{"id":"https://openalex.org/W3014050418","doi":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","title":"LSOF: Novel Outlier Detection Approach Based on Local Structure","display_name":"LSOF: Novel Outlier Detection Approach Based on Local Structure","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3014050418","doi":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","mag":"3014050418"},"language":"en","primary_location":{"id":"doi:10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking (ISPA/BDCloud/SocialCom/SustainCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021739607","display_name":"Renmin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Renmin Wang","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079693039","display_name":"Qingsheng Zhu","orcid":"https://orcid.org/0000-0002-0643-4526"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingsheng Zhu","raw_affiliation_strings":["College of Computer Science, Chongqing University, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5021739607"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.21224999,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2336","issue":null,"first_page":"838","last_page":"846"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/local-outlier-factor","display_name":"Local outlier factor","score":0.9107809662818909},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.9001430869102478},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7488645315170288},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6182907819747925},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5914817452430725},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5432617664337158},{"id":"https://openalex.org/keywords/local-structure","display_name":"Local structure","score":0.47745969891548157},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4657054543495178},{"id":"https://openalex.org/keywords/k-nearest-neighbors-algorithm","display_name":"k-nearest neighbors algorithm","score":0.4407426416873932}],"concepts":[{"id":"https://openalex.org/C169029474","wikidata":"https://www.wikidata.org/wiki/Q387942","display_name":"Local outlier factor","level":3,"score":0.9107809662818909},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.9001430869102478},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7488645315170288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6182907819747925},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5914817452430725},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5432617664337158},{"id":"https://openalex.org/C2986090443","wikidata":"https://www.wikidata.org/wiki/Q77870413","display_name":"Local structure","level":2,"score":0.47745969891548157},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4657054543495178},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.4407426416873932},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C159467904","wikidata":"https://www.wikidata.org/wiki/Q2001702","display_name":"Chemical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa-bdcloud-sustaincom-socialcom48970.2019.00124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE Intl Conf on Parallel &amp; Distributed Processing with Applications, Big Data &amp; Cloud Computing, Sustainable Computing &amp; Communications, Social Computing &amp; Networking (ISPA/BDCloud/SocialCom/SustainCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W39464122","https://openalex.org/W126266486","https://openalex.org/W162964049","https://openalex.org/W1584412742","https://openalex.org/W1986332411","https://openalex.org/W1988833430","https://openalex.org/W1991959600","https://openalex.org/W2015172091","https://openalex.org/W2041184937","https://openalex.org/W2076287166","https://openalex.org/W2084512860","https://openalex.org/W2093859880","https://openalex.org/W2102999520","https://openalex.org/W2110784166","https://openalex.org/W2123256336","https://openalex.org/W2142889610","https://openalex.org/W2144182447","https://openalex.org/W2187643071","https://openalex.org/W2197830862","https://openalex.org/W2224609888","https://openalex.org/W2282861635","https://openalex.org/W2395028581","https://openalex.org/W2590761734","https://openalex.org/W2760451156","https://openalex.org/W2786827964","https://openalex.org/W2868209013","https://openalex.org/W2910041730","https://openalex.org/W3106543020","https://openalex.org/W4241492760","https://openalex.org/W4254182148","https://openalex.org/W4256177618","https://openalex.org/W6634956364","https://openalex.org/W6675630245"],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W2770832849","https://openalex.org/W3111802945","https://openalex.org/W205872183","https://openalex.org/W114119537","https://openalex.org/W4240627425","https://openalex.org/W2761705761","https://openalex.org/W2904893831","https://openalex.org/W2912112202","https://openalex.org/W2946096271"],"abstract_inverted_index":{"Many":[0],"local":[1,13,82,90,101,105],"outlier":[2,14,41,84],"detection":[3,22],"algorithms":[4],"have":[5,20],"been":[6],"proposed":[7],"inspired":[8],"by":[9],"the":[10,44,99,120,127],"idea":[11],"of":[12,40,56,75,93,111,119,130],"factor":[15,85],"(LOF).":[16],"However,":[17],"they":[18],"often":[19],"low":[21],"performance":[23],"and":[24,43,97,109,136],"are":[25,113],"sensitive":[26],"to":[27,52,71,117],"neighborhood":[28,55,74],"size":[29],"because":[30],"there":[31],"is":[32,49],"a":[33,54,65,73,81],"major":[34],"defect":[35],"in":[36],"their":[37],"calculation":[38],"formulas":[39],"degree":[42],"kNN":[45],"(k-nearest":[46],"neighbors)":[47],"method":[48,132],"widely":[50],"used":[51],"quantify":[53],"an":[57,76],"instance.":[58,77],"To":[59],"address":[60],"these":[61],"issues,":[62],"we":[63,79],"define":[64],"novel":[66],"nearest":[67],"neighbors":[68],"tree":[69],"(NNT)":[70],"measure":[72],"Meanwhile,":[78],"propose":[80],"structure":[83,91],"(LSOF),":[86],"which":[87],"score":[88],"each":[89,94],"instead":[92],"data":[95],"point":[96],"report":[98],"top-scored":[100],"structures":[102],"as":[103],"anomalous":[104],"structures,":[106],"where":[107],"outliers":[108,112],"groups":[110],"easily":[114],"divided":[115],"according":[116],"characteristics":[118],"NNT.":[121],"Our":[122],"experimental":[123],"results":[124],"demonstrate":[125],"that":[126],"competitive":[128],"behavior":[129],"our":[131],"on":[133],"both":[134],"synthetic":[135],"real-world":[137],"datasets.":[138]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
