{"id":"https://openalex.org/W1575425953","doi":"https://doi.org/10.3233/ida-140701","title":"Outlier detection based on transitive closure","display_name":"Outlier detection based on transitive closure","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W1575425953","doi":"https://doi.org/10.3233/ida-140701","mag":"1575425953"},"language":"en","primary_location":{"id":"doi:10.3233/ida-140701","is_oa":false,"landing_page_url":"https://doi.org/10.3233/ida-140701","pdf_url":null,"source":{"id":"https://openalex.org/S2498839158","display_name":"Intelligent Data Analysis","issn_l":"1088-467X","issn":["1088-467X","1571-4128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Data Analysis","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026677086","display_name":"Jiaqiang Wan","orcid":"https://orcid.org/0000-0002-7476-7293"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaqiang Wan","raw_affiliation_strings":["Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China","Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China#TAB#","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079693039","display_name":"Qingsheng Zhu","orcid":"https://orcid.org/0000-0002-0643-4526"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingsheng Zhu","raw_affiliation_strings":["Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China","Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"Chongqing Key Laboratory of Software Theory and Technology, College of Computer Science, Chongqing University, Chongqing, China#TAB#","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017048122","display_name":"Dajiang Lei","orcid":"https://orcid.org/0000-0002-7482-6417"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dajiang Lei","raw_affiliation_strings":["College of Computer, Chongqing University of Posts and Telecommunications, Chongqing, China","College of Computer, Chongqing University of Posts and Telecommunications , Chongqing, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"College of Computer, Chongqing University of Posts and Telecommunications , Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101986246","display_name":"Jiaxi Lu","orcid":"https://orcid.org/0000-0002-3460-4537"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiaxi Lu","raw_affiliation_strings":["People's Procuratorate of YuBei District, Chongqing, China","People's Procuratorate of YuBei District, Chongqing, China#TAB#"],"affiliations":[{"raw_affiliation_string":"People's Procuratorate of YuBei District, Chongqing, China","institution_ids":[]},{"raw_affiliation_string":"People's Procuratorate of YuBei District, Chongqing, China#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5026677086"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":1.2943,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85083174,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"19","issue":"1","first_page":"145","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11819","display_name":"Data-Driven Disease Surveillance","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transitive-closure","display_name":"Transitive closure","score":0.8108465671539307},{"id":"https://openalex.org/keywords/transitive-relation","display_name":"Transitive relation","score":0.6610178351402283},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6187340617179871},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.5843883752822876},{"id":"https://openalex.org/keywords/closure","display_name":"Closure (psychology)","score":0.5686904788017273},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.47998449206352234},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3801450729370117},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.36157938838005066},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3598122000694275},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3567556142807007},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.17062631249427795},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.0844217836856842}],"concepts":[{"id":"https://openalex.org/C128896722","wikidata":"https://www.wikidata.org/wiki/Q1501387","display_name":"Transitive closure","level":2,"score":0.8108465671539307},{"id":"https://openalex.org/C191399111","wikidata":"https://www.wikidata.org/wiki/Q64861","display_name":"Transitive relation","level":2,"score":0.6610178351402283},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6187340617179871},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.5843883752822876},{"id":"https://openalex.org/C146834321","wikidata":"https://www.wikidata.org/wiki/Q2979672","display_name":"Closure (psychology)","level":2,"score":0.5686904788017273},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.47998449206352234},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3801450729370117},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.36157938838005066},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3598122000694275},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3567556142807007},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.17062631249427795},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0844217836856842},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/ida-140701","is_oa":false,"landing_page_url":"https://doi.org/10.3233/ida-140701","pdf_url":null,"source":{"id":"https://openalex.org/S2498839158","display_name":"Intelligent Data Analysis","issn_l":"1088-467X","issn":["1088-467X","1571-4128"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Intelligent Data Analysis","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1545327139","https://openalex.org/W1575476631","https://openalex.org/W1584412742","https://openalex.org/W1673310716","https://openalex.org/W1970655212","https://openalex.org/W1974561058","https://openalex.org/W1982418571","https://openalex.org/W2019014808","https://openalex.org/W2048543422","https://openalex.org/W2049068327","https://openalex.org/W2052152127","https://openalex.org/W2058597816","https://openalex.org/W2070591031","https://openalex.org/W2087696360","https://openalex.org/W2102999520","https://openalex.org/W2103086259","https://openalex.org/W2111041916","https://openalex.org/W2117839996","https://openalex.org/W2124135342","https://openalex.org/W2125543909","https://openalex.org/W2129281431","https://openalex.org/W2132914434","https://openalex.org/W2144182447","https://openalex.org/W2166377520","https://openalex.org/W2331052961","https://openalex.org/W2546252175","https://openalex.org/W2562836854"],"related_works":["https://openalex.org/W1553139688","https://openalex.org/W2371151875","https://openalex.org/W2136009070","https://openalex.org/W2362009423","https://openalex.org/W2391133415","https://openalex.org/W2012063573","https://openalex.org/W2123627450","https://openalex.org/W1499233953","https://openalex.org/W1982015164","https://openalex.org/W203725150"],"abstract_inverted_index":{"Outlier":[0],"detection":[1],"is":[2],"an":[3,31],"important":[4],"task":[5],"in":[6],"data":[7],"mining":[8],"because":[9],"outliers":[10],"may":[11],"bring":[12],"either":[13],"new":[14],"knowledge":[15],"or":[16],"potential":[17],"threats.":[18],"Much":[19],"of":[20,38],"recent":[21],"research":[22],"has":[23],"focused":[24],"on":[25],"measuring":[26],"the":[27],"local":[28],"difference":[29],"between":[30],"outlier":[32],"and":[33],"its":[34],"nearest":[35],"neighbors,":[36],"some":[37],"wh":[39]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
