{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T20:13:17Z","timestamp":1770408797281,"version":"3.49.0"},"reference-count":34,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2024,1,10]]},"abstract":"<jats:p>Information amount has been shown to be one of the most efficient methods for measuring uncertainty. However, there has been little research on outlier detection using information amount. To fill this void, this paper provides a new unsupervised outlier detection method based on the amount of information. First, the information amount in a given information system is determined, which offers a thorough estimate of the uncertainty of this information system. Then, the relative information amount and the relative cardinality are proposed. Following that, the degree of outlierness and weight function are shown. Furthermore, the information amount-based outlier factor is constructed, which determines whether an object is an outlier by its rank. Finally, a new unsupervised outlier detection method called the information amount-based outlier factor (IAOF) is developed. To validate the effectiveness and advantages of IAOF, it is compared to five existing outlier identification methods. The experimental results on real-world data sets show that this method is capable of addressing the problem of outlier detection in categorical information systems.<\/jats:p>","DOI":"10.3233\/jifs-236518","type":"journal-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T12:39:37Z","timestamp":1700829577000},"page":"1713-1734","source":"Crossref","is-referenced-by-count":2,"title":["A new unsupervised outlier detection method"],"prefix":"10.1177","volume":"46","author":[{"given":"Lina","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Economics, Guangxi University, Nanning, Guangxi, P.R. China"}]},{"given":"Lijun","family":"Chen","sequence":"additional","affiliation":[{"name":"Center for Applied Mathematics of Guangxi, Yulin Normal University, Yulin, Guangxi, P.R. China"}]},{"given":"Yini","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi Key Laboratory of Seaward Economic Intelligent System Analysis and Decision, Guangxi University of Finance and Economics, Nanning, Guangxi, P.R. China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-236518_ref1","doi-asserted-by":"crossref","first-page":"103256","DOI":"10.1016\/j.jbi.2019.103256","article-title":"Read-mission prediction using deep learning on electronic health records","volume":"97","author":"Ashfaq","year":"2019","journal-title":"Journal of Biomedical Informatics"},{"key":"10.3233\/JIFS-236518_ref2","first-page":"255","article-title":"KEEL data-mining software tool: Data set repository, integration of algorithms and experimental analysis framework","volume":"17","author":"Alcal\u013a\u0107-Fdez","year":"2011","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"10.3233\/JIFS-236518_ref3","first-page":"93","article-title":"LOF: Identifying density-based local outliers, pp","author":"Breunig","year":"2000","journal-title":"Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data"},{"key":"10.3233\/JIFS-236518_ref4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-1-4614-3520-4_26","article-title":"Surprise detection in multivariate astronomical data","volume":"5","author":"Borne","year":"2012","journal-title":"Statistical Challenges in Modern Astronomy"},{"issue":"2","key":"10.3233\/JIFS-236518_ref5","doi-asserted-by":"crossref","first-page":"8745","DOI":"10.1016\/j.eswa.2010.06.040","article-title":"Neighborhood outlier detection","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"30","key":"10.3233\/JIFS-236518_ref6","doi-asserted-by":"crossref","first-page":"845","DOI":"10.21105\/joss.00845","article-title":"PyNomaly: Anomaly detection using Local Outlier Probabilities (LoOP)","volume":"3","author":"Constantinou","year":"2018","journal-title":"Journal of Open Source Software"},{"issue":"4","key":"10.3233\/JIFS-236518_ref7","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1007\/s10618-015-0444-8","article-title":"On the evaluation ofunsupervised outlier detection: Measures, datasets, and an empiricalstudy","volume":"30","author":"Campos","year":"2016","journal-title":"Data Mining and Knowledge Discovery"},{"key":"10.3233\/JIFS-236518_ref8","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","article-title":"A comparative evaluation of outlier detection algorithms: Experiments and analyses","volume":"74","author":"Domingues","year":"2018","journal-title":"Pattern Recognition"},{"key":"10.3233\/JIFS-236518_ref9","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Demar","year":"2006","journal-title":"Journal of Machine Learning Research"},{"key":"10.3233\/JIFS-236518_ref10","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1016\/j.ins.2022.06.013","article-title":"Efficient density and cluster based incremental outlier detection in data streams","volume":"607","author":"Degirmenci","year":"2022","journal-title":"Information Sciences"},{"issue":"34","key":"10.3233\/JIFS-236518_ref11","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","volume":"96","author":"Ester","year":"1996","journal-title":"AAAI Press"},{"issue":"1","key":"10.3233\/JIFS-236518_ref12","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JIFS-151447","article-title":"A LoOP based outlier detection method for high dimensional fuzzy data set","volume":"32","author":"Fakharzadeh","year":"2017","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"6","key":"10.3233\/JIFS-236518_ref13","doi-asserted-by":"crossref","first-page":"927","DOI":"10.1007\/s13042-016-0618-8","article-title":"Novelty detection with CANDIES: A holistic technique based on probabilistic models","volume":"9","author":"Gruhl","year":"2016","journal-title":"Int J Mach Learn Cybern"},{"issue":"9-10","key":"10.3233\/JIFS-236518_ref14","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","article-title":"Discovering cluster-based local outliers","volume":"24","author":"He","year":"2003","journal-title":"Pattern Recognition Letters"},{"key":"10.3233\/JIFS-236518_ref15","doi-asserted-by":"crossref","first-page":"814","DOI":"10.1016\/j.ins.2021.08.010","article-title":"Intrusion detection on internet of vehicles via combining log-ratio oversampling, outlier detection and metric learning","volume":"579","author":"Jin","year":"2021","journal-title":"Information Sciences"},{"issue":"9","key":"10.3233\/JIFS-236518_ref16","doi-asserted-by":"crossref","first-page":"6338","DOI":"10.1016\/j.eswa.2010.02.087","article-title":"An information entropy-based approach to outlier detection in rough sets","volume":"37","author":"Jiang","year":"2010","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-236518_ref17","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.ins.2021.12.042","article-title":"Unsupervised anomaly detection ensembles using item response theory","volume":"587","author":"Kandanaarachchi","year":"2022","journal-title":"Information Sciences"},{"issue":"18","key":"10.3233\/JIFS-236518_ref19","first-page":"161","article-title":"Power big data anomaly detection method based on an improved PSO-PFCM clustering algorithm","volume":"49","author":"Li","year":"2021","journal-title":"Power System Protection and Control"},{"issue":"1","key":"10.3233\/JIFS-236518_ref21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2133360.2133363","article-title":"Isolation-based anomaly detection","volume":"6","author":"Liu","year":"2012","journal-title":"Acm Transactions on Knowledge Discovery from Data"},{"key":"10.3233\/JIFS-236518_ref22","doi-asserted-by":"crossref","first-page":"1245","DOI":"10.1016\/j.ins.2022.06.035","article-title":"Fast anomaly detection with locality-sensitive hashing and hyperparameter autotuning","volume":"607","author":"Meira","year":"2022","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-236518_ref23","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/BF01001956","article-title":"Rough sets","volume":"11","author":"Pawlak","year":"1982","journal-title":"International Journal of Computer and Information Science"},{"issue":"1","key":"10.3233\/JIFS-236518_ref25","doi-asserted-by":"crossref","first-page":"564","DOI":"10.11591\/ijeecs.v24.i1.pp564-569","article-title":"Machine learning based outlier detection for medical data","volume":"24","author":"Reddy","year":"2021","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"6","key":"10.3233\/JIFS-236518_ref26","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/TSMCC.2010.2053532","article-title":"Educational data mining: A review of the state of the art","volume":"40","author":"Romero","year":"2010","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics (Part C)"},{"key":"10.3233\/JIFS-236518_ref27","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1126\/science.1242072","article-title":"Clustering by fast search and find of density peaks","volume":"344","author":"Rodriguez","year":"2014","journal-title":"Science"},{"key":"10.3233\/JIFS-236518_ref28","doi-asserted-by":"crossref","first-page":"100027","DOI":"10.1016\/j.socl.2021.100027","article-title":"A fuzzy proximity relation approach for outlier detection in the mixed dataset by using rough entropy-based weighted density method","volume":"3","author":"Sangeetha","year":"2021","journal-title":"Soft Computing Letters"},{"issue":"2","key":"10.3233\/JIFS-236518_ref29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/IDA-2009-0363","article-title":"Outlier detection based on rough sets theory","volume":"13","author":"Shaari","year":"2009","journal-title":"Intelligent Data Analysis"},{"issue":"1","key":"10.3233\/JIFS-236518_ref30","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.eswa.2012.07.057","article-title":"Advanced probabilistic approach for network intrusion forecasting and detection","volume":"40","author":"Shin","year":"2013","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"10.3233\/JIFS-236518_ref31","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1287\/isre.1060.0105","article-title":"Formulating the data-flow perspective for business process management","volume":"17","author":"Sun","year":"2006","journal-title":"Information Systems Research"},{"key":"10.3233\/JIFS-236518_ref32","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1016\/j.ins.2021.02.045","article-title":"Outlier detection based on weighted neighbourhood information network for mixed-valued data sets","volume":"564","author":"Wang","year":"2021","journal-title":"Information Sciences"},{"key":"10.3233\/JIFS-236518_ref34","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.eswa.2018.06.013","article-title":"Hybrid data-driven outlierdetection based on neighborhood information entropy and itsdevelopmental measures","volume":"112","author":"Yuan","year":"2018","journal-title":"Expert Systems with Applications"},{"key":"10.3233\/JIFS-236518_ref35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.fss.2020.10.017","article-title":"Fuzzy information entropy-based adaptive approach for hybrid feature outlier detection","volume":"421","author":"Yuan","year":"2021","journal-title":"Fuzzy Sets and Systems"},{"issue":"8","key":"10.3233\/JIFS-236518_ref36","doi-asserted-by":"crossref","first-page":"8399","DOI":"10.1109\/TCYB.2021.3058780","article-title":"Outlier detection based on fuzzy rough granules in mixed attribute data","volume":"52","author":"Yuan","year":"2021","journal-title":"IEEE Transactions on Cybernetics"},{"key":"10.3233\/JIFS-236518_ref37","doi-asserted-by":"crossref","first-page":"109995","DOI":"10.1016\/j.asoc.2023.109995","article-title":"Anomaly detection based on weighted fuzzy-rough density","volume":"134","author":"Yuan","year":"2023","journal-title":"Applied Soft Computing"},{"key":"10.3233\/JIFS-236518_ref38","first-page":"38","article-title":"Anomaly detection of power consumption data based on fuzzy clustering and isolated forest","volume":"36","author":"Zhao","year":"2020","journal-title":"Journal of Shanxi University of Technology (Natural Science Edition)"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-236518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T20:50:38Z","timestamp":1769547038000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-236518"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,10]]},"references-count":34,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/jifs-236518","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,10]]}}}