{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:20:49Z","timestamp":1743078049977,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_23","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"417-437","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for\u00a0Superior Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Hongyi","family":"Peng","sequence":"first","affiliation":[]},{"given":"Vinay","family":"Sachidananda","sequence":"additional","affiliation":[]},{"given":"Teng Joon","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Rajendra","family":"Patil","sequence":"additional","affiliation":[]},{"given":"Mingchang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Sivaanandh","family":"Muneeswaran","sequence":"additional","affiliation":[]},{"given":"Mohan","family":"Gurusamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"23_CR1","unstructured":"Cse-cic-ids2018 datasets. https:\/\/www.unb.ca\/cic\/datasets\/ids-2018.html. Accessed 23 June 2021"},{"issue":"1","key":"23_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2830544.2830549","volume":"17","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal, C.C., Sathe, S.: Theoretical foundations and algorithms for outlier ensembles? ACM SIGKDD Explor. Newsl. 17(1), 24\u201347 (2015)","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-54765-7","volume-title":"Outlier Ensembles","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal, C.C., Sathe, S.: Outlier Ensembles, pp. 1\u201334. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54765-7"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Bandaragoda, T.R., Ting, K.M., Albrecht, D., Liu, F.T., Wells, J.R.: Efficient anomaly detection by isolation using nearest neighbour ensemble. In: Proceedings of IEEE International Conference on Data Mining Workshop (2014)","DOI":"10.1109\/ICDMW.2014.70"},{"issue":"8","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1798","DOI":"10.1109\/tpami.2013.50","volume":"35","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y., Courville, A., Vincent, P.: Representation learning: A review and new perspectives. IEEE Trans. Pattern Anal. Mach. Intell. 35(8), 1798\u20131828 (2013). https:\/\/doi.org\/10.1109\/tpami.2013.50","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Bow, S.T.: Multilayer perceptron. In: Pattern Recognition and Image Preprocessing, pp. 201\u2013224, November 2002","DOI":"10.1201\/9780203903896-9"},{"issue":"2","key":"23_CR7","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF00058655","volume":"24","author":"L Breiman","year":"1996","unstructured":"Breiman, L.: Machine learning. Bagging predictors 24(2), 123\u2013140 (1996). https:\/\/doi.org\/10.1007\/BF00058655","journal-title":"Bagging predictors"},{"issue":"2","key":"23_CR8","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF. ACM SIGMOD Rec. 29(2), 93\u2013104 (2000). https:\/\/doi.org\/10.1145\/335191.335388","journal-title":"ACM SIGMOD Rec."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Carlini, N., Wagner, D.: Adversarial examples are not easily detected: bypassing ten detection methods. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 3\u201314 (2017)","DOI":"10.1145\/3128572.3140444"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Chen, J., Sathe, S., Aggarwal, C., Turaga, D.: Outlier detection with autoencoder ensembles. In: Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 90\u201398, September 2017. https:\/\/doi.org\/10.1137\/1.9781611974973.11","DOI":"10.1137\/1.9781611974973.11"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Chen, T., Guestrin, C.: Xgboost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013794 (2016)","DOI":"10.1145\/2939672.2939785"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and ROC curves. In: Proceedings of the 23rd International Conference on Machine Learning, pp. 233\u2013240 (2006)","DOI":"10.1145\/1143844.1143874"},{"key":"23_CR13","unstructured":"Dua, D., Graff, C.: UCI Machine Learning Repository (2017)"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121\u2013134 (2016). https:\/\/doi.org\/10.1016\/j.patcog.2016.03.028","journal-title":"Pattern Recogn."},{"issue":"1","key":"23_CR15","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997). https:\/\/doi.org\/10.1006\/jcss.1997.1504","journal-title":"J. Comput. Syst. Sci."},{"key":"23_CR16","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm. KI-2012 Poster 59\u201363 (2012)"},{"key":"23_CR17","unstructured":"Guo, C., Gardner, J., You, Y., Wilson, A.G., Weinberger, K.: Simple black-box adversarial attacks. In: International Conference on Machine Learning, pp. 2484\u20132493 (2019)"},{"issue":"4","key":"23_CR18","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1016\/S0167-9473(02)00280-3","volume":"44","author":"J Hardin","year":"2004","unstructured":"Hardin, J., Rocke, D.M.: Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator. Comput. Stat. Data Anal. 44(4), 625\u2013638 (2004)","journal-title":"Comput. Stat. Data Anal."},{"key":"23_CR19","unstructured":"Ke, G., et al.: Lightgbm: a highly efficient gradient boosting decision tree. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"23_CR20","first-page":"231","volume":"7","author":"A Krogh","year":"1994","unstructured":"Krogh, A., Vedelsby, J.: Neural network ensembles, cross validation, and active learning. Adv. Neural. Inf. Process. Syst. 7, 231\u2013238 (1994)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"5","key":"23_CR21","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1016\/S0167-4048(02)00514-X","volume":"21","author":"Y Liao","year":"2002","unstructured":"Liao, Y., Vemuri, V.: Use of k-nearest neighbor classifier for intrusion detection. Comput. Secur. 21(5), 439\u2013448 (2002)","journal-title":"Comput. Secur."},{"key":"23_CR22","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining (2008). https:\/\/doi.org\/10.1109\/icdm.2008.17","DOI":"10.1109\/icdm.2008.17"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: Self-supervised learning: generative or contrastive. IEEE Trans. Knowl. Data Eng. (2021)","DOI":"10.1109\/TKDE.2021.3090866"},{"key":"23_CR24","unstructured":"Micenkov\u00e1, B., McWilliams, B., Assent, I.: Learning outlier ensembles: the best of both worlds-supervised and unsupervised. In: Proceedings of the ACM SIGKDD 2014 Workshop on Outlier Detection and Description under Data Diversity (ODD2). New York, pp. 51\u201354. Citeseer (2014)"},{"key":"23_CR25","unstructured":"Micenkov\u00e1, B., McWilliams, B., Assent, I.: Learning representations for outlier detection on a budget. arXiv preprint arXiv:1507.08104 (2015)"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Mirsky, Y., Doitshman, T., Elovici, Y., Shabtai, A.: Kitsune: an ensemble of autoencoders for online network intrusion detection. arXiv:1802.09089 (2018)","DOI":"10.14722\/ndss.2018.23204"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS) (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"23_CR28","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR29","doi-asserted-by":"crossref","unstructured":"Rayana, S., Akoglu, L.: Less is more: Building selective anomaly ensembles with application to event detection in temporal graphs. In: Proceedings of the 2015 SIAM International Conference on Data Mining (2015)","DOI":"10.1137\/1.9781611974010.70"},{"key":"23_CR30","doi-asserted-by":"publisher","unstructured":"Sarvari, H., Domeniconi, C., Prenkaj, B., Stilo, G.: Unsupervised boosting-based autoencoder ensembles for outlier detection. In: PAKDD 2021. LNCS (LNAI), vol. 12712, pp. 91\u2013103. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-75762-5_8, https:\/\/arxiv.org\/pdf\/1910.09754v1.pdf","DOI":"10.1007\/978-3-030-75762-5_8"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Sathe, S., Aggarwal, C.: Lodes: Local density meets spectral outlier detection. In: Proceedings of the 2016 SIAM International Conference on Data Mining (2016)","DOI":"10.1137\/1.9781611974348.20"},{"key":"23_CR32","unstructured":"Shyu, M.L., Chen, S.C., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. Miami Univ. Dept. of Electrical and Computer Engineering, Technical report (2003)"},{"key":"23_CR33","unstructured":"Szegedy, C., et al.: Intriguing properties of neural networks. arXiv:1312.6199 (2013)"},{"key":"23_CR34","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert, D.H.: Stacked generalization. Neural Netw. 5, 241\u2013259 (1992)","journal-title":"Neural Netw."},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Hryniewicki, M.K.: XGBOD: improving supervised outlier detection with unsupervised representation learning. In: 2018 International Joint Conference on Neural Networks (2018)","DOI":"10.1109\/IJCNN.2018.8489605"},{"issue":"96","key":"23_CR36","first-page":"1","volume":"20","author":"Y Zhao","year":"2019","unstructured":"Zhao, Y., Nasrullah, Z., Li, Z.: PyOD: a python toolbox for scalable outlier detection. J. Mach. Learn. Res. 20(96), 1\u20137 (2019)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Zhou, Z.H.: Ensemble Methods: Foundations and Algorithms. CRC Press, Boca Raton (2012)","DOI":"10.1201\/b12207"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:08:39Z","timestamp":1709831319000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}