{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:52:22Z","timestamp":1765486342633,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330748","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"1917-1926","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Anomaly Detection for an E-commerce Pricing System"],"prefix":"10.1145","author":[{"given":"Jagdish","family":"Ramakrishnan","sequence":"first","affiliation":[{"name":"Walmart Labs, San Bruno, CA, USA"}]},{"given":"Elham","family":"Shaabani","sequence":"additional","affiliation":[{"name":"Walmart Labs, San Bruno, CA, USA"}]},{"given":"Chao","family":"Li","sequence":"additional","affiliation":[{"name":"Walmart Labs, San Bruno, CA, USA"}]},{"given":"Matyas A.","family":"Sustik","sequence":"additional","affiliation":[{"name":"Walmart Labs, San Bruno, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Outlier Analysis","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2016. Outlier Analysis 2 nd ed.). Springer Publishing Company, Inc orporated. Charu C. Aggarwal. 2016. Outlier Analysis 2nd ed.). Springer Publishing Company, Incorporated.","edition":"2"},{"key":"e_1_3_2_2_2_1","volume-title":"Real-Time Anomaly Detection for Streaming Analytics. CoRR","author":"Ahmad Subutai","year":"2016","unstructured":"Subutai Ahmad and Scott Purdy . 2016. Real-Time Anomaly Detection for Streaming Analytics. CoRR , Vol. abs\/ 1607 .02480 ( 2016 ). Subutai Ahmad and Scott Purdy. 2016. Real-Time Anomaly Detection for Streaming Analytics. CoRR , Vol. abs\/1607.02480 (2016)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645806.670167"},{"key":"e_1_3_2_2_4_1","unstructured":"Anodot. {n.d.}. Nipping it in the Bud: How real-time anomaly detection can prevent e-commerce glitches from becoming disasters. https:\/\/www.anodot.com\/blog\/real-time-anomaly-detection-can-prevent-ecommerce-retail-glitches\/.  Anodot. {n.d.}. Nipping it in the Bud: How real-time anomaly detection can prevent e-commerce glitches from becoming disasters. https:\/\/www.anodot.com\/blog\/real-time-anomaly-detection-can-prevent-ecommerce-retail-glitches\/."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273528"},{"key":"e_1_3_2_2_9_1","volume-title":"Ann. Statist.","volume":"29","author":"Friedman Jerome H.","year":"2001","unstructured":"Jerome H. Friedman . 2001 . Greedy function approximation: A gradient boosting machine . Ann. Statist. , Vol. 29 , 5 (10 2001), 1189--1232. Jerome H. Friedman. 2001. Greedy function approximation: A gradient boosting machine. Ann. Statist. , Vol. 29, 5 (10 2001), 1189--1232."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2011.6012011"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2316504"},{"key":"e_1_3_2_2_12_1","first-page":"1","article-title":"Toward Supervised Anomaly Detection","volume":"46","author":"G\u00f6rnitz Nico","year":"2013","unstructured":"Nico G\u00f6rnitz , Marius Kloft , Konrad Rieck , and Ulf Brefeld . 2013 . Toward Supervised Anomaly Detection . J. Artif. Int. Res. , Vol. 46 , 1 (Jan. 2013), 235--262. http:\/\/dl.acm.org\/citation.cfm?id=2512538.2512545 Nico G\u00f6rnitz, Marius Kloft, Konrad Rieck, and Ulf Brefeld. 2013. Toward Supervised Anomaly Detection. J. Artif. Int. Res. , Vol. 46, 1 (Jan. 2013), 235--262. http:\/\/dl.acm.org\/citation.cfm?id=2512538.2512545","journal-title":"J. Artif. Int. Res."},{"key":"e_1_3_2_2_13_1","volume-title":"Applying Deep Learning To Airbnb Search. CoRR","author":"Haldar Malay","year":"2018","unstructured":"Malay Haldar , Mustafa Abdool , Prashant Ramanathan , Tao Xu , Shulin Yang , Huizhong Duan , Qing Zhang , Nick Barrow-Williams , Bradley C. Turnbull , Brendan M. Collins , and Thomas Legrand . 2018. Applying Deep Learning To Airbnb Search. CoRR , Vol. abs\/ 1810 .09591 ( 2018 ). arxiv: 1810.09591 http:\/\/arxiv.org\/abs\/1810.09591 Malay Haldar, Mustafa Abdool, Prashant Ramanathan, Tao Xu, Shulin Yang, Huizhong Duan, Qing Zhang, Nick Barrow-Williams, Bradley C. Turnbull, Brendan M. Collins, and Thomas Legrand. 2018. Applying Deep Learning To Airbnb Search. CoRR , Vol. abs\/1810.09591 (2018). arxiv: 1810.09591 http:\/\/arxiv.org\/abs\/1810.09591"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.104"},{"key":"e_1_3_2_2_15_1","volume-title":"On normalization and algorithm selection for unsupervised outlier detection. Monash Econometrics and Business Statistics Working Papers 16\/18","author":"Kandanaarachchi Sevvandi","year":"2018","unstructured":"Sevvandi Kandanaarachchi , Mario A Munoz , Rob J Hyndman , and Kate Smith-Miles . 2018. On normalization and algorithm selection for unsupervised outlier detection. Monash Econometrics and Business Statistics Working Papers 16\/18 . Monash University , Department of Econometrics and Business Statistics. https:\/\/ideas.repec.org\/p\/msh\/ebswps\/ 2018 --16.html Sevvandi Kandanaarachchi, Mario A Munoz, Rob J Hyndman, and Kate Smith-Miles. 2018. On normalization and algorithm selection for unsupervised outlier detection. Monash Econometrics and Business Statistics Working Papers 16\/18. Monash University, Department of Econometrics and Business Statistics. https:\/\/ideas.repec.org\/p\/msh\/ebswps\/2018--16.html"},{"key":"e_1_3_2_2_16_1","volume-title":"1988 International Conference on","volume":"13","author":"Kim JooSeuk","year":"2011","unstructured":"JooSeuk Kim and Clayton D. Scott . 2011. Robust Kernel Density Estimation. Acoustics, Speech, and Signal Processing, 1988. ICASSP-88 ., 1988 International Conference on , Vol. 13 (07 2011 ). JooSeuk Kim and Clayton D. Scott. 2011. Robust Kernel Density Estimation. Acoustics, Speech, and Signal Processing, 1988. ICASSP-88., 1988 International Conference on , Vol. 13 (07 2011)."},{"key":"e_1_3_2_2_17_1","volume-title":"Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12","author":"Kingma Diederik","year":"2014","unstructured":"Diederik Kingma and Jimmy Ba . 2014 . Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12 2014). Diederik Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. International Conference on Learning Representations (12 2014)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401946"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"e_1_3_2_2_21_1","volume-title":"Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08)","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu , Kai Ming Ting , and Zhi-Hua Zhou . 2008 . Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08) . IEEE Computer Society, Washington, DC, USA, 413--422. Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation Forest. In Proceedings of the 2008 Eighth IEEE International Conference on Data Mining (ICDM '08). IEEE Computer Society, Washington, DC, USA, 413--422."},{"volume-title":"NumPy: A guide to NumPy","author":"Oliphant Travis","key":"e_1_3_2_2_22_1","unstructured":"Travis Oliphant . 2006--. NumPy: A guide to NumPy . USA : Trelgol Publishing . http:\/\/www.numpy.org\/ {Online; accessed today}. Travis Oliphant. 2006--. NumPy: A guide to NumPy . USA: Trelgol Publishing. http:\/\/www.numpy.org\/ {Online; accessed today}."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"e_1_3_2_2_25_1","volume-title":"Detecting anomalous patterns in pharmacy retail data. (01","author":"Sabhnani Maheshkumar R","year":"2005","unstructured":"Maheshkumar R Sabhnani , Daniel B Neill , and Andrew W Moore . 2005. Detecting anomalous patterns in pharmacy retail data. (01 2005 ). Maheshkumar R Sabhnani, Daniel B Neill, and Andrew W Moore. 2005. Detecting anomalous patterns in pharmacy retail data. (01 2005)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3009657.3009740"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230666"},{"key":"e_1_3_2_2_30_1","volume-title":"International Journal of Computer Science Issues","volume":"9","author":"Singh Karanjit","year":"2012","unstructured":"Karanjit Singh and Shuchita Upadhyaya . 2012 . Outlier Detection: Applications And Techniques . International Journal of Computer Science Issues , Vol. 9 (01 2012). Karanjit Singh and Shuchita Upadhyaya. 2012. Outlier Detection: Applications And Techniques. International Journal of Computer Science Issues , Vol. 9 (01 2012)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"e_1_3_2_2_32_1","volume-title":"6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14)","author":"Vallis Owen","year":"2014","unstructured":"Owen Vallis , Jordan Hochenbaum , and Arun Kejariwal . 2014 . A Novel Technique for Long-Term Anomaly Detection in the Cloud . In 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14) . USENIX Association, Philadelphia, PA. https:\/\/www.usenix.org\/conference\/hotcloud14\/workshop-program\/presentation\/vallis Owen Vallis, Jordan Hochenbaum, and Arun Kejariwal. 2014. A Novel Technique for Long-Term Anomaly Detection in the Cloud. In 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14). USENIX Association, Philadelphia, PA. https:\/\/www.usenix.org\/conference\/hotcloud14\/workshop-program\/presentation\/vallis"},{"key":"e_1_3_2_2_33_1","volume-title":"Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar.","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati , Chuan Sheng Foo , Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018 . Efficient GAN-Based Anomaly Detection. CoRR , Vol. abs\/ 1802 .06222 (2018). arxiv: 1802.06222 http:\/\/arxiv.org\/abs\/1802.06222 Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018. Efficient GAN-Based Anomaly Detection. CoRR , Vol. abs\/1802.06222 (2018). arxiv: 1802.06222 http:\/\/arxiv.org\/abs\/1802.06222"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Zhai Shuangfei","year":"2016","unstructured":"Shuangfei Zhai , Yu Cheng , Weining Lu , and Zhongfei Zhang . 2016 . Deep Structured Energy Based Models for Anomaly Detection . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1100--1109. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045507 Shuangfei Zhai, Yu Cheng, Weining Lu, and Zhongfei Zhang. 2016. Deep Structured Energy Based Models for Anomaly Detection. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1100--1109. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045507"},{"key":"e_1_3_2_2_35_1","volume-title":"PyOD: A Python Toolbox for Scalable Outlier Detection. arXiv preprint arXiv:1901.01588","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao , Zain Nasrullah , and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. arXiv preprint arXiv:1901.01588 ( 2019 ). https:\/\/arxiv.org\/abs\/1901.01588 Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. arXiv preprint arXiv:1901.01588 (2019). https:\/\/arxiv.org\/abs\/1901.01588"},{"key":"e_1_3_2_2_36_1","unstructured":"Lingxue Zhu and Nikolay Laptev. 2017. Deep and Confident Prediction for Time Series at Uber. 103--110.  Lingxue Zhu and Nikolay Laptev. 2017. Deep and Confident Prediction for Time Series at Uber. 103--110."}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Anchorage AK USA","acronym":"KDD '19"},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:50Z","timestamp":1750208270000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":34,"alternative-id":["10.1145\/3292500.3330748","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330748","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}