{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:15:49Z","timestamp":1769976949702,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infocom.2017.8057217","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T16:28:21Z","timestamp":1507220901000},"page":"1-9","source":"Crossref","is-referenced-by-count":19,"title":["Fast low-rank matrix approximation with locality sensitive hashing for quick anomaly detection"],"prefix":"10.1109","author":[{"given":"Gaogang","family":"Xie","sequence":"first","affiliation":[]},{"given":"Kun","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jigang","family":"Wen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062248"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962595"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.45"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.205"},{"key":"ref16","author":"lin","year":"2010","journal-title":"The augmented Lagrange multiplier method for exact recovery of corrupted low-rank matrices"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814797"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1037\/h0071325"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057218"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524463"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"ref29","year":"0","journal-title":"Abilene Observatory Data Collections"},{"key":"ref5","volume":"32","author":"lakhina","year":"2004","journal-title":"Structural analysis of network traffic flows"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028813"},{"key":"ref2","first-page":"2250","article-title":"Anomaly detection with score functions based on nearest neighbor graphs","author":"zhao","year":"2009","journal-title":"Advances in neural information processing systems"},{"key":"ref9","first-page":"617","article-title":"In-network pca and anomaly detection","author":"huang","year":"2006","journal-title":"Advances in neural information processing systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref20","first-page":"585","article-title":"Geometric entropy minimization (gem) for anomaly detection and localization","author":"hero","year":"2006","journal-title":"Advances in neural information processing systems"},{"key":"ref22","article-title":"Recover corrupted data in sensor networks: a matrix completion solution","author":"xie","year":"2016","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.79"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF02288367"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218633"},{"key":"ref25","author":"lu","year":"2010","journal-title":"Penalty decomposition methods for 10-norm minimization"}],"event":{"name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","location":"Atlanta, GA, USA","start":{"date-parts":[[2017,5,1]]},"end":{"date-parts":[[2017,5,4]]}},"container-title":["IEEE INFOCOM 2017 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8049192\/8056940\/08057217.pdf?arnumber=8057217","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T15:40:45Z","timestamp":1512056445000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8057217\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/infocom.2017.8057217","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}