{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T05:13:07Z","timestamp":1776834787676,"version":"3.51.2"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030654139","type":"print"},{"value":"9783030654146","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65414-6_11","type":"book-chapter","created":{"date-parts":[[2021,1,4]],"date-time":"2021-01-04T08:03:24Z","timestamp":1609747404000},"page":"128-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["GAN-Based Anomaly Detection In Imbalance Problems"],"prefix":"10.1007","author":[{"given":"Junbong","family":"Kim","sequence":"first","affiliation":[]},{"given":"Kwanghee","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Hyomin","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Kisung","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision \u2013 ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11363, pp. 622\u2013637. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39"},{"issue":"1","key":"11_CR2","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Beijbom, O., Edmunds, P.J., Kline, D.I., Mitchell, B.G., Kriegman, D.: Automated annotation of coral reef survey images. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1170\u20131177. IEEE (2012)","DOI":"10.1109\/CVPR.2012.6247798"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192 (2020)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1016\/j.neunet.2018.07.011","volume":"106","author":"M Buda","year":"2018","unstructured":"Buda, M., Maki, A., Mazurowski, M.A.: A systematic study of the class imbalance problem in convolutional neural networks. Neural Netw. 106, 249\u2013259 (2018)","journal-title":"Neural Netw."},{"key":"11_CR6","unstructured":"Cardie, C., Howe, N.: Improving minority class prediction using case-specific feature weights (1997)"},{"key":"11_CR7","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey (2019). arXiv preprint: arXiv:1901.03407"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"11_CR9","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TMM.2018.2846411","volume":"21","author":"W Chu","year":"2018","unstructured":"Chu, W., Xue, H., Yao, C., Cai, D.: Sparse coding guided spatiotemporal feature learning for abnormal event detection in large videos. IEEE Transactions on Multimedia 21(1), 246\u2013255 (2018)","journal-title":"IEEE Transactions on Multimedia"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-10925-7_1","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"L Deecke","year":"2019","unstructured":"Deecke, L., Vandermeulen, R., Ruff, L., Mandt, S., Kloft, M.: Image anomaly detection with generative adversarial networks. In: Berlingerio, M., Bonchi, F., G\u00e4rtner, T., Hurley, N., Ifrim, G. (eds.) ECML PKDD 2018. LNCS (LNAI), vol. 11051, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-10925-7_1"},{"key":"11_CR11","unstructured":"Demir, U., Unal, G.: Patch-based image inpainting with generative adversarial networks (2018). arXiv preprint arXiv:1803.07422"},{"key":"11_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98074-4","volume-title":"Learning From Imbalanced Data Sets","author":"A Fern\u00e1ndez","year":"2018","unstructured":"Fern\u00e1ndez, A., Garc\u00eda, S., Galar, M., Prati, R.C., Krawczyk, B., Herrera, F.: Learning From Imbalanced Data Sets. Springer, Heidelberg (2018)"},{"key":"11_CR13","unstructured":"Golan, I., El-Yaniv, R.: Deep anomaly detection using geometric transformations. In: Advances in Neural Information Processing Systems, pp. 9758\u20139769 (2018)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Gong, D., Liu, L., Le, V., Saha, B., Mansour, M.R., Venkatesh, S., Hengel, A.V.D.: Memorizing normality to detect anomaly: memory-augmented deep auto encoder for unsupervised anomaly detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"11_CR15","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, pp. 2672\u20132680 (2014)"},{"key":"11_CR16","series-title":"Cognitive Technologies","volume-title":"Rough-Neural Computing","author":"JW Grzymala-Busse","year":"2004","unstructured":"Grzymala-Busse, J.W., Goodwin, L.K., Grzymala-Busse, W.J., Zheng, X.: An Approach to imbalanced data sets based on changing rule strength. In: Pal, S.K., Polkowski, L., Skowron, A. (eds.) Rough-Neural Computing. Cognitive Technologies. Springer, Heidelberg (2004)"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.eswa.2016.12.035","volume":"73","author":"G Haixiang","year":"2017","unstructured":"Haixiang, G., Yijing, L., Shang, J., Mingyun, G., Yuanyue, H., Bing, G.: Learning from class-imbalanced data: review of methods and applications. Expert Syst. Appl. 73, 220\u2013239 (2017)","journal-title":"Expert Syst. Appl."},{"key":"11_CR18","unstructured":"Huang, C., Cao, J., Ye, F., Li, M., Zhang, Y., Lu, C.: Inverse-transform autoencoder for anomaly detection (2019). arXiv preprint: arXiv:1911.10676"},{"issue":"20","key":"11_CR19","doi-asserted-by":"publisher","first-page":"6969","DOI":"10.1080\/01431161.2013.810825","volume":"34","author":"BA Johnson","year":"2013","unstructured":"Johnson, B.A., Tateishi, R., Hoan, N.T.: A hybrid pansharpening approach and multiscale object-based image analysis for mapping diseased pine and oak trees. Int. J. Rem. Sens. 34(20), 6969\u20136982 (2013)","journal-title":"Int. J. Rem. Sens."},{"issue":"1","key":"11_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1186\/s40537-019-0192-5","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson, J.M., Khoshgoftaar, T.M.: Survey on deep learning with class imbalance. J. Big Data 6(1), 27 (2019)","journal-title":"J. Big Data"},{"key":"11_CR21","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes (2013). arXiv preprint: arXiv:1312.6114"},{"issue":"2","key":"11_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran, B.R., Thomas, D.M., Parakkal, R.: An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J. Imag. 4(2), 36 (2018)","journal-title":"J. Imag."},{"issue":"4","key":"11_CR23","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s13748-016-0094-0","volume":"5","author":"B Krawczyk","year":"2016","unstructured":"Krawczyk, B.: Learning from imbalanced data: open challenges and future directions. Prog. Artif. Intell. 5(4), 221\u2013232 (2016)","journal-title":"Prog. Artif. Intell."},{"key":"11_CR24","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images (2009)"},{"issue":"2\u20133","key":"11_CR25","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1007452223027","volume":"30","author":"M Kubat","year":"1998","unstructured":"Kubat, M., Holte, R.C., Matwin, S.: Machine learning for the detection of oil spills in satellite radar images. Mach. Learn. 30(2\u20133), 195\u2013215 (1998)","journal-title":"Mach. Learn."},{"key":"11_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-49430-8_15","volume-title":"Neural Networks: Tricks of the Trade","author":"S Lawrence","year":"1998","unstructured":"Lawrence, S., Burns, I., Back, A., Tsoi, A.C., Giles, C.L.: Neural network classification and prior class probabilities. In: Orr, G.B., M\u00fcller, K.-R. (eds.) Neural Networks: Tricks of the Trade. LNCS, vol. 1524, pp. 299\u2013313. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/3-540-49430-8_15"},{"key":"11_CR27","unstructured":"LeCun, Y.: The mnist database of handwritten digits (1998). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"issue":"1","key":"11_CR28","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1186\/s40537-018-0151-6","volume":"5","author":"JL Leevy","year":"2018","unstructured":"Leevy, J.L., Khoshgoftaar, T.M., Bauder, R.A., Seliya, N.: A survey on addressing high-class imbalance in big data. J. Big Data 5(1), 42 (2018)","journal-title":"J. Big Data"},{"key":"11_CR29","first-page":"73","volume":"98","author":"CX Ling","year":"1998","unstructured":"Ling, C.X., Li, C.: Data mining for direct marketing: problems and solutions. KDD 98, 73\u201379 (1998)","journal-title":"KDD"},{"issue":"1","key":"11_CR30","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S0933-3657(01)00092-6","volume":"24","author":"B Mac Namee","year":"2002","unstructured":"Mac Namee, B., Cunningham, P., Byrne, S., Corrigan, O.I.: The problem of bias in training data in regression problems in medical decision support. Artif. Intell. Med. 24(1), 51\u201370 (2002)","journal-title":"Artif. Intell. Med."},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Mao, X., Li, Q., Xie, H., Lau, R.Y., Wang, Z., Paul Smolley, S.: Least squares generative adversarial networks. In: Proceedings of the IEEE International Conference On Computer Vision, pp. 2794\u20132802 (2017)","DOI":"10.1109\/ICCV.2017.304"},{"issue":"12","key":"11_CR32","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou, M., Singh, S.: Novelty detection: a review-part 2: neural network based approaches. Signal Process. 83(12), 2499\u20132521 (2003)","journal-title":"Signal Process."},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-21735-7_7","volume-title":"Artificial Neural Networks and Machine Learning \u2013 ICANN 2011","author":"J Masci","year":"2011","unstructured":"Masci, J., Meier, U., Cire\u015fan, D., Schmidhuber, J.: Stacked convolutional auto-encoders for hierarchical feature extraction. In: Honkela, T., Duch, W., Girolami, M., Kaski, S. (eds.) ICANN 2011. LNCS, vol. 6791, pp. 52\u201359. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-21735-7_7"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Oksuz, K., Cam, B.C., Kalkan, S., Akbas, E.: Imbalance problems in object detection: a review. IEEE Trans. Pattern Anal. Mach. Intell. (2020)","DOI":"10.1109\/TPAMI.2020.2981890"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Perera, P., Nallapati, R., Xiang, B.: OCGAN: One-class novelty detection using GANs with constrained latent representations. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2898\u20132906 (2019)","DOI":"10.1109\/CVPR.2019.00301"},{"key":"11_CR36","unstructured":"Philip, K., Chan, S.: Toward scalable learning with non-uniform class and cost distributions: a case study in credit card fraud detection. In: Proceeding of the Fourth International Conference on Knowledge Discovery and Data Mining, pp. 164\u2013168 (1998)"},{"key":"11_CR37","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MA Pimentel","year":"2014","unstructured":"Pimentel, M.A., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Signal Process. 99, 215\u2013249 (2014)","journal-title":"Signal Process."},{"issue":"4","key":"11_CR38","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.jbi.2004.07.008","volume":"37","author":"P Radivojac","year":"2004","unstructured":"Radivojac, P., Chawla, N.V., Dunker, A.K., Obradovic, Z.: Classification and knowledge discovery in protein databases. J. Biomed. Inform. 37(4), 224\u2013239 (2004)","journal-title":"J. Biomed. Inform."},{"key":"11_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-24574-4_28","volume-title":"Medical Image Computing and Computer-Assisted Intervention \u2013 MICCAI 2015","author":"O Ronneberger","year":"2015","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: Navab, N., Hornegger, J., Wells, W.M., Frangi, A.F. (eds.) MICCAI 2015. LNCS, vol. 9351, pp. 234\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28"},{"key":"11_CR40","unstructured":"Ruff, L., Vandermeulen, R., Goernitz, N., Deecke, L., Siddiqui, S.A., Binder, A., M\u00fcller, E., Kloft, M.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402 (2018)"},{"key":"11_CR41","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Khalooei, M., Fathy, M., Adeli, E.: Adversarially learned one-class classifier for novelty detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3379\u20133388 (2018)","DOI":"10.1109\/CVPR.2018.00356"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Sakurada, M., Yairi, T.: Anomaly detection using auto-encoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis, pp. 4\u201311 (2014)","DOI":"10.1145\/2689746.2689747"},{"key":"11_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., et al. (eds.) IPMI 2017. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"11_CR44","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber, J.: Deep learning in neural networks: An overview. Neural networks 61, 85\u2013117 (2015)","journal-title":"Neural networks"},{"key":"11_CR45","doi-asserted-by":"publisher","first-page":"105187","DOI":"10.1016\/j.knosys.2019.105187","volume":"190","author":"X Wang","year":"2020","unstructured":"Wang, X., Du, Y., Lin, S., Cui, P., Shen, Y., Yang, Y.: adVAE: a self-adversarial variational auto-encoder with Gaussian anomaly prior knowledge for anomaly detection. Knowl. Based Syst. 190, 105187 (2020)","journal-title":"Knowl. Based Syst."},{"key":"11_CR46","doi-asserted-by":"crossref","unstructured":"Xia, Y., Cao, X., Wen, F., Hua, G., Sun, J.: Learning discriminative reconstructions for unsupervised outlier removal. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1511\u20131519 (2015)","DOI":"10.1109\/ICCV.2015.177"},{"key":"11_CR47","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms (2017). arXiv preprint: arXiv:1708.07747"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Xiao, J., Hays, J., Ehinger, K.A., Oliva, A., Torralba, A.: Sun database: Large-scale scene recognition from abbey to zoo. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 3485\u20133492. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5539970"},{"issue":"5","key":"11_CR49","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/TMM.2018.2818942","volume":"20","author":"K Xu","year":"2018","unstructured":"Xu, K., Jiang, X., Sun, T.: Anomaly detection based on stacked sparse coding with intra-frame classification strategy. IEEE Trans. Multimed. 20(5), 1062\u20131074 (2018)","journal-title":"IEEE Trans. Multimed."},{"issue":"2","key":"11_CR50","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TMM.2019.2929931","volume":"22","author":"K Xu","year":"2019","unstructured":"Xu, K., Sun, T., Jiang, X.: Video anomaly detection and localization based on an adaptive intra-frame classification network. IEEE Trans. Multimed. 22(2), 394\u2013406 (2019)","journal-title":"IEEE Trans. Multimed."},{"key":"11_CR51","doi-asserted-by":"crossref","unstructured":"Yamanaka, Y., Iwata, T., Takahashi, H., Yamada, M., Kanai, S.: Auto-encoding binary classifiers for supervised anomaly detection. In: Pacific Rim International Conference on Artificial Intelligence, pp. 647\u2013659. Springer, Cham (2019)","DOI":"10.1007\/978-3-030-29911-8_50"},{"key":"11_CR52","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient GAN-based anomaly detection (2018). arXiv preprint: arXiv:1802.06222"},{"key":"11_CR53","unstructured":"Zhai, S., Cheng, Y., Lu, W., Zhang, Z.: Deep structured energy based models for anomaly detection (2016). arXiv preprint: arXiv:1605.07717"},{"issue":"1","key":"11_CR54","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TKDE.2006.17","volume":"18","author":"ZH Zhou","year":"2005","unstructured":"Zhou, Z.H., Liu, X.Y.: Training cost-sensitive neural networks with methods addressing the class imbalance problem. IEEE Trans. knowl. Data Eng. 18(1), 63\u201377 (2005)","journal-title":"IEEE Trans. knowl. Data Eng."},{"key":"11_CR55","unstructured":"Zong, B., et al.: Deep auto-encoding Gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2020 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65414-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:04:01Z","timestamp":1735949041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65414-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030654139","9783030654146"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65414-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"5 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Glasgow","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2020.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OpenReview","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5025","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1360","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic. From the ECCV Workshops 249 full papers, 18 short papers, and 21 further contributions were published out of a total of 467 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}