{"id":"https://openalex.org/W1987598120","doi":"https://doi.org/10.1145/1031171.1031232","title":"A vertical distance-based outlier detection method with local pruning","display_name":"A vertical distance-based outlier detection method with local pruning","publication_year":2004,"publication_date":"2004-11-13","ids":{"openalex":"https://openalex.org/W1987598120","doi":"https://doi.org/10.1145/1031171.1031232","mag":"1987598120"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1031171.1031232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110274828","display_name":"Dongmei Ren","orcid":null},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongmei Ren","raw_affiliation_strings":["North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088087251","display_name":"Imad Rahal","orcid":"https://orcid.org/0009-0004-3231-0115"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Imad Rahal","raw_affiliation_strings":["North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007656388","display_name":"William Perrizo","orcid":null},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Perrizo","raw_affiliation_strings":["North Dakota State University, Fargo, ND"],"affiliations":[{"raw_affiliation_string":"North Dakota State University, Fargo, ND","institution_ids":["https://openalex.org/I57328836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017911131","display_name":"Kirk Scott","orcid":null},"institutions":[{"id":"https://openalex.org/I147853995","display_name":"University of Alaska Anchorage","ror":"https://ror.org/03k3c2t50","country_code":"US","type":"education","lineage":["https://openalex.org/I147853995"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kirk Scott","raw_affiliation_strings":["The University of Alaska Anchorage, Anchorage, AK#TAB#"],"affiliations":[{"raw_affiliation_string":"The University of Alaska Anchorage, Anchorage, AK#TAB#","institution_ids":["https://openalex.org/I147853995"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.73,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":22,"citation_normalized_percentile":{"value":0.800098,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"279","last_page":"284"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.997,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.9942,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.6886267},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.47302246},{"id":"https://openalex.org/keywords/ransac","display_name":"RANSAC","score":0.42946467}],"concepts":[{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.85881114},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.76529384},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7118509},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.6886267},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.500021},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.48893467},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.47302246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44528902},{"id":"https://openalex.org/C114744707","wikidata":"https://www.wikidata.org/wiki/Q218533","display_name":"RANSAC","level":3,"score":0.42946467},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4192123},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.10106525},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1031171.1031232","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1498047526","https://openalex.org/W1522803764","https://openalex.org/W1536891989","https://openalex.org/W1538527501","https://openalex.org/W1552339598","https://openalex.org/W1556344493","https://openalex.org/W1565838812","https://openalex.org/W1592237688","https://openalex.org/W1593605060","https://openalex.org/W1903475782","https://openalex.org/W2001628108","https://openalex.org/W2043539602","https://openalex.org/W2061681234","https://openalex.org/W2125543909","https://openalex.org/W2129281431","https://openalex.org/W2134715650","https://openalex.org/W2140190241","https://openalex.org/W3161918808","https://openalex.org/W4236977581","https://openalex.org/W4253461361"],"related_works":["https://openalex.org/W3145778961","https://openalex.org/W3083084699","https://openalex.org/W3012182724","https://openalex.org/W2984240274","https://openalex.org/W2981196697","https://openalex.org/W2131378265","https://openalex.org/W2115876589","https://openalex.org/W2091196744","https://openalex.org/W2039208430","https://openalex.org/W1988708904"],"abstract_inverted_index":{"\"One":[0],"person's":[1,5],"noise":[2],"is":[3,9,40,82],"another":[4],"signal\".":[6],"Outlier":[7],"detection":[8,39,88,114],"used":[10],"to":[11,17,60,84,109],"clean":[12],"up":[13],"datasets":[14,55],"and":[15,67,99],"also":[16],"discover":[18],"useful":[19],"anomalies,":[20],"such":[21],"as":[22],"criminal":[23],"activities":[24],"in":[25,43,53],"electronic":[26],"commerce,":[27],"computer":[28],"intrusion":[29],"attacks,":[30],"terrorist":[31],"threats,":[32],"agricultural":[33],"pest":[34],"infestations,":[35],"etc.":[36],"Thus,":[37],"outlier":[38,62,70,87,113],"critically":[41],"important":[42],"the":[44,110],"information-based":[45],"society.":[46],"This":[47],"paper":[48],"focuses":[49],"on":[50],"finding":[51],"outliers":[52],"large":[54],"using":[56],"distance-based":[57,69,112],"methods.":[58],"First,":[59],"speedup":[61],"detections,":[63],"we":[64],"revise":[65],"Knorr":[66],"Ng's":[68],"definition;":[71],"second,":[72],"a":[73],"vertical":[74],"data":[75],"structure,":[76],"instead":[77],"of":[78,103,105],"traditional":[79],"horizontal":[80],"structures,":[81],"adopted":[83],"facilitate":[85],"efficient":[86],"further.":[89],"We":[90],"tested":[91],"our":[92],"methods":[93],"against":[94],"national":[95],"hockey":[96],"league":[97],"dataset":[98],"show":[100],"an":[101],"order":[102],"magnitude":[104],"speed":[106],"improvement":[107],"compared":[108],"contemporary":[111],"approaches.":[115]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1987598120","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-01-07T17:01:15.023378","created_date":"2016-06-24"}