{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T15:51:38Z","timestamp":1772207498336,"version":"3.50.1"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T00:00:00Z","timestamp":1658966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T00:00:00Z","timestamp":1658966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100013096","name":"State Grid Science and Technology Project","doi-asserted-by":"crossref","award":["No.5100-202123009A"],"award-info":[{"award-number":["No.5100-202123009A"]}],"id":[{"id":"10.13039\/501100013096","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special Project of Foshan Science and Technology Innovation Team","award":["No.FS0AA-KJ919-4402-0069"],"award-info":[{"award-number":["No.FS0AA-KJ919-4402-0069"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10489-022-03905-6","type":"journal-article","created":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T13:03:44Z","timestamp":1659013424000},"page":"8209-8231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Anomaly detection methods based on GAN: a survey"],"prefix":"10.1007","volume":"53","author":[{"given":"Haoyuan","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9243-0264","authenticated-orcid":false,"given":"Yifan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,28]]},"reference":[{"key":"3905_CR1","doi-asserted-by":"publisher","unstructured":"Huo W, Wang W, Li W (2019) AnomalyDetect: An online distance-based anomaly detection algorithm. In: Miller J, Stroulia E, Lee K, Zhang L-J (eds) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer International Publishing, Cham, pp 63\u201379. https:\/\/doi.org\/10.1007\/978-3-030-23499-7_5","DOI":"10.1007\/978-3-030-23499-7_5"},{"issue":"1","key":"3905_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc5010001","volume":"5","author":"O Alghushairy","year":"2020","unstructured":"Alghushairy O, Alsini R, Soule T, Ma X (2020) A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn Comput 5(1):1. https:\/\/doi.org\/10.3390\/bdcc5010001","journal-title":"Big Data Cogn Comput"},{"issue":"7","key":"3905_CR3","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.3390\/electronics9071164","volume":"9","author":"J Henriques","year":"2020","unstructured":"Henriques J, Caldeira F, Cruz T, Sim\u00f5es P. (2020) Combining k-means and xgboost models for anomaly detection using log datasets. Electronics 9(7):1164. https:\/\/doi.org\/10.3390\/electronics9071164","journal-title":"Electronics"},{"issue":"1","key":"3905_CR4","doi-asserted-by":"publisher","first-page":"e235","DOI":"10.1002\/itl2.235","volume":"5","author":"R Patil","year":"2022","unstructured":"Patil R, Biradar R, Ravi V, Biradar P, Ghosh U (2022) Network traffic anomaly detection using PCA and biGAN. Internet Technol Lett 5(1):e235. https:\/\/doi.org\/10.1002\/itl2.235","journal-title":"Internet Technol Lett"},{"key":"3905_CR5","doi-asserted-by":"publisher","first-page":"181580","DOI":"10.1109\/ACCESS.2019.2959699","volume":"7","author":"Z Wang","year":"2019","unstructured":"Wang Z, Fu Y, Song C, Zeng P, Qiao L (2019) Power system anomaly detection based on OCSVM optimized by improved particle swarm optimization. IEEE Access 7:181580\u2013181588. https:\/\/doi.org\/10.1109\/access.2019.2959699","journal-title":"IEEE Access"},{"issue":"2","key":"3905_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Den Hengel A Van (2021) Deep learning for anomaly detection: a review. ACM Comput Surv 54(2):1\u201338. https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput Surv"},{"key":"3905_CR7","doi-asserted-by":"publisher","unstructured":"Aytekin C, Ni X, Cricri F, Aksu E (2018) Clustering and Unsupervised Anomaly Detection with l2 Normalized Deep Auto-Encoder Representations. https:\/\/doi.org\/10.1109\/ijcnn.2018.8489068","DOI":"10.1109\/ijcnn.2018.8489068"},{"key":"3905_CR8","doi-asserted-by":"publisher","unstructured":"Chen Z, Yeo CK, Lee BS, Lau CT (2018) Autoencoder-based network anomaly detection. IEEE 2018 Wireless Telecommunications Symposium (WTS) pp 1\u20135. https:\/\/doi.org\/10.1109\/WTS.2018.8363930","DOI":"10.1109\/WTS.2018.8363930"},{"key":"3905_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.patrec.2021.04.020","volume":"148","author":"Z Zhang","year":"2021","unstructured":"Zhang Z, Deng X (2021) Anomaly detection using improved deep SVDD model with data structure preservation. Pattern Recognit Lett 148:1\u20136. https:\/\/doi.org\/10.1016\/j.patrec.2021.04.020","journal-title":"Pattern Recognit Lett"},{"key":"3905_CR10","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2021.04.089","volume":"453","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Liang X, Zhang W, Zhang L, Song X (2021) Vae-based deep svdd for anomaly detection. Neurocomputing 453:131\u2013140. https:\/\/doi.org\/10.1016\/j.neucom.2021.04.089","journal-title":"Neurocomputing"},{"key":"3905_CR11","doi-asserted-by":"publisher","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Neural Information Processing Systems. pp 2672\u20132680. https:\/\/doi.org\/10.3156\/jsoft.29.5_177_2","DOI":"10.3156\/jsoft.29.5_177_2"},{"key":"3905_CR12","doi-asserted-by":"publisher","unstructured":"\u0160kv\u00e1ra V, Pevny\u0300 T, \u0160m\u00eddl V (2018) Are generative deep models for novelty detection truly better? pp 1\u20137. https:\/\/doi.org\/10.48550\/arXiv.1807.05027","DOI":"10.48550\/arXiv.1807.05027"},{"key":"3905_CR13","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville AC (2017) Improved training of wasserstein gans. Advances in neural information processing systems, pp 30"},{"key":"3905_CR14","unstructured":"Thanh-Tung H, Venkatesh S, Tran T (2019) Improving generalization and stability of generative adversarial networks. 7th Int Conf Learn Represent ICLR 2019."},{"key":"3905_CR15","unstructured":"Gulrajani I, Ahmed F, Arjovsky M, Dumoulin V, Courville A (2017) Improved training of wasserstein GANs. Adv. Neural Inf. Process. Syst. 2017-December:5768\u20135778"},{"key":"3905_CR16","doi-asserted-by":"publisher","unstructured":"Xuan X A, Xp A, Nan L A, Xing H A, Lin M A, Xz A, Ning DAB (2022) GAN-based Anomaly Detection: A Review. https:\/\/doi.org\/10.1016\/j.neucom.2021.12.093","DOI":"10.1016\/j.neucom.2021.12.093"},{"key":"3905_CR17","doi-asserted-by":"publisher","unstructured":"Silva E, Lochter J (2020) A study on Anomaly Detection GAN-based methods on image data. In: Anais do XVI Encontro Nacional de Intelig\u00eancia Artificial e Computacional. SBC. pp 823\u2013831. https:\/\/doi.org\/10.5753\/eniac.2019.9337","DOI":"10.5753\/eniac.2019.9337"},{"key":"3905_CR18","doi-asserted-by":"publisher","unstructured":"Beula Rani B J, Sumathi L M E (2020) Survey on applying GAN for anomaly detection. In: 2020 International conference on computer communication and informatics, ICCCI 2020. https:\/\/doi.org\/10.1109\/ICCCI48352.2020.9104046, pp 1\u20135","DOI":"10.1109\/ICCCI48352.2020.9104046"},{"key":"3905_CR19","doi-asserted-by":"publisher","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Lecture Notes in Computer Science . pp 146\u2013147. https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"3905_CR20","doi-asserted-by":"publisher","unstructured":"Zenati H, Foo CS, Lecouat B, Manek G, Chandrasekhar VR (2018) Efficient GAN-based anomaly detection. https:\/\/doi.org\/10.48550\/arXiv.1902.03984","DOI":"10.48550\/arXiv.1902.03984"},{"key":"3905_CR21","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) GANomaly: Semi-supervised Anomaly Detection via Adversarial Training. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp 622\u2013637. https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"3905_CR22","doi-asserted-by":"publisher","unstructured":"Deecke L, Vandermeulen R, Ruff L, Mandt S, Kloft M (2019) Image anomaly detection with generative adversarial networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp 3\u201317. https:\/\/doi.org\/10.1007\/978-3-030-10925-7_1","DOI":"10.1007\/978-3-030-10925-7_1"},{"key":"3905_CR23","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Med Image Anal 54:30\u201344. https:\/\/doi.org\/10.1016\/j.media.2019.01.010","journal-title":"Med Image Anal"},{"key":"3905_CR24","doi-asserted-by":"publisher","unstructured":"Perera P, Nallapati R, Xiang B (2019) OCGAN: One-class novelty detection using gans with constrained latent representations. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. pp 2893\u20132901. https:\/\/doi.org\/10.1109\/cvpr.2019.00301","DOI":"10.1109\/cvpr.2019.00301"},{"key":"3905_CR25","doi-asserted-by":"publisher","unstructured":"Tuluptceva N, Bakker B, Fedulova I, Konushin A (2020) Perceptual Image Anomaly Detection. Lect Notes Comput Sci (including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 12046 LNCS:164\u2013178. https:\/\/doi.org\/10.1007\/978-3-030-41404-7_12","DOI":"10.1007\/978-3-030-41404-7_12"},{"key":"3905_CR26","doi-asserted-by":"publisher","first-page":"204471","DOI":"10.1109\/ACCESS.2020.3037322","volume":"8","author":"S Liu","year":"2020","unstructured":"Liu S, Xu L (2020) An integrated model based on O-GAN and density estimation for anomaly detection. IEEE Access 8:204471\u2013204482. https:\/\/doi.org\/10.1109\/ACCESS.2020.3037322","journal-title":"IEEE Access"},{"key":"3905_CR27","doi-asserted-by":"publisher","unstructured":"ZSu J (2019) O-GAN: extremely concise approach for auto-encoding generative adversarial networks. https:\/\/doi.org\/10.48550\/arXiv.1903.01931https:\/\/doi.org\/10.48550\/arXiv.1903.01931","DOI":"10.48550\/arXiv.1903.01931 10.48550\/arXiv.1903.01931"},{"key":"3905_CR28","doi-asserted-by":"publisher","unstructured":"Chatillon P, Ballester C (2021) History-Based Anomaly Detector: An Adversarial Approach to Anomaly Detection. In: Advances in Intelligent Systems and Computing. pp 761\u2013776. https:\/\/doi.org\/10.1007\/978-3-030-55180-3_58","DOI":"10.1007\/978-3-030-55180-3_58"},{"key":"3905_CR29","doi-asserted-by":"publisher","unstructured":"Han C, Rundo L, Murao K, Milacski Z\u00c1, Umemoto K, Sala E, Nakayama H, Satoh S (2020) GAN-based multiple adjacent brain MRI slice reconstruction for unsupervised alzheimer\u2019s disease diagnosis. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp 44\u201354. https:\/\/doi.org\/10.1007\/978-3-030-63061-4_5","DOI":"10.1007\/978-3-030-63061-4_5"},{"key":"3905_CR30","doi-asserted-by":"publisher","unstructured":"Simarro Viana J, de la Rosa E, Vande Vyvere T, Robben D, Sima DM, Investigators CTP (2021) Unsupervised 3D Brain Anomaly Detection. Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) 12658 LNCS:133142. https:\/\/doi.org\/10.1007\/978-3-030-72084-1_13","DOI":"10.1007\/978-3-030-72084-1_13"},{"key":"3905_CR31","doi-asserted-by":"publisher","first-page":"133051","DOI":"10.1109\/ACCESS.2020.3010612","volume":"8","author":"H Shen","year":"2020","unstructured":"Shen H, Chen J, Wang R, Zhang J (2020) Counterfeit Anomaly Using Generative Adversarial Network for Anomaly Detection. IEEE Access 8:133051\u2013133062. https:\/\/doi.org\/10.1109\/ACCESS.2020.3010612","journal-title":"IEEE Access"},{"key":"3905_CR32","doi-asserted-by":"publisher","unstructured":"Zenati H, Romain M, Foo CS, Lecouat B, Chandrasekhar V (2018) Adversarially Learned Anomaly Detection. In: Proceedings - IEEE International Conference on Data Mining, ICDM. pp 727\u2013736. https:\/\/doi.org\/10.1109\/ICDM.2018.00088","DOI":"10.1109\/ICDM.2018.00088"},{"key":"3905_CR33","doi-asserted-by":"publisher","unstructured":"Berg A, Felsberg M, Ahlberg J (2020) Unsupervised adversarial learning of anomaly detection in the wild. In: Frontiers in Artificial Intelligence and Applications. pp 1002\u20131008. https:\/\/doi.org\/10.3233\/FAIA200194","DOI":"10.3233\/FAIA200194"},{"key":"3905_CR34","doi-asserted-by":"publisher","unstructured":"Zhou K, Gao S, Cheng J, Gu Z, Fu H, Tu Z, Yang J, Zhao Y, Liu J (2020) Sparse-Gan: Sparsity-Constrained Generative Adversarial Network for Anomaly Detection in Retinal OCT Image. In: Proceedings - International Symposium on Biomedical Imaging. pp 1227\u20131231. https:\/\/doi.org\/10.1109\/ISBI45749.2020.9098374","DOI":"10.1109\/ISBI45749.2020.9098374"},{"key":"3905_CR35","doi-asserted-by":"publisher","unstructured":"Carrara F, Amato G, Brombin L, Falchi F, Gennaro C (2020) Combining GANs and AutoEncoders for efficient anomaly detection. In: Proceedings - International Conference on Pattern Recognition. pp 3939\u20133946. https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412253","DOI":"10.1109\/ICPR48806.2021.9412253"},{"issue":"2","key":"3905_CR36","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/s10278-020-00413-2","volume":"34","author":"T Nakao","year":"2021","unstructured":"Nakao T, Hanaoka S, Nomura Y, Murata M, Takenaga T, Miki S, Watadani T, Yoshikawa T, Hayashi N, Abe O (2021) Unsupervised deep anomaly detection in chest radiographs. J Digit Imaging 34(2):418\u2013427. https:\/\/doi.org\/10.1007\/s10278-020-00413-2","journal-title":"J Digit Imaging"},{"issue":"7","key":"3905_CR37","doi-asserted-by":"publisher","first-page":"6017","DOI":"10.1109\/TGRS.2020.3013022","volume":"59","author":"J Zhong","year":"2021","unstructured":"Zhong J, Xie W, Li Y, Lei J, Du Q (2021) Characterization of Background-Anomaly separability with generative adversarial network for hyperspectral anomaly detection. IEEE Trans Geosci Remote Sens 59(7):6017\u20136028. https:\/\/doi.org\/10.1109\/TGRS.2020.3013022https:\/\/doi.org\/10.1109\/TGRS.2020.3013022","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"3905_CR38","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) Skip-GANomaly: Skip Connected and Adversarially Trained Encoder-Decoder Anomaly Detection. https:\/\/doi.org\/10.1109\/IJCNN.2019.8851808","DOI":"10.1109\/IJCNN.2019.8851808"},{"issue":"9","key":"3905_CR39","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.3390\/cryst11091048","volume":"11","author":"CH Huang","year":"2021","unstructured":"Huang C H, Lee P H, Chang S H, Kuo H C, Sun C W, Lin C C, Tsai C L, Liu X (2021) Automated optical inspection method for light-emitting diode defect detection using unsupervised generative adversarial neural network. Crystals 11(9):1048. https:\/\/doi.org\/10.3390\/cryst11091048","journal-title":"Crystals"},{"key":"3905_CR40","doi-asserted-by":"publisher","unstructured":"Li Z, Zhao G, Yin A, Wang T, Chen H, Guo L, Yang H, Yang J, Lin C, Zhao G, Yin A (2020) CS-GANOmaly: A Supervised Anomaly Detection Approach with Ancillary Classifier GANs for Chromosome Images. In: Proceedings of 2020 IEEE 3rd International Conference of Safe Production and Informatization, IICSPI 2020. pp 492\u2013499. https:\/\/doi.org\/10.1109\/IICSPI51290.2020.9332331","DOI":"10.1109\/IICSPI51290.2020.9332331"},{"key":"3905_CR41","doi-asserted-by":"publisher","unstructured":"Wan Z, Ma J, Qin N, Zhou Z, Huang D (2021) Fault Detection of Air-spring Devices Based on GANomaly and Isolated Forest Algorithms. In: Proceedings of the 16th IEEE Conference on Industrial Electronics and Applications, ICIEA 2021. pp 1328-1333. https:\/\/doi.org\/10.1109\/ICIEA51954.2021.9516228","DOI":"10.1109\/ICIEA51954.2021.9516228"},{"key":"3905_CR42","doi-asserted-by":"publisher","unstructured":"Baur C, Graf R, Wiestler B, Albarqouni S, Navab N (2020) SteGANomaly: Inhibiting CycleGAN Steganography for Unsupervised Anomaly Detection in Brain MRI. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp 718\u2013727. https:\/\/doi.org\/10.1007\/978-3-030-59713-9_69","DOI":"10.1007\/978-3-030-59713-9_69"},{"key":"3905_CR43","doi-asserted-by":"publisher","unstructured":"Zhu JY, Park T, Isola P, Efros AA (2017) Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks. In: Proceedings of the IEEE International Conference on Computer Vision. pp 2242\u20132251. https:\/\/doi.org\/10.1109\/ICCV.2017.244https:\/\/doi.org\/10.1109\/ICCV.2017.244","DOI":"10.1109\/ICCV.2017.244 10.1109\/ICCV.2017.244"},{"key":"3905_CR44","doi-asserted-by":"publisher","first-page":"73201","DOI":"10.1109\/ACCESS.2021.3078553","volume":"9","author":"CK Lee","year":"2021","unstructured":"Lee C K, Cheon Y J, Hwang W Y (2021) Studies on the GAN-based Anomaly Detection Methods for the Time Series Data. IEEE Access 9:73201\u201373215. https:\/\/doi.org\/10.1109\/ACCESS.2021.3078553","journal-title":"IEEE Access"},{"key":"3905_CR45","doi-asserted-by":"publisher","unstructured":"Bashar M A, Nayak R (2020) TANoGAN: Time Series Anomaly Detection with Generative Adversarial Networks. In: 2020 IEEE Symposium series on computational intelligence, SSCI 2020. pp 1778\u20131785. https:\/\/doi.org\/10.1109\/SSCI47803.2020.9308512","DOI":"10.1109\/SSCI47803.2020.9308512"},{"key":"3905_CR46","doi-asserted-by":"publisher","unstructured":"Li Y, Peng X, Zhang J, Li Z, Wen M (2021) DCT-GAN: Dilated Convolutional Transformer-based GAN For Time Series Anomaly Detection. https:\/\/doi.org\/10.1109\/TKDE.2021.3130234","DOI":"10.1109\/TKDE.2021.3130234"},{"key":"3905_CR47","doi-asserted-by":"publisher","unstructured":"Li D, Chen D, Jin B, Shi L, Goh J, Ng SK (2019) MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp 703\u2013716. https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"3905_CR48","doi-asserted-by":"publisher","unstructured":"Mao S, Guo J, Gu T, Ma Z (2020) Dis-AE-LSTM: Generative Adversarial Networks for Anomaly Detection of Time Series Data. In: Proceedings - 2020 International Conference on Artificial Intelligence and Computer Engineering, ICAICE 2020. pp 330-336. https:\/\/doi.org\/10.1109\/ICAICE51518.2020.00070","DOI":"10.1109\/ICAICE51518.2020.00070"},{"key":"3905_CR49","doi-asserted-by":"publisher","unstructured":"Li D, Chen D, Goh J, Ng SK (2018) Anomaly detection with generative adversarial networks for multivariate time series. https:\/\/doi.org\/10.48550\/arXiv.1809.04758","DOI":"10.48550\/arXiv.1809.04758"},{"key":"3905_CR50","unstructured":"Gonz\u00e1lez G G, Casas P, Fern\u00e1ndez A, Gomez G (2020) Net-GAN: Recurrent generative adversarial networks for network anomaly detection in multivariate time-series. Netw Traffic Meas Anal Conf"},{"key":"3905_CR51","doi-asserted-by":"publisher","unstructured":"Geiger A, Liu D, Alnegheimish S, Cuesta-Infante A, Veeramachaneni K (2020) TadGAN: Time Series Anomaly Detection Using Generative Adversarial Networks. In: Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020. pp 33\u201343. https:\/\/doi.org\/10.1109\/bigdata50022.2020.9378139","DOI":"10.1109\/bigdata50022.2020.9378139"},{"key":"3905_CR52","doi-asserted-by":"publisher","unstructured":"Maru C, Kobayashi I (2020) Collective Anomaly Detection for Multivariate Data using Generative Adversarial Networks. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI). https:\/\/doi.org\/10.1109\/CSCI51800.2020.00106, pp 598\u2013604","DOI":"10.1109\/CSCI51800.2020.00106"},{"key":"3905_CR53","doi-asserted-by":"publisher","unstructured":"Zhou B, Liu S, Hooi B, Cheng X, Ye J (2019) Beatgan: Anomalous rhythm detection using adversarially generated time series. In: IJCAI International Joint Conference on Artificial Intelligence. pp 4433\u20134439. https:\/\/doi.org\/10.24963\/ijcai.2019\/616","DOI":"10.24963\/ijcai.2019\/616"},{"key":"3905_CR54","doi-asserted-by":"publisher","unstructured":"Choi Y, Lim H, Choi H, Kim IJ (2020) GAN-based anomaly detection and localization of multivariate time series data for power plant. In: Proceedings - 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020. pp 71\u201374. https:\/\/doi.org\/10.1109\/BigComp48618.2020.00-97","DOI":"10.1109\/BigComp48618.2020.00-97"},{"key":"3905_CR55","doi-asserted-by":"publisher","unstructured":"Xu X, Zhao H, Liu H, Sun H (2020) LSTM-Gan-xgboost based anomaly detection algorithm for time series data. In: Proceedings - 11th International Conference on Prognostics and System Health Management, PHM-Jinan 2020. pp 334-339. https:\/\/doi.org\/10.1109\/PHM-Jinan48558.2020.00066","DOI":"10.1109\/PHM-Jinan48558.2020.00066"},{"key":"3905_CR56","doi-asserted-by":"publisher","unstructured":"ZChen T, Guestrin C (2016) XGBoost: A scalable tree boosting system. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp 785\u2013794 . https:\/\/doi.org\/10.1145\/2939672.2939785","DOI":"10.1145\/2939672.2939785"},{"key":"3905_CR57","doi-asserted-by":"publisher","unstructured":"Zhu S, Yuchi H S, Xie Y (2020) Adversarial anomaly detection for marked Spatio-Temporal streaming data. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings. pp 8921\u20138925. https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9053837","DOI":"10.1109\/ICASSP40776.2020.9053837"},{"key":"3905_CR58","doi-asserted-by":"publisher","unstructured":"Patil R, Biradar R, Ravi V, Biradar P, Ghosh U (2020) Network traffic anomaly detection using PCA and biGAN. https:\/\/doi.org\/10.1002\/itl2.235","DOI":"10.1002\/itl2.235"},{"key":"3905_CR59","doi-asserted-by":"publisher","unstructured":"Lim SK, Loo Y, Tran NT, Cheung NM, Roig G, Elovici Y (2018) DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN. In: Proceedings - IEEE International Conference on Data Mining, ICDM. pp 1122\u20131127. https:\/\/doi.org\/10.1109\/icdm.2018.00146","DOI":"10.1109\/icdm.2018.00146"},{"key":"3905_CR60","doi-asserted-by":"publisher","unstructured":"Ngo PC, Winarto AA, Kou CKL, Park S, Akram F, Lee HK (2019) Fence GAN: Towards better anomaly detection. In: Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI. pp 141\u2013148. https:\/\/doi.org\/10.1109\/ICTAI.2019.00028https:\/\/doi.org\/10.1109\/ICTAI.2019.00028","DOI":"10.1109\/ICTAI.2019.00028 10.1109\/ICTAI.2019.00028"},{"key":"3905_CR61","doi-asserted-by":"publisher","unstructured":"Wang C, Dai Y, Dai W (2019) Deep embedding GAN-based model for anomaly detection on high-dimensional sparse data. In: Chinese Control Conference, CCC. pp 8718\u20138722. https:\/\/doi.org\/10.23919\/chicc.2019.8866256","DOI":"10.23919\/chicc.2019.8866256"},{"issue":"8","key":"3905_CR62","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1109\/TKDE.2019.2905606","volume":"32","author":"Y Liu","year":"2020","unstructured":"Liu Y, Li Z, Zhou C, Jiang Y, Sun J, Wang M, He X (2020) Generative adversarial active learning for unsupervised outlier detection. IEEE Trans Knowl Data Eng 32(8):1517\u20131528. https:\/\/doi.org\/10.1109\/TKDE.2019.2905606","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"3905_CR63","first-page":"188","volume":"101","author":"B Hanczar","year":"2019","unstructured":"Hanczar B, Janodet J C, Klaudel W (2019) An encoding adversarial network for anomaly detection. Proc Mach Learn Res 101(1):188\u2013203","journal-title":"Proc Mach Learn Res"},{"issue":"2018","key":"3905_CR64","first-page":"1142","volume":"101","author":"Y Kim","year":"2019","unstructured":"Kim Y, Choi S (2019) Forward-Backward Generative adversarial networks for anomaly detection. Proc Elev Asian Conf Mach Learn 101(2018):1142\u20131155","journal-title":"Proc Elev Asian Conf Mach Learn"},{"key":"3905_CR65","doi-asserted-by":"publisher","unstructured":"Li Z, Sun C, Liu C, Chen X, Wang M, Liu Y (2020) RCC-Dual-GAN: An Efficient Approach for Outlier Detection with Few Identified Anomalies. Arxiv. https:\/\/doi.org\/10.48550\/arXiv.2003.03609https:\/\/doi.org\/10.48550\/arXiv.2003.03609","DOI":"10.48550\/arXiv.2003.03609 10.48550\/arXiv.2003.03609"},{"key":"3905_CR66","doi-asserted-by":"publisher","unstructured":"Han X, Chen X, Liu LP (2020) GAN ensemble for anomaly detection. https:\/\/doi.org\/10.48550\/arXiv.2012.07988","DOI":"10.48550\/arXiv.2012.07988"},{"key":"3905_CR67","doi-asserted-by":"publisher","unstructured":"Shimauchi H (2021) Improving Supervised Outlier Detection by Unsupervised Representation Learning and Generative Adversarial Networks: An Extension of Extreme Gradient Boosting Outlier Detection by GANs. In: ACM International Conference Proceeding Series. pp 22\u201327. https:\/\/doi.org\/10.1145\/3459955.3460595https:\/\/doi.org\/10.1145\/3459955.3460595","DOI":"10.1145\/3459955.3460595 10.1145\/3459955.3460595"},{"key":"3905_CR68","doi-asserted-by":"publisher","unstructured":"Chen Z, Duan J, Kang L, Qiu G (2021) Supervised anomaly detection via conditional generative adversarial network and ensemble active learning. https:\/\/doi.org\/10.48550\/arXiv.2104.11952","DOI":"10.48550\/arXiv.2104.11952"},{"key":"3905_CR69","doi-asserted-by":"publisher","unstructured":"Du J, Guo L, Song L, Liang H, Chen T (2020) Anomaly Detection of Aerospace Facilities Using Ganomaly. In: PervasiveHealth: Pervasive Computing Technologies for Healthcare. pp 40\u201344. https:\/\/doi.org\/10.1145\/3404716.3404730","DOI":"10.1145\/3404716.3404730"},{"key":"3905_CR70","doi-asserted-by":"publisher","first-page":"105043","DOI":"10.1016\/j.apgeochem.2021.105043","volume":"131","author":"Z Luo","year":"2021","unstructured":"Luo Z, Zuo R, Xiong Y, Wang X (2021) Detection of geochemical anomalies related to mineralization using the GANomaly network. Appl Geochemistry 131:105043. https:\/\/doi.org\/10.1016\/j.apgeochem.2021.105043","journal-title":"Appl Geochemistry"},{"key":"3905_CR71","doi-asserted-by":"publisher","first-page":"107982","DOI":"10.1016\/j.buildenv.2021.107982","volume":"201","author":"K Yan","year":"2021","unstructured":"Yan K (2021) Chiller fault detection and diagnosis with anomaly detective generative adversarial network. Build Environ 201:107982. https:\/\/doi.org\/10.1016\/j.buildenv.2021.107982","journal-title":"Build Environ"},{"key":"3905_CR72","doi-asserted-by":"publisher","unstructured":"Xu R, Yan W (2020) A Comparison of GANs-Based Approaches for Combustor System Fault Detection. In: Proceedings of the International Joint Conference on Neural Networks. pp 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN48605.2020.9207487","DOI":"10.1109\/IJCNN48605.2020.9207487"},{"key":"3905_CR73","doi-asserted-by":"publisher","unstructured":"Zheng P, Yuan S, Wu X, Li J, Lu A (2019) One-class adversarial nets for fraud detection. In: 33Rd AAAI conference on artificial intelligence, AAAI 2019, 31st innovative applications of artificial intelligence conference, IAAI 2019 and the 9th AAAI symposium on educational advances in artificial intelligence, EAAI 2019. pp 1286\u20131293. https:\/\/doi.org\/10.1609\/aaai.v33i01.33011286","DOI":"10.1609\/aaai.v33i01.33011286"},{"issue":"2","key":"3905_CR74","doi-asserted-by":"publisher","first-page":"573","DOI":"10.5194\/isprs-annals-V-2-2020-573-2020","volume":"5","author":"SM Tilon","year":"2020","unstructured":"Tilon S M, Nex F, Duarte D, Kerle N, Vosselman G (2020) Infrastructure degradation and Post-Disaster damage detection using anomaly detecting generative adversarial networks. ISPRS Ann Photogramm Remote Sens Spat Inf Sci 5(2):573\u2013582. https:\/\/doi.org\/10.5194\/isprs-annals-V-2-2020-573-2020","journal-title":"ISPRS Ann Photogramm Remote Sens Spat Inf Sci"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03905-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03905-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03905-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T02:34:50Z","timestamp":1678934090000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03905-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,28]]},"references-count":74,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3905"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03905-6","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,28]]},"assertion":[{"value":"14 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}