{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:48Z","timestamp":1750309608237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1145\/3711129.3711178","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:51:16Z","timestamp":1740055876000},"page":"275-280","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Local Optimisation Based Detection of Weak Targets in Isolated Forests"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4291-7020","authenticated-orcid":false,"given":"Jurong","family":"Hu","sequence":"first","affiliation":[{"name":"School of Information Science and Engineering, Hohai University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9628-8783","authenticated-orcid":false,"given":"Yanxiao","family":"Xing","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hohai University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4189-789X","authenticated-orcid":false,"given":"Yuxiao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Software, Hohai University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109399"},{"key":"e_1_3_3_1_2_2","volume-title":"Challenges in radar sea clutter modelling.[J]. IET Radar","author":"Watts","year":"2022","unstructured":"Watts, Simon;Rosenberg, Luke. Challenges in radar sea clutter modelling.[J]. IET Radar, Sonar & Navigation (Wiley-Blackwell), 2022, Vol.16(9): 1."},{"key":"e_1_3_3_1_3_2","first-page":"684","volume-title":"Journal of Radar","volume":"9","author":"Shuwen BAI","year":"2020","unstructured":"SHU Shuwen, BAI Xiaohui, GUO Zihua, SHUI Penglang. Status and outlook of radar target feature detection methods in sea clutter background[J]. Journal of Radar, 2020, Vol. 9.(4): 684-714."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2912329"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2018.2838260"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3321723"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.3033063"},{"issue":"12","key":"e_1_3_3_1_8_2","first-page":"278","article-title":"An outlier detection method integrating isolated forest and local outlier factors[J]","volume":"39","author":"Li LING","year":"2022","unstructured":"Li LING, Zhangyu CHENG, Chengming ZOU. An outlier detection method integrating isolated forest and local outlier factors[J]. Computer Application and Software, 2022, 39(12):278-283.","journal-title":"Computer Application and Software"},{"key":"e_1_3_3_1_9_2","volume-title":"Research on anomalous target detection method of hyperspectral remote sensing image based on isolated forest algorithm [D]","author":"Song Xiangyu","year":"2022","unstructured":"Song Xiangyu. Research on anomalous target detection method of hyperspectral remote sensing image based on isolated forest algorithm [D]. University of Chinese Academy of Sciences (Changchun Institute of Optical Precision Machinery and Physics, Chinese Academy of Sciences).), 2022."},{"key":"e_1_3_3_1_10_2","first-page":"60","volume-title":"Information and Computer (Theoretical Edition)","volume":"35","author":"Jiadong Zhou","year":"2023","unstructured":"Jiadong Zhou. Detection of potential attacks on computer networks based on isolated forest algorithm[J]. Information and Computer (Theoretical Edition), 2023, Vol. 35 (22): 60-62."},{"issue":"12","key":"e_1_3_3_1_11_2","first-page":"1","article-title":"Deep Isolation Forest for Anomaly Detection[J]","volume":"35","author":"Hongzuo Xu","year":"2023","unstructured":"Hongzuo Xu;Guansong Pang;Yijie Wang;Yongjun Wang. Deep Isolation Forest for Anomaly Detection[J]. IEEE Transactions on Knowledge and Data Engineering, 2023, Vol.35(12): 1-14.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"event":{"name":"EITCE 2024: 2024 8th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2024","location":"Haikou Guangdong China"},"container-title":["Proceedings of the 2024 8th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711178","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711129.3711178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:29Z","timestamp":1750298249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711178"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":11,"alternative-id":["10.1145\/3711129.3711178","10.1145\/3711129"],"URL":"https:\/\/doi.org\/10.1145\/3711129.3711178","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"2025-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}