{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T04:27:59Z","timestamp":1774499279112,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,29]],"date-time":"2012-10-29T00:00:00Z","timestamp":1351468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,29]]},"DOI":"10.1145\/2396761.2396816","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T16:38:00Z","timestamp":1352997480000},"page":"415-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Fast and reliable anomaly detection in categorical data"],"prefix":"10.1145","author":[{"given":"Leman","family":"Akoglu","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Hanghang","family":"Tong","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson, Hawthorne, NY, USA"}]},{"given":"Jilles","family":"Vreeken","sequence":"additional","affiliation":[{"name":"University of Antwerp, Mathematics and Computer Science, Belgium"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375668"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_1_3_1","volume-title":"KDD","author":"Arning A.","year":"1996","unstructured":"A. Arning , R. Agrawal , and P. Raghavan . A linear method for deviation detection in large databases . In KDD , 1996 . A. Arning, R. Agrawal, and P. Raghavan. A linear method for deviation detection in large databases. In KDD, 1996."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_5_1","volume-title":"INM","author":"Bronstein A.","year":"2001","unstructured":"A. Bronstein , J. Das , M. Duro , R. Friedrich , G. Kleyner , M. Mueller , S. Singhal , and I. Cohen . Using bayes-nets for detecting anomalies in Internet services . In INM , 2001 . A. Bronstein, J. Das, M. Duro, R. Friedrich, G. Kleyner, M. Mueller, S. Singhal, and I. Cohen. Using bayes-nets for detecting anomalies in Internet services. In INM, 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_3_2_1_7_1","volume-title":"DMKD","author":"Chaudhary A.","year":"2002","unstructured":"A. Chaudhary , A. S. Szalay , and A. W. Moore . Very fast outlier detection in large multidimensional data sets . In DMKD , 2002 . A. Chaudhary, A. S. Szalay, and A. W. Moore. Very fast outlier detection in large multidimensional data sets. In DMKD, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30214-8_22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0093-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198572237.001.0001","volume-title":"Probability and Random Processes","author":"Grimmett G.","year":"2001","unstructured":"G. Grimmett and D. Stirzaker . Probability and Random Processes . Oxford University Press , 2001 . G. Grimmett and D. Stirzaker. Probability and Random Processes. Oxford University Press, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1213810"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_2_1_14_1","volume-title":"AISTAT","author":"Kontkanen P.","year":"2007","unstructured":"P. Kontkanen and P. Myllym\u00e4ki . MDL histogram density estimation . In AISTAT , 2007 . P. Kontkanen and P. Myllym\u00e4ki. MDL histogram density estimation. In AISTAT, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/161259"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/882082.882086"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0246-6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.53"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(78)90005-5"},{"key":"e_1_3_2_1_21_1","first-page":"393","volume-title":"SDM","author":"Siebes A.","year":"2006","unstructured":"A. Siebes , J. Vreeken , and M. van Leeuwen . Item sets that compress . In SDM , pages 393 -- 404 . SIAM , 2006 . A. Siebes, J. Vreeken, and M. van Leeuwen. Item sets that compress. In SDM, pages 393--404. SIAM, 2006."},{"key":"e_1_3_2_1_22_1","volume-title":"SDM","author":"Smets K.","year":"2011","unstructured":"K. Smets and J. Vreeken . The odd one out: Identifying and characterising anomalies . In SDM , pages x--y. SIAM , 2011 . K. Smets and J. Vreeken. The odd one out: Identifying and characterising anomalies. In SDM, pages x--y. SIAM, 2011."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"SDM","author":"Smets K.","year":"2012","unstructured":"K. Smets and J. Vreeken . textscSlim: Directly mining descriptive patterns . In SDM , pages 1 -- 12 . SIAM , 2012 . K. Smets and J. Vreeken.textscSlim: Directly mining descriptive patterns. In SDM, pages 1--12. SIAM, 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.39"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0202-x"},{"key":"e_1_3_2_1_26_1","volume-title":"ICML","author":"Wong W.-K.","year":"2003","unstructured":"W.-K. Wong , A. W. Moore , G. F. Cooper , and M. M. Wagner . Bayesian network anomaly pattern detection for disease outbreaks . In ICML , 2003 . W.-K. Wong, A. W. Moore, G. F. Cooper, and M. M. Wagner. Bayesian network anomaly pattern detection for disease outbreaks. In ICML, 2003."}],"event":{"name":"CIKM'12: 21st ACM International Conference on Information and Knowledge Management","location":"Maui Hawaii USA","acronym":"CIKM'12","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 21st ACM international conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2396816","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2396761.2396816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:38Z","timestamp":1750239278000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2396761.2396816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,29]]},"references-count":26,"alternative-id":["10.1145\/2396761.2396816","10.1145\/2396761"],"URL":"https:\/\/doi.org\/10.1145\/2396761.2396816","relation":{},"subject":[],"published":{"date-parts":[[2012,10,29]]},"assertion":[{"value":"2012-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}