{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T15:10:19Z","timestamp":1728054619795},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s11760-022-02362-5","type":"journal-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T20:18:36Z","timestamp":1663964316000},"page":"1535-1542","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cascade watchdog: a multi-tiered adversarial guard for outlier detection"],"prefix":"10.1007","volume":"17","author":[{"given":"Glauco","family":"Amigo","sequence":"first","affiliation":[]},{"given":"Justin M.","family":"Bui","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Baylis","sequence":"additional","affiliation":[]},{"given":"Robert J.","family":"Marks","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"2362_CR1","unstructured":"Atlas, L.E., Cohn, D.A., Ladner, R.E.: Training connectionist networks with queries and selective sampling. In: Advances in neural information processing systems, pp. 566\u2013573 (1990)"},{"key":"2362_CR2","doi-asserted-by":"publisher","unstructured":"Bui, J., Marks, R.: Autoencoder watchdog outlier detection for classifiers. In: Proceedings of the 13th International Conference on Agents and Artificial Intelligence (2021) https:\/\/doi.org\/10.5220\/0010300509900996","DOI":"10.5220\/0010300509900996"},{"key":"2362_CR3","unstructured":"Bui, J., Marks, R.: Symbiotic hybrid neural network watchdog for outlier detection. In: 17th International Conference on Machine Learning and Data Mining, MLDM 20, New York, pp. 171\u2013180 (July 18\u201322, 2021)"},{"key":"2362_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.neucom.2018.09.013","volume":"321","author":"M Frid-Adar","year":"2018","unstructured":"Frid-Adar, M., Diamant, I., Klang, E., et al.: Gan-based synthetic medical image augmentation for increased cnn performance in liver lesion classification. Neurocomputing 321, 321\u2013331 (2018). https:\/\/doi.org\/10.1016\/j.neucom.2018.09.013","journal-title":"Neurocomputing"},{"key":"2362_CR5","unstructured":"Goodfellow, I.J., Pouget-Abadie, J., Mirza, M., et\u00a0al.: Generative adversarial nets. In: Proceedings of the 27th International Conference on Neural Information Processing Systems-Volume 2. MIT Press, Cambridge, MA, USA, NIPS\u201914, pp. 2672\u20132680 (2014)"},{"key":"2362_CR6","doi-asserted-by":"crossref","unstructured":"Hwang, J.N., Choi, J.J., Oh, S., et\u00a0al.: Query learning based on boundary search and gradient computation of trained multilayer perceptrons. In: 1990 IJCNN International Joint Conference on Neural Networks, IEEE, pp 57\u201362 (1990)","DOI":"10.1109\/IJCNN.1990.137824"},{"issue":"1","key":"2362_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/72.80299","volume":"2","author":"JN Hwang","year":"1991","unstructured":"Hwang, J.N., Choi, J.J., Oh, S., et al.: Query-based learning applied to partially trained multilayer perceptrons. IEEE Trans. Neural Netw. 2(1), 131\u2013136 (1991)","journal-title":"IEEE Trans. Neural Netw."},{"key":"2362_CR8","unstructured":"Jensen, C.A., Reed, R.D., El-Sharkawi, M.A., et\u00a0al.: Location of operating points on the dynamic security border using constrained neural network inversion. In: Proceedings of International Conference Intelligent Systems Applications to Power Systems, (ISAP\u201997) (1997)"},{"issue":"9","key":"2362_CR9","doi-asserted-by":"publisher","first-page":"1536","DOI":"10.1109\/5.784232","volume":"87","author":"CA Jensen","year":"1999","unstructured":"Jensen, C.A., Reed, R.D., Marks, R.J., et al.: Inversion of feedforward neural networks: algorithms and applications. Proc. IEEE 87(9), 1536\u20131549 (1999)","journal-title":"Proc. IEEE"},{"issue":"7\u20138","key":"2362_CR10","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1177\/0278364904045481","volume":"23","author":"SM LaValle","year":"2004","unstructured":"LaValle, S.M., Branicky, M.S., Lindemann, S.R.: On the relationship between classical grid search and probabilistic roadmaps. Int. J. Robot. Res. 23(7\u20138), 673\u2013692 (2004)","journal-title":"Int. J. Robot. Res."},{"key":"2362_CR11","first-page":"9325","volume":"1711","author":"K Lee","year":"2018","unstructured":"Lee, K., Lee, H., Lee, K., et al.: Training confidence-calibrated classifiers for detecting out-of-distribution samples. Science 1711, 9325 (2018)","journal-title":"Science"},{"key":"2362_CR12","doi-asserted-by":"publisher","unstructured":"Reed, R., Marks, R.: An evolutionary algorithm for function inversion and boundary marking. In: Proceedings of 1995 IEEE International Conference on Evolutionary Computation, vol. 2, pp. 794\u2013797 (1995) https:\/\/doi.org\/10.1109\/ICEC.1995.487487","DOI":"10.1109\/ICEC.1995.487487"},{"key":"2362_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten, C., Khoshgoftaar, T.: A survey on image data augmentation for deep learning. J. Big Data 6, 1\u201348 (2019)","journal-title":"J. Big Data"},{"key":"2362_CR14","doi-asserted-by":"crossref","unstructured":"Thompson, B.B., Marks, R.J., El-Sharkawi, M.A., et\u00a0al.; Inversion of neural network underwater acoustic model for estimation of bottom parameters using modified particle swarm optimizers. In: Proceedings of the International Joint Conference on Neural Networks, IEEE, pp. 1301\u20131306 (2003)","DOI":"10.1109\/IJCNN.2003.1223883"},{"issue":"101","key":"2362_CR15","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1016\/j.media.2019.101552","volume":"58","author":"X Yi","year":"2019","unstructured":"Yi, X., Walia, E., Babyn, P.: Generative adversarial network in medical imaging: a review. Med. Image Anal. 58(101), 552 (2019). https:\/\/doi.org\/10.1016\/j.media.2019.101552","journal-title":"Med. Image Anal."},{"key":"2362_CR16","doi-asserted-by":"publisher","unstructured":"Yu, Q., Aizawa, K.: Unsupervised out-of-distribution detection by maximum classifier discrepancy. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 9517\u20139525, https:\/\/doi.org\/10.1109\/ICCV.2019.00961 (2019)","DOI":"10.1109\/ICCV.2019.00961"},{"key":"2362_CR17","doi-asserted-by":"publisher","unstructured":"Zhang, H., Huang, Z., Lv, Z.: Medical image synthetic data augmentation using gan. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering. Association for Computing Machinery, New York, NY, USA, CSAE (2020) https:\/\/doi.org\/10.1145\/3424978.3425118","DOI":"10.1145\/3424978.3425118"},{"key":"2362_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, X., Liu, Y., Li, J., et\u00a0al.: Emotion classification with data augmentation using generative adversarial networks. In: PAKDD (2018)","DOI":"10.1007\/978-3-319-93040-4_28"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02362-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-022-02362-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-022-02362-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T14:49:10Z","timestamp":1728053350000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-022-02362-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["2362"],"URL":"https:\/\/doi.org\/10.1007\/s11760-022-02362-5","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"14 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors agreed on the final approval of the version to be published.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}