{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:31Z","timestamp":1762004611579,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889485","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:30:33Z","timestamp":1410359433000},"page":"3303-3310","source":"Crossref","is-referenced-by-count":5,"title":["Resistant learning on the envelope bulk for identifying anomalous patterns"],"prefix":"10.1109","author":[{"given":"Shin-Ying","family":"Huang","sequence":"first","affiliation":[]},{"given":"Fang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Rua-Huan","family":"Tsaih","sequence":"additional","affiliation":[]},{"given":"Yennun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"318","article-title":"Modeling internal representations by error propagation","author":"rumelhart","year":"1986","journal-title":"Parallel Distributed Processing Explorations in the Microstructures of Cognition"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/64.2.191"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0024-4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.2307\/2343971"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.08.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1093\/bjaceaccp\/mkn041"},{"key":"14","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1136\/bmj.327.7417.716","article-title":"Understanding sensitivity and specificity with the right side of the brain","volume":"327","author":"loong","year":"2003","journal-title":"British Medical Journal"},{"key":"11","first-page":"392","article-title":"Algorithms for mining distance-based outliers in large datasets","author":"knorr","year":"1998","journal-title":"Proc 24th Int Conf Very Large Data Bases"},{"key":"12","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","article-title":"Distance-based outliers: Algorithm and applications","volume":"8","author":"knorr","year":"2000","journal-title":"Very Large Data Bases"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/kxl005"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0299-1"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1126\/science.1117679"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s10472-010-9183-0"},{"key":"24","first-page":"116","article-title":"Outlier-based differential expression analysis in proteomics studies","volume":"4","author":"vuong","year":"2011","journal-title":"Bioinformatics"},{"key":"25","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1111\/j.2517-6161.1995.tb02050.x","article-title":"Robustifying model fitting","volume":"57","author":"windham","year":"1995","journal-title":"Journal of the Royal Statistical Society Series B"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/89.4.939"},{"key":"2","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1023\/A:1008942604045","article-title":"Computing least trimmed squares regression with the forward search","volume":"9","author":"atkinson","year":"1999","journal-title":"Statistics and Computing"},{"key":"10","first-page":"219","article-title":"A unified approach for mining outliers","author":"knorr","year":"1997","journal-title":"Proc KDD"},{"key":"1","doi-asserted-by":"crossref","first-page":"521","DOI":"10.3233\/IDA-2006-10604","article-title":"A comprehensive survey of numeric and symbolic outlier mining techniques","volume":"10","author":"agyemang","year":"2006","journal-title":"Intelligent Data Analysis"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/72.279188"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2002.804227"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/asp075"},{"key":"4","article-title":"Outlier detection: A survey","author":"chandola","year":"2007","journal-title":"ACM Computing Surveys"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1002\/0471725250","author":"huber","year":"1981","journal-title":"Robust Statistics"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9473(95)00053-4"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889485.pdf?arnumber=6889485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,2]],"date-time":"2024-06-02T11:05:59Z","timestamp":1717326359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6889485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889485","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}