{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:30:59Z","timestamp":1771705859386,"version":"3.50.1"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T00:00:00Z","timestamp":1620604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF of Zhejiang Province","award":["LY18F020019"],"award-info":[{"award-number":["LY18F020019"]}]},{"name":"Key project of NSFC","award":["61836016"],"award-info":[{"award-number":["61836016"]}]},{"DOI":"10.13039\/501100001809","name":"NSF of China","doi-asserted-by":"crossref","award":["61976195"],"award-info":[{"award-number":["61976195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National key R&D program of China","doi-asserted-by":"crossref","award":["2020AAA0107100"],"award-info":[{"award-number":["2020AAA0107100"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2021,10,31]]},"abstract":"<jats:p>Similarity representation plays a central role in increasingly popular anomaly detection techniques, which have been successfully applied in various realistic scenes. Until now, many low-rank representation techniques have been introduced to measure the similarity relations of data; yet, they only concern to minimize reconstruction errors, without involving the structural information of data. Besides, the traditional low-rank representation methods often take nuclear norm as their low-rank constraints, easily yielding a suboptimal solution. To address the problems above, in this article, we propose a novel anomaly detection method, which exploits kernel preserving embedding, as well as the double nuclear norm, to explore the similarity relations of data. Based on the similarity relations, a kind of probability transition matrix is derived, and a tailored random walk is further adopted to reveal anomalies. The proposed method can not only preserve the manifold structural properties of the data, but also alleviate the suboptimal problem. To validate the superiority of our method, extensive experiments with eight popular anomaly detection algorithms were conducted on 12 widely used datasets. The experimental results show that our detection method outperformed the state-of-the-art anomaly detection algorithms in most cases.<\/jats:p>","DOI":"10.1145\/3447684","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T22:24:14Z","timestamp":1620685454000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Anomaly Detection With Kernel Preserving Embedding"],"prefix":"10.1145","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0535-4652","authenticated-orcid":false,"given":"Huawen","family":"Liu","sequence":"first","affiliation":[{"name":"Zhejiang Normal University, Zhejiang, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0567-5029","authenticated-orcid":false,"given":"Enhui","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang Normal University, Zhejiang, P.R. China"}]},{"given":"Xinwang","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, P.R. China"}]},{"given":"Kaile","family":"Su","sequence":"additional","affiliation":[{"name":"Griffith University, Brisbane, Australia"}]},{"given":"Shichao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Central South University, Changsha, Hunan, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2021,5,10]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Outlier Analysis","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2017. Outlier Analysis ( 2 nd ed.). Springer . Charu C. Aggarwal. 2017. Outlier Analysis (2nd ed.). Springer.","edition":"2"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362158"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332185"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00766-x"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/00949655.2011.621124"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014057"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_86"},{"key":"e_1_2_1_9_1","volume-title":"Multi-view low-rank analysis applications to outlier detection. ACM Transactions on Knowledge Discovery from Data 12, 3","author":"Li Sheng","year":"2018","unstructured":"Sheng Li , Ming Shao , and Yun Fu. 2018. Multi-view low-rank analysis applications to outlier detection. ACM Transactions on Knowledge Discovery from Data 12, 3 ( 2018 ), Article 32. Sheng Li, Ming Shao, and Yun Fu. 2018. Multi-view low-rank analysis applications to outlier detection. ACM Transactions on Knowledge Discovery from Data 12, 3 (2018), Article 32."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.88"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 26th International Conference on Machine Learning. 663--670","author":"Liu Guangcan","year":"2010","unstructured":"Guangcan Liu , Zhouchen Lin , and Yong Yu . 2010 . Robust subspace segmentation by low-rank representation . In Proceedings of the 26th International Conference on Machine Learning. 663--670 . Guangcan Liu, Zhouchen Lin, and Yong Yu. 2010. Robust subspace segmentation by low-rank representation. In Proceedings of the 26th International Conference on Machine Learning. 663--670."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2718220"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2519683"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2954856"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs10050745"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.2990457"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213008003753"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2749215"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2748590"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3009632"},{"key":"e_1_2_1_22_1","first-page":"2195","article-title":"A geometric analysis of subspace clustering with outliers","volume":"44","author":"Soltanolkotabi Mahdi","year":"2012","unstructured":"Mahdi Soltanolkotabi and Emmanuel J. Candes . 2012 . A geometric analysis of subspace clustering with outliers . Annals of Statistics 44 , 4 (2012), 2195 -- 2238 . Mahdi Soltanolkotabi and Emmanuel J. Candes. 2012. A geometric analysis of subspace clustering with outliers. Annals of Statistics 44, 4 (2012), 2195--2238.","journal-title":"Annals of Statistics"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05127-3"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the ICCV Workshop on Robust Subspace Learning and Computer Vision. 10--18","author":"Manolis","unstructured":"Manolis C. Tsakiris and Rene Vidal. 2015. Dual principal component pursuit . In Proceedings of the ICCV Workshop on Robust Subspace Learning and Computer Vision. 10--18 . Manolis C. Tsakiris and Rene Vidal. 2015. Dual principal component pursuit. In Proceedings of the ICCV Workshop on Robust Subspace Learning and Computer Vision. 10--18."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.104907"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2044470"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173156"},{"key":"e_1_2_1_28_1","volume-title":"Recent progress of anomaly detection. Complexity","author":"Xu Xiaodan","year":"2019","unstructured":"Xiaodan Xu , Huawen Liu , and Minghai Yao . 2019. Recent progress of anomaly detection. Complexity ( 2019 ), 2686378:1\u20132686378:11. Xiaodan Xu, Huawen Liu, and Minghai Yao. 2019. Recent progress of anomaly detection. Complexity (2019), 2686378:1\u20132686378:11."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.460"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2811764"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01307-2_84"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2547180"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2654163"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-019-00731-8"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2858782"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1280"},{"key":"e_1_2_1_37_1","volume-title":"Encyclopedia of Database Systems","author":"Zimek Arthur","unstructured":"Arthur Zimek and Erich Schubert . 2018. Outlier detection . In Encyclopedia of Database Systems ( 2 nd ed.), Ling Liu and M. Tamer \u00d6zsu (Eds.). Springer , Chapter 1, 1--5. Arthur Zimek and Erich Schubert. 2018. Outlier detection. In Encyclopedia of Database Systems (2nd ed.), Ling Liu and M. Tamer \u00d6zsu (Eds.). Springer, Chapter 1, 1--5.","edition":"2"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447684","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:10Z","timestamp":1750200070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,10]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10,31]]}},"alternative-id":["10.1145\/3447684"],"URL":"https:\/\/doi.org\/10.1145\/3447684","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"value":"1556-4681","type":"print"},{"value":"1556-472X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,10]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}