{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:49:15Z","timestamp":1725832155200},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319244648"},{"type":"electronic","value":"9783319244655"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24465-5_17","type":"book-chapter","created":{"date-parts":[[2015,10,13]],"date-time":"2015-10-13T05:17:43Z","timestamp":1444713463000},"page":"193-204","source":"Crossref","is-referenced-by-count":2,"title":["Class-Based Outlier Detection: Staying Zombies or Awaiting for Resurrection?"],"prefix":"10.1007","author":[{"given":"Leona","family":"Nezvalov\u00e1","sequence":"first","affiliation":[]},{"given":"Lubo\u0161","family":"Popel\u00ednsk\u00fd","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Torgo","sequence":"additional","affiliation":[]},{"given":"Karel","family":"Vacul\u00edk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,22]]},"reference":[{"key":"17_CR1","unstructured":"ODD2 Ws on Outlier Detection & Description under Data Diversity, KDD (2014)"},{"key":"17_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2013","unstructured":"Aggarwal, C.C.: Outlier Analysis. Springer, New York (2013)"},{"issue":"2","key":"17_CR3","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10618-013-0310-5","volume":"28","author":"F Angiulli","year":"2014","unstructured":"Angiulli, F., Fassetti, F.: Exploiting domain knowledge to detect outliers. Data Min. Knowl. Discov. 28(2), 519\u2013568 (2014)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"17_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-40994-3_20","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"XH Dang","year":"2013","unstructured":"Dang, X.H., Micenkov\u00e1, B., Assent, I., Ng, R.T.: Local outlier detection with interpretation. In: Blockeel, H., Kersting, K., Nijssen, S., \u017delezn\u00fd, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 304\u2013320. Springer, Heidelberg (2013)"},{"issue":"1","key":"17_CR6","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., et al.: The weka data mining software: an update. SIGKDD Explor. Newsl. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"issue":"5","key":"17_CR7","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TNNLS.2013.2292894","volume":"25","author":"B Frenay","year":"2014","unstructured":"Frenay, B., Verleysen, M.: Classification in the presence of label noise: a survey. IEEE Trans. Neural Netw. Learn. Syst. 25(5), 845\u2013869 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"4","key":"17_CR8","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.eswa.2004.07.002","volume":"27","author":"Z He","year":"2004","unstructured":"He, Z., Xu, X., Huang, J.Z., Deng, S.: Mining class outliers: concepts, algorithms and applications in CRM. Expert Syst. Appl. 27(4), 681\u2013697 (2004)","journal-title":"Expert Syst. Appl."},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-45703-8_12","volume-title":"Advances in Web-Age Information Management","author":"Z He","year":"2002","unstructured":"He, Z., Deng, S., Xu, X.: Outlier detection integrating semantic knowledge. In: Meng, X., Su, J., Wang, Y. (eds.) WAIM 2002. LNCS, vol. 2419, p. 126. Springer, Heidelberg (2002)"},{"issue":"1","key":"17_CR10","first-page":"5568","volume":"2","author":"N Hewahi","year":"2007","unstructured":"Hewahi, N., Saad, M.: Class outliers mining: distance-based approach. Int. J. Intell. Technol. 2(1), 5568 (2007)","journal-title":"Int. J. Intell. Technol."},{"key":"17_CR11","unstructured":"John, G.H.: Robust decision trees: removing outliers from databases. In: Knowledge Discovery and Data Mining, pp. 174\u2013179. AAAI Press (1995)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Konijn, R.M., Duivesteijn,W., Kowalczyk, W., Knobbe, A.J.: Discovering local subgroups, with an application to fraud detection. In: Proceedings of PAKDD 2013, pp. 1\u201312 (2013)","DOI":"10.1007\/978-3-642-37453-1_1"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-87481-2_1","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"D Leman","year":"2008","unstructured":"Leman, D., Feelders, A., Knobbe, A.J.: Exceptional model mining. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part II. LNCS (LNAI), vol. 5212, pp. 1\u201316. Springer, Heidelberg (2008)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Micenkov\u00e1, B., Ng, R.T., Dang, X.H., Assent, I.: Explaining outliers by subspace separability. In: IEEE ICDM 2013, pp. 518\u2013527 (2013)","DOI":"10.1109\/ICDM.2013.132"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1007\/978-3-642-33486-3_57","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"E M\u00fcller","year":"2012","unstructured":"M\u00fcller, E., Keller, F., Blanc, S., B\u00f6hm, K.: OutRules: A framework for outlier descriptions in multiple context spaces. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part II. LNCS, vol. 7524, pp. 828\u2013832. Springer, Heidelberg (2012)"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45072-6_12","volume-title":"Advances in Spatial and Temporal Databases","author":"S Papadimitriou","year":"2003","unstructured":"Papadimitriou, S., Faloutsos, C.: Cross-outlier detection. In: Hadzilacos, T., Manolopoulos, Y., Roddick, J., Theodoridis, Y. (eds.) SSTD 2003. LNCS, vol. 2750. Springer, Heidelberg (2003)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Smith, M.R., Martinez, T.R.: Improving classification accuracy by identifying and removing instances that should be misclassified. In: IJCNN, pp. 2690\u20132697. IEEE (2011)","DOI":"10.1109\/IJCNN.2011.6033571"},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1007\/978-3-319-10554-3_14","volume-title":"Artificial Intelligence: Methodology, Systems, and Applications","author":"K Vacul\u00edk","year":"2014","unstructured":"Vacul\u00edk, K., Nezvalov\u00e1, L., Popel\u00ednsk\u00fd, L.: Educational data mining for analysis of students\u2019 solutions. In: Agre, G., Hitzler, P., Krisnadhi, A.A., Kuznetsov, S.O. (eds.) AIMSA 2014. LNCS, vol. 8722, pp. 150\u2013161. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Data Analysis XIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24465-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:18:29Z","timestamp":1559279909000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24465-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319244648","9783319244655"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24465-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}