{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:11:24Z","timestamp":1765357884893,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032061287","type":"print"},{"value":"9783032061294","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06129-4_7","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T04:53:16Z","timestamp":1759294396000},"page":"111-128","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Risk-Based Thresholding for\u00a0Reliable Anomaly Detection in\u00a0Concentrated Solar Power Plants"],"prefix":"10.1007","author":[{"given":"Yorick","family":"Estievenart","sequence":"first","affiliation":[]},{"given":"Sukanya","family":"Patra","sequence":"additional","affiliation":[]},{"given":"Souhaib","family":"Ben Taieb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Abdalla, M., Javed, S., Radi, M.A., Ulhaq, A., Werghi, N.: Video anomaly detection in 10 years: a survey and outlook. arXiv preprint arXiv:2405.19387 (2024)","DOI":"10.1007\/s00521-025-11659-8"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Akcay, S., Ameln, D., Vaidya, A., Lakshmanan, B., Ahuja, N., Genc, U.: Anomalib: a deep learning library for anomaly detection. In: 2022 IEEE International Conference on Image Processing (ICIP), pp. 1706\u20131710. IEEE (2022)","DOI":"10.1109\/ICIP46576.2022.9897283"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Angelopoulos, A.N., Bates, S.: Conformal prediction: A gentle introduction. Found. Trends\u00ae Mach. Learn. 16(4), 494\u2013591 (2023)","DOI":"10.1561\/2200000101"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Angelopoulos, A.N., Bates, S., Cand\u00e8s, E.J., Jordan, M.I., Lei, L.: Learn then test: Calibrating predictive algorithms to achieve risk control. Annals Appl. Stat. 19(2), 1641\u20131662 (2025). https:\/\/doi.org\/10.1214\/24-AOAS1998","DOI":"10.1214\/24-AOAS1998"},{"key":"7_CR5","unstructured":"Angelopoulos, A.N., Bates, S., Fisch, A., Lei, L., Schuster, T.: Conformal risk control. arXiv [stat.ME] (Aug 2022)"},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3478535","volume":"68","author":"S Bates","year":"2021","unstructured":"Bates, S., Angelopoulos, A., Lei, L., Malik, J., Jordan, M.: Distribution-free, risk-controlling prediction sets. J. ACM (JACM) 68(6), 1\u201334 (2021)","journal-title":"J. ACM (JACM)"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1214\/22-AOS2244","volume":"51","author":"S Bates","year":"2023","unstructured":"Bates, S., Cand\u00e8s, E., Lei, L., Romano, Y., Sesia, M.: Testing for outliers with conformal p-values. Ann. Stat. 51(1), 149\u2013178 (2023)","journal-title":"Ann. Stat."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Batzner, K., Heckler, L., K\u00f6nig, R.: EfficientAD: accurate visual anomaly detection at millisecond-level latencies. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV), pp. 128\u2013138 (1 2024)","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"7_CR9","unstructured":"Bertasius, G., Wang, H., Torresani, L.: Is space-time attention all you need for video understanding? 2(3), 4 (2021)"},{"key":"7_CR10","unstructured":"Bouman, R., Heskes, T.: Autoencoders for anomaly detection are unreliable. arXiv [cs.LG] (Jan 2025)"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1007\/s10462-022-10258-6","volume":"56","author":"S Chandrakala","year":"2023","unstructured":"Chandrakala, S., Deepak, K., Revathy, G.: Anomaly detection in surveillance videos: a thematic taxonomy of deep models, review and performance analysis. Artif. Intell. Rev. 56(4), 3319\u20133368 (2023)","journal-title":"Artif. Intell. Rev."},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11760-020-01740-1","volume":"15","author":"K Deepak","year":"2021","unstructured":"Deepak, K., Chandrakala, S., Mohan, C.K.: Residual spatiotemporal autoencoder for unsupervised video anomaly detection. SIViP 15(1), 215\u2013222 (2021)","journal-title":"SIViP"},{"key":"7_CR13","unstructured":"Dheur, V., Fontana, M., Estievenart, Y., Desobry, N., Taieb, S.B.: A unified comparative study with generalized conformity scores for multi-output conformal regression. arXiv [stat.ML] (Jan 2025)"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Gudovskiy, D., Ishizaka, S., Kozuka, K.: CFLOW-AD: real-time unsupervised anomaly detection with localization via conditional normalizing flows. In: Proceedings - 2022 IEEE\/CVF Winter Conference on Applications of Computer Vision, WACV 2022, pp. 1819\u20131828 (7 2021). https:\/\/doi.org\/10.1109\/WACV51458.2022.00188","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"7_CR16","unstructured":"Kingma, D.P., Dhariwal, P.: Glow: Generative flow with invertible 1x1 convolutions. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"7_CR17","unstructured":"Kubat, M., Matwin, S.: Addressing the curse of imbalanced training sets: one-sided selection. In: Proceedings of the 14th International Conference on Machine Learning, pp. 179\u2013186 (1997)"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"3240","DOI":"10.1007\/s10489-022-03613-1","volume":"53","author":"VT Le","year":"2023","unstructured":"Le, V.T., Kim, Y.G.: Attention-based residual autoencoder for video anomaly detection. Appl. Intell. 53(3), 3240\u20133254 (2023)","journal-title":"Appl. Intell."},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Lee, S., Lee, S., Song, B.C.: CFA: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10, 78446\u201378454 (6 2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3193699","DOI":"10.1109\/ACCESS.2022.3193699"},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","volume":"21","author":"J Liu","year":"2024","unstructured":"Liu, J., et al.: Deep industrial image anomaly detection: a survey. Mach. Intell. Res. 21(1), 104\u2013135 (2024)","journal-title":"Mach. Intell. Res."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Lu, Y., Huang, B.: Structured output learning with conditional generative flows. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a034, pp. 5005\u20135012 (2020)","DOI":"10.1609\/aaai.v34i04.5940"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1613\/jair.1.14849","volume":"79","author":"A Moore","year":"2024","unstructured":"Moore, A., Morelli, D.: ConDENSE: conditional density estimation for time series anomaly detection. J. Artif. Intell. Res. 79, 801\u2013824 (2024)","journal-title":"J. Artif. Intell. Res."},{"key":"7_CR23","unstructured":"Novello, P., Dalmau, J., And\u00e9ol, L.: Exploring the link between out-of-distribution detection and conformal prediction with illustrations of its benefits (2025)"},{"key":"7_CR24","doi-asserted-by":"publisher","unstructured":"Patra, S., Sournac, N., Taieb, S.B.: Detecting abnormal operations in concentrated solar power plants from irregular sequences of thermal images. In: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 5578\u20135589. KDD \u201924, Association for Computing Machinery, New York, NY, USA (2024https:\/\/doi.org\/10.1145\/3637528.3671623","DOI":"10.1145\/3637528.3671623"},{"key":"7_CR25","unstructured":"Patra, S., Taieb, S.B.: Revisiting deep feature reconstruction for logical and structural industrial anomaly detection. Transactions on Machine Learning Research (2024)"},{"key":"7_CR26","unstructured":"Perini, L., B\u00fcrkner, P.C., Klami, A.: Estimating the contamination factor\u2019s distribution in unsupervised anomaly detection, pp. 27668\u201327679 (2023)"},{"key":"7_CR27","first-page":"69673","volume":"36","author":"L Perini","year":"2023","unstructured":"Perini, L., Davis, J.: Unsupervised anomaly detection with rejection. Adv. Neural. Inf. Process. Syst. 36, 69673\u201369691 (2023)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Perini, L., Vercruyssen, V., Davis, J.: Quantifying the confidence of anomaly detectors in their example-wise predictions. In: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 227\u2013243. Springer (2020)","DOI":"10.1007\/978-3-030-67664-3_14"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Perini, L., Vercruyssen, V., Davis, J.: Transferring the contamination factor between anomaly detection domains by shape similarity. In: Proceedings of the AAAI Conference on Artificial Intelligence 36(4), 4128\u20134136 (6 2022). https:\/\/doi.org\/10.1609\/AAAI.V36I4.20331, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/view\/20331","DOI":"10.1609\/AAAI.V36I4.20331"},{"key":"7_CR30","unstructured":"Rezende, D., Mohamed, S.: Variational inference with normalizing flows. In: International Conference on Machine Learning, pp. 1530\u20131538. PMLR (2015)"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"issue":"5","key":"7_CR32","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JPROC.2021.3052449","volume":"109","author":"L Ruff","year":"2021","unstructured":"Ruff, L., et al.: A unifying review of deep and shallow anomaly detection. Proc. IEEE 109(5), 756\u2013795 (2021)","journal-title":"Proc. IEEE"},{"key":"7_CR33","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR (2018)"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Sudhakaran, S., Lanz, O.: Learning to detect violent videos using convolutional long short-term memory. In: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"Tax, D.M., Duin, R.P.: Support vector domain description. Pattern Recogn. Lett. 20(11-13), 1191\u20131199 (11 1999). https:\/\/doi.org\/10.1016\/S0167-8655(99)00087-2","DOI":"10.1016\/S0167-8655(99)00087-2"},{"key":"7_CR36","volume-title":"Algorithmic Learning In A Random World","author":"V Vovk","year":"2005","unstructured":"Vovk, V., Gammerman, A., Shafer, G.: Algorithmic Learning In A Random World, 2005th edn. Springer, New York, NY (2005)","edition":"2005"},{"key":"7_CR37","doi-asserted-by":"publisher","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: DR\u00c6M - A discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 8310\u20138319 (8 2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00822","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Zhang, J., Suganuma, M., Okatani, T.: Contextual affinity distillation for image anomaly detection, pp. 149\u2013158 (2024)","DOI":"10.1109\/WACV57701.2024.00022"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track and Demo Track"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06129-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T04:53:25Z","timestamp":1759294405000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06129-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032061287","9783032061294"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06129-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecmlpkdd.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}