{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:24:50Z","timestamp":1775100290185,"version":"3.50.1"},"reference-count":241,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1509216"],"award-info":[{"award-number":["U1509216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1866602"],"award-info":[{"award-number":["U1866602"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602129"],"award-info":[{"award-number":["61602129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472099"],"award-info":[{"award-number":["61472099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2016YFB1000703"],"award-info":[{"award-number":["2016YFB1000703"]}]},{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2932769","type":"journal-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T19:56:12Z","timestamp":1564775772000},"page":"107964-108000","source":"Crossref","is-referenced-by-count":427,"title":["Progress in Outlier Detection Techniques: A Survey"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7521-2871","authenticated-orcid":false,"given":"Hongzhi","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7335-602X","authenticated-orcid":false,"given":"Mohamed Jaward","family":"Bah","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6506-3083","authenticated-orcid":false,"given":"Mohamed","family":"Hammad","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology, Harbin, China"}]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2014.2322385"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8255032"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_38"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93037-4_40"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2015.7393040"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487676"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498276"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481252"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12097"},{"key":"ref168","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","author":"kaufman","year":"1990","journal-title":"Finding Groups in Data An Introduction to Cluster Analysis"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2248"},{"key":"ref39","author":"barnett","year":"1994","journal-title":"Outliers in Statistical Data"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12026-8_29"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr026"},{"key":"ref32","article-title":"Deep learning for anomaly detection: A survey","author":"chalapathy","year":"2019","journal-title":"arXiv 1901 03407"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref30","first-page":"1","article-title":"A survey of deep learning-based network anomaly detection","volume":"10","author":"kwon","year":"2017","journal-title":"Cluster Comput"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081891"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3134302.3134337"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803446"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/2594473.2594476"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/2618243.2618257"},{"key":"ref185","first-page":"1167","article-title":"Sequential ensemble learning for outlier detection: A bias-variance perspective","author":"rayana","year":"2017","journal-title":"Proc ICDM"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/2890508"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489605"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/2830544.2830549"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.142"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2004.10095"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93034-3_45"},{"key":"ref186","article-title":"Learning representations for outlier detection on a budget","author":"micenkov\u00e1","year":"2015","journal-title":"arXiv 1507 08104"},{"key":"ref28","author":"aggarwal","year":"2016","journal-title":"Outlier Analysis"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487676"},{"key":"ref29","first-page":"57","volume":"1","author":"hadi","year":"2009","journal-title":"Outlier Detection"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893124"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00114"},{"key":"ref24","first-page":"261","article-title":"Outlier detection","volume":"1","author":"su","year":"2011","journal-title":"Robust Regression and Outlier Detection"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1347"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.4108\/trans.sis.2013.01-03.e2"},{"key":"ref25","first-page":"3535","article-title":"A survey of outlier detection algorithms for data streams","author":"tamboli","year":"2016","journal-title":"Proc 3rd Int Conf Comput Sustain Global Develop"},{"key":"ref50","year":"2018","journal-title":"ELKI Outlier Datasets"},{"key":"ref51","author":"rayana","year":"2018","journal-title":"ODDS Library Stony Brook NY Stony Brook University Department of Computer Science"},{"key":"ref154","first-page":"58","article-title":"An efficient approach to cluster in large multimedia databases with noise","author":"hinneburg","year":"1998","journal-title":"Proc SIGKDD"},{"key":"ref153","first-page":"226","article-title":"A density-based algorithm for discovering clusters a density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc Int'l Conf Knowledge Discovery and Data Mining"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-005-0265-0"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050009"},{"key":"ref150","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/T-C.1971.223083","article-title":"Graph-theoretical methods for detecting and describing gestalt clusters","volume":"c 20","author":"zahn","year":"1971","journal-title":"IEEE Trans Comput"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/2.781637"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276312"},{"key":"ref146","first-page":"310","article-title":"An effective clustering-based approach for outlier detection","volume":"28","author":"al-zoubi","year":"2009","journal-title":"Eur J Sci Res"},{"key":"ref147","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","author":"kaufman","year":"1990","journal-title":"Finding Groups in Data An Introduction to Cluster Analysis"},{"key":"ref148","first-page":"144","article-title":"Efficient and effective clustering methods for spatial data mining","author":"ng","year":"1994","journal-title":"Proc 20th VLDB Conf"},{"key":"ref149","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proc 5th Berkeley Symp Math Statist Prob"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-016-0400-6"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1067-8"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14778\/3115404.3115410"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5772\/5526"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_93"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2816564"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.9790\/0661-16264448"},{"key":"ref52","author":"bache","year":"2013","journal-title":"UCI Machine Learning Repository"},{"key":"ref40","first-page":"1","article-title":"A review of statistical outlier methods","volume":"30","author":"walfish","year":"2006","journal-title":"Pharm Technol"},{"key":"ref167","first-page":"6050","article-title":"Outlier detection in streaming data using clustering approached","volume":"5","author":"bhosale","year":"2014","journal-title":"Int J Adv Comput Inf Technol"},{"key":"ref166","first-page":"25","article-title":"Outlier detection in stream data by clustering method","volume":"2","author":"moradi","year":"2013","journal-title":"Int J Adv Comput Inf Technol"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2012.10.026"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368917"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.374"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29038-1_18"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2009.553"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1108\/IJICC-07-2015-0024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0040"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0125-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281210"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.29"},{"key":"ref49","author":"goldstein","year":"2015","journal-title":"Unsupervised Anomaly Detection Benchmark"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276314"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.29"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50075-9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/EUVIP.2014.7018408"},{"key":"ref48","article-title":"Anomaly detection meta-analysis benchmarks","author":"emmott","year":"2016","journal-title":"Oregon State University"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2718220"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(00)00131-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"ref44","year":"2018","journal-title":"Three methods to deal with outliers Artelnics Machine Learning Blog"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12098-5_34"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994526"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/IC4.2015.7375696"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4108\/eai.19-1-2016.151000"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9370-y"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_84"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.05.135"},{"key":"ref74","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1145\/3219819.3220107","article-title":"Outlier detection in feature-evolving data streams","author":"manzoor","year":"2018","journal-title":"Proc 7th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining (KDD)"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_68"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.039"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0300-z"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330748"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886583"},{"key":"ref61","article-title":"Outlier detection for text data:An extended version","author":"kannan","year":"2017","journal-title":"arXiv 1701 01325"},{"key":"ref63","first-page":"411","article-title":"Robust local outlier detection with statistical parameters for big data","volume":"30","author":"lei","year":"2015","journal-title":"Comput Syst Sci Eng"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2980765.2980767"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2811268"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663319"},{"key":"ref67","first-page":"837","article-title":"A methodology for outlier detection in audit logs for financial transactions","author":"pradnya","year":"2015","journal-title":"Proc Int Conf Comput Commun Control Automat"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2016.0044"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0986"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2012.745029"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2008.4498387"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2905606"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"ref194","article-title":"A generalized active learning approach for unsupervised anomaly detection","volume":"2018","author":"pimentel","year":"0","journal-title":"arXiv 1805 09411"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.07.016"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2475748"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0283-2"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.2"},{"key":"ref94","first-page":"186","article-title":"STING: A statistical information grid approach to spatial data mining","author":"wang","year":"1997","journal-title":"Proc 23rd VLDB Conf"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.90"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886197"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3297156.3297236"},{"key":"ref91","first-page":"970","article-title":"Outlier detection based on low density models","author":"v\u00e1zquez","year":"2018","journal-title":"Proc ICDM Workshops"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.116"},{"key":"ref98","first-page":"255","article-title":"Anomaly detection over noisy data using learned probability distributions","author":"eskin","year":"2000","journal-title":"Proc 17th Int Conf Mach Learn (ICML)"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","article-title":"Distance-based outliers: Algorithms and applications","volume":"8","author":"knorr","year":"2000","journal-title":"VLDB J"},{"key":"ref96","first-page":"1","article-title":"Outlier detection techniques","author":"kriegel","year":"2009","journal-title":"Proc Tutorial KDD"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08010-9_9"},{"key":"ref83","first-page":"503","article-title":"RDF: A density-based outlier detection method using vertical data representation","author":"ren","year":"2004","journal-title":"Proc Int Conf Data Mining"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47887-6_53"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.45"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.88"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2733381"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38628-2_61"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-008-0145-3"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3623"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.13"},{"key":"ref100","year":"2015","journal-title":"Maximum Likelihood Estimation"},{"key":"ref209","article-title":"MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks","author":"li","year":"2019","journal-title":"arXiv 1901 04997"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840717"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213008003753"},{"key":"ref201","article-title":"Active anomaly detection via ensembles: Insights, algorithms, and interpretability","author":"das","year":"2019","journal-title":"arXiv 1901 08930"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767916"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4020036"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2883681"},{"key":"ref206","first-page":"58","article-title":"Outlier detection using diverse neighborhood graphs","author":"chao","year":"2018","journal-title":"Proc 15th Int Comput Conf Wavelet Act Media Technol"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref210","first-page":"1","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71249-9_3"},{"key":"ref213","first-page":"21","article-title":"Detecting anomalous data using auto-encoders","volume":"6","author":"andrews","year":"2016","journal-title":"Int J Mach Learn Comput"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref215","article-title":"Deep anomaly detection with outlier exposure","author":"hendrycks","year":"2019","journal-title":"arXiv 1812 04606"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref217","article-title":"Anomaly Detection Using Autoencoders in high performance computing systems","author":"borghesi","year":"2018","journal-title":"arXiv 1811 05269"},{"key":"ref218","article-title":"Anomaly detection using one-class neural networks","author":"chalapathy","year":"2018","journal-title":"arXiv 1802 06360"},{"key":"ref219","first-page":"4390","article-title":"Deep one-class classification","author":"ruff","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921021"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02982-0_35"},{"key":"ref221","year":"2018","journal-title":"ELKI Tutorials - The Demonstrated Software is Available As Release 0 3 of the ELKI Framework"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481252"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.66"},{"key":"ref227","first-page":"1","article-title":"Dcso: Dynamic combination of detector scores for outlier ensembles","author":"zhao","year":"2018","journal-title":"Proc 7th ACM SIGKDD Int Conf Knowledge Discovery and Data Mining (KDD)"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"ref225","first-page":"1","article-title":"Benchmarking algorithms for detecting anomalies in large datasets","volume":"1","author":"carrasquilla","year":"2011","journal-title":"CMG Journal"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.12.002"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.037"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.04.004"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1080\/00949655.2011.621124"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.07.005"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0093-2"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2365790"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.09.002"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.10.014"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321550"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031232"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.030"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956758"},{"key":"ref232","article-title":"Pyod: A python toolbox for scalable outlier detection","author":"zhao","year":"2019","journal-title":"arXiv 1901 01588"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ISMSIT.2018.8567262"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"ref231","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2410031"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"ref235","year":"2018","journal-title":"Detect and Remove Outliers in Data"},{"key":"ref234","author":"goldstein","year":"2018","journal-title":"RapidMiner Anomaly Detection Extension"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68474-1_12"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0159-9"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04174-7_11"},{"key":"ref138","first-page":"187","article-title":"Online outlier detection in sensor data using non-parametric models","author":"subramaniam","year":"2006","journal-title":"Proc Int Conf Very Large Data Bases"},{"key":"ref137","first-page":"80","article-title":"On abnormality detection in spurious populated data streams","author":"aggarwal","year":"2005","journal-title":"Proc SIAM Int Conf Data Mining"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516422"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/1321440.1321552"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816641"},{"key":"ref143","first-page":"1601","article-title":"MOA: Massive Online Analysis Tool","volume":"11","author":"bifet","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref2","article-title":"Credit card fraud detection in e-commerce: An outlier detection approach","author":"porwal","year":"2018","journal-title":"arXiv 1811 02196"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/376284.375668"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2016.0172"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020554"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972788.44"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0148-z"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20847-8_23"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73499-4_6"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0569-0_22"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-51281-5_32"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24474-7_12"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.5539\/ijsp.v2n3p101"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2009.2017477"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2015.8.8.17"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0712-0"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2015.7286013"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.5120\/924-1302"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3681-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v12i1.5171"},{"key":"ref12","article-title":"A fast outlier detection algorithm for big datasets","volume":"463","author":"van hieu","year":"2016","journal-title":"Recent Advances in Information and Communication Technology"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-015-1596-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.10.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2744619"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2950109"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.114"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1002\/widm.2"},{"key":"ref18","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"cai","year":"2018","journal-title":"IEEE Trans Depend and Sec Comp"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.102"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3013527"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.10.009"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840816"},{"key":"ref116","first-page":"59","article-title":"Histogram-based outlier score (HBOS): A fast unsupervised anomaly detection algorithm","author":"goldstein","year":"2012","journal-title":"Proceedings of the Posters and Demo Track"},{"key":"ref115","first-page":"421","article-title":"Scalable kernel density estimation-based local outlier detection over large data streams","author":"qin","year":"2019","journal-title":"Proc EDBT"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_2"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSP.2015.7251924"},{"key":"ref122","first-page":"392","article-title":"Algorithms for mining distance based outliers in large data sets","author":"knorr","year":"1998","journal-title":"Proc 24th Int Conf Very Large Databases Conf"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08786096.pdf?arnumber=8786096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T20:16:47Z","timestamp":1695068207000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8786096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":241,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2932769","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}