{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:12Z","timestamp":1761401712777,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/cogsima.2014.6816565","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:25:35Z","timestamp":1401474335000},"page":"216-222","source":"Crossref","is-referenced-by-count":7,"title":["A confabulation model for abnormal vehicle events detection in wide-area traffic monitoring"],"prefix":"10.1109","author":[{"given":"Qiuwen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qinru","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Qing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Morgan","family":"Bishop","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Barnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-46145-0_17","article-title":"Outlier detection using replicator neural networks","author":"hawkins","year":"2002","journal-title":"Proc of International Conference on Data Warehousing and Knowledge Discovery"},{"key":"2","article-title":"Outlier detection with one-class kernel fisher discriminants","author":"roth","year":"2004","journal-title":"Proc of the Conference on Advances in Neural Information Processing Systems"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2006.246712"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"7","article-title":"Similarity based vehicle trajectory clustering and anomaly detection","author":"fu","year":"2005","journal-title":"Proc Of International Conference on Image Processing"},{"key":"6","article-title":"Active platform security through intrusion detection using naive bayesian network for anomaly detection","author":"sebyala","year":"2002","journal-title":"Proc London Communications Symp"},{"key":"5","first-page":"1","article-title":"Rank-based outlier detection","volume":"82","author":"huang","year":"2011","journal-title":"Journal of Statistical Computation and Simulation"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-005-0197-6"},{"journal-title":"Confabulation Theory The Mechanism of Thought","year":"2007","author":"hecht-nielsen","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2008.4732677"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.50"}],"event":{"name":"2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","start":{"date-parts":[[2014,3,3]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2014,3,6]]}},"container-title":["2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811096\/6816529\/06816565.pdf?arnumber=6816565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T04:37:47Z","timestamp":1565498267000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2014.6816565","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}