{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:17:16Z","timestamp":1761059836959,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/itsc.2014.6957939","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T15:15:59Z","timestamp":1417014959000},"page":"1707-1712","source":"Crossref","is-referenced-by-count":19,"title":["Wavelets on graphs with application to transportation networks"],"prefix":"10.1109","author":[{"given":"Dhanya Menoth","family":"Mohan","sequence":"first","affiliation":[]},{"given":"Muhammad Tayyab","family":"Asif","sequence":"additional","affiliation":[]},{"given":"Nikola","family":"Mitrovic","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Dauwels","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Jaillet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11460-007-0013-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.05.061"},{"key":"ref12","first-page":"2","article-title":"One class support vector machines for detecting anomalous windows registry accesses","author":"heller","year":"2003","journal-title":"ICDM Workshop on Data Mining for Computer Security (DMSEC)"},{"key":"ref13","article-title":"Towards a learning traffic incident detection system","author":"singliar","year":"2006","journal-title":"Proc ICML Workshop Mach Learn Algorithms Surveillance Event Detection"},{"key":"ref14","first-page":"1025","article-title":"One-class novelty detection for seizure analysis from intracranial eeg","volume":"7","author":"gardner","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080118"},{"key":"ref16","article-title":"Traffic anomaly detection using k-means clustering","volume":"4","author":"munz","year":"2007","journal-title":"Proc of performance reliable a ssigkeits and Verl &#x00E4; sslichkeitsbewertung of communication networks and distributed systems"},{"key":"ref17","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","author":"leung","year":"2005","journal-title":"Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38"},{"key":"ref18","first-page":"305","article-title":"Anomaly detection using baseline and k-means clustering","author":"lima","year":"2010","journal-title":"Software Telecommunications and Computer Networks (SoftCOM) 2010 International Conference On IEEE"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/978-3-642-30507-8_13","article-title":"Unsupervised clustering approach for network anomaly detection","author":"syarif","year":"2012","journal-title":"Networked Digital Technologies"},{"journal-title":"The spectral graph wavelets toolbox","year":"2010","author":"hammond","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2010.10.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/0515056"},{"key":"ref3","article-title":"Route guidance strategies revisited: Comparison and evaluation in an asymmetric two-route traffic system","author":"he","year":"2013","journal-title":"arXiv preprint arXiv 1305 3009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2011.5975612"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505229"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2013.6728263"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338627"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/637209.637210"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.35"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63857"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2005.1520133"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1269899.1254895"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20010659"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2220964"},{"article-title":"The emerging field of signal processing on graphs","year":"0","author":"shuman","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2010.04.005"}],"event":{"name":"2014 IEEE 17th International Conference on Intelligent Transportation Systems (ITSC)","start":{"date-parts":[[2014,10,8]]},"location":"Qingdao, China","end":{"date-parts":[[2014,10,11]]}},"container-title":["17th International IEEE Conference on Intelligent Transportation Systems (ITSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6948869\/6957655\/06957939.pdf?arnumber=6957939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:59:47Z","timestamp":1498179587000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6957939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/itsc.2014.6957939","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}