{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T13:50:36Z","timestamp":1764251436512,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2016,5,29]],"date-time":"2016-05-29T00:00:00Z","timestamp":1464480000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373134"],"award-info":[{"award-number":["61373134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Jiangsu Key Laboratory of Meteorological Observation and Information Processing","award":["KDXS1105"],"award-info":[{"award-number":["KDXS1105"]}]},{"name":"Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11042-016-3638-1","type":"journal-article","created":{"date-parts":[[2016,5,29]],"date-time":"2016-05-29T21:30:26Z","timestamp":1464557426000},"page":"16911-16927","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Parallel implementing improved k-means applied for image retrieval and anomaly detection"],"prefix":"10.1007","volume":"76","author":[{"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"given":"Sun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"key":"3638_CR1","first-page":"1","volume":"2015","author":"M Anagnostopoulos","year":"2015","unstructured":"Anagnostopoulos M, Kambourakis G, Gritzalis S (2015) New facets of mobile botnet: architecture and evaluation. Int J Inf Secur 2015:1\u201319","journal-title":"Int J Inf Secur"},{"issue":"7","key":"3638_CR2","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2014","unstructured":"Gu B, Sheng VS, Tay KY, Romano W, Li S (2014) Incremental support vector learning for ordinal regression. Ieee T Neur Net Learn 26(7):1403\u20131416","journal-title":"Ieee T Neur Net Learn"},{"key":"3638_CR3","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu B, Sheng VS, Wang Z, Ho D, Osman S, Li S (2015) Incremental learning for \u03bd-support vector regression. Neural Netw 67:140\u2013150","journal-title":"Neural Netw"},{"issue":"2","key":"3638_CR4","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/BF02719780","volume":"31","author":"S Laxman","year":"2006","unstructured":"Laxman S, Sastry PS (2006) A survey of temporal data mining. Sadhana Acad P Eng S 31(2):173\u2013198","journal-title":"Sadhana Acad P Eng S"},{"issue":"12","key":"3638_CR5","doi-asserted-by":"crossref","first-page":"14891","DOI":"10.1016\/j.eswa.2011.05.058","volume":"38","author":"S Leea","year":"2011","unstructured":"Leea S, Kimb G, Kimc S (2011) Self-adaptive and dynamic clustering for online anomaly detection. Exp Syst Appl 38(12):14891\u201314898","journal-title":"Exp Syst Appl"},{"issue":"1","key":"3638_CR6","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/s00500-014-1511-6","volume":"20","author":"FA Narudin","year":"2016","unstructured":"Narudin FA, Feizollah A, Anuar NB, Gani A (2016) Evaluation of machine learning classifiers for mobile malware detection. Soft Comput 20(1):343\u2013357","journal-title":"Soft Comput"},{"key":"3638_CR7","first-page":"1","volume":"2015","author":"N Pandeeswari","year":"2015","unstructured":"Pandeeswari N, Kumar G (2015) Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mob Netw Appl 2015:1\u201312","journal-title":"Mob Netw Appl"},{"issue":"2","key":"3638_CR8","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/s10994-010-5177-8","volume":"80","author":"O Shamir","year":"2010","unstructured":"Shamir O, Tishby N (2010) Stability and model selection in k-means clustering. Mach Learn 80(2):213\u2013243","journal-title":"Mach Learn"},{"issue":"8","key":"3638_CR9","first-page":"2721","volume":"32","author":"XJ Tong","year":"2011","unstructured":"Tong XJ, Meng FR, Wang ZX (2011) Optimization to k-means initial cluster centers. Comput Eng Des 32(8):2721\u20132723","journal-title":"Comput Eng Des"},{"issue":"4","key":"3638_CR10","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s10462-008-9082-5","volume":"27","author":"SD Villalba","year":"2007","unstructured":"Villalba SD, Cunningham P (2007) An evaluation of dimension reduction techniques for one-class classification. Artif Intell Rev 27(4):273\u2013294","journal-title":"Artif Intell Rev"},{"key":"3638_CR11","first-page":"425","volume":"2014","author":"C Yin","year":"2014","unstructured":"Yin C (2014) Towards accurate node-based detection of P2P Botnets. Sci World J 2014:425\u2013491","journal-title":"Sci World J"},{"key":"3638_CR12","first-page":"1","volume":"2015","author":"C Yin","year":"2015","unstructured":"Yin C, Feng L, Ma L (2015) An improved Hoeffding-ID data-stream classification algorithm. J Supercomput 2015:1\u201312","journal-title":"J Supercomput"},{"issue":"5","key":"3638_CR13","first-page":"1","volume":"30","author":"C Yin","year":"2016","unstructured":"Yin C, Ma L, Feng L (2016) A feature selection method for improved clonal algorithm towards intrusion detection. Int J Pattern Recognit Artif Intell 30(5):1\u201313","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"6","key":"3638_CR14","doi-asserted-by":"crossref","first-page":"291","DOI":"10.14257\/ijhit.2013.6.6.26","volume":"6","author":"C Yin","year":"2013","unstructured":"Yin C, Zou M, Iko D, Wang J (2013) Botnet detection based on correlation of malicious behaviors. Int J Hybrid Inf Technol 6(6):291\u2013300","journal-title":"Int J Hybrid Inf Technol"},{"issue":"6","key":"3638_CR15","first-page":"1675","volume":"31","author":"FY Yuan","year":"2011","unstructured":"Yuan FY, Zhang XC, Luo SB (2011) Accurate property weighted K- means clustering algorithm based on information entropy. J Comput Appl 31(6):1675\u20131677","journal-title":"J Comput Appl"},{"key":"3638_CR16","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1109\/SP.2012.16","volume":"59","author":"Y Zhou","year":"2012","unstructured":"Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. 2012 I.E. Symp Secur Priv 59:95\u2013109","journal-title":"2012 I.E. Symp Secur Priv"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3638-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3638-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3638-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T22:13:55Z","timestamp":1589667235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3638-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,29]]},"references-count":16,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3638"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3638-1","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,5,29]]}}}