{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T20:56:40Z","timestamp":1764277000243,"version":"3.40.5"},"reference-count":57,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1080\/08839514.2020.1722933","type":"journal-article","created":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T09:31:31Z","timestamp":1581154291000},"page":"345-377","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":13,"title":["Detection of Thin Boundaries between Different Types of Anomalies in Outlier Detection Using Enhanced Neural Networks"],"prefix":"10.1080","volume":"34","author":[{"given":"Rasoul","family":"Kiani","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Marvdasht Branch, Islamic Azad University, Marvdasht, Iran"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1117-4052","authenticated-orcid":false,"given":"Amin","family":"Keshavarzi","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Marvdasht Branch, Islamic Azad University, Marvdasht, Iran"}]},{"given":"Mahdi","family":"Bohlouli","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Technology, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran"},{"name":"Research Center for Basic Sciences and Modern Technologies, Institute for Advanced Studies in Basic Sciences, Zanjan, Iran"},{"name":"Research and Innovation Department, Pentax GmbH, Bonn, Germany"}]}],"member":"301","published-online":{"date-parts":[[2020,2,8]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/ICMIRA.2013.45","volume-title":"Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on","author":"Agarwal S.","year":"2013"},{"key":"CIT0002","doi-asserted-by":"crossref","unstructured":"Aggarwal, C. C. 2015. Outlier analysis. Data mining, 237\u201363. Springer, Springer, Berlin, Heidelberg.","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"CIT0003","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1109\/ICIEA.2014.6931337","volume-title":"Industrial electronics and applications (ICIEA), 2014 IEEE 9th Conference on","author":"Ahmed M.","year":"2014"},{"key":"CIT0004","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/CIFER.1997.618940","volume-title":"Computational Intelligence for Financial Engineering (CIFEr), New York City, USA, 1997., Proceedings of the IEEE\/IAFE 1997","author":"Aleskerov E.","year":"1997"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1080\/01431160110055804"},{"key":"CIT0006","first-page":"477","volume":"6","author":"Barson P.","year":"1996","journal-title":"Neural Network World"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34471-8_4"},{"key":"CIT0008","first-page":"235","author":"Bolton R. J.","year":"2001","journal-title":"Credit Scoring and Credit Control"},{"key":"CIT0009","unstructured":"Boyd, T., G. Docken, and J. Ruggiero. 2016. Outliers in data envelopment analysis. \u00a0Journal of Centrum Cathedra, Vol. 9 No. 2, pp. 168-183."},{"key":"CIT0010","unstructured":"Campbell, C., and Bennett, K. 2000. A Linear Programming Approach to Novelty Detection. In\u00a0Proceedings of the 13th International Conference on Neural Information Processing Systems, Denver, Colorado, USA, Wiki Loves LovePhotograph your local culture, help Wikipedia and win!Colorado\u00a0(pp. 374\u2013380). MIT Press, USA."},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"CIT0012","first-page":"152","volume-title":"Computer Software and Applications Conference Workshops (COMPSACW), Seoul, Korea, 2010 IEEE 34th Annual","author":"Challagalla A.","year":"2010"},{"volume-title":"International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO)","year":"2015","author":"Chandarana D. R.","key":"CIT0013"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"CIT0015","first-page":"2070","volume-title":"Neural Networks, 2002. IJCNN\u201902. Honolulu, HI, USA, Proceedings of the 2002 International Joint Conference on","author":"Diaz I.","year":"2002"},{"key":"CIT0016","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/1081870.1081917","volume-title":"Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining","author":"Fujimaki R.","year":"2005"},{"key":"CIT0017","first-page":"259","volume-title":"Computer Security Applications Conference, 1998. Proceedings. 14th Annual","author":"Ghosh A. K.","year":"1998"},{"key":"CIT0018","first-page":"1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN)","author":"Guo F.","year":"2018"},{"key":"CIT0019","first-page":"1","volume":"5","author":"Gupta M.","year":"2014","journal-title":"Transactions on Knowledge and Data Engineering"},{"key":"CIT0020","first-page":"1749","volume-title":"Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT\/IUCC\/DASC\/PICOM), 2015 IEEE International Conference on","author":"Hachmi F.","year":"2015"},{"key":"CIT0021","first-page":"286","volume-title":"AMIA annual symposium proceedings","author":"Hauskrecht M.","year":"2010"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1169-8"},{"issue":"9","key":"CIT0024","volume":"11","author":"Keshavarzi A.","year":"2017","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"CIT0025","doi-asserted-by":"crossref","unstructured":"Keshavarzi, A., A. T. Haghighat, and M. Bohlouli. 2019. Enhanced time-aware QoS prediction in multi-cloud: A hybrid k-medoids and lazy learning approach (QoPC). Computing, 1\u201327.","DOI":"10.1007\/s00607-019-00747-y"},{"key":"CIT0026","volume-title":"Advanced data mining and applications. ADMA 2008. Lecture notes in computer science","volume":"5139","author":"Keshavarzi A.","year":"2008"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.14569\/issn.2165-4069"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1007\/s13760-017-0817-4"},{"key":"CIT0029","first-page":"281","volume-title":"ictai","author":"Kou Y.","year":"2007"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-016-0486-6"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2401536"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(01)00133-7"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0560-3"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-018-0585-7"},{"key":"CIT0035","first-page":"1","volume-title":"Recent Advances and Innovations in Engineering (ICRAIE), 2016 International Conference on","author":"Maheshwari K.","year":"2016"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.5120\/17026-7318"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1162\/15324430260185574"},{"key":"CIT0038","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1145\/956750.956831","volume-title":"Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining","author":"Noble C. C.","year":"2003"},{"key":"CIT0039","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","volume-title":"International Workshop on Recent Advances in Intrusion Detection","author":"Ramadas M.","year":"2003"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-006-0112-4"},{"key":"CIT0041","doi-asserted-by":"crossref","first-page":"1590","DOI":"10.1109\/SSCI.2015.224","volume-title":"Computational Intelligence, 2015 IEEE Symposium Series on","author":"Riahi F.","year":"2015"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269665"},{"key":"CIT0043","first-page":"579","volume-title":"Proceedings of intelligent engineering systems through artificial neural networks","author":"Smith R.","year":"2002"},{"key":"CIT0044","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1117\/12.434110","volume-title":"Smart Structures and Materials 2001: Smart Systems for Bridges, Structures, and Highways","author":"Sohn H.","year":"2001"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1009"},{"key":"CIT0046","first-page":"211","volume":"6","author":"Steinwart I.","year":"2005","journal-title":"Journal of Machine Learning Research"},{"key":"CIT0047","first-page":"1241","volume-title":"Acoustics, Speech and Signal Processing, 1998. Seattle, WA, USA, Proceedings of the 1998 IEEE International Conference on","author":"Taniguchi M.","year":"1998"},{"key":"CIT0048","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1117\/12.487069","volume-title":"Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery IX","author":"Theiler J. P.","year":"2003"},{"key":"CIT0049","first-page":"1","volume-title":"IJCNN","author":"Vatanen T.","year":"2012"},{"key":"CIT0050","first-page":"22","volume":"32","author":"Vijayarani S.","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"CIT0051","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1109\/ICDM.2009.95","volume-title":"Data Mining, 2009. ICDM\u201909. Ninth IEEE International Conference on","author":"Wang X.","year":"2009"},{"key":"CIT0052","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1109\/iThings\/CPSCom.2011.25","volume-title":"2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing","author":"Yang S.","year":"2011"},{"volume-title":"Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy","year":"2008","author":"Zhang J.","key":"CIT0053"},{"key":"CIT0054","doi-asserted-by":"crossref","first-page":"1632","DOI":"10.1109\/FSKD.2012.6233948","volume-title":"Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012)","author":"Zhang J.","year":"2012"},{"key":"CIT0055","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/ICICTA.2018.00009","volume-title":"2018 11th International Conference on Intelligent Computation Technology and Automation (ICICTA)","author":"Zhang L.","year":"2018"},{"key":"CIT0056","first-page":"85","volume-title":"Proc. IEEE Workshop on Information Assurance and Security","author":"Zhang Z.","year":"2001"},{"key":"CIT0057","first-page":"1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN)","author":"Zhao Y.","year":"2018"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2020.1722933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T06:24:57Z","timestamp":1609136697000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2020.1722933"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,8]]},"references-count":57,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,4,15]]}},"alternative-id":["10.1080\/08839514.2020.1722933"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2020.1722933","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"type":"print","value":"0883-9514"},{"type":"electronic","value":"1087-6545"}],"subject":[],"published":{"date-parts":[[2020,2,8]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-02-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}