{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T03:29:52Z","timestamp":1776310192839,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030208929","type":"print"},{"value":"9783030208936","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20893-6_39","type":"book-chapter","created":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:25:52Z","timestamp":1559013952000},"page":"622-637","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":980,"title":["GANomaly: Semi-supervised Anomaly Detection via Adversarial Training"],"prefix":"10.1007","author":[{"given":"Samet","family":"Akcay","sequence":"first","affiliation":[]},{"given":"Amir","family":"Atapour-Abarghouei","sequence":"additional","affiliation":[]},{"given":"Toby P.","family":"Breckon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,29]]},"reference":[{"key":"39_CR1","unstructured":"OSCT Borders X-ray Image Library: UK Home Office Centre for Applied Science and Technology (CAST). Publication Number: 146\/16 (2016)"},{"key":"39_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/J.JNCA.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016). \n                      https:\/\/doi.org\/10.1016\/J.JNCA.2016.04.007\n                      \n                    . \n                      https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804516300571","journal-title":"J. Netw. Comput. Appl."},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/J.FUTURE.2015.01.001","volume":"55","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Islam, M.R.: A survey of anomaly detection techniques in financial domain. Future Gener. Comput. Syst. 55, 278\u2013288 (2016). \n                      https:\/\/doi.org\/10.1016\/J.FUTURE.2015.01.001\n                      \n                    . \n                      https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X15000023","journal-title":"Future Gener. Comput. Syst."},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/J.JNCA.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Naser Mahmood, A., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016). \n                      https:\/\/doi.org\/10.1016\/J.JNCA.2015.11.016\n                      \n                    . \n                      https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1084804515002891","journal-title":"J. Netw. Comput. Appl."},{"issue":"9","key":"39_CR5","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"Akcay, S., Kundegorski, M.E., Willcocks, C.G., Breckon, T.P.: Using deep convolutional neural network architectures for object classification and detection within X-ray baggage security imagery. IEEE Trans. Inf. Forensics Secur. 13(9), 2203\u20132215 (2018). \n                      https:\/\/doi.org\/10.1109\/TIFS.2018.2812196","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"39_CR6","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2, 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"39_CR7","unstructured":"Arjovsky, M., Bottou, L.: Towards principled methods for training generative adversarial networks. In: 2017 ICLR, April 2017. \n                      http:\/\/arxiv.org\/abs\/1701.04862"},{"key":"39_CR8","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein generative adversarial networks. In: Proceedings of the 34th International Conference on Machine Learning, pp. 214\u2013223, Sydney, Australia, 06\u201311 August 2017. \n                      http:\/\/proceedings.mlr.press\/v70\/arjovsky17a.html"},{"issue":"3","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection. ACM Comput. Surv. 41(3), 1\u201358 (2009). \n                      https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Comput. Surv."},{"key":"39_CR10","unstructured":"Chen, X., et al.: InfoGAN: interpretable representation learning by information maximizing generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2172\u20132180 (2016)"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Creswell, A., Bharath, A.A.: Inverting the generator of a generative adversarial network (II). arXiv preprint \n                      arXiv:1802.05701\n                      \n                     (2018)","DOI":"10.1109\/TNNLS.2018.2875194"},{"issue":"1","key":"39_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., Bharath, A.A.: Generative adversarial networks: an overview. IEEE Signal Process. Mag. 35(1), 53\u201365 (2018)","journal-title":"IEEE Signal Process. Mag."},{"key":"39_CR13","unstructured":"Dimokranitou, A.: Adversarial autoencoders for anomalous event detection in images. Ph.D. thesis, Purdue University (2017)"},{"key":"39_CR14","unstructured":"Donahue, J., Kr\u00e4henb\u00fchl, P., Darrell, T.: Adversarial feature learning. In: International Conference on Learning Representations (ICLR), Toulon, France, April 2017. \n                      http:\/\/arxiv.org\/abs\/1605.09782"},{"key":"39_CR15","unstructured":"Dumoulin, V., et al.: Adversarially learned inference. In: ICLR (2017)"},{"key":"39_CR16","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"39_CR17","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.C.: Improved training of Wasserstein GANs. In: Advances in Neural Information Processing Systems, pp. 5767\u20135777 (2017)"},{"key":"39_CR18","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"issue":"2","key":"39_CR19","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85\u2013126 (2004). \n                      https:\/\/doi.org\/10.1023\/B:AIRE.0000045502.10941.a9","journal-title":"Artif. Intell. Rev."},{"key":"39_CR20","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on Machine Learning, pp. 448\u2013456, Lille, France, 07\u201309 July 2015. \n                      http:\/\/proceedings.mlr.press\/v37\/ioffe15.html"},{"key":"39_CR21","doi-asserted-by":"publisher","unstructured":"Isola, P., Zhu, J., Zhou, T., Efros, A.A.: Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 5967\u20135976, July 2017. \n                      https:\/\/doi.org\/10.1109\/CVPR.2017.632","DOI":"10.1109\/CVPR.2017.632"},{"key":"39_CR22","unstructured":"Kinga, D., Adam, J.B.: Adam: a method for stochastic optimization. In: International Conference on Learning Representations (ICLR), vol. 5 (2015)"},{"issue":"2","key":"39_CR23","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran, B.R., Thomas, D.M., Parakkal, R.: An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J. Imaging 4(2), 36 (2018)","journal-title":"J. Imaging"},{"key":"39_CR24","unstructured":"Krizhevsky, A., Hinton, G.: Learning multiple layers of features from tiny images. Technical report, Citeseer (2009)"},{"key":"39_CR25","unstructured":"LeCun, Y., Cortes, C.: MNIST handwritten digit database (2010). \n                      http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"39_CR26","unstructured":"Lipton, Z.C., Tripathi, S.: Precise recovery of latent vectors from generative adversarial networks. In: ICLR Workshop (2017)"},{"key":"39_CR27","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders. In: ICLR (2016)"},{"issue":"12","key":"39_CR28","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1016\/J.SIGPRO.2003.07.018","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou, M., Singh, S.: Novelty detection: a review-part 1: statistical approaches. Signal Process. 83(12), 2481\u20132497 (2003). \n                      https:\/\/doi.org\/10.1016\/J.SIGPRO.2003.07.018\n                      \n                    . \n                      https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165168403002020","journal-title":"Signal Process."},{"issue":"12","key":"39_CR29","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/J.SIGPRO.2003.07.019","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou, M., Singh, S.: Novelty detection: a review-part 2: neural network based approaches. Signal Process. 83(12), 2499\u20132521 (2003). \n                      https:\/\/doi.org\/10.1016\/J.SIGPRO.2003.07.019\n                      \n                    . \n                      https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0165168403002032","journal-title":"Signal Process."},{"key":"39_CR30","unstructured":"Medel, J.R., Savakis, A.: Anomaly detection in video using predictive convolutional long short-term memory networks. CoRR abs\/1612.0 (2016)"},{"key":"39_CR31","unstructured":"Mirza, M., Osindero, S.: Conditional generative adversarial nets. arXiv preprint \n                      arXiv:1411.1784\n                      \n                     (2014)"},{"key":"39_CR32","unstructured":"Paszke, A., et al.: Automatic differentiation in PyTorch (2017)"},{"key":"39_CR33","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MA Pimentel","year":"2014","unstructured":"Pimentel, M.A., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Signal Process. 99, 215\u2013249 (2014)","journal-title":"Signal Process."},{"key":"39_CR34","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. In: ICLR (2016)"},{"key":"39_CR35","unstructured":"Ravanbakhsh, M., Sangineto, E., Nabi, M., Sebe, N.: Training adversarial discriminators for cross-channel abnormal event detection in crowds. CoRR abs\/1706.0 (2017). \n                      http:\/\/arxiv.org\/abs\/1706.07680"},{"key":"39_CR36","first-page":"1","volume":"25","author":"TW Rogers","year":"2016","unstructured":"Rogers, T.W., Jaccard, N., Morton, E.J., Griffin, L.D.: Automated X-ray image analysis for cargo security: critical review and future promise. J. X-Ray Sci. Technol. (Prepr.) 25, 1\u201324 (2016)","journal-title":"J. X-Ray Sci. Technol. (Prepr.)"},{"key":"39_CR37","doi-asserted-by":"publisher","unstructured":"Sabokrou, M., Fathy, M., Hoseini, M., Klette, R.: Real-time anomaly detection and localization in crowded scenes. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 56\u201362 (2015). \n                      https:\/\/doi.org\/10.1109\/CVPRW.2015.7301284\n                      \n                    , \n                      http:\/\/ieeexplore.ieee.org\/document\/7301284\/","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"39_CR38","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., Chen, X.: Improved techniques for training GANs. In: Advances in Neural Information Processing Systems, pp. 2234\u20132242 (2016)"},{"key":"39_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., et al. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). \n                      https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"39_CR40","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient GAN-based anomaly detection. arXiv preprint \n                      arXiv:1802.06222\n                      \n                     (2018)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ACCV 2018"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20893-6_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T03:58:53Z","timestamp":1559015933000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20893-6_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030208929","9783030208936"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Perth, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"accv2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/accv2018.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"979","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"274","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}