{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:21:58Z","timestamp":1775229718310,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T00:00:00Z","timestamp":1689206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T00:00:00Z","timestamp":1689206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Open Research Program of Zhejiang Lab under Grant","award":["No. 2019KB0AB05"],"award-info":[{"award-number":["No. 2019KB0AB05"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Anomalies (or outliers) indicate a minority of data items that are quite different from the majority (inliers) of a dataset in a certain aspect. Unsupervised anomaly detection (UAD) is an important but not yet extensively studied research topic. Recent deep learning based methods exploit the reconstruction gap between inliers and outliers to discriminate them. However, it is observed that the reconstruction gap often decreases rapidly as the training process goes. And there is no reasonable way to set the training stop point. To support effective UAD, we propose a new UAD framework by introducing a Latent Feature Reconstruction\u00a0(LFR) layer that can be applied to recent UAD methods. The LFR layer acts as a regularizer to constrain the latent features in a low-rank subspace from which inliers can be reconstructed well while outliers cannot. We develop two new UAD methods by implementing the proposed framework with autoencoder architecture and geometric transformation scheme. Experiments on five benchmarks show that our proposed methods can achieve state-of-the-art performance in most cases.<\/jats:p>","DOI":"10.1007\/s10489-023-04767-2","type":"journal-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T10:03:52Z","timestamp":1689242632000},"page":"23628-23640","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Latent feature reconstruction for unsupervised anomaly detection"],"prefix":"10.1007","volume":"53","author":[{"given":"Jinghuang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yifan","family":"He","sequence":"additional","affiliation":[]},{"given":"Weixia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jihong","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shuigeng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"issue":"3","key":"4767_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: A survey. ACM Comput Surv (CSUR) 41(3):1\u201358","journal-title":"ACM Comput Surv (CSUR)"},{"key":"4767_CR2","unstructured":"Phua C, Lee V, Smith K, Gayler R (2010) A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119"},{"issue":"6\u20137","key":"4767_CR3","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.cose.2011.05.008","volume":"30","author":"JJ Davis","year":"2011","unstructured":"Davis JJ, Clark AJ (2011) Data preprocessing for anomaly based network intrusion detection: A review. computers & security 30(6\u20137):353\u2013375","journal-title":"computers & security"},{"key":"4767_CR4","unstructured":"Portnoff RS (2018) The Dark Net: De-anonymization, Classification and Analysis. University of California, Berkeley, ???"},{"key":"4767_CR5","doi-asserted-by":"crossref","unstructured":"Xia Y, Cao X, Wen F, Hua G, Sun J (2015) Learning discriminative reconstructions for unsupervised outlier removal. In: Proceedings of the IEEE International Conference on Computer Vision, pp 1511\u20131519","DOI":"10.1109\/ICCV.2015.177"},{"key":"4767_CR6","doi-asserted-by":"crossref","unstructured":"Zhou C, Paffenroth RC (2017) Anomaly detection with robust deep autoencoders. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 665\u2013674","DOI":"10.1145\/3097983.3098052"},{"key":"4767_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) f-anogan: Fast unsupervised anomaly detection with generative adversarial networks. Med Image Anal 54:30\u201344","journal-title":"Med Image Anal"},{"key":"4767_CR8","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Information Processing in Medical Imaging: 25th International Conference, IPMI 2017, Boone, NC, USA, June 25\u201330,2017, Proceedings, pp 146\u2013157. Springer","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"4767_CR9","unstructured":"Golan I, El-Yaniv R (2018) Deep anomaly detection using geometric transformations. Advances in neural information processing systems 31"},{"key":"4767_CR10","unstructured":"Wang S, Zeng Y, Liu X, Zhu E, Yin J, Xu C, Kloft M (2019) Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network. Advances in neural information processing systems 32"},{"key":"4767_CR11","unstructured":"Zhai S, Cheng Y, Lu W, Zhang Z (2016) Deep structured energy based models for anomaly detection. In: International Conference on Machine Learning, pp 1100\u20131109. PMLR"},{"key":"4767_CR12","first-page":"15","volume":"14","author":"V Chandola","year":"2007","unstructured":"Chandola V, Banerjee A, Kumar V (2007) Outlier detection: A survey. ACM Comput Surv 14:15","journal-title":"ACM Comput Surv"},{"issue":"2","key":"4767_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. Journal of Imaging 4(2):36","journal-title":"Journal of Imaging"},{"key":"4767_CR14","unstructured":"Lai C-H, Zou D, Lerman G (2020) Robust subspace recovery layer for unsupervised anomaly detection. In: Eighth International Conference on Learning Representations"},{"issue":"3","key":"4767_CR15","first-page":"582","volume":"12","author":"B Scholkopf","year":"2000","unstructured":"Scholkopf B, Williamson R, Smola A, Shawe-Taylor J, Platt J et al (2000) Support vector method for novelty detection. Advances in neural information processing systems 12(3):582\u2013588","journal-title":"Advances in neural information processing systems"},{"key":"4767_CR16","unstructured":"SHYU M-L (2003) A novel anomaly detection scheme based on principal component classifier. In: Proc. of ICDM Foundation and New Direction of Data Mining Workshop, 2003"},{"issue":"3","key":"4767_CR17","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1016\/j.patcog.2006.07.009","volume":"40","author":"H Hoffmann","year":"2007","unstructured":"Hoffmann H (2007) Kernel pca for novelty detection. Pattern Recogn 40(3):863\u2013874","journal-title":"Pattern Recogn"},{"issue":"2","key":"4767_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Hengel AVD (2021) Deep learning for anomaly detection: A review. ACM Comput Surv (CSUR) 54(2):1\u201338","journal-title":"ACM Comput Surv (CSUR)"},{"key":"4767_CR19","unstructured":"Zong B, Song Q, Min MR, Cheng W, Lumezanu C, Cho D, Chen H (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations"},{"key":"4767_CR20","unstructured":"You Z, Cui L, Shen Y, Yang K, Lu X, Zheng Y, Le X (2022) A unified model for multi-class anomaly detection. In: Advances in Neural Information Processing Systems"},{"key":"4767_CR21","unstructured":"Liznerski P, Ruff L, Vandermeulen RA, Franks BJ, Kloft M, Muller KR (2021) Explainable deep one-class classification. In: International Conference on Learning Representations"},{"key":"4767_CR22","doi-asserted-by":"crossref","unstructured":"Salehi M, Sadjadi N, Baselizadeh S, Rohban MH, Rabiee HR (2021) Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF Conf Comput Vis Pattern Recognit, pp 14902\u201314912","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"4767_CR23","doi-asserted-by":"crossref","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj, D (2021) Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp 8330\u20138339","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"4767_CR24","doi-asserted-by":"crossref","unstructured":"Zhang H, Cao L, VanNostrand P, Madden S, Rundensteiner EA (2021) Elite: robust deep anomaly detection with meta gradient. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp 2174\u20132182","DOI":"10.1145\/3447548.3467320"},{"key":"4767_CR25","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proc IEEE Conf Comput Vis Pattern Recognit, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"4767_CR26","doi-asserted-by":"crossref","unstructured":"Zagoruyko S, Komodakis N (2016) Wide residual networks. In: British Machine Vision Conference 2016. British Machine Vision Association","DOI":"10.5244\/C.30.87"},{"key":"4767_CR27","unstructured":"Fei-Fei L, Fergus R, Perona P (2004) Learning generative visual models from few training examples: An incremental bayesian approach tested on 101 object categories. In: 2004 Conf Comput Vis Pattern Recognit Workshop, pp 178\u2013178. IEEE"},{"key":"4767_CR28","unstructured":"Xiao H, Rasul K, Vollgraf R (2017) Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms"},{"key":"4767_CR29","unstructured":"Krizhevsky A (2009) Learning multiple layers of features from tiny images. Master\u2019s thesis, University of Tront"},{"key":"4767_CR30","unstructured":"Reuters-21578 text categorization test collection. Distribution 1.0, AT &T Labs-Research (1997)"},{"key":"4767_CR31","doi-asserted-by":"crossref","unstructured":"Lang K (1995) Newsweeder: Learning to filter netnews. Machine Learning Proceedings 1995, pp 331\u2013339","DOI":"10.1016\/B978-1-55860-377-6.50048-7"},{"key":"4767_CR32","doi-asserted-by":"crossref","unstructured":"Liu W, Hua G, Smith JR (2014) Unsupervised one-class learning for automatic outlier removal. In: Proc IEEE Conf Comput Vis Pattern Recognit, pp 3826\u20133833","DOI":"10.1109\/CVPR.2014.483"},{"key":"4767_CR33","doi-asserted-by":"crossref","unstructured":"Masci J, Meier U, Cire\u015fan D, Schmidhuber J (2011) Stacked convolutional auto-encoders for hierarchical feature extraction. In: Artificial Neural Networks and Machine Learning, pp 52\u201359. Springer","DOI":"10.1007\/978-3-642-21735-7_7"},{"key":"4767_CR34","doi-asserted-by":"crossref","unstructured":"Lin W-Y, Liu Z, Liu S (2022) Locally varying distance transform for unsupervised visual anomaly detection. In: Computer Vision\u2013ECCV 2022: 17th European Conference on Computer Vision, pp 354\u2013371 Springer","DOI":"10.1007\/978-3-031-20056-4_21"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04767-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-04767-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04767-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T16:14:41Z","timestamp":1697904881000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-04767-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,13]]},"references-count":34,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["4767"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-04767-2","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,13]]},"assertion":[{"value":"5 June 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interests"}}]}}