{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:53Z","timestamp":1767339293707},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,8,20]]},"DOI":"10.1145\/1150402.1150459","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":209,"title":["Outlier detection by active learning"],"prefix":"10.1145","author":[{"given":"Naoki","family":"Abe","sequence":"first","affiliation":[{"name":"IBM T. J. Watson Research Center, Yorktown Heights, NY"}]},{"given":"Bianca","family":"Zadrozny","sequence":"additional","affiliation":[{"name":"Universidade Federal Fluminense, Niter\u00f3i, RJ, Brazil"}]},{"given":"John","family":"Langford","sequence":"additional","affiliation":[{"name":"Toyota Technological Institute at Chicago, Chicago, IL"}]}],"member":"320","published-online":{"date-parts":[[2006,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Workshop at SIAM 2004 - Workshop on Data Mining in Resource Constrained Environments","author":"Abe N.","year":"2004","unstructured":"N. Abe , C. V. Apte , B. Bhattacharjee , K. A. Goldman , J. Langford , and B. Zadrozny . Sampling approach to resource light data mining . In Workshop at SIAM 2004 - Workshop on Data Mining in Resource Constrained Environments , February 2004 .]] N. Abe, C. V. Apte, B. Bhattacharjee, K. A. Goldman, J. Langford, and B. Zadrozny. Sampling approach to resource light data mining. In Workshop at SIAM 2004 - Workshop on Data Mining in Resource Constrained Environments, February 2004.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645527.657478"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1507"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_6_1","volume-title":"Results of the kdd'99 classification learning contest.","author":"Elkan C.","year":"1999","unstructured":"C. Elkan . Results of the kdd'99 classification learning contest. Available at http:\/\/www.cs.ucsd.edu\/users\/elkan\/clresults.html, 1999 .]] C. Elkan. Results of the kdd'99 classification learning contest. Available at http:\/\/www.cs.ucsd.edu\/users\/elkan\/clresults.html, 1999.]]"},{"key":"e_1_3_2_1_7_1","first-page":"123","volume-title":"Proceedings of the First IEEE International Conference on Data Mining (ICDM'01)","author":"Fan W.","year":"2001","unstructured":"W. Fan , M. Miller , S. J. Stolfo , W. Lee , and P. K. Chan . Using artificial anomalies to detect unknown and known network intrusions . In Proceedings of the First IEEE International Conference on Data Mining (ICDM'01) , pages 123 -- 130 , 2001 .]] W. Fan, M. Miller, S. J. Stolfo, W. Lee, and P. K. Chan. Using artificial anomalies to detect unknown and known network intrusions. In Proceedings of the First IEEE International Conference on Data Mining (ICDM'01), pages 123--130, 2001.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the Very Large Databases (VLDB) Conference","author":"Knorr E.","year":"1998","unstructured":"E. Knorr and R. Ng . Algorithms for mining distance based outliers in large data sets . In Proceedings of the Very Large Databases (VLDB) Conference , August 1998 .]] E. Knorr and R. Ng. Algorithms for mining distance based outliers in large data sets. In Proceedings of the Very Large Databases (VLDB) Conference, August 1998.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081891"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/645529.657969"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015385"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130417"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.487069"},{"key":"e_1_3_2_1_17_1","first-page":"385","volume-title":"Proceedings of the 16th International Conference on Pattern Recognition (ICPR'02)","author":"Yeung D. Y.","year":"2003","unstructured":"D. Y. Yeung and C. Chow . Parzen-window network intrusion detectors . In Proceedings of the 16th International Conference on Pattern Recognition (ICPR'02) , pages 385 -- 388 , 2003 .]] D. Y. Yeung and C. Chow. Parzen-window network intrusion detectors. In Proceedings of the 16th International Conference on Pattern Recognition (ICPR'02), pages 385--388, 2003.]]"}],"event":{"name":"KDD06: The 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Philadelphia PA USA","acronym":"KDD06","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1150402.1150459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T09:26:53Z","timestamp":1673170013000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1150402.1150459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,20]]},"references-count":17,"alternative-id":["10.1145\/1150402.1150459","10.1145\/1150402"],"URL":"https:\/\/doi.org\/10.1145\/1150402.1150459","relation":{},"subject":[],"published":{"date-parts":[[2006,8,20]]},"assertion":[{"value":"2006-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}