{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:15:23Z","timestamp":1769555723785,"version":"3.49.0"},"reference-count":80,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100007655","name":"\u010cesk\u00e9 Vysok\u00e9 U\u010den\u00ed Technick\u00e9 v Praze","doi-asserted-by":"publisher","award":["SGS21\/165\/OHK4\/3T\/14"],"award-info":[{"award-number":["SGS21\/165\/OHK4\/3T\/14"]}],"id":[{"id":"10.13039\/100007655","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001823","name":"Ministerstvo \u0160kolstv\u00ed, Ml\u00e1de\u017ee a T\u011blov\u00fdchovy","doi-asserted-by":"publisher","award":["CZ.02.1.01\/0.0\/0.0\/16_019\/0000765"],"award-info":[{"award-number":["CZ.02.1.01\/0.0\/0.0\/16_019\/0000765"]}],"id":[{"id":"10.13039\/501100001823","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s00521-024-10291-2","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:02:12Z","timestamp":1725454932000},"page":"21561-21580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly detection in multifactor data"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4165-7124","authenticated-orcid":false,"given":"V\u00edt","family":"\u0160kv\u00e1ra","sequence":"first","affiliation":[]},{"given":"V\u00e1clav","family":"\u0160m\u00eddl","sequence":"additional","affiliation":[]},{"given":"Tom\u00e1\u0161","family":"Pevn\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"issue":"3","key":"10291_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"12","key":"10291_CR2","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448\u20133470","journal-title":"Comput Netw"},{"key":"10291_CR3","doi-asserted-by":"crossref","unstructured":"Vanerio J, Casas P (2017) Ensemble-learning approaches for network security and anomaly detection. In: proceedings of the workshop on big data analytics and machine learning for data communication networks; p 1\u20136","DOI":"10.1145\/3098593.3098594"},{"key":"10291_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) F-AnoGAN: fast unsupervised anomaly detection with generative adversarial networks. Med Image Anal 54:30\u201344","journal-title":"Med Image Anal"},{"issue":"10","key":"10291_CR5","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou JT, Du J, Zhu H, Peng X, Liu Y, Goh RSM (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensics Secur 14(10):2537\u20132550","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"10291_CR6","doi-asserted-by":"publisher","DOI":"10.1115\/1.4042108","volume":"141","author":"M Mahmoudi","year":"2019","unstructured":"Mahmoudi M, Ezzat AA, Elwany A (2019) Layerwise anomaly detection in laser powder-bed fusion metal additive manufacturing. J Manuf Sci Eng 141(3):031002","journal-title":"J Manuf Sci Eng"},{"key":"10291_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.applthermaleng.2019.114664","volume":"166","author":"M Bai","year":"2020","unstructured":"Bai M, Liu J, Chai J, Zhao X, Yu D (2020) Anomaly detection of gas turbines based on normal pattern extraction. Appl Therm Eng 166:114664","journal-title":"Appl Therm Eng"},{"key":"10291_CR8","doi-asserted-by":"crossref","unstructured":"Choi Y, Lim H, Choi H, Kim IJ (2020) GAN-based anomaly detection and localization of multivariate time series data for power plant. In: IEEE international conference on big data and smart computing (BigComp). IEEE 2020, 71\u201374","DOI":"10.1109\/BigComp48618.2020.00-97"},{"key":"10291_CR9","unstructured":"Knorr EM, Ng RT (1998) Algorithms for mining distance-based outliers in large datasets. In: Gupta A, Shmueli O, Widom J, editors. VLDB\u201998, proceedings of 24rd international conference on very large data bases, August 24-27, 1998, New York City, New York, USA. Morgan Kaufmann; p 392\u2013403. Available from: http:\/\/www.vldb.org\/conf\/1998\/p392.pdf"},{"issue":"2","key":"10291_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge V, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22(2):85\u2013126","journal-title":"Artif Intell Rev"},{"key":"10291_CR11","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MA Pimentel","year":"2014","unstructured":"Pimentel MA, Clifton DA, Clifton L, Tarassenko L (2014) A review of novelty detection. Signal Process 99:215\u2013249","journal-title":"Signal Process"},{"key":"10291_CR12","unstructured":"Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui SA, Binder A, et\u00a0al (2018) Deep one-class classification. In: international conference on machine learning; p 4393\u20134402"},{"key":"10291_CR13","unstructured":"Liang S, Li Y, Srikant R (2017) Enhancing the reliability of out-of-distribution image detection in neural networks. http:\/\/arxiv.org\/abs\/1706.02690"},{"issue":"6","key":"10291_CR14","doi-asserted-by":"publisher","first-page":"2494","DOI":"10.1109\/TNNLS.2021.3116269","volume":"33","author":"V \u0160kv\u00e1ra","year":"2021","unstructured":"\u0160kv\u00e1ra V, Franc\u00f8u J, Zorek M, Pevn\u00fd T, \u0160m\u00eddl V (2021) Comparison of anomaly detectors: context matters. IEEE Trans Neural Netw Learn Syst 33(6):2494\u20132507","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"7","key":"10291_CR15","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443\u20131471","journal-title":"Neural Comput"},{"key":"10291_CR16","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 Eighth IEEE international conference on data mining. IEEE; p 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"issue":"2","key":"10291_CR17","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u00fd","year":"2016","unstructured":"Pevn\u00fd T (2016) Loda: lightweight on-line detector of anomalies. Mach Learn 102(2):275\u2013304","journal-title":"Mach Learn"},{"key":"10291_CR18","first-page":"622","volume-title":"Asian Conf Comput Vision","author":"S Akcay","year":"2018","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2018) Ganomaly: semi-supervised anomaly detection via adversarial training. Asian Conf Comput Vision. Springer, Cham, pp 622\u2013637"},{"key":"10291_CR19","doi-asserted-by":"crossref","unstructured":"Perera P, Nallapati R, Xiang B. Ocgan (2019) One-class novelty detection using gans with constrained latent representations. In: proceedings of the IEEE conference on computer vision and pattern recognition; p 2898\u20132906","DOI":"10.1109\/CVPR.2019.00301"},{"key":"10291_CR20","unstructured":"Ruff L, Vandermeulen RA, G\u00f6rnitz N, Binder A, M\u00fcller E, M\u00fcller KR, et\u00a0al (2019) Deep semi-supervised anomaly detection. http:\/\/arxiv.org\/abs\/1906.02694"},{"key":"10291_CR21","doi-asserted-by":"crossref","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj D (2021) Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: proceedings of the IEEE\/CVF international conference on computer vision; p 8330\u20138339","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"10291_CR22","first-page":"3154","volume":"34","author":"F Ahmed","year":"2020","unstructured":"Ahmed F, Courville A (2020) Detecting semantic anomalies. Proc AAAI Conf Artif Intell 34:3154\u20133162","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"10291_CR23","unstructured":"Ahmed F, Bengio Y, Van\u00a0Seijen H, Courville A (2021) Systematic generalisation with group invariant predictions. In: international conference on learning representations"},{"key":"10291_CR24","doi-asserted-by":"crossref","unstructured":"Raz O, Koopman P, Shaw M (2002) Semantic anomaly detection in online data sources. In: proceedings of the 24th international conference on software engineering; p 302\u2013312","DOI":"10.1145\/581376.581378"},{"key":"10291_CR25","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/978-3-642-01307-2_86","volume-title":"Pacific-Asia Conf Knowl Discov Data Min","author":"HP Kriegel","year":"2009","unstructured":"Kriegel HP, Kr\u00f6ger P, Schubert E, Zimek A (2009) Outlier detection in axis-parallel subspaces of high dimensional data. Pacific-Asia Conf Knowl Discov Data Min. Springer, Cham, pp 831\u2013838"},{"issue":"6","key":"10291_CR26","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.1109\/TSP.2016.2645515","volume":"65","author":"M Rahmani","year":"2016","unstructured":"Rahmani M, Atia GK (2016) Randomized robust subspace recovery and outlier detection for high dimensional data matrices. IEEE Trans Signal Process 65(6):1580\u20131594","journal-title":"IEEE Trans Signal Process"},{"key":"10291_CR27","unstructured":"Burgess CP, Higgins I, Pal A, Matthey L, Watters N, Desjardins G, et\u00a0al (2018) Understanding disentangling in beta-VAE. http:\/\/arxiv.org\/abs\/1804.03599"},{"key":"10291_CR28","unstructured":"Kim H, Mnih A (2018) Disentangling by factorising. In: international conference on machine learning. PMLR; p 2649\u20132658"},{"key":"10291_CR29","unstructured":"Esmaeili B, Wu H, Jain S, Bozkurt A, Siddharth N, Paige B, et\u00a0al (2019) Structured disentangled representations. In: The 22nd international conference on artificial intelligence and statistics. PMLR; . p 2525\u20132534"},{"key":"10291_CR30","unstructured":"Tschannen M, Bachem O, Lucic M (2018) Recent advances in autoencoder-based representation learning. http:\/\/arxiv.org\/abs\/1812.05069"},{"key":"10291_CR31","first-page":"10105","volume":"34","author":"J Bai","year":"2021","unstructured":"Bai J, Wang W, Gomes CP (2021) Contrastively disentangled sequential variational autoencoder. Adv Neural Inf Process Syst 34:10105\u201310118","journal-title":"Adv Neural Inf Process Syst"},{"key":"10291_CR32","doi-asserted-by":"crossref","unstructured":"Kim M, Wang Y, Sahu P, Pavlovic V (2019) Bayes-factor-vae: Hierarchical bayesian deep auto-encoder models for factor disentanglement. In: proceedings of the IEEE\/CVF international conference on computer vision; p 2979\u20132987","DOI":"10.1109\/ICCV.2019.00307"},{"key":"10291_CR33","unstructured":"Deecke L, Ruff L, Vandermeulen RA, Bilen H (2021) Transfer-based semantic anomaly detection. In: international conference on machine learning. PMLR; p 2546\u20132558"},{"key":"10291_CR34","doi-asserted-by":"crossref","unstructured":"Micenkov\u00e1 B, Ng RT, Dang XH, Assent I (2013) Explaining outliers by subspace separability. In: 2013 IEEE 13th international conference on data mining. IEEE, pp 518\u2013527","DOI":"10.1109\/ICDM.2013.132"},{"issue":"1","key":"10291_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3230666","volume":"13","author":"MA Siddiqui","year":"2019","unstructured":"Siddiqui MA, Fern A, Dietterich TG, Wong WK (2019) Sequential feature explanations for anomaly detection. ACM Trans Knowl Discov Data (TKDD) 13(1):1\u201322","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"10291_CR36","doi-asserted-by":"publisher","first-page":"11318113187","DOI":"10.1016\/j.eswa.2020.113187","volume":"149","author":"M Kopp","year":"2020","unstructured":"Kopp M, Pevn\u1ef3 T, Hole\u0148a M (2020) Anomaly explanation with random forests. Expert Syst Appl 149:11318113187","journal-title":"Expert Syst Appl"},{"issue":"7","key":"10291_CR37","doi-asserted-by":"publisher","first-page":"e0130140","DOI":"10.1371\/journal.pone.0130140","volume":"10","author":"S Bach","year":"2015","unstructured":"Bach S, Binder A, Montavon G, Klauschen F, M\u00fcller KR, Samek W (2015) On pixel-wise explanations for non-linear classifier decisions by layer-wise relevance propagation. PLoS ONE 10(7):e0130140","journal-title":"PLoS ONE"},{"key":"10291_CR38","doi-asserted-by":"crossref","unstructured":"Ribeiro MT, Singh S, Guestrin C (2016) \" Why should i trust you?\" Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining; p 1135\u20131144","DOI":"10.1145\/2939672.2939778"},{"key":"10291_CR39","doi-asserted-by":"crossref","unstructured":"Selvaraju RR, Cogswell M, Das A, Vedantam R, Parikh D, Batra D (2017) Grad-cam: Visual explanations from deep networks via gradient-based localization. In: Proceedings of the IEEE international conference on computer vision; pp 618\u2013626","DOI":"10.1109\/ICCV.2017.74"},{"key":"10291_CR40","unstructured":"Liznerski P, Ruff L, Vandermeulen RA, Franks BJ, Kloft M, M\u00fcller KR (2020) Explainable deep one-class classification. http:\/\/arxiv.org\/abs\/2007.01760"},{"key":"10291_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107198","volume":"101","author":"J Kauffmann","year":"2020","unstructured":"Kauffmann J, M\u00fcller KR, Montavon G (2020) Towards explaining anomalies: a deep Taylor decomposition of one-class models. Pattern Recogn 101:107198","journal-title":"Pattern Recogn"},{"issue":"6","key":"10291_CR42","doi-asserted-by":"publisher","first-page":"2410","DOI":"10.1007\/s10618-022-00868-7","volume":"36","author":"E Calikus","year":"2022","unstructured":"Calikus E, Nowaczyk S, Bouguelia MR, Dikmen O (2022) Wisdom of the contexts: active ensemble learning for contextual anomaly detection. Data Min Knowl Disc 36(6):2410\u20132458","journal-title":"Data Min Knowl Disc"},{"key":"10291_CR43","unstructured":"Hendrycks D, Mazeika M, Dietterich T (2018) Deep anomaly detection with outlier exposure. http:\/\/arxiv.org\/abs\/1812.04606"},{"key":"10291_CR44","unstructured":"Locatello F, Bauer S, Lucic M, Raetsch G, Gelly S, Sch\u00f6lkopf B, et\u00a0al (2019)Challenging common assumptions in the unsupervised learning of disentangled representations. In: International conference on machine learning. PMLR; pp 4114\u20134124"},{"key":"10291_CR45","unstructured":"Khemakhem I, Kingma D, Monti R, Hyvarinen A (2020) Variational autoencoders and nonlinear ICA: a unifying framework. In: International conference on artificial intelligence and statistics. PMLR; pp 2207\u20132217"},{"key":"10291_CR46","first-page":"9216","volume":"34","author":"A Gabbay","year":"2021","unstructured":"Gabbay A, Cohen N, Hoshen Y (2021) An image is worth more than a thousand words: towards disentanglement in the wild. Adv Neural Inf Process Syst 34:9216\u20139228","journal-title":"Adv Neural Inf Process Syst"},{"key":"10291_CR47","doi-asserted-by":"crossref","unstructured":"l Stammer W, Memmel M, Schramowski P, Kersting K (2022) Interactive disentanglement: learning concepts by interacting with their prototype representations. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition; pp 10317\u201310328","DOI":"10.1109\/CVPR52688.2022.01007"},{"key":"10291_CR48","unstructured":"Sauer A, Geiger A (2021) Counterfactual generative networks. http:\/\/arxiv.org\/abs\/2101.06046"},{"key":"10291_CR49","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, et\u00a0al (2014) Generative adversarial nets. In: Advances in neural information processing systems; pp 2672\u20132680"},{"key":"10291_CR50","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. http:\/\/arxiv.org\/abs\/1312.6114"},{"key":"10291_CR51","unstructured":"An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability. SNU Data Mining Center, Tech Rep"},{"key":"10291_CR52","doi-asserted-by":"crossref","unstructured":"Xu H, Chen W, Zhao N, Li Z, Bu J, Li Z, et\u00a0al (2018) Unsupervised anomaly detection via variational auto-encoder for seasonal KPIs in web applications. http:\/\/arxiv.org\/abs\/1802.03903","DOI":"10.1145\/3178876.3185996"},{"key":"10291_CR53","doi-asserted-by":"crossref","unstructured":"Nguyen QP, Lim KW, Divakaran DM, Low KH, Chan MC (2019) Gee: A gradient-based explainable variational autoencoder for network anomaly detection. In: 2019 IEEE conference on communications and network security (CNS). IEEE; pp 91\u201399","DOI":"10.1109\/CNS.2019.8802833"},{"key":"10291_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105187","volume":"190","author":"X Wang","year":"2020","unstructured":"Wang X, Du Y, Lin S, Cui P, Shen Y, Yang Y (2020) adVAE: a self-adversarial variational autoencoder with Gaussian anomaly prior knowledge for anomaly detection. Knowl-Based Syst 190:105187","journal-title":"Knowl-Based Syst"},{"issue":"2","key":"10291_CR55","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/s10618-020-00725-5","volume":"35","author":"Y Shaalan","year":"2021","unstructured":"Shaalan Y, Zhang X, Chan J, Salehi M (2021) Detecting singleton spams in reviews via learning deep anomalous temporal aspect-sentiment patterns. Data Min Knowl Disc 35(2):450\u2013504","journal-title":"Data Min Knowl Disc"},{"key":"10291_CR56","doi-asserted-by":"crossref","unstructured":"Kieu T, Yang B, Guo C, Cirstea RG, Zhao Y, Song Y, et\u00a0al (2022) Anomaly detection in time series with robust variational quasi-recurrent autoencoders. In: 2022 IEEE 38th international conference on data engineering (ICDE). IEEE; pp 1342\u20131354","DOI":"10.1109\/ICDE53745.2022.00105"},{"key":"10291_CR57","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International conference on information processing in medical imaging. Springer, pp 146\u2013157","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"10291_CR58","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh M, Nabi M, Sangineto E, Marcenaro L, Regazzoni C, Sebe N (2017) Abnormal event detection in videos using generative adversarial nets. In: 2017 IEEE International conference on image processing (ICIP). IEEE; pp 1577\u20131581","DOI":"10.1109\/ICIP.2017.8296547"},{"issue":"8","key":"10291_CR59","first-page":"1517","volume":"32","author":"Y Liu","year":"2019","unstructured":"Liu Y, Li Z, Zhou C, Jiang Y, Sun J, Wang M et al (2019) Generative adversarial active learning for unsupervised outlier detection. IEEE Trans Knowl Data Eng 32(8):1517\u20131528","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"10291_CR60","doi-asserted-by":"crossref","unstructured":"Zenati H, Romain M, Foo CS, Lecouat B, Chandrasekhar V (2018) Adversarially learned anomaly detection. In: 2018 IEEE International conference on data mining (ICDM). IEEE, pp 727\u2013736","DOI":"10.1109\/ICDM.2018.00088"},{"key":"10291_CR61","unstructured":"Pidhorskyi S, Almohsen R, Doretto G (2018) Generative probabilistic novelty detection with adversarial autoencoders. In: Advances in neural information processing systems; pp 6822\u20136833"},{"key":"10291_CR62","unstructured":"\u0160m\u00eddl V, B\u00edm J, Pevn\u00fd T (2019) Anomaly scores for generative models. http:\/\/arxiv.org\/abs\/1905.11890"},{"key":"10291_CR63","unstructured":"Choi J, Hwang G, Kang M (2020) Discond-VAE: disentangling continuous factors from the discrete. http:\/\/arxiv.org\/abs\/2009.08039"},{"key":"10291_CR64","unstructured":"LeCun Y, Cortes C, Burges C.: MNIST handwritten digit database. Florham Park, NJ, USA"},{"key":"10291_CR65","doi-asserted-by":"crossref","unstructured":"Cimpoi M, Maji S, Kokkinos I, Mohamed S, Vedaldi A (2014) Describing textures in the wild. In: Proceedings of the IEEE conference on computer vision and pattern recognition; pp 3606\u20133613","DOI":"10.1109\/CVPR.2014.461"},{"key":"10291_CR66","unstructured":"Larsen ABL, S\u00f8nderby SK, Larochelle H, Winther O (2016) Autoencoding beyond pixels using a learned similarity metric. In: International conference on machine learning. PMLR; pp 1558\u20131566"},{"key":"10291_CR67","unstructured":"Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training GANs. In: Advances in neural information processing systems; pp 2234\u20132242"},{"key":"10291_CR68","doi-asserted-by":"crossref","unstructured":"Johnson J, Alahi A, Fei-Fei L (2016) Perceptual losses for real-time style transfer and super-resolution. In: European conference on computer vision. Springer; pp 694\u2013711","DOI":"10.1007\/978-3-319-46475-6_43"},{"key":"10291_CR69","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"10291_CR70","unstructured":"Kingma DP, Ba J (2014) Adam: a method for stochastic optimization. http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"10291_CR71","unstructured":"Dai B, Wipf D (2019) Diagnosing and enhancing vae models. http:\/\/arxiv.org\/abs\/1903.05789"},{"key":"10291_CR72","doi-asserted-by":"crossref","unstructured":"Devroye LP, Wagner TJ (1977) The strong uniform consistency of nearest neighbor density estimates. The Annals of Statistics. pp 536\u2013540","DOI":"10.1214\/aos\/1176343851"},{"issue":"1","key":"10291_CR73","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/BF01589116","volume":"45","author":"DC Liu","year":"1989","unstructured":"Liu DC, Nocedal J (1989) On the limited memory BFGS method for large scale optimization. Math Progr 45(1):503\u2013528","journal-title":"Math Progr"},{"key":"10291_CR74","doi-asserted-by":"crossref","unstructured":"Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, et\u00a0al (2014) Microsoft COCO: Common objects in context. In: European conference on computer vision. Springer; pp 740\u2013755","DOI":"10.1007\/978-3-319-10602-1_48"},{"issue":"6","key":"10291_CR75","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/TPAMI.2017.2723009","volume":"40","author":"B Zhou","year":"2017","unstructured":"Zhou B, Lapedriza A, Khosla A, Oliva A, Torralba A (2017) Places: a 10 million image database for scene recognition. IEEE Trans Pattern Anal Mach Intell 40(6):1452\u20131464","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"10291_CR76","unstructured":"Netzer Y, Wang T, Coates A, Bissacco A, Wu B, Ng AY. Reading digits in natural images with unsupervised feature learning"},{"key":"10291_CR77","unstructured":"Chalapathy R, Menon AK, Chawla S (2018) Anomaly detection using one-class neural networks. http:\/\/arxiv.org\/abs\/1802.06360"},{"key":"10291_CR78","unstructured":"Krizhevsky A, Hinton G, et\u00a0al. Learning multiple layers of features from tiny images. Toronto, ON, Canada"},{"key":"10291_CR79","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2019) MVTec AD\u2013A comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition; pp 9592\u20139600","DOI":"10.1109\/CVPR.2019.00982"},{"issue":"Jan","key":"10291_CR80","first-page":"1","volume":"7","author":"J Dem\u0161ar","year":"2006","unstructured":"Dem\u0161ar J (2006) Statistical comparisons of classifiers over multiple data sets. J Mach Learn Res 7(Jan):1\u201330","journal-title":"J Mach Learn Res"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10291-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-024-10291-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-024-10291-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,23]],"date-time":"2024-11-23T09:08:51Z","timestamp":1732352931000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-024-10291-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":80,"journal-issue":{"issue":"34","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["10291"],"URL":"https:\/\/doi.org\/10.1007\/s00521-024-10291-2","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,4]]},"assertion":[{"value":"31 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this article have no conflict of interest to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}