{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:43:32Z","timestamp":1772905412338,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819980727","type":"print"},{"value":"9789819980734","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8073-4_14","type":"book-chapter","created":{"date-parts":[[2023,11,14]],"date-time":"2023-11-14T08:02:54Z","timestamp":1699948974000},"page":"175-187","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Spiking Reinforcement Learning for\u00a0Weakly-Supervised Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Ao","family":"Jin","sequence":"first","affiliation":[]},{"given":"Zhichao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Qianchen","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,15]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-47578-3_1","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal, C.C.: An Introduction to Outlier Analysis. In: Outlier Analysis, pp. 1\u201334. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-47578-3_1"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Asrori, S.S., Wang, L., Ozawa, S.: Permissioned blockchain-based XGBoost for multi banks fraud detection. In: Tanveer, M., Agarwal, S., Ozawa, S., Ekbal, A., Jatowt, A. (eds.) Neural Information Processing: 29th International Conference, ICONIP 2022, Virtual Event, 22\u201326 November 2022, Proceedings, Part III. LNCS, vol. 13625, pp. 683\u2013692. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30111-7_57","DOI":"10.1007\/978-3-031-30111-7_57"},{"issue":"1","key":"14_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1109\/SURV.2013.052213.00046","volume":"16","author":"MH Bhuyan","year":"2013","unstructured":"Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16(1), 303\u2013336 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Burkitt, A.N.: A review of the integrate-and-fire neuron model: I. homogeneous synaptic input. Biol. Cybern. 95, 1\u201319 (2006)","DOI":"10.1007\/s00422-006-0068-6"},{"key":"14_CR6","first-page":"6090","volume":"35","author":"J Ding","year":"2022","unstructured":"Ding, J., et al.: Biologically inspired dynamic thresholds for spiking neural networks. Adv. Neural. Inf. Process. Syst. 35, 6090\u20136103 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"6","key":"14_CR7","doi-asserted-by":"publisher","first-page":"e1002092","DOI":"10.1371\/journal.pcbi.1002092","volume":"7","author":"J Friedrich","year":"2011","unstructured":"Friedrich, J., Urbanczik, R., Senn, W.: Spatio-temporal credit assignment in neuronal population learning. PLoS Comput. Biol. 7(6), e1002092 (2011)","journal-title":"PLoS Comput. Biol."},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Gerstner, W., Kistler, W.M., Naud, R., Paninski, L.: Neuronal Dynamics: From Single Neurons to Networks and Models of Cognition. Cambridge University Press, Cambridge (2014)","DOI":"10.1017\/CBO9781107447615"},{"key":"14_CR9","first-page":"32142","volume":"35","author":"S Han","year":"2022","unstructured":"Han, S., Hu, X., Huang, H., Jiang, M., Zhao, Y.: ADBench: anomaly detection benchmark. Adv. Neural. Inf. Process. Syst. 35, 32142\u201332159 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Hessel, M., et al.: Rainbow: combining improvements in deep reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32 (2018)","DOI":"10.1609\/aaai.v32i1.11796"},{"key":"14_CR11","first-page":"6391750","volume":"2022","author":"L Hu","year":"2022","unstructured":"Hu, L., Liu, Y., Qiu, W.: A deep spiking neural network anomaly detection method. Comput. Intell. Neurosci. CIN 2022, 6391750 (2022)","journal-title":"Comput. Intell. Neurosci. CIN"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: An introduction to reinforcement learning. In: The Biology and Technology of Intelligent Autonomous Agents, pp. 90\u2013127 (1995)","DOI":"10.1007\/978-3-642-79629-6_5"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Kim, Y., Li, Y., Park, H., Venkatesha, Y., Panda, P.: Neural architecture search for spiking neural networks. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) Computer Vision-ECCV 2022: 17th European Conference, Tel Aviv, Israel, 23\u201327 October 2022, Proceedings, Part XXIV. LNCS, vol. 13684, pp. 36\u201356. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20053-3_3","DOI":"10.1007\/978-3-031-20053-3_3"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Kozma, R., Pino, R.E., Pazienza, G.E.: Advances in Neuromorphic Memristor Science and Applications, vol. 4. Springer, Cham (2012). https:\/\/doi.org\/10.1007\/978-94-007-4491-2","DOI":"10.1007\/978-94-007-4491-2"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Lavin, A., Ahmad, S.: Evaluating real-time anomaly detection algorithms-the Numenta anomaly benchmark. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 38\u201344. IEEE (2015)","DOI":"10.1109\/ICMLA.2015.141"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhao, Y., Botta, N., Ionescu, C., Hu, X.: COPOD: copula-based outlier detection. In: 2020 IEEE International Conference on Data Mining (ICDM), pp. 1118\u20131123. IEEE (2020)","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"7540","key":"14_CR18","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529\u2013533 (2015)","journal-title":"Nature"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Pang, G., Cao, L., Chen, L., Liu, H.: Learning representations of ultrahigh-dimensional data for random distance-based outlier detection. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 2041\u20132050 (2018)","DOI":"10.1145\/3219819.3220042"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Pang, G., van den Hengel, A., Shen, C., Cao, L.: Toward deep supervised anomaly detection: reinforcement learning from partially labeled anomaly data. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 1298\u20131308 (2021)","DOI":"10.1145\/3447548.3467417"},{"issue":"2","key":"14_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., van den Hengel, A.: Deep anomaly detection with deviation networks. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 353\u2013362 (2019)","DOI":"10.1145\/3292500.3330871"},{"key":"14_CR23","unstructured":"Ruff, L., et al.: Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694 (2019)"},{"key":"14_CR24","unstructured":"Savinov, N., et al.: Episodic curiosity through reachability. arXiv preprint arXiv:1810.02274 (2018)"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Tamersoy, A., Roundy, K., Chau, D.H.: Guilt by association: large scale malware detection by mining file-relation graphs. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1524\u20131533 (2014)","DOI":"10.1145\/2623330.2623342"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Tang, G., Shah, A., Michmizos, K.P.: Spiking neural network on neuromorphic hardware for energy-efficient unidimensional SLAM. In: 2019 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), pp. 4176\u20134181. IEEE (2019)","DOI":"10.1109\/IROS40897.2019.8967864"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Ukil, A., Bandyoapdhyay, S., Puri, C., Pal, A.: IoT healthcare analytics: the importance of anomaly detection. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 994\u2013997. IEEE (2016)","DOI":"10.1109\/AINA.2016.158"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Van Hasselt, H., Guez, A., Silver, D.: Deep reinforcement learning with double Q-learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 30 (2016)","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Xu, H., Pang, G., Wang, Y., Wang, Y.: Deep isolation forest for anomaly detection. IEEE Trans. Knowl. Data Eng. 1\u201314 (2023). https:\/\/doi.org\/10.1109\/TKDE.2023.3270293","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"14_CR30","unstructured":"Xu, H., Wang, Y., Wei, J., Jian, S., Li, Y., Liu, N.: Fascinating supervisory signals and where to find them: deep anomaly detection with scale learning. In: Proceedings of the International Conference on Machine Learning (2023)"},{"key":"14_CR31","unstructured":"Yoon, J., Sohn, K., Li, C.L., Arik, S.O., Lee, C.Y., Pfister, T.: Self-trained one-class classification for unsupervised anomaly detection. arXiv e-prints pp. arXiv-2106 (2021)"},{"key":"14_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, D., Zhang, T., Jia, S., Xu, B.: Multi-scale dynamic coding improved spiking actor network for reinforcement learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 59\u201367 (2022)","DOI":"10.1609\/aaai.v36i1.19879"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, H., et al.: In the blink of an eye: event-based emotion recognition. In: ACM SIGGRAPH 2023 Conference Proceedings, pp. 1\u201311 (2023)","DOI":"10.1145\/3588432.3591511"},{"key":"14_CR34","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Spiking transformers for event-based single object tracking. In: Proceedings of the IEEE\/CVF conference on Computer Vision and Pattern Recognition, pp. 8801\u20138810 (2022)","DOI":"10.1109\/CVPR52688.2022.00860"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Frame-event alignment and fusion network for high frame rate tracking. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9781\u20139790, June 2023","DOI":"10.1109\/CVPR52729.2023.00943"},{"issue":"6","key":"14_CR36","doi-asserted-by":"publisher","first-page":"2454","DOI":"10.1109\/TNNLS.2021.3086137","volume":"33","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Song, X., Zhang, Y., Liu, F., Zhu, C., Liu, L.: Feature encoding with autoencoders for weakly supervised anomaly detection. IEEE Trans. Neural Networks Learn. Syst. 33(6), 2454\u20132465 (2021)","journal-title":"IEEE Trans. Neural Networks Learn. Syst."}],"container-title":["Lecture Notes in Computer Science","Neural Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8073-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T18:37:26Z","timestamp":1710355046000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8073-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"ISBN":["9789819980727","9789819980734"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8073-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"15 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICONIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Neural Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changsha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconip2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iconip2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1274","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"650","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.14","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.46","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}