{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T06:52:59Z","timestamp":1726123979249},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811625398"},{"type":"electronic","value":"9789811625404"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-2540-4_39","type":"book-chapter","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T18:04:30Z","timestamp":1620324270000},"page":"542-557","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Outlier Detection for Sensor Data Streams Based on Maximum Frequent and Minimum Rare Patterns"],"prefix":"10.1007","author":[{"given":"Xiaochen","family":"Shi","sequence":"first","affiliation":[]},{"given":"Saihua","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Ruizhi","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"issue":"3","key":"39_CR1","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1016\/j.elerap.2013.01.001","volume":"12","author":"K Kim","year":"2013","unstructured":"Kim, K., Choi, Y., Park, J.: Pricing fraud detection in online shopping malls using a finite mixture model. Electron. Commer. Res. Appl. 12(3), 195\u2013207 (2013)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"11","key":"39_CR2","doi-asserted-by":"publisher","first-page":"7755","DOI":"10.1007\/s00521-018-3550-x","volume":"31","author":"G Mamalakis","year":"2018","unstructured":"Mamalakis, G., Diou, C., Symeonidis, A., Georgiadis, L.: Of daemons and men: reducing false positive rate in intrusion detection systems with file system footprint analysis. Neural Comput. Appl. 31(11), 7755\u20137767 (2018). https:\/\/doi.org\/10.1007\/s00521-018-3550-x","journal-title":"Neural Comput. Appl."},{"key":"39_CR3","unstructured":"Kim, M.S., Kong, H.J., Hong, S.C., Chung, S.H., Hong, J.W.: A flow-based method for abnormal network traffic detection. In: 2004 IEEE\/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), pp. 599\u2013612. IEEE, USA (2004)"},{"issue":"729","key":"39_CR4","doi-asserted-by":"publisher","first-page":"1768","DOI":"10.1002\/qj.3766","volume":"146","author":"IV Sideris","year":"2020","unstructured":"Sideris, I.V., Foresti, L., Nerini, D., Germann, U.: NowPrecip: localized precipitation nowcasting in the complex terrain of Switzerland. Q. J. R. Meteorol. Soc. 146(729), 1768\u20131800 (2020)","journal-title":"Q. J. R. Meteorol. Soc."},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Tang, X., Li, G., Chen, G.: Fast detecting outliers over online data streams. In: 2009 International Conference on Information Engineering and Computer Science, pp. 1\u20134. IEEE, USA (2009)","DOI":"10.1109\/ICIECS.2009.5363123"},{"issue":"1","key":"39_CR6","first-page":"55","volume":"20","author":"AM Said","year":"2015","unstructured":"Said, A.M., Dominic, P.D.D., Faye, I.: Data stream outlier detection approach based on frequent pattern mining technique. Int. J. Bus. Inf. Syst. 20(1), 55\u201370 (2015)","journal-title":"Int. J. Bus. Inf. Syst."},{"key":"39_CR7","unstructured":"Toshniwal, D., Yadav, S.: Adaptive outlier detection in streaming time series. In: Proceedings of International Conference on Asia Agriculture and Animal (ICAAA 2011), vol. 13, pp. 186\u2013191. Springer, Heidelberg (2011)"},{"key":"39_CR8","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.neucom.2018.01.016","volume":"295","author":"J Yuan","year":"2018","unstructured":"Yuan, J., Wang, Z., Sun, Y., Zhang, W., Jiang, J.: An effective pattern-based Bayesian classifier for evolving data stream. Neurocomputing 295, 17\u201328 (2018)","journal-title":"Neurocomputing"},{"key":"39_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2020.113646","volume":"160","author":"S Cai","year":"2020","unstructured":"Cai, S., Li, L., Li, S., Sun, R., Yuan, G.: An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns. Expert Syst. Appl. 160, 1\u201317 (2020)","journal-title":"Expert Syst. Appl."},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.knosys.2019.105268","volume":"191","author":"S Cai","year":"2020","unstructured":"Cai, S., Li, S., Yuan, G., Hao, S., Sun, R.: MiFI-Outlier: minimal infrequent itemset-based outlier detection approach on uncertain data stream. Knowl.-Based Syst. 191, 1\u201322 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"10","key":"39_CR11","first-page":"66","volume":"5","author":"L Feng","year":"2010","unstructured":"Feng, L., Wang, L., Jin, B.: Research on maximal frequent pattern outlier factor for online high dimensional time-series outlier detection. J. Converg. Inf. Technol. 5(10), 66\u201371 (2010)","journal-title":"J. Converg. Inf. Technol."},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Hao, S., Cai, S., Sun, R., Li, S.: FCI-Outlier: an efficient frequent closed itemset-based outlier detecting approach on data stream. In: CCF Conference on Computer Supported Cooperative Work and Social Computing, pp. 371\u2013385. Springer, Heidelberg (2018)","DOI":"10.1007\/978-981-13-3044-5_13"},{"key":"39_CR13","doi-asserted-by":"publisher","first-page":"1998","DOI":"10.1016\/j.eswa.2014.09.053","volume":"42","author":"C Sweetlin Hemalatha","year":"2015","unstructured":"Sweetlin Hemalatha, C., Vaidehi, V., Lakshmi, R.: Minimal infrequent pattern based approach for mining outliers in data streams. Expert Syst. Appl. 42, 1998\u20132012 (2015)","journal-title":"Expert Syst. Appl."},{"issue":"2","key":"39_CR14","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/376284.375668","volume":"30","author":"CC Aggarwal","year":"2001","unstructured":"Aggarwal, C.C., Yu, P.S.: Outlier detection for high dimensional data. Proc. ACM Sigmod May Santa Barbara 30(2), 37\u201346 (2001)","journal-title":"Proc. ACM Sigmod May Santa Barbara"},{"issue":"C","key":"39_CR15","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.is.2015.07.006","volume":"55","author":"M Kontaki","year":"2016","unstructured":"Kontaki, M., Gounaris, A., Papadopoulos, A.N., Tsichlas, K., Manolopoulos, Y.: Efficient and flexible algorithms for monitoring distance-based outliers over data streams. Inf. Syst. 55(C), 37\u201353 (2016)","journal-title":"Inf. Syst."},{"key":"39_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.knosys.2017.10.009","volume":"139","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Lin, J., Karim, R.: Adaptive kernel density-based anomaly detection for nonlinear systems. Knowl.-Based Syst. 139, 50\u201363 (2018)","journal-title":"Knowl.-Based Syst."},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Elahi, M., Li, K., Nisar, W., Lv, X., Wang, H.: Efficient clustering-based outlier detection algorithm for dynamic data stream. In: 5th International Conference on Fuzzy Systems and Knowledge Discovery, Shandong, pp. 298\u2013304. IEEE, USA (2008)","DOI":"10.1109\/FSKD.2008.374"},{"issue":"1","key":"39_CR18","doi-asserted-by":"publisher","first-page":"103","DOI":"10.2298\/CSIS0501103H","volume":"2","author":"Z He","year":"2005","unstructured":"He, Z., Xu, X., Huang, Z., Deng, S.: FP-Outlier: Frequent pattern based outlier detection. Computer Science and Information Systems 2(1), 103\u2013118 (2005)","journal-title":"Computer Science and Information Systems"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, W., Wu, J., Yu, J.: An improved method of outlier detection based on frequent pattern. In: WASE International Conference on Information Engineering (ICIE), pp. 3\u20136. IEEE, USA (2010)","DOI":"10.1109\/ICIE.2010.97"},{"key":"39_CR20","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-981-15-1377-0_9","volume-title":"Computer Supported Cooperative Work and Social Computing","author":"S Cai","year":"2019","unstructured":"Cai, S., Sun, R., Mu, H., Shi, X., Yuan, G.: A minimum rare-itemset-based anomaly detection method and its application on sensor data stream. In: Sun, Y., Lu, T., Yu, Z., Fan, H., Gao, L. (eds.) ChineseCSCW 2019. CCIS, vol. 1042, pp. 116\u2013130. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-1377-0_9"}],"container-title":["Communications in Computer and Information Science","Computer Supported Cooperative Work and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2540-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T18:11:56Z","timestamp":1620324716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2540-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811625398","9789811625404"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2540-4_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChineseCSCW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CCF Conference on Computer Supported Cooperative Work and Social Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinesecscw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.scholat.com\/confweb\/CCSCW2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}