{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T11:24:04Z","timestamp":1764588244286,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030930486"},{"type":"electronic","value":"9783030930493"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93049-3_29","type":"book-chapter","created":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T06:00:24Z","timestamp":1641016824000},"page":"347-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust Anomaly Detection from\u00a0Partially Observed Anomalies with\u00a0Augmented Classes"],"prefix":"10.1007","author":[{"given":"Rundong","family":"He","sequence":"first","affiliation":[]},{"given":"Zhongyi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xueying","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiushan","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yilong","family":"Yin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,1]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M.A., Zainal, A.: Fraud detection system: a survey. J. Netw. Comput. Appl. 68, 90\u2013113 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"29_CR2","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s10994-020-05877-5","volume":"109","author":"J Bekker","year":"2020","unstructured":"Bekker, J., Davis, J.: Learning from positive and unlabeled data: a survey. Mach. Learn. 109(4), 719\u2013760 (2020). https:\/\/doi.org\/10.1007\/s10994-020-05877-5","journal-title":"Mach. Learn."},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"},{"issue":"3","key":"29_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"7","key":"29_CR5","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1109\/TGRS.2018.2810124","volume":"56","author":"S Chang","year":"2018","unstructured":"Chang, S., Du, B., Zhang, L.: BASO: a background-anomaly component projection and separation optimized filter for anomaly detection in hyperspectral images. IEEE Trans. Geosci. Remote Sens. 56(7), 3747\u20133761 (2018)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Chapelle, O., Scholkopf, B., Zien, A.: Semi-supervised Learning (2006). IEEE Transactions on Neural Networks 20(3), 542\u2013542 (2009)","DOI":"10.1109\/TNN.2009.2015974"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhu, X., Li, W., Gong, S.: Semi-supervised learning under class distribution mismatch. In: AAAI, pp. 3569\u20133576 (2020)","DOI":"10.1609\/aaai.v34i04.5763"},{"issue":"3","key":"29_CR8","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273\u2013297 (1995)","journal-title":"Mach. Learn."},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Cui, L., Biswal, S., Glass, L.M., Lever, G., Sun, J., Xiao, C.: CONAN: complementary pattern augmentation for rare disease detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, pp. 614\u2013621 (2020)","DOI":"10.1609\/aaai.v34i01.5401"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Da, Q., Yu, Y., Zhou, Z.H.: Learning with augmented class by exploiting unlabeled data. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 28 (2014)","DOI":"10.1609\/aaai.v28i1.8997"},{"issue":"143","key":"29_CR11","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1080\/14786448708628471","volume":"23","author":"FY Edgeworth","year":"1887","unstructured":"Edgeworth, F.Y.: XLI. On discordant observations. London Edinburgh Dublin Philos. Mag. J. Sci. 23(143), 364\u2013375 (1887)","journal-title":"London Edinburgh Dublin Philos. Mag. J. Sci."},{"key":"29_CR12","unstructured":"Ehrhardt, S., Zisserman, A., Rebuffi, S., Han, K., Vedaldi, A.: Automatically discovering and learning new visual categories with ranking statistics. In: Proceedings of the 8th International Conference on Learning Representations, ICLR 2020. Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2020)"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N G\u00f6rnitz","year":"2013","unstructured":"G\u00f6rnitz, N., Kloft, M., Rieck, K., Brefeld, U.: Toward supervised anomaly detection. J. Artif. Intell. Res. 46, 235\u2013262 (2013)","journal-title":"J. Artif. Intell. Res."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Han, K., Vedaldi, A., Zisserman, A.: Learning to discover novel visual categories via deep transfer clustering. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 8401\u20138409 (2019)","DOI":"10.1109\/ICCV.2019.00849"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"29_CR16","unstructured":"Hsu, Y.C., Lv, Z., Kira, Z.: Learning to cluster in order to transfer across domains and tasks. arXiv preprint arXiv:1711.10125 (2017)"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Keller, F., Muller, E., Bohm, K.: HiCS: high contrast subspaces for density-based outlier ranking. In: 2012 IEEE 28th International Conference on Data Engineering, pp. 1037\u20131048. IEEE (2012)","DOI":"10.1109\/ICDE.2012.88"},{"key":"29_CR18","unstructured":"Lee, W.S., Liu, B.: Learning with positive and unlabeled examples using weighted logistic regression. In: ICML, vol. 3, pp. 448\u2013455 (2003)"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Leon, E., Nasraoui, O., Gomez, J.: Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. In: Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No. 04TH8753), vol. 1, pp. 502\u2013508. IEEE (2004)","DOI":"10.1109\/CEC.2004.1330898"},{"key":"29_CR20","unstructured":"Liu, B., Dai, Y., Li, X., Lee, W.S., Yu, P.S.: Building text classifiers using positive and unlabeled examples. In: Third IEEE International Conference on Data Mining, pp. 179\u2013186. IEEE (2003)"},{"key":"29_CR21","unstructured":"Liu, B., Lee, W.S., Yu, P.S., Li, X.: Partially supervised classification of text documents. In: ICML, vol. 2, pp. 387\u2013394 (2002)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"29_CR23","unstructured":"M\u00fcnz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI\/ITG Workshop MMBnet, pp. 13\u201314 (2007)"},{"key":"29_CR24","first-page":"3235","volume":"31","author":"A Oliver","year":"2018","unstructured":"Oliver, A., Odena, A., Raffel, C.A., Cubuk, E.D., Goodfellow, I.: Realistic evaluation of deep semi-supervised learning algorithms. Adv. Neural. Inf. Process. Syst. 31, 3235\u20133246 (2018)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"29_CR25","unstructured":"Rayana, S.: ODDS library (2016)"},{"issue":"1","key":"29_CR26","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/S0167-9473(96)00027-8","volume":"23","author":"I Ruts","year":"1996","unstructured":"Ruts, I., Rousseeuw, P.J.: Computing depth contours of bivariate point clouds. Comput. Stat. Data Anal. 23(1), 153\u2013168 (1996)","journal-title":"Comput. Stat. Data Anal."},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Sabahi, F., Movaghar, A.: Intrusion detection: a survey. In: 2008 Third International Conference on Systems and Networks Communications, pp. 23\u201326. IEEE (2008)","DOI":"10.1109\/ICSNC.2008.44"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Sillito, R.R., Fisher, R.B.: Semi-supervised learning for anomalous trajectory detection. In: BMVC, vol. 1, pp. 035\u20131 (2008)","DOI":"10.5244\/C.22.103"},{"issue":"6","key":"29_CR29","first-page":"1825","volume":"5","author":"H Tang","year":"2009","unstructured":"Tang, H., Cao, Z.: Machine learning-based intrusion detection algorithms. J. Comput. Inf. Syst. 5(6), 1825\u20131831 (2009)","journal-title":"J. Comput. Inf. Syst."},{"issue":"3","key":"29_CR30","doi-asserted-by":"publisher","first-page":"5605","DOI":"10.1016\/j.eswa.2008.06.138","volume":"36","author":"SY Wu","year":"2009","unstructured":"Wu, S.Y., Yen, E.: Data mining-based intrusion detectors. Expert Syst. Appl. 36(3), 5605\u20135612 (2009)","journal-title":"Expert Syst. Appl."},{"key":"29_CR31","unstructured":"Zhang, J., et al.: Viral pneumonia screening on chest X-ray images using confidence-aware anomaly detection (2020)"},{"key":"29_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, Y.L., et al.: POSTER: a PU learning based system for potential malicious URL detection. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2599\u20132601 (2017)","DOI":"10.1145\/3133956.3138825"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Y.L., Li, L., Zhou, J., Li, X., Zhou, Z.H.: Anomaly detection with partially observed anomalies. In: Companion Proceedings of the Web Conference 2018, pp. 639\u2013646 (2018)","DOI":"10.1145\/3184558.3186580"},{"key":"29_CR34","doi-asserted-by":"publisher","first-page":"3694","DOI":"10.1109\/TCSVT.2020.3039798","volume":"31","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Nie, X., He, R., Chen, M., Yin, Y.: Normality learning in multispace for video anomaly detection. IEEE Trans. Circuits Syst. Video Technol. 31, 3694\u20133706 (2020)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"29_CR35","unstructured":"Zhu, X.J.: Semi-supervised learning literature survey. Technical report, University of Wisconsin-Madison Department of Computer Sciences (2005)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93049-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:12:59Z","timestamp":1726409579000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93049-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030930486","9783030930493"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93049-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"1 January 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CICAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"CAAI International Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cicai2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cicai.caai.cn\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"307","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"105","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}