{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:29:14Z","timestamp":1730204954676,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/cec48606.2020.9185626","type":"proceedings-article","created":{"date-parts":[[2020,9,3]],"date-time":"2020-09-03T19:34:48Z","timestamp":1599161688000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Integrated Learning Method for Anomaly Detection Combining KLSH and Isolation Principles"],"prefix":"10.1109","author":[{"given":"Hongchun","family":"Qu","sequence":"first","affiliation":[]},{"given":"Zonglan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jingjing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The UCRTime Series Archive","year":"2018","author":"bagnall","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.219"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1232271"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/72.914517"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2013.133"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330748"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2017.11.003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2318763"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-06605-9_42","article-title":"Improving iforest with relative mass","author":"aryal","year":"2014","journal-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining"},{"key":"ref17","first-page":"12","article-title":"An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window","volume":"46 20","author":"ding","year":"2013","journal-title":"IFAC Proceedings"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42911-3_37"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12156"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"ref27","article-title":"Hashing for similarity search: A survey","author":"wang","year":"2014","journal-title":"arXiv preprint arXiv 1408 2927"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref6","article-title":"Research on Withdrawal Behavior Pattern of Bank Card Withdrawal Anomaly Detection Algorithm Based on Rule","author":"jiang","year":"2015","journal-title":"Computer Knowledge and Technology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2019.2936308"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref8","first-page":"20","article-title":"Anomaly Detection in Medical Wireless Sensor Networks using SVM and Linear Regression Models","volume":"5 1","author":"salem","year":"2014","journal-title":"International Journal of E-Health and Medical Communications"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1016\/j.asoc.2018.07.044","article-title":"Incorporating unsupervised learning into intrusion detection for wireless sensor networks with structural co-evolvability","volume":"71","author":"qu","year":"2018","journal-title":"Applied Soft Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"ref9","article-title":"iBAT ? detecting anomalous taxi trajectories from GPS traces","author":"zhang","year":"2011","journal-title":"International Conference on Ubiquitous Computing"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0371-9"},{"key":"ref20","article-title":"Hybrid Isolation Forest-Application to Intrusion Detection","author":"marteau","year":"2017","journal-title":"arXiv preprint arXiv 1705 03800"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.44"},{"key":"ref21","article-title":"On detecting clustered anomalies using SCiForest","author":"liu","year":"2010","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.145"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCID.2017.202"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref25","article-title":"Entropy Isolation Forest Based on Dimension Entropy for Anomaly Detection","author":"liao","year":"2018","journal-title":"International Symposium on Intelligence Computation and Applications"}],"event":{"name":"2020 IEEE Congress on Evolutionary Computation (CEC)","start":{"date-parts":[[2020,7,19]]},"location":"Glasgow, UK","end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 IEEE Congress on Evolutionary Computation (CEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9178820\/9185488\/09185626.pdf?arnumber=9185626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T11:55:07Z","timestamp":1656330907000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9185626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cec48606.2020.9185626","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}