{"id":"https://openalex.org/W3093485399","doi":"https://doi.org/10.1145/3340531.3411988","title":"OPHiForest: Order Preserving Hashing Based Isolation Forest for Robust and Scalable Anomaly Detection","display_name":"OPHiForest: Order Preserving Hashing Based Isolation Forest for Robust and Scalable Anomaly Detection","publication_year":2020,"publication_date":"2020-10-19","ids":{"openalex":"https://openalex.org/W3093485399","doi":"https://doi.org/10.1145/3340531.3411988","mag":"3093485399"},"language":"en","primary_location":{"id":"doi:10.1145/3340531.3411988","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3411988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003553958","display_name":"Haolong Xiang","orcid":"https://orcid.org/0000-0003-4565-8829"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Haolong Xiang","raw_affiliation_strings":["The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088166627","display_name":"Zoran Sal\u010di\u0107","orcid":"https://orcid.org/0000-0001-7714-9848"},"institutions":[{"id":"https://openalex.org/I154130895","display_name":"University of Auckland","ror":"https://ror.org/03b94tp07","country_code":"NZ","type":"education","lineage":["https://openalex.org/I154130895"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Zoran Salcic","raw_affiliation_strings":["The University of Auckland, Auckland, New Zealand"],"affiliations":[{"raw_affiliation_string":"The University of Auckland, Auckland, New Zealand","institution_ids":["https://openalex.org/I154130895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038791483","display_name":"Wanchun Dou","orcid":"https://orcid.org/0000-0003-4833-2023"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wanchun Dou","raw_affiliation_strings":["Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007818509","display_name":"Xiaolong Xu","orcid":"https://orcid.org/0000-0003-4879-9803"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaolong Xu","raw_affiliation_strings":["Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101825932","display_name":"Lianyong Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I202126657","display_name":"Qufu Normal University","ror":"https://ror.org/03ceheh96","country_code":"CN","type":"education","lineage":["https://openalex.org/I202126657"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lianyong Qi","raw_affiliation_strings":["Qufu Normal University, Qufu, China"],"affiliations":[{"raw_affiliation_string":"Qufu Normal University, Qufu, China","institution_ids":["https://openalex.org/I202126657"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076120553","display_name":"Xuyun Zhang","orcid":"https://orcid.org/0000-0001-7353-4159"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xuyun Zhang","raw_affiliation_strings":["Macquarie University, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Macquarie University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003553958"],"corresponding_institution_ids":["https://openalex.org/I154130895"],"apc_list":null,"apc_paid":null,"fwci":1.3256,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.85012263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1655","last_page":"1664"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8458646535873413},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8245738744735718},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7217280864715576},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6857398748397827},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6122917532920837},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6086812615394592},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5774039030075073},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5030702948570251},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.32997530698776245},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1909518539905548},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.0964072048664093}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8458646535873413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8245738744735718},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7217280864715576},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6857398748397827},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6122917532920837},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6086812615394592},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5774039030075073},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5030702948570251},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32997530698776245},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1909518539905548},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0964072048664093},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3340531.3411988","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3340531.3411988","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM International Conference on Information &amp; Knowledge Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1560256462","https://openalex.org/W1598260899","https://openalex.org/W1923967535","https://openalex.org/W1968701380","https://openalex.org/W1969241115","https://openalex.org/W1990106316","https://openalex.org/W2056081083","https://openalex.org/W2089632823","https://openalex.org/W2097714558","https://openalex.org/W2106053110","https://openalex.org/W2148781362","https://openalex.org/W2296719434","https://openalex.org/W2464915613","https://openalex.org/W2473499128","https://openalex.org/W2541635437","https://openalex.org/W2616332741","https://openalex.org/W2620678361","https://openalex.org/W2896488239","https://openalex.org/W2904996768","https://openalex.org/W2945594226","https://openalex.org/W2963338867","https://openalex.org/W2990138404","https://openalex.org/W3003532075","https://openalex.org/W3004944858","https://openalex.org/W4239954780","https://openalex.org/W4254182148","https://openalex.org/W4301014524","https://openalex.org/W6660556005","https://openalex.org/W6675354903","https://openalex.org/W6715177018","https://openalex.org/W6842097421"],"related_works":["https://openalex.org/W2383698455","https://openalex.org/W2355809385","https://openalex.org/W2363105058","https://openalex.org/W2364419519","https://openalex.org/W1516902003","https://openalex.org/W2141254179","https://openalex.org/W2390910196","https://openalex.org/W2248187919","https://openalex.org/W2392851122","https://openalex.org/W1981779368"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,19,39,51,79,122,153],"is":[2,97,170],"one":[3],"of":[4,45,86,123],"the":[5,28,84,87,100,111,135],"most":[6],"important":[7],"data":[8,30,103,164],"mining":[9],"tasks":[10],"in":[11],"many":[12],"real-life":[13],"applications":[14,33],"such":[15],"as":[16],"network":[17],"intrusion":[18],"for":[20,25,134,146],"cybersecurity":[21],"and":[22,36,116,149,155,162,173],"medical":[23],"diagnosis":[24],"healthcare.":[26],"In":[27,71],"big":[29],"era,":[31],"these":[32],"demand":[34],"fast":[35,130],"versatile":[37],"anomaly":[38,78,125,152],"capability":[40],"to":[41,57,63,98,104,142],"handle":[42],"various":[43,124],"types":[44],"increasingly":[46],"huge-volume":[47],"data.":[48],"However,":[49],"existing":[50],"methods":[52,113],"are":[53],"either":[54],"slow":[55],"due":[56],"high":[58],"computational":[59],"complexity,":[60],"or":[61],"unable":[62],"deal":[64],"with":[65,83],"complicated":[66],"anomalies":[67],"like":[68,114],"local":[69],"anomalies.":[70],"this":[72],"paper,":[73],"we":[74],"propose":[75],"a":[76,129],"novel":[77],"method":[80,169],"named":[81],"OPHiForest":[82],"use":[85],"order":[88,136,144],"preserving":[89,137],"hashing":[90,138],"based":[91],"isolation":[92,107],"forest.":[93],"The":[94],"core":[95],"idea":[96],"learn":[99],"information":[101],"from":[102],"construct":[105],"better":[106,147],"forest":[108],"structure":[109],"than":[110],"state-of-the-art":[112],"iForest":[115],"LSHiForest,":[117],"which":[118],"can":[119],"achieve":[120],"robust":[121,172],"types.":[126],"We":[127],"design":[128],"two-step":[131],"learning":[132],"process":[133],"scheme.":[139],"This":[140],"leads":[141],"stronger":[143],"preservation":[145],"hashing,":[148],"therefore":[150],"enhances":[151],"robustness":[154],"accuracy.":[156],"Extensive":[157],"experiments":[158],"on":[159],"both":[160],"synthetic":[161],"real-world":[163],"sets":[165],"demonstrate":[166],"that":[167],"our":[168],"highly":[171],"scalable.":[174]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
