{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:10:03Z","timestamp":1755886203330,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T00:00:00Z","timestamp":1700870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3604237.3626872","type":"proceedings-article","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T18:09:47Z","timestamp":1700935787000},"page":"279-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["From Detection to Action: a Human-in-the-loop Toolkit for Anomaly Reasoning and Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6338-6068","authenticated-orcid":false,"given":"Xueying","family":"Ding","sequence":"first","affiliation":[{"name":"Heinz College, Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7615-4493","authenticated-orcid":false,"given":"Nikita","family":"Seleznev","sequence":"additional","affiliation":[{"name":"Capital One, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0988-0916","authenticated-orcid":false,"given":"Senthil","family":"Kumar","sequence":"additional","affiliation":[{"name":"Capital One, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2260-7518","authenticated-orcid":false,"given":"C. Bayan","family":"Bruss","sequence":"additional","affiliation":[{"name":"Capital One, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3026-5731","authenticated-orcid":false,"given":"Leman","family":"Akoglu","sequence":"additional","affiliation":[{"name":"Heinz College, Carnegie Mellon University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,11,25]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(03)00025-4"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12098-5_34"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","unstructured":"Mattia Carletti Matteo Terzi and Gian\u00a0Antonio Susto. 2020. Interpretable Anomaly Detection with DIFFI: Depth-based Isolation Forest Feature Importance. https:\/\/doi.org\/10.48550\/ARXIV.2007.11117","DOI":"10.48550\/ARXIV.2007.11117"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_2_6_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_2_7_1","volume-title":"A meta-analysis of the anomaly detection problem. arXiv preprint arXiv:1503.01158","author":"Emmott Andrew","year":"2015","unstructured":"Andrew Emmott, Shubhomoy Das, Thomas Dietterich, Alan Fern, and Weng-Keen Wong. 2015. A meta-analysis of the anomaly detection problem. arXiv preprint arXiv:1503.01158 (2015)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Nikhil Gupta Dhivya Eswaran Neil Shah Leman Akoglu and Christos Faloutsos. 2019. Beyond outlier detection: Lookout for pictorial explanation. In ECML PKDD. 122\u2013138.","DOI":"10.1007\/978-3-030-10925-7_8"},{"key":"e_1_3_2_2_9_1","volume-title":"Outlier detection. Data mining: Concepts and Techniques","author":"Han Jiawei","year":"2012","unstructured":"Jiawei Han, Micheline Kamber, and Jian Pei. 2012. Outlier detection. Data mining: Concepts and Techniques (2012), 543\u2013584."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511513"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Piotr Indyk and Rajeev Motwani. 1998. Approximate nearest neighbors: towards removing the curse of dimensionality. In STOC. 604\u2013613.","DOI":"10.1145\/276698.276876"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130348.3130374"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445941"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376219"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"Diederik\u00a0P Kingma and Max Welling. 2013. Auto-Encoding Variational Bayes. https:\/\/doi.org\/10.48550\/ARXIV.1312.6114","DOI":"10.48550\/ARXIV.1312.6114"},{"volume-title":"Computer Graphics Forum, Vol.\u00a035","author":"Ko Sungahn","key":"e_1_3_2_2_17_1","unstructured":"Sungahn Ko, Isaac Cho, Shehzad Afzal, Calvin Yau, Junghoon Chae, Abish Malik, Kaethe Beck, Yun Jang, William Ribarsky, and David\u00a0S Ebert. 2016. A survey on visual analysis approaches for financial data. In Computer Graphics Forum, Vol.\u00a035. Wiley Online Library, 599\u2013617."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","unstructured":"Satyapriya Krishna Tessa Han Alex Gu Javin Pombra Shahin Jabbari Steven Wu and Himabindu Lakkaraju. 2022. The Disagreement Problem in Explainable Machine Learning: A Practitioner\u2019s Perspective. https:\/\/doi.org\/10.48550\/ARXIV.2202.01602","DOI":"10.48550\/ARXIV.2202.01602"},{"volume-title":"Multidimensional scaling. Number\u00a011","author":"Kruskal B","key":"e_1_3_2_2_19_1","unstructured":"Joseph\u00a0B Kruskal and Myron Wish. 1978. Multidimensional scaling. Number\u00a011. Sage."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i18.18012"},{"volume-title":"Isolation forest","author":"Liu Fei\u00a0Tony","key":"e_1_3_2_2_21_1","unstructured":"Fei\u00a0Tony Liu, Kai\u00a0Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In ICDM. IEEE, 413\u2013422."},{"key":"e_1_3_2_2_22_1","volume-title":"From local explanations to global understanding with explainable AI for trees. Nature machine intelligence 2, 1","author":"Lundberg M","year":"2020","unstructured":"Scott\u00a0M Lundberg, Gabriel Erion, Hugh Chen, Alex DeGrave, Jordan\u00a0M Prutkin, Bala Nair, Ronit Katz, Jonathan Himmelfarb, Nisha Bansal, and Su-In Lee. 2020. From local explanations to global understanding with explainable AI for trees. Nature machine intelligence 2, 1 (2020), 56\u201367."},{"key":"e_1_3_2_2_23_1","volume-title":"A unified approach to interpreting model predictions. Advances in neural information processing systems 30","author":"Lundberg M","year":"2017","unstructured":"Scott\u00a0M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems 30 (2017)."},{"key":"e_1_3_2_2_24_1","first-page":"1444","article-title":"Explaining anomalies in groups with characterizing subspace rules","volume":"32","author":"Macha Meghanath","year":"2018","unstructured":"Meghanath Macha and Leman Akoglu. 2018. Explaining anomalies in groups with characterizing subspace rules. DAMI 32, 5 (2018), 1444\u20131480.","journal-title":"DAMI"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Emaad Manzoor Hemank Lamba and Leman Akoglu. 2018. xStream: Outlier detection in feature-evolving data streams. In KDD. 1963\u20131972.","DOI":"10.1145\/3219819.3220107"},{"key":"e_1_3_2_2_26_1","volume-title":"A survey on outlier explanations. The VLDB Journal","author":"Panjei Egawati","year":"2022","unstructured":"Egawati Panjei, Le Gruenwald, Eleazar Leal, Christopher Nguyen, and Shejuti Silvia. 2022. A survey on outlier explanations. The VLDB Journal (2022), 1\u201332."},{"volume-title":"Visual Analytics for Homeland Defense and Security, Vol.\u00a07346","author":"Riveiro Maria","key":"e_1_3_2_2_27_1","unstructured":"Maria Riveiro, G\u00f6ran Falkman, Tom Ziemke, and Thomas Kronhamn. 2009. Reasoning about anomalies: a study of the analytical process of detecting and identifying anomalous behavior in maritime traffic data. In Visual Analytics for Homeland Defense and Security, Vol.\u00a07346. SPIE, 93\u2013104."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v8i1.7477"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2964169"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"e_1_3_2_2_32_1","volume-title":"Sparx: Distributed Outlier Detection at Scale. In KDD. 4530\u20134540.","author":"Zhang Sean","year":"2022","unstructured":"Sean Zhang, Varun Ursekar, and Leman Akoglu. 2022. Sparx: Distributed Outlier Detection at Scale. In KDD. 4530\u20134540."},{"key":"e_1_3_2_2_33_1","first-page":"1","article-title":"PyOD: A Python Toolbox for Scalable Outlier Detection","volume":"20","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A Python Toolbox for Scalable Outlier Detection. Journal of Machine Learning Research 20, 96 (2019), 1\u20137. http:\/\/jmlr.org\/papers\/v20\/19-011.html","journal-title":"Journal of Machine Learning Research"}],"event":{"name":"ICAIF '23: 4th ACM International Conference on AI in Finance","acronym":"ICAIF '23","location":"Brooklyn NY USA"},"container-title":["4th ACM International Conference on AI in Finance"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604237.3626872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604237.3626872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:38:28Z","timestamp":1755884308000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604237.3626872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,25]]},"references-count":33,"alternative-id":["10.1145\/3604237.3626872","10.1145\/3604237"],"URL":"https:\/\/doi.org\/10.1145\/3604237.3626872","relation":{},"subject":[],"published":{"date-parts":[[2023,11,25]]},"assertion":[{"value":"2023-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}