{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T22:08:14Z","timestamp":1778623694199,"version":"3.51.4"},"reference-count":60,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100012542","name":"Sichuan Provincial Science and Technology Support Program","doi-asserted-by":"publisher","award":["2026NSFSC0783"],"award-info":[{"award-number":["2026NSFSC0783"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Provincial Science and Technology Support Program","doi-asserted-by":"publisher","award":["2024NSFTD0049"],"award-info":[{"award-number":["2024NSFTD0049"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Municipal Science and Technology Program","doi-asserted-by":"publisher","award":["2025-YF05-00169-SN"],"award-info":[{"award-number":["2025-YF05-00169-SN"]}],"id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019014","name":"Chengdu Municipal Science and Technology Program","doi-asserted-by":"publisher","award":["2025-YF08-00104-GX"],"award-info":[{"award-number":["2025-YF08-00104-GX"]}],"id":[{"id":"10.13039\/501100019014","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306196"],"award-info":[{"award-number":["62306196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115147","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:54:27Z","timestamp":1774940067000},"page":"115147","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Natural granular-ball anomaly detection"],"prefix":"10.1016","volume":"197","author":[{"given":"Qilin","family":"Li","sequence":"first","affiliation":[]},{"given":"Yizhi","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6038-0541","authenticated-orcid":false,"given":"Baiyang","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7456-4445","authenticated-orcid":false,"given":"Zhong","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Dezhong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Shihao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115147_bib0005","article-title":"X-GAD: explainable graph-level anomaly detection via inter-graph anomalies","volume":"296","author":"Zhang","year":"2026","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115147_bib0010","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113190","article-title":"An attention-based balanced variational autoencoder method for credit card fraud detection","author":"Shi","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115147_bib0015","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1016\/j.asoc.2018.12.029","article-title":"Outlier detection based on Gaussian process with application to industrial processes","volume":"76","author":"Wang","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115147_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118902","article-title":"Time-series anomaly detection using dynamic programming based longest common subsequence on sensor data","volume":"213","author":"Nguyen","year":"2023","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115147_bib0025","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.ins.2015.11.005","article-title":"Initialization of K-modes clustering using outlier detection techniques","volume":"332","author":"Jiang","year":"2016","journal-title":"Inform. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0030","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.neucom.2021.04.028","article-title":"A local search algorithm for k-means with outliers","volume":"450","author":"Zhang","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.115147_bib0035","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.ins.2019.01.010","article-title":"Granular ball computing classifiers for efficient, scalable and robust learning","volume":"483","author":"Xia","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0040","author":"Xia"},{"key":"10.1016\/j.asoc.2026.115147_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113304","article-title":"Multi-granularity confidence learning for unsupervised text-to-image person re-identification with incomplete modality","volume":"315","author":"Li","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0050","first-page":"235","article-title":"Statistical fraud detection: a review","author":"Bolton","year":"2002","journal-title":"Stat. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijar.2025.109373","article-title":"Outlier detection in mixed-attribute data: a semi-supervised approach with fuzzy approximations and relative entropy","volume":"179","author":"Chen","year":"2025","journal-title":"Int. J. Approx. Reason."},{"key":"10.1016\/j.asoc.2026.115147_bib0060","series-title":"Proceedings of SIAM International Conference on Data Mining (SDM)","first-page":"145","article-title":"Outlier detection with globally optimal exemplar-based GMM","author":"Yang","year":"2009"},{"key":"10.1016\/j.asoc.2026.115147_bib0065","series-title":"Poster and Demo Track of the 35th German Conference on Artificial Intelligence (KI-2012)","first-page":"59","article-title":"Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm","author":"Goldstein","year":"2012"},{"key":"10.1016\/j.asoc.2026.115147_bib0070","series-title":"2020 IEEE International Conference on Data Mining (ICDM)","first-page":"1118","article-title":"COPOD: copula-based outlier detection","author":"Li","year":"2020"},{"key":"10.1016\/j.asoc.2026.115147_bib0075","first-page":"1","article-title":"ECOD: unsupervised outlier detection using empirical cumulative distribution functions","author":"Li","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2026.115147_bib0080","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.1109\/TKDE.2020.3036524","article-title":"A novel outlier detection method for multivariate data","volume":"34","author":"Almardeny","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2026.115147_bib0085","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1145\/335191.335437","article-title":"Efficient algorithms for mining outliers from large data sets","volume":"29","author":"Ramaswamy","year":"2000","journal-title":"ACM SIGMOD Record"},{"key":"10.1016\/j.asoc.2026.115147_bib0090","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TKDE.2005.31","article-title":"Outlier mining in large high-dimensional data sets","volume":"17","author":"Angiulli","year":"2005","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2026.115147_bib0095","article-title":"Rapid distance-based outlier detection via sampling","volume":"26","author":"Sugiyama","year":"2013","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0100","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.is.2014.09.002","article-title":"A fast MST-inspired KNN-based outlier detection method","volume":"48","author":"Wang","year":"2015","journal-title":"Inf. Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0105","series-title":"International Conference on Machine Learning","first-page":"4393","article-title":"Deep one-class classification","author":"Ruff","year":"2018"},{"key":"10.1016\/j.asoc.2026.115147_bib0110","series-title":"The 12th International Conference on Learning Representations, ICLR","article-title":"Deep orthogonal hypersphere compression for anomaly detection","author":"Zhang","year":"2024"},{"key":"10.1016\/j.asoc.2026.115147_bib0115","series-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data","first-page":"93","article-title":"LOF: identifying density-based local outliers","author":"Breunig","year":"2000"},{"key":"10.1016\/j.asoc.2026.115147_bib0120","series-title":"Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD)","first-page":"535","article-title":"Enhancing effectiveness of outlier detections for low density patterns","author":"Tang","year":"2002"},{"key":"10.1016\/j.asoc.2026.115147_bib0125","series-title":"Proceedings of the International Conference on Data Engineering","first-page":"315","article-title":"LOCI: fast outlier detection using the local correlation integral","author":"Papadimitriou","year":"2003"},{"key":"10.1016\/j.asoc.2026.115147_bib0130","series-title":"International Conference on Data Mining (ICDM)","first-page":"503","article-title":"RDF: a density-based outlier detection method using vertical data representation","author":"Ren","year":"2004"},{"key":"10.1016\/j.asoc.2026.115147_bib0135","series-title":"Advances in Knowledge Discovery and Data Mining","first-page":"577","article-title":"Ranking outliers using symmetric neighborhood relationship","author":"Jin","year":"2006"},{"key":"10.1016\/j.asoc.2026.115147_bib0140","series-title":"Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM)","first-page":"1649","article-title":"LoOP: local outlier probabilities","author":"Kriegel","year":"2009"},{"key":"10.1016\/j.asoc.2026.115147_bib0145","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.knosys.2015.10.014","article-title":"A non-parameter outlier detection algorithm based on natural neighbor","volume":"92","author":"Huang","year":"2016","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0150","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.117988","article-title":"Robust outlier detection based on the changing rate of directed density ratio","volume":"207","author":"Li","year":"2022","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115147_bib0155","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2023.109995","article-title":"Anomaly detection based on weighted fuzzy-rough density","volume":"134","author":"Yuan","year":"2023","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115147_bib0160","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","article-title":"Discovering cluster-based local outliers","volume":"24","author":"He","year":"2003","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.asoc.2026.115147_bib0165","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.knosys.2017.01.013","article-title":"A novel outlier cluster detection algorithm without top-n parameter","volume":"121","author":"Huang","year":"2017","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0170","doi-asserted-by":"crossref","first-page":"6365","DOI":"10.1016\/j.jksuci.2021.07.003","article-title":"An adaptive outlier removal aided k-means clustering algorithm","volume":"34","author":"Shrifan","year":"2022","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0175","series-title":"Image Analysis: 14th Scandinavian Conference","first-page":"978","article-title":"Improving k-means by outlier removal","author":"Hautam\u00e4ki","year":"2005"},{"key":"10.1016\/j.asoc.2026.115147_bib0180","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1016\/j.patrec.2017.03.008","article-title":"k-means clustering with outlier removal","volume":"90","author":"Gan","year":"2017","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.asoc.2026.115147_bib0185","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.106518","article-title":"Robust multi-view k-means clustering with outlier removal","volume":"210","author":"Chen","year":"2020","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0190","doi-asserted-by":"crossref","first-page":"2369","DOI":"10.1109\/TKDE.2019.2954317","article-title":"Clustering with outlier removal","volume":"33","author":"Liu","year":"2019","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2026.115147_bib0195","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2024.121016","article-title":"Detecting anomalies with granular-ball fuzzy rough sets","volume":"678","author":"Su","year":"2024","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0200","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113045","article-title":"Fusing multi-granular-ball fuzzy information to detect outliers","volume":"175","author":"Su","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115147_bib0205","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2024.111115","article-title":"GBMOD: a granular-ball mean-shift outlier detector","volume":"159","author":"Cheng","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.asoc.2026.115147_bib0210","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2025.111588","article-title":"Granular-ball computing-based random walk for anomaly detection","volume":"165","author":"Wang","year":"2025","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.asoc.2026.115147_bib0215","doi-asserted-by":"crossref","first-page":"2144","DOI":"10.1109\/TNNLS.2021.3105984","article-title":"Granular ball sampling for noisy label classification or imbalanced classification","volume":"34","author":"Xia","year":"2021","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0220","doi-asserted-by":"crossref","first-page":"9743","DOI":"10.1109\/TKDE.2023.3249475","article-title":"An efficient spectral clustering algorithm based on granular-ball","volume":"35","author":"Xie","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.asoc.2026.115147_bib0225","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.patrec.2016.05.007","article-title":"Natural neighbor: a self-adaptive neighborhood method without parameter k","volume":"80","author":"Zhu","year":"2016","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.asoc.2026.115147_bib0230","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/335191.335415","article-title":"Influence sets based on reverse nearest neighbor queries","volume":"29","author":"Korn","year":"2000","journal-title":"ACM Sigmod Record"},{"key":"10.1016\/j.asoc.2026.115147_bib0235","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","article-title":"On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study","volume":"30","author":"Campos","year":"2016","journal-title":"Data Min. Knowl. Discov."},{"key":"10.1016\/j.asoc.2026.115147_bib0240","article-title":"A kernelized fuzzy approximation fusion model with granular-ball computing for outlier detection","author":"Li","year":"2025","journal-title":"Inf. Fusion."},{"key":"10.1016\/j.asoc.2026.115147_bib0245","doi-asserted-by":"crossref","DOI":"10.1016\/j.inffus.2023.102133","article-title":"Fusing multi-scale fuzzy information to detect outliers","volume":"103","author":"Chen","year":"2024","journal-title":"Inf. Fusion"},{"key":"10.1016\/j.asoc.2026.115147_bib0250","series-title":"2008 Eighth Ieee International Conference on Data Mining","first-page":"413","article-title":"Isolation forest","author":"Liu","year":"2008"},{"key":"10.1016\/j.asoc.2026.115147_bib0255","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1016\/j.ins.2023.03.037","article-title":"Incomplete mixed data-driven outlier detection based on local\u2013global neighborhood information","volume":"633","author":"Li","year":"2023","journal-title":"Inf. Sci."},{"key":"10.1016\/j.asoc.2026.115147_bib0260","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TNNLS.2016.2614896","article-title":"An efficient representation-based method for boundary point and outlier detection","volume":"29","author":"Li","year":"2018","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.asoc.2026.115147_bib0265","series-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"4323","article-title":"Provable self-representation based outlier detection in a union of subspaces","author":"You","year":"2017"},{"key":"10.1016\/j.asoc.2026.115147_bib0270","author":"Kingma"},{"key":"10.1016\/j.asoc.2026.115147_bib0275","doi-asserted-by":"crossref","first-page":"2302","DOI":"10.1109\/TCYB.2018.2876615","article-title":"Outlier detection using structural scores in a high-dimensional space","volume":"50","author":"Li","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.asoc.2026.115147_bib0280","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s13042-013-0202-4","article-title":"A simple and effective outlier detection algorithm for categorical data","volume":"5","author":"Zhao","year":"2014","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"10.1016\/j.asoc.2026.115147_bib0285","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"13061","article-title":"Disentangling tabular data towards better one-class anomaly detection","volume":"vol. 39","author":"Ye","year":"2025"},{"key":"10.1016\/j.asoc.2026.115147_bib0290","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.inffus.2023.02.007","article-title":"MFGAD: multi-fuzzy granules anomaly detection","volume":"95","author":"Yuan","year":"2023","journal-title":"Inf. Fusion."},{"key":"10.1016\/j.asoc.2026.115147_bib0295","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1214\/aoms\/1177731944","article-title":"A comparison of alternative tests of significance for the problem of m rankings","volume":"11","author":"Friedman","year":"1940","journal-title":"Ann. Math. Stat."},{"key":"10.1016\/j.asoc.2026.115147_bib0300","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Dem\u0161ar","year":"2006","journal-title":"J. Mach. Learn. Res."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626005958?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626005958?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T21:10:21Z","timestamp":1778620221000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626005958"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":60,"alternative-id":["S1568494626005958"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115147","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Natural granular-ball anomaly detection","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115147","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115147"}}