{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:58:46Z","timestamp":1777579126043,"version":"3.51.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030865139","type":"print"},{"value":"9783030865146","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86514-6_1","type":"book-chapter","created":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T12:05:38Z","timestamp":1631189138000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Anomaly Detection: How to Artificially Increase Your F1-Score with a Biased Evaluation Protocol"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5085-0052","authenticated-orcid":false,"given":"Damien","family":"Fourure","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9262-2250","authenticated-orcid":false,"given":"Muhammad Usama","family":"Javaid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1795-6039","authenticated-orcid":false,"given":"Nicolas","family":"Posocco","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3985-1967","authenticated-orcid":false,"given":"Simon","family":"Tihon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,9,10]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision \u2013 ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11363, pp. 622\u2013637. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/3-540-45681-3_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"F Angiulli","year":"2002","unstructured":"Angiulli, F., Pizzuti, C.: Fast outlier detection in high dimensional spaces. In: Elomaa, T., Mannila, H., Toivonen, H. (eds.) PKDD 2002. LNCS, vol. 2431, pp. 15\u201327. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45681-3_2"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"1_CR4","unstructured":"Dua, D., Graff, C.: UCI machine learning repository (2017). http:\/\/archive.ics.uci.edu\/ml"},{"key":"1_CR5","unstructured":"Eduardo, S., Naz\u00e1bal, A., Williams, C.K., Sutton, C.: Robust variational autoencoders for outlier detection and repair of mixed-type data. In: International Conference on Artificial Intelligence and Statistics, pp. 4056\u20134066. PMLR (2020)"},{"issue":"8","key":"1_CR6","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","volume":"31","author":"T Ergen","year":"2019","unstructured":"Ergen, T., Kozat, S.S.: Unsupervised anomaly detection with LSTM neural networks. IEEE trans. Neural Netw. Learn. Syst. 31(8), 3127\u20133141 (2019)","journal-title":"IEEE trans. Neural Netw. Learn. Syst."},{"key":"1_CR7","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm. KI-2012: Poster and Demo Track, pp. 59\u201363 (2012)"},{"key":"1_CR8","unstructured":"Goyal, S., Raghunathan, A., Jain, M., Simhadri, H.V., Jain, P.: DROCC: deep robust one-class classification. In: International Conference on Machine Learning, pp. 3711\u20133721. PMLR (2020)"},{"key":"1_CR9","unstructured":"Han, X., Chen, X., Liu, L.P.: GAN ensemble for anomaly detection. arXiv preprint arXiv:2012.07988 (2020)"},{"issue":"9\u201310","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He, Z., Xu, X., Deng, S.: Discovering cluster-based local outliers. Pattern Recogn. Lett. 24(9\u201310), 1641\u20131650 (2003)","journal-title":"Pattern Recogn. Lett."},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Kriegel, H.P., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 444\u2013452, August 2008. https:\/\/doi.org\/10.1145\/1401890.1401946","DOI":"10.1145\/1401890.1401946"},{"key":"1_CR12","unstructured":"Lai, C.H., Zou, D., Lerman, G.: Robust subspace recovery layer for unsupervised anomaly detection. In: International Conference on Learning Representations (2020). https:\/\/openreview.net\/forum?id=rylb3eBtwr"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, Z., Liu, S., Lin, W.Y.: Deep unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 3636\u20133645, January 2021","DOI":"10.1109\/WACV48630.2021.00368"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-662-44851-9_15","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"ZC Lipton","year":"2014","unstructured":"Lipton, Z.C., Elkan, C., Naryanaswamy, B.: Optimal thresholding of classifiers to maximize F1 measure. In: Calders, T., Esposito, F., H\u00fcllermeier, E., Meo, R. (eds.) ECML PKDD 2014. LNCS (LNAI), vol. 8725, pp. 225\u2013239. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44851-9_15"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, ICDM 2008, pp. 413\u2013422. IEEE Computer Society, USA (2008). https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"1_CR16","unstructured":"Maziarka, \u0141., \u015amieja, M., Sendera, M., Struski, \u0141., Tabor, J., Spurek, P.: Flow-based anomaly detection (2020)"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Parra, L., Deco, G., Miesbach, S.: Statistical independence and novelty detection with information preserving nonlinear maps. Neural Comput. 8 (1997). https:\/\/doi.org\/10.1162\/neco.1996.8.2.260","DOI":"10.1162\/neco.1996.8.2.260"},{"key":"1_CR18","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Perera, P., Nallapati, R., Xiang, B.: Ocgan: One-class novelty detection using gans with constrained latent representations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), June 2019","DOI":"10.1109\/CVPR.2019.00301"},{"key":"1_CR20","unstructured":"Rayana, S.: ODDS library (2016). http:\/\/odds.cs.stonybrook.edu"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., et al. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"1_CR22","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C., et al.: Support vector method for novelty detection. In: NIPS, vol. 12, pp. 582\u2013588. Citeseer (1999)"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/3-540-47887-6_53","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J Tang","year":"2002","unstructured":"Tang, J., Chen, Z., Fu, A.W., Cheung, D.W.: Enhancing effectiveness of outlier detections for low density patterns. In: Chen, M.-S., Yu, P.S., Liu, B. (eds.) PAKDD 2002. LNCS (LNAI), vol. 2336, pp. 535\u2013548. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47887-6_53"},{"key":"1_CR24","unstructured":"Wang, J., Sun, S., Yu, Y.: Multivariate triangular quantile maps for novelty detection. In: Advances in Neural Information Processing Systems, vol. 32. Curran Associates, Inc. (2019)"},{"key":"1_CR25","unstructured":"Wang, S., et al.: Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network. In: NeurIPS, pp. 5960\u20135973 (2019)"},{"key":"1_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/2686378","volume":"2019","author":"X Xu","year":"2019","unstructured":"Xu, X., Liu, H., Yao, M.: Recent progress of anomaly detection. Complexity 2019, 1\u201311 (2019). https:\/\/doi.org\/10.1155\/2019\/2686378","journal-title":"Complexity"},{"key":"1_CR27","unstructured":"Yang, Z., Bozchalooi, I.S., Darve, E.: Regularized cycle consistent generative adversarial network for anomaly detection (2020)"},{"key":"1_CR28","unstructured":"Yang, Z., Zhang, T., Bozchalooi, I.S., Darve, E.: Memory augmented generative adversarial networks for anomaly detection (2020)"},{"key":"1_CR29","doi-asserted-by":"publisher","unstructured":"Zaigham Zaheer, M., Lee, J.H., Astrid, M., Lee, S.I.: Old is gold: redefining the adversarially learned one-class classifier training paradigm. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14171\u201314181 (2020). https:\/\/doi.org\/10.1109\/CVPR42600.2020.01419","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"1_CR30","unstructured":"Zhai, S., Cheng, Y., Lu, W., Zhang, Z.: Deep structured energy based models for anomaly detection. In: International Conference on Machine Learning, pp. 1100\u20131109. PMLR (2016)"},{"key":"1_CR31","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86514-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T22:03:26Z","timestamp":1757369006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86514-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030865139","9783030865146"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86514-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bilbao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2021.ecmlpkdd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"869","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"210","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held online due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}