{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:56:22Z","timestamp":1760385382060},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889446","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:30:33Z","timestamp":1410359433000},"source":"Crossref","is-referenced-by-count":18,"title":["Locality linear fitting one-class SVM with low-rank constraints for outlier detection"],"prefix":"10.1109","author":[{"given":"Sheng","family":"Li","sequence":"first","affiliation":[]},{"given":"Ming","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202588"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"18","article-title":"One class support vector machines for detecting anomalous windows registry accesses","author":"heller","year":"2003","journal-title":"Workshop on Data Mining for Computer Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17534-3_17"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-1001-7"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502567"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2009.87"},{"key":"11","first-page":"298","article-title":"Efficient clusteringbased outlier detection algorithm for dynamic data stream","author":"elahi","year":"2008","journal-title":"FSKD (5)"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-009-0148-z"},{"key":"21","author":"bertsekas","year":"1982","journal-title":"Constrained Optimization and Lagrange Multiplier Methods"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23184-1_3"},{"key":"22","article-title":"The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices","author":"lin","year":"2009","journal-title":"Technical Report UIUC"},{"key":"23","first-page":"1472","article-title":"Low-rank coding with b-matching constraint for semi-supervised classification","author":"li","year":"2013","journal-title":"IJCAI"},{"key":"24","first-page":"1","article-title":"Discriminative dictionary learning with lowrank regularization for face recognition","author":"li","year":"2013","journal-title":"FG"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1137\/080738970"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102361"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.07.006"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1251154"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1002\/0471725382","author":"rousseeuw","year":"1987","journal-title":"Robust Regression and Outlier Detection"},{"key":"2","author":"barnett","year":"1994","journal-title":"Outliers in Statistical Data"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347145"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"7","first-page":"170","article-title":"Outlier detection using replicator neural networks","author":"hawkins","year":"2002","journal-title":"DaWaK"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/956755.956758"},{"key":"5","first-page":"972","article-title":"Automatic mitral leaflet tracking in echocardiography by outlier detection in the low-rank representation","author":"zhou","year":"2012","journal-title":"CVPR"},{"key":"4","author":"hawkins","year":"1982","journal-title":"Constrained Optimization and Lagrange Multiplier Methods"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2011.63"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502554"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","location":"Beijing, China","start":{"date-parts":[[2014,7,6]]},"end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889446.pdf?arnumber=6889446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:42:23Z","timestamp":1602686543000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6889446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889446","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}