{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T22:10:02Z","timestamp":1739139002760,"version":"3.37.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/ciss.2009.5054728","type":"proceedings-article","created":{"date-parts":[[2009,6,2]],"date-time":"2009-06-02T21:12:48Z","timestamp":1243977168000},"page":"264-269","source":"Crossref","is-referenced-by-count":2,"title":["Coping with training contamination in unsupervised distributional anomaly detection"],"prefix":"10.1109","author":[{"given":"Nash","family":"Borges","sequence":"first","affiliation":[]},{"given":"Gerard G. L.","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2009","journal-title":"Audacity Plug-In Effects","key":"19"},{"key":"35","doi-asserted-by":"crossref","DOI":"10.21437\/Eurospeech.1997-504","article-title":"the det curve in assessment of detection task performance","author":"martin","year":"1997","journal-title":"Eurospeech"},{"year":"2003","author":"nelson","article-title":"voice activity detector","key":"17"},{"key":"18","article-title":"a multivariate speech actitivity detector based on the syllable rate","author":"smith","year":"1999","journal-title":"ICASSP"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1109\/18.61115"},{"year":"0","key":"15"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1214\/aos\/1176344552"},{"key":"16","article-title":"learning with positive and unlabeled examples using weighted logistic regression","author":"lee","year":"2003","journal-title":"ICML"},{"key":"13","article-title":"text classication from positive and unlabeled examples","author":"denis","year":"2002","journal-title":"IPMU"},{"key":"14","first-page":"387","article-title":"partially supervised classification of text documents","author":"liu","year":"2002","journal-title":"ICML"},{"year":"2007","author":"zhu","journal-title":"Semi-supervised learning literature survey","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1007\/3-540-40992-0_6"},{"year":"2009","key":"21"},{"year":"2009","key":"20"},{"year":"1997","author":"canavan","journal-title":"CALLHOME American English Speech","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1016\/j.cviu.2003.10.010"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1006\/cviu.2001.0934"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/ICASSP.1988.196655"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1007\/BF00130487"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1038\/333364a0"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/CVPR.1997.609331"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/34.56204"},{"key":"3","article-title":"unsupervised profiling methods for fraud detection","author":"bolton","year":"2001","journal-title":"Credit Scoring Conference"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1137\/1.9781611972733.3"},{"key":"10","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/3-540-49730-7_9","article-title":"pac learning from positive statistical queries","author":"denis","year":"1998","journal-title":"Algorithmic Learning Theory"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/CISS.2008.4558655"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1002\/0471725382","author":"rousseeuw","year":"1987","journal-title":"Robust Regression and Outlier Detection"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"doi-asserted-by":"publisher","key":"32","DOI":"10.1023\/A:1026543900054"},{"key":"5","article-title":"unsupervised anomaly detection","author":"guthrie","year":"2007","journal-title":"IJCAI"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1214\/aoms\/1177729694"},{"key":"4","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1117\/12.150246","article-title":"outlier detection and motion segmentation","volume":"2059","author":"torr","year":"1993","journal-title":"Proc of SPIE"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1968.1972"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/BF00116829"}],"event":{"name":"2009 43rd Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2009,3,18]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2009,3,20]]}},"container-title":["2009 43rd Annual Conference on Information Sciences and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4976858\/5054673\/05054728.pdf?arnumber=5054728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,9]],"date-time":"2025-02-09T21:33:46Z","timestamp":1739136826000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5054728\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ciss.2009.5054728","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}