{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:19Z","timestamp":1750221319384,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T00:00:00Z","timestamp":1498176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,23]]},"DOI":"10.1145\/3134302.3134337","type":"proceedings-article","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T14:02:08Z","timestamp":1510927328000},"page":"73-79","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Outlier Detection via Deep Learning Architecture"],"prefix":"10.1145","author":[{"given":"Irina","family":"Kakanakova","sequence":"first","affiliation":[{"name":"University of Sofia"}]},{"given":"Stefan","family":"Stoyanov","sequence":"additional","affiliation":[{"name":"University of Sofia, branch Plovdiv"}]}],"member":"320","published-online":{"date-parts":[[2017,6,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"e_1_3_2_1_2_1","unstructured":"Buitinck L. G. Louppe M. Blondel F. Pedregos A. Mueller O. Grisel V. Niculae P. Prettenhofer A. Gramfort J. Grobler R. Layton J. Vanderplas A. Joly B. Holt and G. Varoquaux API design for machine learning software: experiences from the scikit-learn project.  Buitinck L. G. Louppe M. Blondel F. Pedregos A. Mueller O. Grisel V. Niculae P. Prettenhofer A. Gramfort J. Grobler R. Layton J. Vanderplas A. Joly B. Holt and G. Varoquaux API design for machine learning software: experiences from the scikit-learn project."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, Jan 6--8","author":"Carreira-Perpi\u00f1an M.","year":"2005","unstructured":"Carreira-Perpi\u00f1an , M. , and G. Hinton , On contrastive divergence learning . In Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, Jan 6--8 , 2005 , Savannah Hotel, Barbados. Carreira-Perpi\u00f1an, M., and G. Hinton, On contrastive divergence learning. In Proceedings of the Tenth International Workshop on Artificial Intelligence and Statistics, Jan 6--8, 2005, Savannah Hotel, Barbados."},{"key":"e_1_3_2_1_4_1","unstructured":"Do K. T. Tran D. Phung and S. Venkatesh Outlier Detection on Mixed-Type Data: An Energy-based Approach.  Do K. T. Tran D. Phung and S. Venkatesh Outlier Detection on Mixed-Type Data: An Energy-based Approach."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"e_1_3_2_1_7_1","first-page":"131","author":"Lepora N.","year":"2010","unstructured":"Lepora , N. , M. Pearson , B. Mitchinson , M. Evans , C. Fox , A. Pipe , K. Gurney and T. J. Prescott , Naive Bayes novelty detection for a moving robot with whiskers. In 'ROBIO, IEEE , 2010 , pp. 131 -- 136 . Lepora, N., M. Pearson, B. Mitchinson, M. Evans, C. Fox, A. Pipe, K. Gurney and T. J. Prescott, Naive Bayes novelty detection for a moving robot with whiskers. In 'ROBIO, IEEE, 2010, pp. 131--136.","journal-title":"In 'ROBIO, IEEE"},{"volume-title":"Proceedings of the Data Mining for business workshop.","author":"Loureiro A.","key":"e_1_3_2_1_8_1","unstructured":"Loureiro , A. , L. Torgo , C. Soares , Outlier Detection Using Clustering Methods : a Data Cleaning Application (2004) . In Proceedings of the Data Mining for business workshop. Loureiro, A., L. Torgo, C. Soares, Outlier Detection Using Clustering Methods: a Data Cleaning Application (2004). In Proceedings of the Data Mining for business workshop."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.019"},{"key":"e_1_3_2_1_11_1","volume-title":"Naive Bayes Classifier with Feature Reduction. 2nd International Conference on Computer, Communication, Control and Information Technology(C3IT-2012)","author":"Mukherjee S.","year":"2012","unstructured":"Mukherjee , S. , N. Sharma , Intrusion Detection using Naive Bayes Classifier with Feature Reduction. 2nd International Conference on Computer, Communication, Control and Information Technology(C3IT-2012) on February 25 --26 , 2012 . Mukherjee, S., N. Sharma, Intrusion Detection using Naive Bayes Classifier with Feature Reduction. 2nd International Conference on Computer, Communication, Control and Information Technology(C3IT-2012) on February 25--26, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SYNASC.2011.57"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2979779.2979790"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950597"},{"key":"e_1_3_2_1_16_1","unstructured":"Wong W. A. Moore G. Cooper and M. Wagner Rule-based anomaly pattern detection for detecting disease outbreaks. In Eighteenth national conference on Artificial intelligence AAAI CA USA 217--223.   Wong W. A. Moore G. Cooper and M. Wagner Rule-based anomaly pattern detection for detecting disease outbreaks. In Eighteenth national conference on Artificial intelligence AAAI CA USA 217--223."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2010.71"},{"key":"e_1_3_2_1_18_1","volume-title":"Deep Structured Energy Based Models for Anomaly Detection. In the 33rd International Conference on Machine Learning (ICML","author":"Zhai S.","year":"2016","unstructured":"Zhai , S. , Y. Cheng , W. Lu and Z. Zhang , Deep Structured Energy Based Models for Anomaly Detection. In the 33rd International Conference on Machine Learning (ICML 2016 ). Zhai, S., Y. Cheng, W. Lu and Z.Zhang, Deep Structured Energy Based Models for Anomaly Detection. In the 33rd International Conference on Machine Learning (ICML 2016)."}],"event":{"name":"CompSysTech'17: 18th International Conference on Computer Systems and Technologies","sponsor":["UORB University of Ruse, Bulgaria","TECHUVB Technical University of Varna, Bulgaria"],"location":"Ruse Bulgaria","acronym":"CompSysTech'17"},"container-title":["Proceedings of the 18th International Conference on Computer Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134302.3134337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134302.3134337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:51Z","timestamp":1750212831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134302.3134337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,23]]},"references-count":18,"alternative-id":["10.1145\/3134302.3134337","10.1145\/3134302"],"URL":"https:\/\/doi.org\/10.1145\/3134302.3134337","relation":{},"subject":[],"published":{"date-parts":[[2017,6,23]]},"assertion":[{"value":"2017-06-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}