{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:03:50Z","timestamp":1756893830998,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031083327"},{"type":"electronic","value":"9783031083334"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08333-4_7","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T15:52:13Z","timestamp":1655394733000},"page":"85-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Empirical Study on\u00a0Anomaly Detection Algorithms for\u00a0Extremely Imbalanced Datasets"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0288-9029","authenticated-orcid":false,"given":"Gon\u00e7alo","family":"Fontes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5827-9129","authenticated-orcid":false,"given":"Lu\u00eds Miguel","family":"Matos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4902-9483","authenticated-orcid":false,"given":"Arthur","family":"Matta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4380-3220","authenticated-orcid":false,"given":"Andr\u00e9","family":"Pilastri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7991-2090","authenticated-orcid":false,"given":"Paulo","family":"Cortez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,10]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2015.01.001","volume":"55","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Futur. Gener. Comput. Syst. 55, 278\u2013288 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2014","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2014). https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min. Knowl. Disc."},{"key":"7_CR3","doi-asserted-by":"publisher","unstructured":"Alla, S., Adari, S.K.: Beginning Anomaly Detection Using Python-Based Deep Learning. Apress, Berkeley (2019). https:\/\/doi.org\/10.1007\/978-1-4842-5177-5","DOI":"10.1007\/978-1-4842-5177-5"},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001). https:\/\/doi.org\/10.1023\/A:1010933404324","journal-title":"Mach. Learn."},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Chen, W., Naughton, J.F., Bernstein, P.A. (eds.) Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, USA, 16\u201318 May 2000, pp. 93\u2013104. ACM (2000). https:\/\/doi.org\/10.1145\/342009.335388","DOI":"10.1145\/342009.335388"},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1177\/1473871616686635","volume":"17","author":"N Cao","year":"2018","unstructured":"Cao, N., Lin, Y.R., Gotz, D., Du, F.: Z-glyph: visualizing outliers in multivariate data. Inf. Vis. 17(1), 22\u201340 (2018). https:\/\/doi.org\/10.1177\/1473871616686635","journal-title":"Inf. Vis."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)","DOI":"10.1145\/3394486.3406704"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., Kegelmeyer, W.P.: SMOTE: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002). https:\/\/doi.org\/10.1613\/jair.953","DOI":"10.1613\/jair.953"},{"key":"7_CR10","unstructured":"Credit Card Fraud - Kaggle: Anonymized credit card transactions labeled as fraudulent or genuine (2018). https:\/\/www.kaggle.com\/mlg-ulb\/creditcardfraud"},{"key":"7_CR11","unstructured":"Delgado, M.F., Cernadas, E., Barro, S., Amorim, D.G.: Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res. 15(1), 3133\u20133181 (2014). http:\/\/dl.acm.org\/citation.cfm?id=2697065"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett, T.: An introduction to ROC analysis. Pattern Recognit. Lett. 27, 861\u2013874 (2006)","journal-title":"Pattern Recognit. Lett."},{"key":"7_CR13","doi-asserted-by":"publisher","unstructured":"Ferreira, L., Pilastri, A.L., Martins, C.M., Pires, P.M., Cortez, P.: A comparison of automl tools for machine learning, deep learning and xgboost. In: International Joint Conference on Neural Networks, IJCNN 2021, Shenzhen, China, 18\u201322 July 2021, pp. 1\u20138. IEEE (2021). https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534091","DOI":"10.1109\/IJCNN52387.2021.9534091"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-030-91608-4_26","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2021","author":"L Ferreira","year":"2021","unstructured":"Ferreira, L., Pilastri, A., Sousa, V., Romano, F., Cortez, P.: Prediction of maintenance equipment failures using automated machine learning. In: Yin, H., et al. (eds.) IDEAL 2021. LNCS, vol. 13113, pp. 259\u2013267. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91608-4_26"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","volume":"11","author":"FE Grubbs","year":"1969","unstructured":"Grubbs, F.E.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1\u201321 (1969)","journal-title":"Technometrics"},{"key":"7_CR16","doi-asserted-by":"publisher","unstructured":"Hinton, G., Salakhutdinov, R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006). https:\/\/doi.org\/10.1126\/science.1127647. Cited By 9376","DOI":"10.1126\/science.1127647"},{"issue":"2","key":"7_CR17","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Kumar, V.: Parallel and distributed computing for cybersecurity. IEEE Distrib. Syst. Online 6(10) (2005)","DOI":"10.1109\/MDSO.2005.53"},{"key":"7_CR19","unstructured":"Lema\u00eetre, G., Nogueira, F., Aridas, C.K.: Imbalanced-learn: a python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 18(17), 1\u20135 (2017). http:\/\/jmlr.org\/papers\/v18\/16-365"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.: Isolation forest. In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM), Pisa, Italy, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"7_CR21","unstructured":"Longadge, R., Dongre, S.: Class imbalance problem in data mining review. arXiv preprint arXiv:1305.1707 (2013)"},{"key":"7_CR22","unstructured":"Matos, L.M., Cortez, P., Mendes, R.: Cane - Categorical Attribute traNsformation Environment (2020). https:\/\/pypi.org\/project\/cane\/"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Matos, L.M., Cortez, P., Mendes, R., Moreau, A.: A comparison of data-driven approaches for mobile marketing user conversion prediction. In: Jardim-Gon\u00e7alves, R., Mendon\u00e7a, J.P., Jotsov, V., Marques, M., Martins, J., Bierwolf, R.E. (eds.) 9th IEEE International Conference on Intelligent Systems, IS 2018, Funchal, Madeira, Portugal, 25\u201327 September 2018, pp. 140\u2013146. IEEE (2018). https:\/\/doi.org\/10.1109\/IS.2018.8710472","DOI":"10.1109\/IS.2018.8710472"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Matos, L.M., Cortez, P., Mendes, R., Moreau, A.: Using deep learning for mobile marketing user conversion prediction. In: International Joint Conference on Neural Networks, IJCNN 2019 Budapest, Hungary, 14\u201319 July 2019, pp. 1\u20138. IEEE (2019). https:\/\/doi.org\/10.1109\/IJCNN.2019.8851888","DOI":"10.1109\/IJCNN.2019.8851888"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-030-33607-3_7","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2019","author":"LM Matos","year":"2019","unstructured":"Matos, L.M., Cortez, P., Mendes, R.C., Moreau, A.: Using deep learning for ordinal classification of mobile marketing user conversion. In: Yin, H., Camacho, D., Tino, P., Tall\u00f3n-Ballesteros, A.J., Menezes, R., Allmendinger, R. (eds.) IDEAL 2019. LNCS, vol. 11871, pp. 60\u201367. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33607-3_7"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-91608-4_1","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2021","author":"LM Matos","year":"2021","unstructured":"Matos, L.M., Domingues, A., Moreira, G., Cortez, P., Pilastri, A.: A comparison of machine learning approaches for predicting in-car display production quality. In: Yin, H., et al. (eds.) IDEAL 2021. LNCS, vol. 13113, pp. 3\u201311. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-91608-4_1"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Matzka, S.: Explainable artificial intelligence for predictive maintenance applications. In: Proceedings - 2020 3rd International Conference on Artificial Intelligence for Industries, AI4I 2020, pp. 69\u201374 (2020). https:\/\/doi.org\/10.1109\/AI4I49448.2020.00023","DOI":"10.1109\/AI4I49448.2020.00023"},{"key":"7_CR28","unstructured":"Microsoft: Predictive maintenance modelling guide (2016). https:\/\/gallery.azure.ai\/Collection\/Predictive-Maintenance-Implementation-Guide-1"},{"issue":"3","key":"7_CR29","first-page":"294","volume":"3","author":"F Muharemi","year":"2019","unstructured":"Muharemi, F., Logof\u0103tu, D., Leon, F.: Machine learning approaches for anomaly detection of water quality on a real-world data set. J. Inf. Telecommun. 3(3), 294\u2013307 (2019)","journal-title":"J. Inf. Telecommun."},{"issue":"2","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2021). https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput. Surv."},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"Patki, N., Wedge, R., Veeramachaneni, K.: The synthetic data vault. In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 399\u2013410, October 2016. https:\/\/doi.org\/10.1109\/DSAA.2016.49","DOI":"10.1109\/DSAA.2016.49"},{"key":"7_CR32","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-86230-5_44","volume-title":"Progress in Artificial Intelligence","author":"PJ Pereira","year":"2021","unstructured":"Pereira, P.J., Pereira, A., Cortez, P., Pilastri, A.: A comparison of machine learning methods for extremely unbalanced industrial quality data. In: Marreiros, G., Melo, F.S., Lau, N., Lopes Cardoso, H., Reis, L.P. (eds.) EPIA 2021. LNCS (LNAI), vol. 12981, pp. 561\u2013572. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86230-5_44"},{"issue":"4","key":"7_CR33","first-page":"2828","volume":"7","author":"K Rai","year":"2016","unstructured":"Rai, K., Devi, M.S., Guleria, A.: Decision tree based algorithm for intrusion detection. Int. J. Adv. Netw. Appl. 7(4), 2828 (2016)","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1007\/978-3-030-86960-1_34","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2021","author":"D Ribeiro","year":"2021","unstructured":"Ribeiro, D., Matos, L.M., Cortez, P., Moreira, G., Pilastri, A.: A comparison of anomaly detection methods for industrial screw tightening. In: Gervasi, O., et al. (eds.) ICCSA 2021. LNCS, vol. 12950, pp. 485\u2013500. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-86960-1_34"},{"issue":"4","key":"7_CR35","doi-asserted-by":"publisher","first-page":"54","DOI":"10.3390\/computers11040054","volume":"11","author":"D Ribeiro","year":"2022","unstructured":"Ribeiro, D., Matos, L.M., Moreira, G., Pilastri, A., Cortez, P.: Isolation forests and deep autoencoders for industrial screw tightening anomaly detection. Computers 11(4), 54 (2022). https:\/\/doi.org\/10.3390\/computers11040054","journal-title":"Computers"},{"key":"7_CR36","unstructured":"Ruff, L., G\u00f6rnitz, N., et al.: Deep one-class classification. In: Dy, J.G., Krause, A. (eds.) Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\u00e4ssan, Stockholm, Sweden, 10\u201315 July 2018. Proceedings of Machine Learning Research, vol. 80, pp. 4390\u20134399. PMLR (2018)"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08333-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T16:02:05Z","timestamp":1655395325000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08333-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031083327","9783031083334"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08333-4_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AIAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Artificial Intelligence Applications and Innovations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hersonissos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aiai2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifipaiai.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}