{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:29Z","timestamp":1763468069085,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,12]],"date-time":"2012-08-12T00:00:00Z","timestamp":1344729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,12]]},"DOI":"10.1145\/2339530.2339667","type":"proceedings-article","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T12:18:56Z","timestamp":1344946736000},"page":"859-867","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Integrating community matching and outlier detection for mining evolutionary community outliers"],"prefix":"10.1145","author":[{"given":"Manish","family":"Gupta","sequence":"first","affiliation":[{"name":"Univ of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Jing","family":"Gao","sequence":"additional","affiliation":[{"name":"State Univ of New York, Buffalo, Buffalo, NY, USA"}]},{"given":"Yizhou","family":"Sun","sequence":"additional","affiliation":[{"name":"Univ of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Jiawei","family":"Han","sequence":"additional","affiliation":[{"name":"Univ of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,8,12]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.5555\/1577069.1577103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1145\/376284.375668"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_3_1","DOI":"10.1137\/1.9781611972788.44"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_4_1","DOI":"10.1109\/ICDE.2011.5767885"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_5_1","DOI":"10.5555\/1965841.1965889"},{"key":"e_1_3_2_2_6_1","volume-title":"Non-Linear Programming","author":"Bertsekas D. P.","year":"1999","unstructured":"D. P. Bertsekas . Non-Linear Programming ( 2 nd Edition). Athena Scientific , 1999 . D. P. Bertsekas. Non-Linear Programming (2nd Edition). Athena Scientific, 1999.","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_7_1","DOI":"10.1145\/342009.335388"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_8_1","DOI":"10.1145\/1541880.1541882"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_9_1","DOI":"10.1145\/775047.775116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.5555\/646258.686050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1093\/bioinformatics\/btg038"},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. of the 17th Intl. Conf. on Machine Learning (ICML), 255--262","author":"Eskin E.","year":"2000","unstructured":"E. Eskin . Anomaly Detection over Noisy Data using Learned Probability Distributions . In Proc. of the 17th Intl. Conf. on Machine Learning (ICML), 255--262 . Morgan Kaufmann Publishers Inc. , 2000 . E. Eskin. Anomaly Detection over Noisy Data using Learned Probability Distributions. In Proc. of the 17th Intl. Conf. on Machine Learning (ICML), 255--262. Morgan Kaufmann Publishers Inc., 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1111\/j.2517-6161.1972.tb00912.x"},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. of the 23rd Annual Conf. on Neural Information Processing Systems (NIPS), 585--593","author":"Gao J.","year":"2009","unstructured":"J. Gao , F. Liang , W. Fan , Y. Sun , and J. Han . Graph-based Consensus Maximization among Multiple Supervised and Unsupervised Models . In Proc. of the 23rd Annual Conf. on Neural Information Processing Systems (NIPS), 585--593 . Curran Associates, Inc. , 2009 . J. Gao, F. Liang, W. Fan, Y. Sun, and J. Han. Graph-based Consensus Maximization among Multiple Supervised and Unsupervised Models. In Proc. of the 23rd Annual Conf. on Neural Information Processing Systems (NIPS), 585--593. Curran Associates, Inc., 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1145\/1835804.1835907"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/1871437.1871716"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.5555\/1032649.1033487"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. of the Intl. Conf. on Machine Learning (ICML), 282--289","author":"Hu W.","year":"2003","unstructured":"W. Hu , Y. Liao , and V. R. Vemuri . Robust Anomaly Detection Using Support Vector Machines . In Proc. of the Intl. Conf. on Machine Learning (ICML), 282--289 . Morgan Kaufmann Publishers Inc , 2003 . W. Hu, Y. Liao, and V. R. Vemuri. Robust Anomaly Detection Using Support Vector Machines. In Proc. of the Intl. Conf. on Machine Learning (ICML), 282--289. Morgan Kaufmann Publishers Inc, 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_20_1","DOI":"10.1093\/bioinformatics\/btm233"},{"key":"e_1_3_2_2_21_1","volume-title":"Proc. of the 24th Intl. Conf. on Very Large Data Bases (VLDB), 392--403","author":"Knorr E. M.","year":"1998","unstructured":"E. M. Knorr and R. T. Ng . Algorithms for Mining Distance-Based Outliers in Large Datasets . In Proc. of the 24th Intl. Conf. on Very Large Data Bases (VLDB), 392--403 . Morgan Kaufmann , 1998 . E. M. Knorr and R. T. Ng. Algorithms for Mining Distance-Based Outliers in Large Datasets. In Proc. of the 24th Intl. Conf. on Very Large Data Bases (VLDB), 392--403. Morgan Kaufmann, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1007\/s007780050006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1109\/34.334394"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/1645953.1646195"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1137\/1.9781611972818.2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1109\/ICDE.2008.4497422"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1109\/ICDM.2005.45"},{"issue":"5","key":"e_1_3_2_2_28_1","first-page":"297","volume":"5","author":"Miller M. J.","year":"1984","unstructured":"M. J. Miller , A. D. Olson , and S. S. Thorgeirsson . Computer Analysis of Two-Dimensional Gels: Automatic Matching. ElectroPhoresis , 5 ( 5 ): 297 -- 303 , 1984 . M. J. Miller, A. D. Olson, and S. S. Thorgeirsson. Computer Analysis of Two-Dimensional Gels: Automatic Matching. ElectroPhoresis, 5(5):297--303, 1984.","journal-title":"Computer Analysis of Two-Dimensional Gels: Automatic Matching. ElectroPhoresis"},{"key":"e_1_3_2_2_29_1","volume-title":"Incremental Local Outlier Detection for Data Streams. In IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 504--515","author":"Pokrajac D.","year":"2007","unstructured":"D. Pokrajac , A. Lazarevic , and L. J. Latecki . Incremental Local Outlier Detection for Data Streams. In IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 504--515 . IEEE, Apr 2007 . D. Pokrajac, A. Lazarevic, and L. J. Latecki. Incremental Local Outlier Detection for Data Streams. In IEEE Symposium on Computational Intelligence and Data Mining (CIDM), 504--515. IEEE, Apr 2007."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/335191.335437"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1109\/ICDM.2009.43"}],"event":{"sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"acronym":"KDD '12","name":"KDD '12: The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Beijing China"},"container-title":["Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339530.2339667","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2339530.2339667","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:13Z","timestamp":1750239253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2339530.2339667"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,12]]},"references-count":31,"alternative-id":["10.1145\/2339530.2339667","10.1145\/2339530"],"URL":"https:\/\/doi.org\/10.1145\/2339530.2339667","relation":{},"subject":[],"published":{"date-parts":[[2012,8,12]]},"assertion":[{"value":"2012-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}