{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:47Z","timestamp":1755993767219,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T00:00:00Z","timestamp":1721779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,24]]},"DOI":"10.1145\/3688574.3688575","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T12:21:55Z","timestamp":1726230115000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Soft Single-branch Ensemble Trees for Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6963-3015","authenticated-orcid":false,"given":"Fanglan","family":"Zheng","sequence":"first","affiliation":[{"name":"Everbright Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6005-8770","authenticated-orcid":false,"given":"Zhiyu","family":"Ding","sequence":"additional","affiliation":[{"name":"North China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2890-8326","authenticated-orcid":false,"given":"Le","family":"Wei","sequence":"additional","affiliation":[{"name":"Everbright Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"volume-title":"Proceedings of the IEEE\/IAFE 1997 computational intelligence for financial engineering (CIFEr), 220\u2013226","author":"Aleskerov E.","key":"e_1_3_2_1_2_1","unstructured":"[2] Aleskerov, E.; Freisleben, B.; and Rao, B. 1997. Cardwatch: A neural network based database mining system for credit card fraud detection. In Proceedings of the IEEE\/IAFE 1997 computational intelligence for financial engineering (CIFEr), 220\u2013226. IEEE."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asr.2017.03.043"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_5_1","unstructured":"[5] Chalapathy R.; and Chawla S. 2019. Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"[6] Cover T.; and Hart P. 1967. Nearest neighbor pattern classification. IEEE transactions on information theory 13(1): 21\u201327.","DOI":"10.1109\/TIT.1967.1053964"},{"volume-title":"Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 47\u201356","author":"Das S.","key":"e_1_3_2_1_7_1","unstructured":"[7] Das, S.; Matthews, B.\u00a0L.; Srivastava, A.\u00a0N.; and Oza, N.\u00a0C. 2010. Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 47\u201356."},{"key":"e_1_3_2_1_8_1","unstructured":"[8] Ester M.; Kriegel H.-P.; Sander J.; Xu X.; et\u00a0al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In kdd volume\u00a096 226\u2013231."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.11.050"},{"volume-title":"Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 32\u201332","author":"Gu Y.","key":"e_1_3_2_1_10_1","unstructured":"[10] Gu, Y.; McCallum, A.; and Towsley, D. 2005. Detecting anomalies in network traffic using maximum entropy estimation. In Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, 32\u201332."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.4249\/scholarpedia.1668"},{"volume-title":"International conference on runtime verification, 122\u2013135","author":"Legay A.","key":"e_1_3_2_1_12_1","unstructured":"[12] Legay, A.; Delahaye, B.; and Bensalem, S. 2010. Statistical model checking: An overview. In International conference on runtime verification, 122\u2013135. Springer."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"[13] McCulloch W.\u00a0S.; and Pitts W. 1943. A logical calculus of the ideas immanent in nervous activity. The bulletin of mathematical biophysics 5: 115\u2013133.","DOI":"10.1007\/BF02478259"},{"key":"e_1_3_2_1_14_1","volume-title":"\u00a0H","author":"Omar S.","year":"2013","unstructured":"[14] Omar, S.; Ngadi, A.; and Jebur, H.\u00a0H. 2013. Machine learning techniques for anomaly detection: an overview. International Journal of Computer Applications, 79(2)."},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"29","article-title":"Anomaly detection using artificial neural network","volume":"2","author":"Pradhan M.","year":"2012","unstructured":"[15] Pradhan, M.; Pradhan, S.\u00a0K.; and Sahu, S.\u00a0K. 2012. Anomaly detection using artificial neural network. International Journal of Engineering Sciences & Emerging Technologies, 2(1): 29\u201336.","journal-title":"International Journal of Engineering Sciences & Emerging Technologies"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"[16] Rumelhart D.\u00a0E.; Hinton G.\u00a0E.; Williams R.\u00a0J.; et\u00a0al. 1985. Learning internal representations by error propagation.","DOI":"10.21236\/ADA164453"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/64884.64889"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90034-7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00320-x"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"[20] Vidulin L. M. K. B. P.\u00a0R. Vedrana; and Krivec J. 2010. Localization Data for Person Activity. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C57G8X.","DOI":"10.24432\/C57G8X"},{"key":"e_1_3_2_1_21_1","unstructured":"[21] Walke K. 2021. bank personal loan modelling. DOI: https:\/\/www.kaggle.com\/datasets\/itsmesunil\/bank-loan-modelling."},{"key":"e_1_3_2_1_22_1","unstructured":"[22] Zhang R.; Zheng F.; and Min W. 2018. Sequential behavioral data processing using deep learning and the Markov transition field in online fraud detection. arXiv preprint arXiv:1808.05329."}],"event":{"name":"BDE 2024: 2024 6th International Conference on Big Data Engineering","acronym":"BDE 2024","location":"Xining China"},"container-title":["Proceedings of the 2024 6th International Conference on Big Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688574.3688575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:14:52Z","timestamp":1755915292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688574.3688575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,24]]},"references-count":22,"alternative-id":["10.1145\/3688574.3688575","10.1145\/3688574"],"URL":"https:\/\/doi.org\/10.1145\/3688574.3688575","relation":{},"subject":[],"published":{"date-parts":[[2024,7,24]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}