{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T18:22:31Z","timestamp":1750530151041,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1145\/3383583.3398531","type":"proceedings-article","created":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T04:18:32Z","timestamp":1596255512000},"page":"27-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Unsupervised Anomaly Detection in Journal-Level Citation Networks"],"prefix":"10.1145","author":[{"given":"Baani Leen Kaur","family":"Jolly","sequence":"first","affiliation":[{"name":"Indraprastha Institute Information Technology, Delhi, New Delhi, India"}]},{"given":"Lavina","family":"Jain","sequence":"additional","affiliation":[{"name":"Indraprastha Institute Information Technology, Delhi, New Delhi, India"}]},{"given":"Debajyoti","family":"Bera","sequence":"additional","affiliation":[{"name":"Indraprastha Institute Information Technology, Delhi, New Delhi, India"}]},{"given":"Tanmoy","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Indraprastha Institute Information Technology, Delhi, New Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2020,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Accessed April 7 2019. scimagojr.com. https:\/\/www.scimagojr.com\/journalsearch.php?q=15107&tip=sid&clean=0. Accessed April 7 2019. scimagojr.com. https:\/\/www.scimagojr.com\/journalsearch.php?q=15107&tip=sid&clean=0."},{"volume-title":"Conf Score. https:\/\/en.wikipedia.org\/wiki\/Confidence_interval.","year":"2020","author":"Accessed May","key":"e_1_3_2_2_2_1"},{"key":"e_1_3_2_2_3_1","unstructured":"Accessed May 16 2020. Impact Factor. https:\/\/en.wikipedia.org\/wiki\/Impact_factor. Accessed May 16 2020. Impact Factor. https:\/\/en.wikipedia.org\/wiki\/Impact_factor."},{"key":"e_1_3_2_2_4_1","unstructured":"Accessed May 16 2020. itsoc. https:\/\/www.itsoc.org\/. Accessed May 16 2020. itsoc. https:\/\/www.itsoc.org\/."},{"key":"e_1_3_2_2_5_1","unstructured":"Accessed May 16 2020. Thomson Reuter. http:\/\/ipscience-help.thomsonreuters.com\/incitesLiveJCR\/JCRGroup\/titleSuppressions.html. Accessed May 16 2020. Thomson Reuter. http:\/\/ipscience-help.thomsonreuters.com\/incitesLiveJCR\/JCRGroup\/titleSuppressions.html."},{"volume-title":"Advances in Knowledge Discovery and Data Mining, Mohammed J. Zaki, Jeffrey Xu Yu","author":"Akoglu Leman","key":"e_1_3_2_2_6_1"},{"key":"e_1_3_2_2_7_1","volume-title":"Scientometrics","volume":"56","author":"Aksnes Dag","year":"2003"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-010-0306-5"},{"key":"e_1_3_2_2_9_1","unstructured":"Joyita Chakraborty Dinesh Pradhan Hridoy Sankar Dutta Subrata Nandi and Tanmoy Chakraborty. 2018. On Good and Bad Intentions behind Anomalous Citation Patterns among Journals in Computer Sciences. arXiv preprint arXiv:1807.10804 (2018). Joyita Chakraborty Dinesh Pradhan Hridoy Sankar Dutta Subrata Nandi and Tanmoy Chakraborty. 2018. On Good and Bad Intentions behind Anomalous Citation Patterns among Journals in Computer Sciences. arXiv preprint arXiv:1807.10804 (2018)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701412"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-017-1080-y"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2492517.2492536"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-011-0183-2"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0161021"},{"key":"e_1_3_2_2_16_1","volume-title":"Scientometrics","volume":"54","author":"Cronin Blaise","year":"2002"},{"key":"e_1_3_2_2_17_1","first-page":"376","article-title":"Mining for Structural Anomalies in Graph-based Data","volume":"7","author":"Eberle William","year":"2007","journal-title":"DMIN"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2016.00049"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-007-1777-2"},{"key":"e_1_3_2_2_20_1","volume-title":"Scientometrics","volume":"113","author":"Hayat Malik Khizar","year":"2017"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Marco Huber. 2017. Conditional Anomaly Detection in Event Streams. at - Automatisierungstechnik Vol. 65 (04 2017) 233--244. Marco Huber. 2017. Conditional Anomaly Detection in Event Streams. at - Automatisierungstechnik Vol. 65 (04 2017) 233--244.","DOI":"10.1515\/auto-2016-0070"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Norman P Hummon and Patrick Dereian. 1989. Connectivity in a citation network: The development of DNA theory. Social networks Vol. 11 1 (1989) 39--63. Norman P Hummon and Patrick Dereian. 1989. Connectivity in a citation network: The development of DNA theory. Social networks Vol. 11 1 (1989) 39--63.","DOI":"10.1016\/0378-8733(89)90017-8"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpsychores.2014.11.008"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2006.94"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Caleb C. Noble and Diane J. Cook. 2003. Graph-based Anomaly Detection. In ACM SIGKDD (Washington D.C.). 631--636. Caleb C. Noble and Diane J. Cook. 2003. Graph-based Anomaly Detection. In ACM SIGKDD (Washington D.C.). 631--636.","DOI":"10.1145\/956750.956831"},{"key":"e_1_3_2_2_27_1","volume-title":"Citation Analysis and Co-Citation Analysis: A Review of Literature I. Libri","volume":"46","author":"Osareh Farideh","year":"1996"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630340305"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Derek J De Solla Price. 1965. Networks of scientific papers. Science (1965) 510--515. Derek J De Solla Price. 1965. Networks of scientific papers. Science (1965) 510--515.","DOI":"10.1126\/science.149.3683.510"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","article-title":"The three sigma rule","volume":"48","author":"Pukelsheim Friedrich","year":"1994","journal-title":"The American Statistician"},{"key":"e_1_3_2_2_31_1","unstructured":"Jimeng Sun Huiming Qu Deepayan Chakrabarti and Christos Faloutsos. 2005. Neighborhood formation and anomaly detection in bipartite graphs. ICDM (2005) 8 -- 17. Jimeng Sun Huiming Qu Deepayan Chakrabarti and Christos Faloutsos. 2005. Neighborhood formation and anomaly detection in bipartite graphs. ICDM (2005) 8 -- 17."},{"key":"e_1_3_2_2_32_1","unstructured":"Guerrero-Bote Vicente and Felix Moya-Anegon. 2012. A further step forward in measuring journals' scientific prestige: The SJR2 indicator. CoRR Vol. abs\/1201.4639 (01 2012). Guerrero-Bote Vicente and Felix Moya-Anegon. 2012. A further step forward in measuring journals' scientific prestige: The SJR2 indicator. CoRR Vol. abs\/1201.4639 (01 2012)."},{"key":"e_1_3_2_2_33_1","volume-title":"Publications","volume":"5","author":"Flatt Justin W.","year":"2017"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45817-5_37"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Qiankun Zhao Sourav S. Bhowmick Xin Zheng and Kai Yi. 2008. Characterizing and Predicting Community Members from Evolutionary and Heterogeneous Networks. In CIKM. 309--318. Qiankun Zhao Sourav S. Bhowmick Xin Zheng and Kai Yi. 2008. Characterizing and Predicting Community Members from Evolutionary and Heterogeneous Networks. In CIKM. 309--318.","DOI":"10.1145\/1458082.1458125"}],"event":{"name":"JCDL '20: The ACM\/IEEE Joint Conference on Digital Libraries in 2020","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval","IEEE Institute of Electrical and Electronics Engineers"],"location":"Virtual Event China","acronym":"JCDL '20"},"container-title":["Proceedings of the ACM\/IEEE Joint Conference on Digital Libraries in 2020"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383583.3398531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383583.3398531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:11Z","timestamp":1750197671000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383583.3398531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":35,"alternative-id":["10.1145\/3383583.3398531","10.1145\/3383583"],"URL":"https:\/\/doi.org\/10.1145\/3383583.3398531","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"2020-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}