{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T12:23:37Z","timestamp":1770553417087,"version":"3.49.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/icde.2011.5767852","type":"proceedings-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T16:45:21Z","timestamp":1305650721000},"page":"410-421","source":"Crossref","is-referenced-by-count":41,"title":["Locality Sensitive Outlier Detection: A ranking driven approach"],"prefix":"10.1109","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Srinivasan","family":"Parthasarathy","sequence":"additional","affiliation":[]},{"given":"Shirish","family":"Tatikonda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219917"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04174-7_11"},{"key":"ref32","article-title":"Exploring the Design Space of Scalable Distance-Based Outlier Algorithms","author":"gustavo","year":"2009","journal-title":"Technical Report"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","article-title":"Distance-based outliers: algorithms and applications","volume":"8","author":"knorr","year":"2000","journal-title":"The VLDB Journal"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150447"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1999.1690"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327494"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921021"},{"key":"ref34","first-page":"471","article-title":"A bayesian method for guessing the extreme values in a data set?","author":"wu","year":"2007","journal-title":"Proceedings of International Conference on Very Large Data Bases"},{"key":"ref10","article-title":"Outlier Detection Techniques","author":"kriegel","year":"2009","journal-title":"Tutorial at the 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining"},{"key":"ref40","article-title":"Similarity Search in High Dimensions via Hashing","author":"gionis","year":"1999","journal-title":"Proc 5th Int Conf Very Large Data Bases"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"ref13","first-page":"211","article-title":"Finding intensional knowledge of distance-based outliers","author":"knorr","year":"1999","journal-title":"Proc 5th Int Conf Very Large Data Bases"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","article-title":"Fast outlier detection in high dimensional spaces","author":"angiulli","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956758"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0093-2"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1145\/1321440.1321550","article-title":"Very efficient mining of distance-based outliers","author":"angiulli","year":"2007","journal-title":"Proc of the sixteenth ACM conference on Conference on information and knowledge management"},{"key":"ref18","article-title":"Very fast outlier detection in large multidimensional data sets","author":"chaudhary","year":"2002","journal-title":"Proc 8th ACM SIGMOD Workshop Res Issues Data Mining Knowl Discovery"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/235968.233324"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(00)00022-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref27","first-page":"144","article-title":"Efficient and effective clustering methods for spatial data mining","author":"ng","year":"1994","journal-title":"Proc 20th Int'l Conf Very Large Data Bases 1994"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.07.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/labinvest.3700477"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9884.00279"},{"key":"ref8","author":"barnett","year":"1994","journal-title":"Outliers in Statistical Data"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.8.742"},{"key":"ref2","article-title":"Unsupervised profiling methods for fraud detection","author":"bolton","year":"1999","journal-title":"Credit Scoring and Credit Control VII"},{"key":"ref9","author":"tukey","year":"1977","journal-title":"Exploratory Data Analysis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2004.01.009"},{"key":"ref46","first-page":"194","article-title":"A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces","author":"weber","year":"1998","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458172"},{"key":"ref22","article-title":"An efficient algorithm for outlier detection in high dimensional real databases","author":"teixeira","year":"2008","journal-title":"Tech Rep"},{"key":"ref47","year":"2006","journal-title":"Projeto Tamandua"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"ref42","article-title":"E2LSH 0.1 User Manual","author":"andoni","year":"2005","journal-title":"Technical Report"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref41","article-title":"A Comparison of Document Clustering Techniques","author":"karypis","year":"2000","journal-title":"Proc KDD Workshop Text Mining"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060840"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1002\/0471725382","author":"rousseeuw","year":"1987","journal-title":"Robust Regression and Outlier Detection"},{"key":"ref43","year":"0","journal-title":"Lsh algo and impl (e21sh)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1063\/1.2995737"}],"event":{"name":"2011 IEEE International Conference on Data Engineering (ICDE 2011)","location":"Hannover, Germany","start":{"date-parts":[[2011,4,11]]},"end":{"date-parts":[[2011,4,16]]}},"container-title":["2011 IEEE 27th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5765035\/5767827\/05767852.pdf?arnumber=5767852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T20:17:06Z","timestamp":1497903426000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5767852\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icde.2011.5767852","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}