{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T10:51:02Z","timestamp":1768819862285,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:00:00Z","timestamp":1673222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,5]]},"DOI":"10.1007\/s11042-022-14306-9","type":"journal-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T16:11:23Z","timestamp":1673280683000},"page":"20197-20214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Two-stage anomaly detection for positive samples and small samples based on generative adversarial networks"],"prefix":"10.1007","volume":"82","author":[{"given":"Caie","family":"Xu","sequence":"first","affiliation":[]},{"given":"Dandan","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Bingyan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mingyang","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7722-8914","authenticated-orcid":false,"given":"Honghua","family":"Gan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,9]]},"reference":[{"key":"14306_CR1","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) Skip-ganomaly: skip connected and adversarially trained encoder-decoder anomaly detection IEEE. https:\/\/doi.org\/10.1109\/IJCNN.2019.8851808","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"14306_CR2","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2018) Ganomaly: semi-supervised anomaly detection via adversarial training. https:\/\/doi.org\/10.1007\/978-3-030-20893_39","DOI":"10.1007\/978-3-030-20893_39"},{"key":"14306_CR3","unstructured":"Bahdanau D, Cho K, Bengio Y (2014) Neural machine translation by jointly learning to align and translate. Computer Science"},{"key":"14306_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann P, Sdea Fauser M (2020) Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"14306_CR5","doi-asserted-by":"crossref","unstructured":"Bhatti UA, Huang M, Wu D, Zhang Y, Mehmood A, Han H (2018) Recommendation system using feature extraction and pattern recognition in clinical care systems. Enterprise Information Systems, pp 1\u201323","DOI":"10.1080\/17517575.2018.1557256"},{"issue":"1","key":"14306_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1166\/jmihi.2021.3313","volume":"11","author":"UA Bhatti","year":"2021","unstructured":"Bhatti UA, Yuan L, Yu Z, Nawaz SA, Xiao S (2021) Predictive data modeling using sp-knn for risk factor evaluation in urban demographical healthcare data. Journal of Medical Imaging and Health Informatics 11(1):7\u201314","journal-title":"Journal of Medical Imaging and Health Informatics"},{"key":"14306_CR7","doi-asserted-by":"crossref","unstructured":"Boriah S, Chandola V, Kumar V (2008) Similarity measures for categorical data: a comparative evaluation. In: Proceedings of the SIAM International Conference on Data Mining, SDM 2008, April 24-26, Atlanta, Georgia, USA","DOI":"10.1137\/1.9781611972788.22"},{"key":"14306_CR8","doi-asserted-by":"publisher","unstructured":"Chalapathy R, Menon AK, Chawla S (2018) Anomaly detection using one-class neural networks. https:\/\/doi.org\/10.48550\/arXiv.1802.06360","DOI":"10.48550\/arXiv.1802.06360"},{"key":"14306_CR9","doi-asserted-by":"publisher","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. https:\/\/doi.org\/10.48550\/arXiv.1901.03407","DOI":"10.48550\/arXiv.1901.03407"},{"key":"14306_CR10","doi-asserted-by":"publisher","unstructured":"Chen Y, Tian Y, Pang G, Carneiro G (2021) Deep one-class classification via interpolated gaussian descriptor. https:\/\/doi.org\/10.48550\/arXiv.2101.10043","DOI":"10.48550\/arXiv.2101.10043"},{"key":"14306_CR11","doi-asserted-by":"publisher","unstructured":"Fu J, Liu J, Tian H, Li Y, Bao Y, Fang Z, Lu H (2018) Dual attention network for scene segmentation. https:\/\/doi.org\/10.48550\/arXiv.1809.02983","DOI":"10.48550\/arXiv.1809.02983"},{"key":"14306_CR12","unstructured":"Geert L, Thijs K, Babak E, Bejnordi A, Arindra A (2017) A survey on deep learning in medical image analysis medical image analysis"},{"key":"14306_CR13","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks"},{"key":"14306_CR14","doi-asserted-by":"publisher","unstructured":"Haloui I, Gupta JS, Feuillard V (2018) Anomaly detection with wasserstein gan. https:\/\/doi.org\/10.48550\/arXiv.1812.02463","DOI":"10.48550\/arXiv.1812.02463"},{"issue":"9-10","key":"14306_CR15","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He Z, Xu X, Deng S (2003) Discovering cluster-based local outliers. Pattern Recogn Lett 24 (9-10):1641\u20131650. https:\/\/doi.org\/10.1016\/S0167-8655(03)00003-5","journal-title":"Pattern Recogn Lett"},{"key":"14306_CR16","doi-asserted-by":"publisher","unstructured":"Huang H, Lin L, Tong R, Hu H, Wu J (2020) Unet 3+: a full-scale connected unet for medical image segmentation IEEE. https:\/\/doi.org\/10.1109\/ICASSP40776.2020.9053405","DOI":"10.1109\/ICASSP40776.2020.9053405"},{"key":"14306_CR17","doi-asserted-by":"publisher","unstructured":"Kingma DP, Welling M (2014) Auto-encoding variational bayes, arXiv.org. https:\/\/doi.org\/10.48550\/arXiv.1312.6114","DOI":"10.48550\/arXiv.1312.6114"},{"key":"14306_CR18","doi-asserted-by":"crossref","unstructured":"Li J, Fang F, Mei K, Zhang G (2018) Multi-scale residual network for image super-resolution. In: 15th european conference, munich, germany, september 8-14, 2018, proceedings, part viii, Springer, Cham","DOI":"10.1007\/978-3-030-01237-3_32"},{"key":"14306_CR19","doi-asserted-by":"publisher","unstructured":"Michelucci U (2022) An introduction to autoencoders. https:\/\/doi.org\/10.48550\/arXiv.2201.03898","DOI":"10.48550\/arXiv.2201.03898"},{"key":"14306_CR20","doi-asserted-by":"crossref","unstructured":"Milletari F, Navab N, Ahmadi SA (2016) V-net fully convolutional neural networks for volumetric medical image segmentation","DOI":"10.1109\/3DV.2016.79"},{"key":"14306_CR21","doi-asserted-by":"crossref","unstructured":"Nawaz SA, Li J, Bhatti UA, Bazai SU, Zafar A, Bhatti MA, Mehmood A, Ain QU, Shoukat MU (2021) A hybrid approach to forecast the covid-19 epidemic trend. PLOS ONE vol 16","DOI":"10.1371\/journal.pone.0256971"},{"key":"14306_CR22","unstructured":"Nong Y, Qiang C (2001) An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems"},{"key":"14306_CR23","doi-asserted-by":"publisher","unstructured":"Oktay O, Schlemper J, Folgoc LL, Lee M, Heinrich M, Misawa K, Mori K, Mcdonagh S, Hammerla NY, Kainz B (2018) Attention u-net: learning where to look for the pancreas. https:\/\/doi.org\/10.48550\/arXiv.1804.03999","DOI":"10.48550\/arXiv.1804.03999"},{"key":"14306_CR24","doi-asserted-by":"crossref","unstructured":"Perera P, Nallapati R, Bing X (2019) Ocgan: one-class novelty detection using gans with constrained latent representations IEEE","DOI":"10.1109\/CVPR.2019.00301"},{"key":"14306_CR25","unstructured":"Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. Computer ence"},{"key":"14306_CR26","unstructured":"Rifai S, Vincent P, Muller X, Glorot X, Bengio Y (2013) Contracting auto-encoders"},{"key":"14306_CR27","doi-asserted-by":"publisher","unstructured":"Salehi M, Sadjadi N, Baselizadeh S, Rohban MH, Rabiee HR (2020) Multiresolution knowledge distillation for anomaly detection. https:\/\/doi.org\/10.48550\/arXiv.2011.11108","DOI":"10.48550\/arXiv.2011.11108"},{"key":"14306_CR28","unstructured":"Salvador S, Chan PK, Brodie J (2003) Learning states and rules for time series anomaly detection. Seventeenth International Florida Artificial Intelligence Research Society Conference"},{"key":"14306_CR29","doi-asserted-by":"publisher","unstructured":"Schlegl T, Seebck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. Springer Cham. https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"14306_CR30","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"14306_CR31","doi-asserted-by":"publisher","unstructured":"Song JW, Kong K, Park YI, Kang SJ (2021) Attention map-guided two-stage anomaly detection using hard augmentation. https:\/\/doi.org\/10.48550\/arXiv.2103.16851","DOI":"10.48550\/arXiv.2103.16851"},{"key":"14306_CR32","doi-asserted-by":"publisher","unstructured":"Varun C, Arindam B, Vipin K (2009) Anomaly detection: a survey. Acm Computing Surveys. https:\/\/doi.org\/10.48550\/arXiv.1901.03407","DOI":"10.48550\/arXiv.1901.03407"},{"key":"14306_CR33","doi-asserted-by":"publisher","unstructured":"Vincent P, Larochelle H, Bengio Y, Manzagol PA (2008) Extracting and composing robust features with denoising autoencoders. https:\/\/doi.org\/10.1145\/1390156.1390294","DOI":"10.1145\/1390156.1390294"},{"key":"14306_CR34","doi-asserted-by":"crossref","unstructured":"Zeeshan Z, Ain QU, Bhatti UA, Memon WH, Ali S, Nawaz SA, Nizamani MM, Mehmood A, Bhatti MA, Shoukat MU (2021) Feature-based multi-criteria recommendation system using a weighted approach with ranking correlation Intelligent data analysis pp 25-4","DOI":"10.3233\/IDA-205388"},{"key":"14306_CR35","doi-asserted-by":"publisher","unstructured":"Zenati H, Foo CS, Lecouat B, Manek G, Chandrasekhar VR (2018) Efficient gan-based anomaly detection Computer Vision and Pattern Recognition. https:\/\/doi.org\/10.48550\/arXiv.1802.06222","DOI":"10.48550\/arXiv.1802.06222"},{"key":"14306_CR36","unstructured":"Zhao J, Mathieu M, Lecun Y (2016) Energy-based generative adversarial network. https:\/\/doi.org\/10.48550\/ arXiv:1609.03126"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14306-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-14306-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-14306-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,22]],"date-time":"2023-04-22T04:20:36Z","timestamp":1682137236000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-14306-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,9]]},"references-count":36,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2023,5]]}},"alternative-id":["14306"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-14306-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,9]]},"assertion":[{"value":"9 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 October 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"We confirm that we have read, understand, and agreed to the submission guidelines, policies, and submission declaration of the journal, and all authors of the manuscript have no conflict of interest to declare. The manuscript is the author\u2019s original work, and the manuscript has not received prior publication and is not under consideration for publication elsewhere. On behalf of all Co-Authors, I bear full responsibility for the submission.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}}]}}