{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:42:14Z","timestamp":1774352534837,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T00:00:00Z","timestamp":1665532800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T00:00:00Z","timestamp":1665532800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["NO. 2020A1515010970"],"award-info":[{"award-number":["NO. 2020A1515010970"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Research Council","award":["NO. JCYJ20200109113427092"],"award-info":[{"award-number":["NO. JCYJ20200109113427092"]}]},{"name":"Shenzhen Research Council","award":["NO. GJHZ20180928155209705"],"award-info":[{"award-number":["NO. GJHZ20180928155209705"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s13042-022-01657-w","type":"journal-article","created":{"date-parts":[[2022,10,12]],"date-time":"2022-10-12T14:04:06Z","timestamp":1665583446000},"page":"683-696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["VESC: a new variational autoencoder based model for anomaly detection"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2207-0953","authenticated-orcid":false,"given":"Chunkai","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiahua","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shaocong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hanyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peiyi","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,12]]},"reference":[{"key":"1657_CR1","unstructured":"Onat I, Miri A (2017) An intrusion detection system for wireless sensor networks. In: International conference on telecommunications"},{"issue":"8","key":"1657_CR2","doi-asserted-by":"publisher","first-page":"3784","DOI":"10.1109\/TNNLS.2017.2736643","volume":"29","author":"AD Pozzolo","year":"2018","unstructured":"Pozzolo AD, Boracchi G, Caelen O, Alippi C, Bontempi G (2018) Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE Trans Neural Netw Learn Syst 29(8):3784\u20133797","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1657_CR3","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"1657_CR4","doi-asserted-by":"crossref","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. arXiv:1901.03407","DOI":"10.1145\/3394486.3406704"},{"key":"1657_CR5","unstructured":"Bayer J, Osendorfer C (2015) Learning stochastic recurrent networks"},{"key":"1657_CR6","doi-asserted-by":"crossref","unstructured":"Pham N, Pagh R (2012) A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data. ACM, pp 877\u2013885","DOI":"10.1145\/2339530.2339669"},{"key":"1657_CR7","doi-asserted-by":"crossref","unstructured":"Pham N (2018) L1-depth revisited: a robust angle-based outlier factor in high-dimensional space. In: Joint European conference on machine learning and knowledge discovery in databases. Springer, pp 105\u2013121","DOI":"10.1007\/978-3-030-10925-7_7"},{"key":"1657_CR8","doi-asserted-by":"crossref","unstructured":"Sathe S, Aggarwal CC (2018) Subspace histograms for outlier detection in linear time. Knowl Inf Syst 1\u201325","DOI":"10.1007\/s10115-017-1148-8"},{"key":"1657_CR9","first-page":"002002551830375","volume":"457","author":"C Kim","year":"2018","unstructured":"Kim C, Lee J, Kim R, Park Y, Kang J (2018) Deepnap: deep neural anomaly pre-detection in a semiconductor fab. Inf Sci 457:002002551830375","journal-title":"Inf Sci"},{"issue":"2","key":"1657_CR10","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","volume":"48","author":"F Pukelsheim","year":"1994","unstructured":"Pukelsheim F (1994) The three sigma rule. Am Stat 48(2):88\u201391","journal-title":"Am Stat"},{"issue":"1","key":"1657_CR11","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1214\/aoms\/1177729885","volume":"21","author":"FE Grubbs","year":"1950","unstructured":"Grubbs FE (1950) Sample criteria for testing outlying observations. Ann Math Stat 21(1):27\u201358. https:\/\/doi.org\/10.1214\/aoms\/1177729885","journal-title":"Ann Math Stat"},{"key":"1657_CR12","doi-asserted-by":"publisher","unstructured":"Munawar A, Vinayavekhin P, De\u00a0Magistris G (2017) Limiting the reconstruction capability of generative neural network using negative learning. In: 2017 IEEE 27th international workshop on machine learning for signal processing (MLSP), pp 1\u20136. https:\/\/doi.org\/10.1109\/MLSP.2017.8168155","DOI":"10.1109\/MLSP.2017.8168155"},{"key":"1657_CR13","doi-asserted-by":"publisher","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour MR, Venkatesh S, Van Den\u00a0Hengel A (2019) Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In: 2019 IEEE\/CVF international conference on computer vision (ICCV), pp 1705\u20131714. https:\/\/doi.org\/10.1109\/ICCV.2019.00179","DOI":"10.1109\/ICCV.2019.00179"},{"key":"1657_CR14","doi-asserted-by":"publisher","unstructured":"Kieu T, Yang B, Jensen CS (2018) Outlier detection for multidimensional time series using deep neural networks. In: 2018 19th IEEE international conference on mobile data management (MDM), pp 125\u2013134. https:\/\/doi.org\/10.1109\/MDM.2018.00029","DOI":"10.1109\/MDM.2018.00029"},{"key":"1657_CR15","unstructured":"Zong B, Song Q, Min MR, Cheng W, Lumezanu C, Cho D, Chen H (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection"},{"key":"1657_CR16","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Advances in neural information processing systems, pp 2672\u20132680"},{"key":"1657_CR17","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) f-anogan: fast unsupervised anomaly detection with generative adversarial networks. Med Image Anal 54:30\u201344","journal-title":"Med Image Anal"},{"key":"1657_CR18","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Ghahramani Z, Welling M, Cortes C, Lawrence N, Weinberger KQ (eds) Advances in neural information processing systems, vol 27. Curran Associates, Inc."},{"key":"1657_CR19","doi-asserted-by":"crossref","unstructured":"Hicsonmez S, Samet N, Akbas E, Duygulu P (2020) GANILLA: generative adversarial networks for image to illustration translation. CoRR. arXiv:2002.05638","DOI":"10.1016\/j.imavis.2020.103886"},{"key":"1657_CR20","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. arXiv:1312.6114"},{"key":"1657_CR21","unstructured":"Liu G, Guo C, Xie L, Liu W, Xiong NN, Chen G (2020) An intelligent cnn-vae text representation technology based on text semantics for comprehensive big data. arXiv:abs\/2008.12522"},{"key":"1657_CR22","unstructured":"Cui Z, Wang J, Bai B, Guo T, Feng Y (2020) G-vae: a continuously variable rate deep image compression framework. arXiv:abs\/2003.02012"},{"key":"1657_CR23","doi-asserted-by":"crossref","unstructured":"Lin S, Clark R, Birke R, Sch\u00f6nborn S, Trigoni N, Roberts SJ (2020) Anomaly detection for time series using vae-lstm hybrid model. ICASSP 2020\u20142020 IEEE international conference on acoustics, speech and signal processing (ICASSP), pp 4322\u20134326","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"1657_CR24","unstructured":"An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability"},{"key":"1657_CR25","doi-asserted-by":"publisher","unstructured":"Li Z, Chen W, Pei D (2018) Robust and unsupervised kpi anomaly detection based on conditional variational autoencoder, pp 1\u20139. https:\/\/doi.org\/10.1109\/PCCC.2018.8710885","DOI":"10.1109\/PCCC.2018.8710885"},{"issue":"10","key":"1657_CR26","first-page":"1744","volume":"32","author":"Z Tu","year":"2009","unstructured":"Tu Z, Bai X (2009) Auto-context and its application to high-level vision tasks and 3d brain image segmentation. IEEE Trans Pattern Anal Mach Intell 32(10):1744\u20131757","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1657_CR27","doi-asserted-by":"crossref","unstructured":"Wang W, Yu K, Hugonot J, Fua P, Salzmann M (2019) Recurrent u-net for resource-constrained segmentation. In: Proceedings of the IEEE international conference on computer vision, pp 2142\u20132151","DOI":"10.1109\/ICCV.2019.00223"},{"key":"1657_CR28","doi-asserted-by":"crossref","unstructured":"Cai Z, Vasconcelos N (2018) Cascade r-cnn: delving into high quality object detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6154\u20136162","DOI":"10.1109\/CVPR.2018.00644"},{"key":"1657_CR29","doi-asserted-by":"crossref","unstructured":"Dau HA, Keogh E, Kamgar K, Yeh C-CM, Zhu Y, Gharghabi S, Ratanamahatana CA, Yanping, Hu B, Begum N, Bagnall A, Mueen A, Batista G (2018) The UCR time series classification archive. https:\/\/www.cs.ucr.edu\/~eamonn\/time_series_data_2018\/","DOI":"10.1109\/JAS.2019.1911747"},{"key":"1657_CR30","unstructured":"Dua D, Graff C (2017) UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"1657_CR31","doi-asserted-by":"crossref","unstructured":"Liu FT, Kai MT, Zhou ZH (2009) Isolation forest. In: Eighth IEEE international conference on data mining","DOI":"10.1109\/ICDM.2008.17"},{"key":"1657_CR32","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani SM, Rajasegarar S, Karunasekera S, Leckie C (2016) High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recognit 58:121\u2013134","journal-title":"Pattern Recognit"},{"key":"1657_CR33","doi-asserted-by":"crossref","unstructured":"Zenati H, Romain M, Foo CS, Lecouat B, Chandrasekhar VR (2018) Adversarially learned anomaly detection","DOI":"10.1109\/ICDM.2018.00088"},{"key":"1657_CR34","unstructured":"An J, Cho S (2015) Variational autoencoder based anomaly detection using reconstruction probability. Special lecture on IE 2(1)"},{"key":"1657_CR35","unstructured":"Donahue J, Kr\u00e4henb\u00fchl P, Darrell T (2016) Adversarial feature learning. arXiv:1605.09782"},{"key":"1657_CR36","doi-asserted-by":"crossref","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2018) Ganomaly: semi-supervised anomaly detection via adversarial training. In: Asian conference on computer vision, pp 622\u2013637","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"1657_CR37","unstructured":"Ling CX, Huang J, Zhang H (2003) Auc: a statistically consistent and more discriminating measure than accuracy. In: International joint conference on artificial intelligence"},{"key":"1657_CR38","doi-asserted-by":"crossref","unstructured":"Ak\u00e7ay S, Atapour-Abarghouei A, Breckon TP (2019) Skip-ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In: 2019 international joint conference on neural networks (IJCNN). IEEE, pp 1\u20138","DOI":"10.1109\/IJCNN.2019.8851808"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01657-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-022-01657-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-022-01657-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T17:39:24Z","timestamp":1728149964000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-022-01657-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,12]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1657"],"URL":"https:\/\/doi.org\/10.1007\/s13042-022-01657-w","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"value":"1868-8071","type":"print"},{"value":"1868-808X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,12]]},"assertion":[{"value":"2 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}