{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:41:29Z","timestamp":1763458889702,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CRC for Alertness, Sleep and Productivity"},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["ADAMS, SMISC"],"award-info":[{"award-number":["ADAMS, SMISC"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1134990, IIS-1254206"],"award-info":[{"award-number":["IIS-1134990, IIS-1254206"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007615","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007615","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Capial Markets CRC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,2]]},"DOI":"10.1145\/3018661.3022757","type":"proceedings-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T15:09:48Z","timestamp":1486048188000},"page":"817-818","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Social Media Anomaly Detection"],"prefix":"10.1145","author":[{"given":"Yan","family":"Liu","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"given":"Sanjay","family":"Chawla","sequence":"additional","affiliation":[{"name":"University of Sydney &amp; Qatar Computing Research Institute, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Anomaly detection in large graphs","author":"Akoglu L.","year":"2009","unstructured":"L. Akoglu and M. McGlohon. Anomaly detection in large graphs. Carnegie Mellon University-CS-09-173 Technical, (November), 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.36"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281226"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.18"},{"key":"e_1_3_2_1_7_1","first-page":"418","volume-title":"Proceedings of ICDM '05","author":"Sun J.","year":"2005","unstructured":"J. Sun, H. Qu, D. Chakrabarti, and C. Faloutsos. Neighborhood formation and anomaly detection in bipartite graphs. In Proceedings of ICDM '05, pages 418--425,Washington, DC, USA, 2005. IEEE Computer Society."},{"key":"e_1_3_2_1_8_1","first-page":"1074","volume-title":"Proceedings of ICDM'2012","author":"Qiu H.","year":"2012","unstructured":"H. Qiu, Y. Liu, N. Subrahmanya, W. Li. Granger Graphical Models for Time-Series Anomaly Detection. In Proceedings of ICDM'2012, Pages 1074--1079, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.9"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of ICML '03","author":"Wong W.-K.","year":"2003","unstructured":"W.-K. Wong, A. Moore, G. Cooper, and M. Wagner. Bayesian network anomaly pattern detection for disease outbreaks. In Proceedings of ICML '03, 2003."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623719"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980765.2980767"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.13"}],"event":{"name":"WSDM 2017: Tenth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Cambridge United Kingdom","acronym":"WSDM 2017"},"container-title":["Proceedings of the Tenth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3022757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3022757","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018661.3022757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:37:37Z","timestamp":1763458657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018661.3022757"}},"subtitle":["Challenges and Solutions"],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":13,"alternative-id":["10.1145\/3018661.3022757","10.1145\/3018661"],"URL":"https:\/\/doi.org\/10.1145\/3018661.3022757","relation":{},"subject":[],"published":{"date-parts":[[2017,2,2]]},"assertion":[{"value":"2017-02-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}