{"id":"https://openalex.org/W4256177618","doi":"https://doi.org/10.1109/icpr.2004.1334558","title":"Outlier detection using k-nearest neighbour graph","display_name":"Outlier detection using k-nearest neighbour graph","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W4256177618","doi":"https://doi.org/10.1109/icpr.2004.1334558"},"language":"en","primary_location":{"id":"doi:10.1109/icpr.2004.1334558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2004.1334558","pdf_url":null,"source":{"id":"https://openalex.org/S4363608750","display_name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037259225","display_name":"Ville Hautam\u00e4ki","orcid":"https://orcid.org/0000-0002-5885-0003"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"V. Hautamaki","raw_affiliation_strings":["Dept. of Comput. Sci., Joensuu Univ., Finland","Department of Computer Science, University of Joensuu, Joensuu, Finland"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Joensuu Univ., Finland","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, University of Joensuu, Joensuu, Finland","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018962547","display_name":"Ismo K\u00e4rkk\u00e4inen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"I. Karkkainen","raw_affiliation_strings":["Dept. of Comput. Sci., Joensuu Univ., Finland","Department of Computer Science, University of Joensuu, Joensuu, Finland"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Joensuu Univ., Finland","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, University of Joensuu, Joensuu, Finland","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037846871","display_name":"Pasi Fr\u00e4nti","orcid":"https://orcid.org/0000-0002-9554-2827"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"P. Franti","raw_affiliation_strings":["Dept. of Comput. Sci., Joensuu Univ., Finland","Department of Computer Science, University of Joensuu, Joensuu, Finland"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Joensuu Univ., Finland","institution_ids":[]},{"raw_affiliation_string":"Department of Computer Science, University of Joensuu, Joensuu, Finland","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037259225"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.33198223,"has_fulltext":false,"cited_by_count":346,"citation_normalized_percentile":{"value":0.85043103,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"430","last_page":"433 Vol.3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11220","display_name":"Water Systems and Optimization","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/2205","display_name":"Civil and Structural Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12549","display_name":"Image and Object Detection Techniques","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6940181851387024},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6859822869300842},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.6705981492996216},{"id":"https://openalex.org/keywords/nearest-neighbour","display_name":"Nearest neighbour","score":0.5934850573539734},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5632078647613525},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5456836223602295},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.5351216793060303},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4715321660041809},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45163968205451965},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.11482769250869751}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6940181851387024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6859822869300842},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.6705981492996216},{"id":"https://openalex.org/C2983946233","wikidata":"https://www.wikidata.org/wiki/Q4088109","display_name":"Nearest neighbour","level":2,"score":0.5934850573539734},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5632078647613525},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5456836223602295},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.5351216793060303},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4715321660041809},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45163968205451965},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.11482769250869751}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr.2004.1334558","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr.2004.1334558","pdf_url":null,"source":{"id":"https://openalex.org/S4363608750","display_name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1552339598","https://openalex.org/W1884606608","https://openalex.org/W2001245517","https://openalex.org/W2029073757","https://openalex.org/W2049058890","https://openalex.org/W2050439513","https://openalex.org/W2054011861","https://openalex.org/W2111160323","https://openalex.org/W2131687179","https://openalex.org/W2141245797","https://openalex.org/W2170948800","https://openalex.org/W2498631646","https://openalex.org/W4253461361","https://openalex.org/W6632829031","https://openalex.org/W6684936000"],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W3111802945","https://openalex.org/W2946096271","https://openalex.org/W2295423552","https://openalex.org/W3107369729","https://openalex.org/W2622145841","https://openalex.org/W40622155","https://openalex.org/W1591806955","https://openalex.org/W4206315490","https://openalex.org/W2062957446"],"abstract_inverted_index":{"We":[0,24],"present":[1],"an":[2],"outlier":[3],"detection":[4],"using":[5],"indegree":[6],"number":[7,56],"(ODIN)":[8],"algorithm":[9],"that":[10,36],"utilizes":[11],"k-nearest":[12],"neighbour":[13],"graph.":[14],"Improvements":[15],"to":[16],"existing":[17],"kNN":[18],"distance-based":[19],"method":[20,39],"are":[21],"also":[22],"proposed.":[23],"compare":[25],"the":[26,37],"methods":[27,49],"with":[28,43,50,54],"real":[29,51],"and":[30,46],"synthetic":[31,44],"datasets.":[32],"The":[33],"results":[34,42],"show":[35],"proposed":[38],"achieves":[40],"reasonable":[41],"data":[45,52],"outperforms":[47],"compared":[48],"sets":[53],"small":[55],"of":[57],"observations.":[58]},"counts_by_year":[{"year":2025,"cited_by_count":22},{"year":2024,"cited_by_count":30},{"year":2023,"cited_by_count":43},{"year":2022,"cited_by_count":36},{"year":2021,"cited_by_count":40},{"year":2020,"cited_by_count":44},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":28},{"year":2017,"cited_by_count":22},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":7}],"updated_date":"2026-01-14T23:40:02.550235","created_date":"2025-10-10T00:00:00"}
