{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:34:53Z","timestamp":1767141293607,"version":"build-2238731810"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,8,12]],"date-time":"2017-08-12T00:00:00Z","timestamp":1502496000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11042-017-5057-3","type":"journal-article","created":{"date-parts":[[2017,8,12]],"date-time":"2017-08-12T10:07:31Z","timestamp":1502532451000},"page":"3245-3260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["RETRACTED ARTICLE: Discovering Graphical Visual Features for Abnormal Semantic Event Detection"],"prefix":"10.1007","volume":"77","author":[{"given":"Fenghua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuhui","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanjuan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yunye","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"5057_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0953-0","volume-title":"Applications of Data Mining in Computer Security","author":"D Barbara","year":"2002","unstructured":"Barbara D, Jajodia S (2002) Applications of Data Mining in Computer Security. Springer Science & Business Media, New York"},{"key":"5057_CR2","doi-asserted-by":"crossref","unstructured":"Camacho J, Macia-Fernandez G, Diaz-Verdejo J, et al (2014) Tackling the big data 4 vs for anomaly detection. In: 2014 I.E. Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 500\u2013505. IEEE","DOI":"10.1109\/INFCOMW.2014.6849282"},{"key":"5057_CR3","doi-asserted-by":"crossref","unstructured":"Cao B, Shen D, Sun J-T, Yang Q, Chen Z (2007) Feature selection in a kernel space. International Conference on Machine Learning, pp 745\u2013770","DOI":"10.1145\/1273496.1273512"},{"issue":"10","key":"5057_CR4","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TNNLS.2016.2582746","volume":"28","author":"Xiaojun Chang","year":"2017","unstructured":"Chang X, Yang Y (2016) Semi-supervised Feature Analysis by Mining Correlations among Multiple Tasks. IEEE Trans Neural Netw Learn Syst. doi:\n                    10.1109\/TNNLS.2016.2582746","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"7","key":"5057_CR5","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1109\/TNNLS.2015.2441735","volume":"27","author":"X Chang","year":"2016","unstructured":"Chang X, Shen H, Nie F, Wang S, Yang Y, Zhou X (2016) Compound Rank-k Projections for Bilinear Analysis. IEEE Trans Neural Netw Learn Syst 27(7):1502\u20131513","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"8","key":"5057_CR6","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","volume":"39","author":"X Chang","year":"2017","unstructured":"Chang X, Yu Y, Yang Y, Xing EP (2017) Semantic Pooling for Complex Event Analysis in Untrimmed Videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617\u20131632","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"5057_CR7","first-page":"1180","volume":"47","author":"X Chang","year":"2017","unstructured":"Chang X, Ma Z, Yang Y, Zeng Z, Hauptmann AG (2017) Bi-Level Semantic Representation Analysis for Multimedia Event Detection. IEEE Trans. Cybernetics 47(5):1180\u20131197","journal-title":"Cybernetics"},{"issue":"8","key":"5057_CR8","doi-asserted-by":"publisher","first-page":"3911","DOI":"10.1109\/TIP.2017.2708506","volume":"26","author":"X Chang","year":"2017","unstructured":"Chang X, Ma Z, Lin M, Yang Y, Hauptmann AG (2017) Feature Interaction Augmented Sparse Learning for Fast Kinect Motion Detection. IEEE Trans Image Process 26(8):3911\u20133920","journal-title":"IEEE Trans Image Process"},{"key":"5057_CR9","doi-asserted-by":"crossref","unstructured":"Davis JV, Kulis B, Jain P, Sra S, Dhillon IS (2007) Information theoretic metric learning. In: Proceedings of the 24th international conference on Machine learning, vol 227. ACM, pp 209\u2013216","DOI":"10.1145\/1273496.1273523"},{"key":"5057_CR10","unstructured":"Duda RO, Hart PE, Stock DG (1986) Pattern Classification. Addison-Wesley Publishing Company"},{"key":"5057_CR11","unstructured":"Egilmez HE, Ortega A (2014) Spectral anomaly detection using graph-based filtering for wireless sensor networks. In: 2014 I.E. International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 1085\u20131089"},{"key":"5057_CR12","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4615-0953-0_4","volume-title":"Applications of Data Mining in Computer Security","author":"E Eskin","year":"2002","unstructured":"Eskin E, Arnold A, Prerau M et al (2002) A geometric framework for unsupervised anomaly detection. In: Barbar\u00e1 D, Jajodia S (eds) Applications of Data Mining in Computer Security. Springer, New York, pp 77\u2013101"},{"issue":"2","key":"5057_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"R. A. FISHER","year":"1936","unstructured":"Fisher R (1936) The use of multiple measurements in taxonomic problems. Annals of Eugnics, pp 179\u2013188","journal-title":"Annals of Eugenics"},{"key":"5057_CR14","unstructured":"Fukunaga K (1990) Introduction to Statistical Pattern Recognition. Elsevier Academic Press, pp 101\u2013109"},{"key":"5057_CR15","unstructured":"He X, Cai D, Niyogi P (2005) Laplacian Score for Feature Selection. NIPS, pp 507\u2013514"},{"key":"5057_CR16","doi-asserted-by":"crossref","unstructured":"Heady R, Luger GF, Maccabe A et al (1990) The architecture of a network level intrusion detection system. Department of Computer Science, College of Engineering, University of New Mexico","DOI":"10.2172\/425295"},{"key":"5057_CR17","unstructured":"Hu W, Hu W (2005) Network-based intrusion detection using Adaboost algorithm. In: The 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence, Proceedings, pp 712\u2013717. IEEE"},{"key":"5057_CR18","unstructured":"Huang SY, Huang YN (2013) Network traffic anomaly detection based on growing hierarchical SOM. In: 2013 43rd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, pp 1\u20132"},{"key":"5057_CR19","doi-asserted-by":"crossref","unstructured":"Jiang W, Yao M, Yan J (2008) Intrusion detection based on improved fuzzy c-means algorithm. In: 2008 International Symposium on Information Science and Engineering, ISISE 2008, vol 2. IEEE, pp 326\u2013329","DOI":"10.1109\/ISISE.2008.17"},{"key":"5057_CR20","unstructured":"Leibe B, Schiele B (2003) Analyzing Appearance and Contour Based Methods for Object Categorizationn. In: Proc. of CPVR, pp 409\u2013415"},{"key":"5057_CR21","doi-asserted-by":"crossref","unstructured":"Liu X, Song M, Tao D, Liu Z, Zhang L, Bu J, Chen C (2013) Semi-supervised Node Splitting for Random Forest Construction. IEEE Computer Vision and Pattern Recognition (CVPR), pp 492\u2013499, (CCF A)","DOI":"10.1109\/CVPR.2013.70"},{"key":"5057_CR22","unstructured":"Liu X, Song M, Tao D, Zhang L, Bu J, Chen C (2014) Learning to Track Multiple Objects. IEEE Trans Neural Netw Learn Syst, (accepted, IF: 3.766, CCF B, JCR 1)"},{"key":"5057_CR23","doi-asserted-by":"crossref","unstructured":"Luo YB, Wang BS, Sun YP et al (2013) FL-LPVG: an approach for anomaly detection based on flow-level limited penetrable visibility graph","DOI":"10.1049\/cp.2013.2470"},{"issue":"12","key":"5057_CR24","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448\u20133470","journal-title":"Comput Netw"},{"key":"5057_CR25","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A et al (2011) Scikit-learn: machine learning in Python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"key":"5057_CR26","unstructured":"Quinlan J (1993) C4.5 Programs for machine learning. Morgan Kaufmann"},{"issue":"1","key":"5057_CR27","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch M (1999) Snort: lightweight intrusion detection for networks. LISA 99(1):229\u2013238","journal-title":"LISA"},{"key":"5057_CR28","unstructured":"Tenenbaum JB (1998) Mapping a manifold of perceptual observations. Neural information processing systems, pp 745\u2013770"},{"issue":"10","key":"5057_CR29","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/j.cpc.2009.05.004","volume":"180","author":"X Tong","year":"2009","unstructured":"Tong X, Wang Z, Yu H (2009) A research using hybrid RBF\/Elman neural networks for intrusion detection system secure model. Comput Phys Commun 180(10):1795\u20131801","journal-title":"Comput Phys Commun"},{"key":"5057_CR30","doi-asserted-by":"crossref","unstructured":"Wang G, Lu Y, Zhang L, Zimmermann R, Kim SH, Alfarrarjeh A, Cyrus S (2014) Active Key Frame Selection for 3D Model Reconstruction from Crowdsourced Geo-tagged Videos. International Conference on Multimedia and Expo (ICME), (CCF B)","DOI":"10.1109\/ICME.2014.6890253"},{"key":"5057_CR31","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.neucom.2014.05.091","volume":"151","author":"Yingjie Xia","year":"2015","unstructured":"Xia Y, Xu W, Zhang L, Shi X, Mao K (2015) Integrating 3D Structure into Traffic Scene Understanding with RGB-D Data. Neurocomputing 151:700\u2013709","journal-title":"Neurocomputing"},{"key":"5057_CR32","unstructured":"Xu L, Liu H (1993) Feature selection for high-dimensional data. International Conference on Machine Learning, pp 745\u2013770"},{"key":"5057_CR33","unstructured":"Yin Y, Shen Z, Zhang L, Zimmermann R (2014) Spatial-Temporal Tag Mining for Automatic Geospatial Video Annotations. ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP), (accepted, IF: 0.935, CCF B, JCR 3)"},{"key":"5057_CR34","doi-asserted-by":"crossref","unstructured":"Zhang J, Zulkernine M (2006) Anomaly based network intrusion detection with unsupervised outlier detection. In: 2006 I.E. International Conference on Communications, ICC 2006, vol 5. IEEE, pp 2388\u20132393","DOI":"10.1109\/ICC.2006.255127"},{"key":"5057_CR35","unstructured":"Zhang L, Song M, Sun L, Liu X, Wang Y, Tao D, Bu J, Chen C (2012) Spatial Graphlet Matching Kernel for Recognizing Aerial Image Categories, International Conference on Pattern Recognition (ICPR), pp 2813\u20132816"},{"issue":"12","key":"5057_CR36","doi-asserted-by":"publisher","first-page":"5071","DOI":"10.1109\/TIP.2013.2278465","volume":"22","author":"L Zhang","year":"2013","unstructured":"Zhang L, Han Y, Yang Y, Song M, Yan S, Tian Q (2013) Discovering Discriminative Graphlets for Aerial Image Categories Recognition. IEEE Trans Image Process 22(12):5071\u20135084 (IF:3.199, CCF A, JCR 2)","journal-title":"IEEE Trans Image Process"},{"issue":"5","key":"5057_CR37","first-page":"803","volume":"21","author":"L Zhang","year":"2013","unstructured":"Zhang L, Song M, Zhao Q, Liu X, Bu J, Chen C (2013) Probabilistic Graphlet Transfer for Photo Cropping. IEEE Trans Image Process 21(5):803\u2013815 (IF:3.199, CCF A, JCR 2)","journal-title":"IEEE Trans Image Process"},{"key":"5057_CR38","doi-asserted-by":"crossref","unstructured":"Zhang L, Song M, Liu Z, Liu X, Bu J, Chen C (2013) Probabilistic Graphlet Cut: Exploring Spatial Structure Cue for Weakly Supervised Image Segmentation. IEEE Computer Vision and Pattern Recognition (CVPR), pp 1908\u20131915, (CCF A)","DOI":"10.1109\/CVPR.2013.249"},{"issue":"6","key":"5057_CR39","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s00530-013-0317-1","volume":"20","author":"Luming Zhang","year":"2013","unstructured":"Zhang L, Tao D, Liu X, Song M, Chen C (2014) Grassmann Multimodal Implicit Feature Selection. Multimedia System 12(6):102\u2013134","journal-title":"Multimedia Systems"},{"issue":"6","key":"5057_CR40","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1016\/j.sigpro.2012.05.012","volume":"93","author":"L Zhang","year":"2013","unstructured":"Zhang L, Song M, Liu X, Jiajun B, Chen C (2013) Fast Multi-View Segment Graph Kernel for Object Classification. Signal Process 93(6):1597\u20131607","journal-title":"Signal Process"},{"issue":"6","key":"5057_CR41","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s00530-013-0317-1","volume":"20","author":"L Zhang","year":"2014","unstructured":"Zhang L, Tao D, Liu X, Sun L, Song M, Chen C (2014) Grassmann multimodal implicit feature selection. Multimedia Syst 20(6):659\u2013674","journal-title":"Multimedia Syst"},{"issue":"5","key":"5057_CR42","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1109\/TIP.2014.2311658","volume":"23","author":"L Zhang","year":"2014","unstructured":"Zhang L, Gao Y, Ji R, Dai Q, Li X (2014) Actively Learning Human Gaze Shifting Paths for Photo Cropping. IEEE Trans Image Process 23(5):2235\u20132245 (IF:3.199, CCF A, JCR 2)","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"5057_CR43","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1109\/TIP.2014.2303650","volume":"23","author":"L Zhang","year":"2014","unstructured":"Zhang L, Gao Y, Zimmermann R, Tian Q, Li X (2014) Fusion of Multi-Channel Local and Global Structural Cues for Photo Aesthetics Evaluation. IEEE Trans Image Process 23(3):1419\u20131429 (IF:3.199, CCF A, JCR 2)","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"5057_CR44","doi-asserted-by":"publisher","first-page":"4150","DOI":"10.1109\/TIP.2014.2344433","volume":"23","author":"L Zhang","year":"2014","unstructured":"Zhang L, Yang Y, Gao Y, Wang C, Yu Y, Li X (2014) A Probabilistic Associative Model for Segmenting Weakly-Supervised Images. IEEE Trans Image Process 23(9):4150\u20134159 (IF:3.199, CCF A, JCR 2)","journal-title":"IEEE Trans Image Process"},{"issue":"8","key":"5057_CR45","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.1109\/TCYB.2013.2285219","volume":"44","author":"L Zhang","year":"2014","unstructured":"Zhang L, Gao Y, Hong C, Feng Y, Zhu J, Cai D (2014) Feature Correlation Hypergraph: Exploiting High-order Potentials for Multimodal Recognition. IEEE Trans Cybern 44(8):1408\u20131419 (IF:3.236, CCF B, JCR 1)","journal-title":"IEEE Trans Cybern"},{"issue":"2","key":"5057_CR46","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1109\/TMM.2013.2293424","volume":"16","author":"L Zhang","year":"2014","unstructured":"Zhang L, Gao Y, Ji R, Ke L, Shen J (2014) Representative Discovery of Structure Cues for Weakly-Supervised Image Segmentation. IEEE Trans Multimed 16(2):470\u2013479 (IF:1.754, CCF B, JCR 2)","journal-title":"IEEE Trans Multimed"},{"issue":"1","key":"5057_CR47","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TMM.2013.2286817","volume":"16","author":"L Zhang","year":"2014","unstructured":"Zhang L, Song M, Yang Y, Zhao Q, Chen Z, Sebe N (2014) Weakly Supervised Photo Cropping. IEEE Trans Multimed 16(1):94\u2013107 (IF:1.754, CCF B, JCR 2)","journal-title":"IEEE Trans Multimed"},{"key":"5057_CR48","unstructured":"Zhang L, Ji R, Xia Y, Li X (2014) Learning a Probabilistic Topology Discovering Model for Scene Categorization. IEEE Trans Neural Netw Learn Syst, (accepted, IF: 3.766, CCF B, JCR 1)"},{"key":"5057_CR49","unstructured":"Zhang Y, Zhang L, Zimmermann R (2014) Aesthetics-Guided Summarization from Multiple User Generated Videos. ACM Transactions on Multimedia Computing, Communications and Applications (TOMCCAP), (accepted, IF: 0.935, CCF B, JCR 3)"},{"key":"5057_CR50","doi-asserted-by":"crossref","unstructured":"Zhang L, Gao Y, Zhang C, Tian Q, Zimmermann R (2014) Perception-Guided Multimodal Aesthetics Discovery for Photo Quality Assessment. ACM Multimedia (Full paper). (accepted, CCF A)","DOI":"10.1145\/2647868.2654903"},{"key":"5057_CR51","doi-asserted-by":"crossref","unstructured":"Zhang L, Yang Y, Zimmermann R (2014) Discriminative Cellets Discovery for Fine-Grained Image Categories Retrieval. ACM ICMR, (CCF B)","DOI":"10.1145\/2578726.2578736"},{"key":"5057_CR52","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.ins.2013.08.020","volume":"254","author":"L Zhang","year":"2014","unstructured":"Zhang L, Song M, Liu X, Jiajun B, Chen C (2014) Recognizing architecture styles by hierarchical sparse coding of blocklets. Inf Sci 254:41\u2013154 (IF: 3.643, CCF B, JCR 1)","journal-title":"Inf Sci"},{"issue":"2","key":"5057_CR53","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1109\/TIE.2014.2336602","volume":"62","author":"L Zhang","year":"2015","unstructured":"Zhang L, Xia Y, Ji R, Li X (2015) Spatial-Aware Object-Level Saliency Prediction by Learning Graphlet Hierarchies. IEEE Trans Ind Electron 62(2):1301\u20131308 (IF: 5.165, JCR 1)","journal-title":"IEEE Trans Ind Electron"},{"issue":"1","key":"5057_CR54","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TIE.2014.2327558","volume":"62","author":"L Zhang","year":"2015","unstructured":"Zhang L, Gao Y, Xia Y, Dai Q, Li X (2015) A Fine-Grained Image Categorization System by Cellet-Encoded Spatial Pyramid Modeling. IEEE Trans Ind Electro 62(1):564\u2013571 (IF: 5.165, JCR 1)","journal-title":"IEEE Trans Ind Electro"},{"issue":"2","key":"5057_CR55","doi-asserted-by":"publisher","first-page":"1309","DOI":"10.1109\/TIE.2014.2336639","volume":"62","author":"L Zhang","year":"2015","unstructured":"Zhang L, Xia Y, Mao K, Shan Z (2015) An Effective Video Summarization Framework Toward Handheld Devices. IEEE Trans Ind Electron 62(2):1309\u20131316 (IF: 5.165, JCR 1)","journal-title":"IEEE Trans Ind Electron"},{"issue":"1","key":"5057_CR56","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/TMM.2014.2370257","volume":"71","author":"L Zhang","year":"2015","unstructured":"Zhang L, Gao Y, Hong R, Hu Y, Ji R, Dai Q (2015) Probabilistic Skimlet Fusion for Summarizing Multiple Consumer Landmark Videos. IEEE Trans Multimed 71(1):40\u201349 (accepted, IF:1.754, CCF B, JCR 2)","journal-title":"IEEE Trans Multimed"},{"key":"5057_CR57","unstructured":"Zhou Q, Gu L, Wang C et al (2006) Using an improved C4.5 for imbalanced dataset of intrusion. In: Proceedings of the 2006 International Conference on Privacy, Security, Trust: Bridge the Gap Between PST Technologies and Business Services. ACM, p 67"}],"updated-by":[{"DOI":"10.1007\/s11042-019-7705-2","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000},"record-id":"20602"},{"DOI":"10.1007\/s11042-019-7705-2","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T00:00:00Z","timestamp":1560124800000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-5057-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5057-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-5057-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T10:49:50Z","timestamp":1571395790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-5057-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,12]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["5057"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-5057-3","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,12]]},"assertion":[{"value":"18 July 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 July 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2019","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The Editor-in-Chief has retracted this article [3], which was published as part of special issue \u201cSemantic Concept Discovery in MMData\u201d, because the article shows substantial text overlap most notably with the articles cited [1, 2, 4, 5].","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}