{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T13:54:03Z","timestamp":1758635643161,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,8]],"date-time":"2018-12-08T00:00:00Z","timestamp":1544227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,8]]},"DOI":"10.1145\/3297156.3297236","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T13:07:04Z","timestamp":1551359224000},"page":"227-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Relative Density-Based Outlier Detection Algorithm"],"prefix":"10.1145","author":[{"given":"Jin","family":"Ning","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Institute of Electronic and Information Engineering in Dongguan, University of Electronic Science and Technology of China, Digital Media Technology Key Laboratory of Sichuan Province"}]},{"given":"Leiting","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Institute of Electronic and Information Engineering in Dongguan, University of Electronic Science and Technology of China, Digital Media Technology Key Laboratory of Sichuan Province"}]},{"given":"Junwei","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Electronic Science and Technology of China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Kamber","author":"Han J.","year":"2011","unstructured":"Han , J. , Pei , J. , Kamber , M. : Data mining: concepts and techniques. Elsevier ( 2011 ). Han, J., Pei, J., Kamber, M.: Data mining: concepts and techniques. Elsevier (2011)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":": Identification of outliers","author":"Hawkins D.M.","year":"1980","unstructured":"Hawkins , D.M. : Identification of outliers . Volume 11 . Springer ( 1980 ). Hawkins, D.M.: Identification of outliers. Volume 11. Springer (1980)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.06.005"},{"key":"e_1_3_2_1_5_1","volume-title":"Introduction to data mining. Pearson Education India","author":"Tan P.N.","year":"2006","unstructured":"Tan , P.N. , : Introduction to data mining. Pearson Education India ( 2006 ). Tan, P.N., et al.: Introduction to data mining. Pearson Education India (2006)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EUMC.2008.4751615"},{"volume-title":"Proceedings of the International Conference on Very Large Data Bases, Citeseer (1998)","author":"Knox E.M.","key":"e_1_3_2_1_7_1","unstructured":"Knox , E.M. , Ng , R.T. : Algorithms for mining distancebased outliers in large datasets . In: Proceedings of the International Conference on Very Large Data Bases, Citeseer (1998) 392--403. Knox, E.M., Ng, R.T.: Algorithms for mining distancebased outliers in large datasets. In: Proceedings of the International Conference on Very Large Data Bases, Citeseer (1998) 392--403."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335437"},{"key":"e_1_3_2_1_9_1","volume-title":"Pizzuti","author":"Angiulli F.","year":"2002","unstructured":"Angiulli , F. , Pizzuti , C. : Fast outlier detection in high dimensional spaces. In : European Conference on Principles of Data Mining and Knowledge Discovery, Springer ( 2002 ) 15--27. Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: European Conference on Principles of Data Mining and Knowledge Discovery, Springer (2002) 15--27."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956758"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_66"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.07.006"},{"key":"e_1_3_2_1_13_1","volume-title":": Outlier Analysis","author":"Aggarwal C.C.","year":"2016","unstructured":"Aggarwal , C.C. : Outlier Analysis Second Edition. ( 2016 ). Aggarwal, C.C.: Outlier Analysis Second Edition. (2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.058"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2011.06.042"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73499-4_6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646195"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.04.004"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_68"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.02.039"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.03.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.06.030"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.10.014"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.01.013"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0598-1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.12.040"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.05.007"},{"key":"e_1_3_2_1_30_1","unstructured":"Arthur U Asuncion D.J.N.: Uci repository of machine learning databases. university of california irvine ca.  Arthur U Asuncion D.J.N.: Uci repository of machine learning databases. university of california irvine ca."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"}],"event":{"name":"CSAI '18: 2018 2nd International Conference on Computer Science and Artificial Intelligence","sponsor":["Shenzhen University Shenzhen University"],"location":"Shenzhen China","acronym":"CSAI '18"},"container-title":["Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297236","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297156.3297236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:14Z","timestamp":1750208534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297156.3297236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,8]]},"references-count":31,"alternative-id":["10.1145\/3297156.3297236","10.1145\/3297156"],"URL":"https:\/\/doi.org\/10.1145\/3297156.3297236","relation":{},"subject":[],"published":{"date-parts":[[2018,12,8]]},"assertion":[{"value":"2018-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}