{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T12:08:41Z","timestamp":1774526921776,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2017YFB1010000"],"award-info":[{"award-number":["2017YFB1010000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772053"],"award-info":[{"award-number":["61772053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011347","name":"State Key Laboratory of Software Development Environment","doi-asserted-by":"publisher","award":["SKLSDE-2018ZX-10"],"award-info":[{"award-number":["SKLSDE-2018ZX-10"]}],"id":[{"id":"10.13039\/501100011347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013287","name":"Science Challenge Project","doi-asserted-by":"crossref","award":["TZ2016002"],"award-info":[{"award-number":["TZ2016002"]}],"id":[{"id":"10.13039\/501100013287","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2018.2886197","type":"journal-article","created":{"date-parts":[[2018,12,11]],"date-time":"2018-12-11T14:53:12Z","timestamp":1544539992000},"page":"1006-1020","source":"Crossref","is-referenced-by-count":29,"title":["An Efficient Density-Based Local Outlier Detection Approach for Scattered Data"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1395-4578","authenticated-orcid":false,"given":"Shubin","family":"Su","sequence":"first","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Limin","family":"Xiao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Li","family":"Ruan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Fei","family":"Gu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5823-2037","authenticated-orcid":false,"given":"Shupan","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Zhaokai","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]},{"given":"Rongbin","family":"Xu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-540-73499-4_6","article-title":"Outlier detection with kernel density functions","author":"latecki","year":"2007","journal-title":"Proc IEEE Mach Learn Data Mining Pattern Recogn (MLDM)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-005-0233-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_68"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-1004-2"},{"key":"ref36","first-page":"19","article-title":"Fast and scalable outlier detection with approximate nearest neighbor ensembles","author":"schubert","year":"2015","journal-title":"Proc Int Conf Database Syst Adv Appl"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0430-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.63"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-2004-8105"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.130"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-006-0034-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2679006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3014812.3014829"},{"key":"ref15","first-page":"1560","article-title":"A data-driven approach for multivariate contextualized anomaly detection: Industry use case","author":"stojanovic","year":"2018","journal-title":"Proc IEEE Int Conf Big Data"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/qre.1581"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.34"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2017.06.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0300-z"},{"key":"ref28","article-title":"Local sparsity coefficient-based mining of outliers","author":"agyemang","year":"2002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029809"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","article-title":"Distance-based outliers: Algorithms and applications","volume":"8","author":"knorr","year":"2000","journal-title":"VLDB J"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/9150965"},{"key":"ref8","first-page":"226","article-title":"Survey on incremental approaches for network anomaly detection","volume":"3","author":"bhuyan","year":"2012","journal-title":"Int J Commun Netw Inf Sec"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr026"},{"key":"ref2","first-page":"11","article-title":"A unified approach for mining outliers","author":"knorr","year":"1997","journal-title":"Proc Conf Centre Adv Stud Collaborative Res"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.22"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.60"},{"key":"ref46","year":"2018","journal-title":"UPenn Wharton Research Data Services Stock"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_84"},{"key":"ref45","first-page":"811","article-title":"Detecting distance-based outliers in streams of data","author":"angiulli","year":"2007","journal-title":"Proc 16th ACM Conf Inf Knowl Manage (CIKM)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref47","first-page":"76","article-title":"Scalable distance-based outlier detection over high-volume data streams","author":"apacao","year":"2014","journal-title":"Proc IEEE Int Conf Data Eng"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98741"},{"key":"ref42","author":"hettich","year":"1999","journal-title":"The UCI KDD Archive"},{"key":"ref24","first-page":"426","article-title":"M-tree: An efficient access method for similarity search in metric spaces","author":"ciaccia","year":"1997","journal-title":"Proc 23rd Int Conf Very Large Data Bases (VLDB)"},{"key":"ref41","first-page":"226","article-title":"A density based algorithm for discovering clusters in large spatial data sets with noise","author":"ester","year":"1996","journal-title":"Proc Int'l Conf Knowledge Discovery and Data Mining"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143857"},{"key":"ref44","year":"2018","journal-title":"Pacific Ocean TAO"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1997.582015"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08572736.pdf?arnumber=8572736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T18:44:30Z","timestamp":1753296270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8572736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2886197","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}