{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:29Z","timestamp":1750309409018,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T00:00:00Z","timestamp":1731024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Science, Research and the Arts Baden W\u00fcrttemberg"},{"name":"Algorithm Engineering for the Scalability Challenge (AESC)."}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            Outlier generation is a popular technique used to solve important outlier detection tasks. Generating outliers with realistic behavior is challenging. Popular existing methods tend to disregard the \u201cmultiple views\u201d property of outliers in high-dimensional spaces. The only existing method accounting for this property falls short in efficiency and effectiveness. We propose\n            <jats:sc>Bisect<\/jats:sc>\n            , a new outlier generation method that creates realistic outliers mimicking said property. To do so,\n            <jats:sc>Bisect<\/jats:sc>\n            employs a novel proposition introduced in this article stating how to efficiently generate said realistic outliers. Our method has better guarantees and complexity than the current method for recreating \u201cmultiple views.\u201d We use the synthetic outliers generated by\n            <jats:sc>Bisect<\/jats:sc>\n            to effectively enhance outlier detection in diverse datasets for multiple use cases. For instance, oversampling with\n            <jats:sc>Bisect<\/jats:sc>\n            reduced the error by up to 3 times when compared with the baselines.\n          <\/jats:p>","DOI":"10.1145\/3690827","type":"journal-article","created":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T14:39:45Z","timestamp":1725115185000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Generation of Hidden Outliers for Improved Outlier Detection"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0631-7431","authenticated-orcid":false,"given":"Jose","family":"Cribeiro-Ramallo","sequence":"first","affiliation":[{"name":"Karlsruhe Insitute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6854-4931","authenticated-orcid":false,"given":"Vadim","family":"Arzamasov","sequence":"additional","affiliation":[{"name":"Karlsruhe Insitute of Technology, Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1706-1913","authenticated-orcid":false,"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[{"name":"Karlsruhe Insitute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,11,8]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150459"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_27"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_27"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54765-7"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_2"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-011-0287-y"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","unstructured":"W. Conover and R. Iman. 1979. Multiple-Comparisons Procedures. Informal Report. Technical Report. Los Alamos National Laboratory (LANL).","DOI":"10.2172\/6057803"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05993-w"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.022"},{"key":"e_1_3_2_16_2","volume-title":"Advances in Neural Information Processing Systems","author":"El-Yaniv Ran","year":"2006","unstructured":"Ran El-Yaniv and Mordechai Nisenson. 2006. Optimal single-class classification strategies. In Advances in Neural Information Processing Systems. B. Sch\u00f6lkopf, J. Platt, and T. Hoffman (Eds.), Vol. 19, MIT Press. Retrieved from https:\/\/proceedings.neurips.cc\/paper\/2006\/file\/ae1d2c2d957a01dcb3f3b39685cdb4fa-Paper.pdf"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114582"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4633969"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87479-9_51"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/34.709601"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.88"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505560"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1017\/S026988891300043X"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729332"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v028.i05"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081891"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"issue":"8","key":"e_1_3_2_28_2","first-page":"1517","article-title":"Generative adversarial active learning for unsupervised outlier detection","volume":"32","author":"Liu Yezheng","year":"2019","unstructured":"Yezheng Liu, Zhe Li, Chong Zhou, Yuanchun Jiang, Jianshan Sun, Meng Wang, and Xiangnan He. 2019. Generative adversarial active learning for unsupervised outlier detection. IEEE Transactions on Knowledge and Data Engineering 32, 8 (2019), 1517\u20131528.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_29_2","first-page":"54855","volume-title":"Advances in Neural Information Processing Systems","author":"Matteucci Federico","year":"2023","unstructured":"Federico Matteucci, Vadim Arzamasov, and Klemens B\u00f6hm. 2023. A benchmark of categorical encoders for binary classification. In Advances in Neural Information Processing Systems. A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine (Eds.), Vol. 36, Curran Associates, Inc., 54855\u201354875. Retrieved from https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2023\/file\/ac01e21bb14609416760f790dd8966ae-Paper-Datasets_and_Benchmarks.pdf"},{"key":"e_1_3_2_30_2","unstructured":"Alejandro Mottini Alix Lheritier and Rodrigo Acuna-Agost. 2018. Airline passenger name record generation using generative adversarial networks. arXiv:1807.06657. Retrieved from https:\/\/arxiv.org\/abs\/1807.06657"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.112"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.05.006"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.9790\/0661-16264448"},{"key":"e_1_3_2_34_2","first-page":"4393","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In Proceedings of the 35th International Conference on Machine Learning. Jennifer Dy and Andreas Krause (Eds.), PMLR, Vol. 80, 4393\u20134402. Retrieved from https:\/\/proceedings.mlr.press\/v80\/ruff18a.html"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCMI47871.2019.9004400"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_37_2","volume-title":"Advances in Neural Information Processing Systems.","author":"Sch\u00f6lkopf Bernhard","year":"1999","unstructured":"Bernhard Sch\u00f6lkopf, Robert C. Williamson, Alex Smola, John Shawe-Taylor, and John Platt. 1999. Support vector method for novelty detection. In Advances in Neural Information Processing Systems. S. Solla, T. Leen, and K. M\u00fcller (Eds.), Vol. 12, MIT Press. Retrieved from https:\/\/proceedings.neurips.cc\/paper_files\/paper\/1999\/file\/8725fb777f25776ffa9076e44fcfd776-Paper.pdf"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00060"},{"issue":"1","key":"e_1_3_2_39_2","first-page":"15","article-title":"smotefamily: A collection of oversampling techniques for class imbalance problem based on SMOTE","volume":"1","author":"Siriseriwan Wacharasak","year":"2019","unstructured":"Wacharasak Siriseriwan. 2019. smotefamily: A collection of oversampling techniques for class imbalance problem based on SMOTE. R Package Version 1, 1 (2019), 15.","journal-title":"R Package Version"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-017-0068-8"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447822"},{"key":"e_1_3_2_42_2","unstructured":"Kevin Ushey J. J. Allaire and Yuan Tang. 2023. reticulate: Interface to \u2018Python\u2019. Retrieved from https:\/\/rstudio.github.io\/reticulate\/ https:\/\/github.com\/rstudio\/reticulate"},{"key":"e_1_3_2_43_2","article-title":"Dimensionality reduction: A comparative review","volume":"10","author":"van der Maaten Laurens","year":"2007","unstructured":"Laurens van der Maaten, Eric Postma, and H. Herik. 2007. Dimensionality reduction: A comparative review. Journal of Machine Learning Research 10 (2007).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_44_2","first-page":"110","article-title":"Are random forests truly the best classifiers?","volume":"17","author":"Wainberg Michael","year":"2016","unstructured":"Michael Wainberg, Babak Alipanahi, and Brendan J. Frey. 2016. Are random forests truly the best classifiers? Journal of Machine Learning Research 17, 110 (2016), 1\u20135. Retrieved from http:\/\/jmlr.org\/papers\/v17\/15-374.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_45_2","first-page":"96","article-title":"PyOD: A python toolbox for scalable outlier detection","volume":"20","author":"Zhao Yue","year":"2019","unstructured":"Yue Zhao, Zain Nasrullah, and Zheng Li. 2019. PyOD: A python toolbox for scalable outlier detection. Journal of Machine Learning Research 20, 96 (2019), 1\u20137. Retrieved from http:\/\/jmlr.org\/papers\/v20\/19-011.html","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.10.014"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:06Z","timestamp":1750294686000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,8]]},"references-count":45,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3690827"],"URL":"https:\/\/doi.org\/10.1145\/3690827","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2024,11,8]]},"assertion":[{"value":"2024-03-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}