{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:41:22Z","timestamp":1772120482267,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA8650-15-C-7557"],"award-info":[{"award-number":["FA8650-15-C-7557"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3220083","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"2200-2209","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Feedback-Guided Anomaly Discovery via Online Optimization"],"prefix":"10.1145","author":[{"given":"Md Amran","family":"Siddiqui","sequence":"first","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Alan","family":"Fern","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Thomas G.","family":"Dietterich","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Ryan","family":"Wright","sequence":"additional","affiliation":[{"name":"Galois, Inc., Portland, OR, USA"}]},{"given":"Alec","family":"Theriault","sequence":"additional","affiliation":[{"name":"Galois, Inc., Portland, OR, USA"}]},{"given":"David W.","family":"Archer","sequence":"additional","affiliation":[{"name":"Galois, Inc., Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"e_1_3_2_2_2_1","volume-title":"Incorporating Feedback into Tree-based Anomaly Detection. arXiv preprint arXiv:1708.09441","author":"Das Shubhomoy","year":"2017","unstructured":"Shubhomoy Das ,Weng-KeenWong, Alan Fern , Thomas G Dietterich , and Md Amran Siddiqui . 2017. Incorporating Feedback into Tree-based Anomaly Detection. arXiv preprint arXiv:1708.09441 ( 2017 ). Shubhomoy Das,Weng-KeenWong, Alan Fern, Thomas G Dietterich, and Md Amran Siddiqui. 2017. Incorporating Feedback into Tree-based Anomaly Detection. arXiv preprint arXiv:1708.09441 (2017)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132854"},{"key":"e_1_3_2_2_4_1","volume-title":"Systematic Construction of Anomaly Detection Benchmarks from Real Data. CoRR abs\/1503.01158","author":"Emmott Andrew","year":"2015","unstructured":"Andrew Emmott , Shubhomoy Das , Thomas G. Dietterich , Alan Fern , and Weng- Keen Wong . 2015. Systematic Construction of Anomaly Detection Benchmarks from Real Data. CoRR abs\/1503.01158 ( 2015 ). http:\/\/arxiv.org\/abs\/1503.01158 Andrew Emmott, Shubhomoy Das, Thomas G. Dietterich, Alan Fern, and Weng- Keen Wong. 2015. Systematic Construction of Anomaly Detection Benchmarks from Real Data. CoRR abs\/1503.01158 (2015). http:\/\/arxiv.org\/abs\/1503.01158"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500858"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030126"},{"key":"e_1_3_2_2_8_1","volume-title":"Konrad Rieck, and Ulf Brefeld.","author":"G\u00f6rnitz Nico","year":"2013","unstructured":"Nico G\u00f6rnitz , Marius Micha Kloft , Konrad Rieck, and Ulf Brefeld. 2013 . Toward supervised anomaly detection. Journal of Artificial Intelligence Research ( 2013). Nico G\u00f6rnitz, Marius Micha Kloft, Konrad Rieck, and Ulf Brefeld. 2013. Toward supervised anomaly detection. Journal of Artificial Intelligence Research (2013)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.021"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning","volume":"48","author":"Guha Sudipto","year":"2016","unstructured":"Sudipto Guha , Nina Mishra , Gourav Roy , and Okke Schrijvers . 2016 . Robust Random Cut Forest Based Anomaly Detection On Streams . In Proceedings of The 33rd International Conference on Machine Learning , Vol. 48 . Sudipto Guha, Nina Mishra, Gourav Roy, and Okke Schrijvers. 2016. Robust Random Cut Forest Based Anomaly Detection On Streams. In Proceedings of The 33rd International Conference on Machine Learning, Vol. 48."},{"key":"e_1_3_2_2_11_1","volume-title":"Efficient Nonmyopic Active Search. In International Conference on Machine Learning. 1714--1723","author":"Jiang Shali","year":"2017","unstructured":"Shali Jiang , Gustavo Malkomes , Geoff Converse , Alyssa Shofner , Benjamin Moseley , and Roman Garnett . 2017 . Efficient Nonmyopic Active Search. In International Conference on Machine Learning. 1714--1723 . Shali Jiang, Gustavo Malkomes, Geoff Converse, Alyssa Shofner, Benjamin Moseley, and Roman Garnett. 2017. Efficient Nonmyopic Active Search. In International Conference on Machine Learning. 1714--1723."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69321-5_2"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_2_14_1","unstructured":"Dan Pelleg and Andrew W Moore. 2005. Active learning for anomaly and rarecategory detection. In Advances in neural information processing systems.   Dan Pelleg and Andrew W Moore. 2005. Active learning for anomaly and rarecategory detection. In Advances in neural information processing systems."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2201375"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884433"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019233"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000018"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"e_1_3_2_2_21_1","volume-title":"Finite Sample Complexity of Rare Pattern Anomaly Detection. In Conference on Uncertainty in Artificial Intelligence (UAI).","author":"Siddiqui Md Amran","year":"2016","unstructured":"Md Amran Siddiqui , Alan Fern , Thomas Dietterich , and Shubhomoy Das . 2016 . Finite Sample Complexity of Rare Pattern Anomaly Detection. In Conference on Uncertainty in Artificial Intelligence (UAI). Md Amran Siddiqui, Alan Fern, Thomas Dietterich, and Shubhomoy Das. 2016. Finite Sample Complexity of Rare Pattern Anomaly Detection. In Conference on Uncertainty in Artificial Intelligence (UAI)."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 22nd International Joint Conference on Artificial Intelligence -","volume":"1516","author":"Tan Swee Chuan","year":"2011","unstructured":"Swee Chuan Tan , Kai Ming Ting , and Tony Fei Liu . 2011 . Fast Anomaly Detection for Streaming Data . In Proceedings of the 22nd International Joint Conference on Artificial Intelligence - Volume Two. 1511-- 1516 . Swee Chuan Tan, Kai Ming Ting, and Tony Fei Liu. 2011. Fast Anomaly Detection for Streaming Data. In Proceedings of the 22nd International Joint Conference on Artificial Intelligence - Volume Two. 1511--1516."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2017.74"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.79"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.45"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3220083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3220083","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3220083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:29Z","timestamp":1750212449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3220083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":25,"alternative-id":["10.1145\/3219819.3220083","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3220083","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}