{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T20:58:41Z","timestamp":1772225921990,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/bibm47256.2019.8982967","type":"proceedings-article","created":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T02:49:51Z","timestamp":1581043791000},"page":"1091-1095","source":"Crossref","is-referenced-by-count":3,"title":["Biclustering-sim: A Novel Method to Identify Abnormal Co-occurrence Medical Visit Behaviors"],"prefix":"10.1109","author":[{"given":"Ruican","family":"Li","sequence":"first","affiliation":[{"name":"School of Software, Shandong University,Jinan,China"}]},{"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"Joint SDU-NTU Centre for Artificial Intelligence Research(C-FAIR), Shandong University,Jinan,China"}]},{"given":"Wei","family":"Guo","sequence":"additional","affiliation":[{"name":"Joint SDU-NTU Centre for Artificial Intelligence Research(C-FAIR), Shandong University,Jinan,China"}]},{"given":"Lizhen","family":"Cui","sequence":"additional","affiliation":[{"name":"Joint SDU-NTU Centre for Artificial Intelligence Research(C-FAIR), Shandong University,Jinan,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.483"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.48"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-018-0068-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-91452-7_12"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1101\/gr.648603","article-title":"Spectral biclustering of microarray data: coclustering genes and conditions","volume":"13","author":"yuval","year":"2003","journal-title":"Genome Research"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2004.2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-013-0701-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939866"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783352"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.06.138"},{"key":"ref3","author":"hua","year":"2009","journal-title":"Machine Learning-based Intrusion Detection Algorithms"},{"key":"ref6","first-page":"757","article-title":"Multi-view sparse co-clustering via proximal alternating linearized minimization","author":"sun","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref7","article-title":"Codinmf: Co-clustering of directed graphs via nmf","author":"lim","year":"0","journal-title":"Thirty-Second AAAI Conference on Artificial Intelligence"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.08.137"},{"key":"ref1","year":"0","journal-title":"These behaviors are fraudulent insurance behavior see please report!"},{"key":"ref9","first-page":"1225","article-title":"Distributed local outlier detection in big data","author":"yan","year":"0","journal-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13186-3_5"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1002\/9781118548387","volume":"398","author":"hosmer","year":"2013","journal-title":"Applied Logistic Regression"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-017-0043-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"}],"event":{"name":"2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)","location":"San Diego, CA, USA","start":{"date-parts":[[2019,11,18]]},"end":{"date-parts":[[2019,11,21]]}},"container-title":["2019 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8965270\/8982928\/08982967.pdf?arnumber=8982967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T18:11:11Z","timestamp":1757095871000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8982967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bibm47256.2019.8982967","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}