{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T19:09:32Z","timestamp":1778699372692,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T00:00:00Z","timestamp":1742256000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T00:00:00Z","timestamp":1742256000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Xinjiang Autonomous Region Major Science and Technology Programs","award":["2022A02010-3"],"award-info":[{"award-number":["2022A02010-3"]}]},{"name":"Tianshan Talent Training Program","award":["2023TSYCLJ0052"],"award-info":[{"award-number":["2023TSYCLJ0052"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"DOI":"10.1007\/s44443-025-00021-6","type":"journal-article","created":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T09:10:58Z","timestamp":1742289058000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Generative adversarial message passing-based anomaly detection"],"prefix":"10.1007","volume":"37","author":[{"given":"Leilei","family":"Ma","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiangfeng","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kedian","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuejun","family":"Hou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lan","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenxu","family":"Han","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3586-6926","authenticated-orcid":false,"given":"Xusheng","family":"Du","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,3,18]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","unstructured":"Anguita D, Ghio A, Greco N, Oneto L, Ridella S (2010) Model selection for support vector machines: Advantages and disadvantages of the Machine Learning Theory[C]. The 2010 International Joint Conference on Neural Networks (IJCNN), IEEE, Barcelona, Spain, pp 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN.2010.5596450","DOI":"10.1109\/IJCNN.2010.5596450"},{"key":"21_CR2","first-page":"200196","volume":"18","author":"NS Bajaj","year":"2023","unstructured":"Bajaj NS, Patange AD, Jegadeeshwaran R, Pardeshi SS, Kulkarni KA, Ghatpande RS (2023) Application of metaheuristic optimization based support vector machine for milling cutter health monitoring[J]. Intell Syst Appl 18:200196","journal-title":"Intell Syst Appl"},{"key":"21_CR3","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data, 3rd edn [M]. Wiley, New York"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s10586-022-03719-8","volume":"26","author":"N Chander","year":"2023","unstructured":"Chander N, Upendra Kumar M (2023) Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment[J]. Cluster Comput 26:1801\u20131819","journal-title":"Cluster Comput"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s10845-020-01600-2","volume":"32","author":"X Chen","year":"2021","unstructured":"Chen X, Zhang B, Gao D (2021) Bearing fault diagnosis base on multi-scale CNN and LSTM model[J]. J Intell Manuf 32:971\u2013987","journal-title":"J Intell Manuf"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"7103","DOI":"10.1002\/int.22582","volume":"36","author":"Z Cheng","year":"2021","unstructured":"Cheng Z, Wang S, Zhang P, Wang S, Liu X, Zhu E (2021) Improved autoencoder for unsupervised anomaly detection[J]. Int J Intell Sys 36:7103\u20137125","journal-title":"Int J Intell Sys"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MSP.2017.2765202","volume":"35","author":"A Creswell","year":"2018","unstructured":"Creswell A, White T, Dumoulin V, Arulkumaran K, Sengupta B, Bharath AA (2018) Generative adversarial networks: an overview[J]. IEEE Signal Process Mag 35:53\u201365","journal-title":"IEEE Signal Process Mag"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1111\/j.1600-6143.2008.02237.x","volume":"8","author":"TS Dabade","year":"2008","unstructured":"Dabade TS, Grande JP, Norby SM, Fervenza FC, Cosio FG (2008) Recurrent idiopathic membranous nephropathy after kidney transplantation: a surveillance biopsy study[J]. Am J Transplant 8:1318\u20131322","journal-title":"Am J Transplant"},{"key":"21_CR9","first-page":"1","volume":"72","author":"X Deng","year":"2023","unstructured":"Deng X, Xiao L, Liu X, Zhang X (2023) One-dimensional residual GANomaly network-based deep feature extraction model for complex industrial system fault detection[K]. IEEE Trans Instrum Meas 72:1\u201313","journal-title":"IEEE Trans Instrum Meas"},{"key":"21_CR10","unstructured":"Dubey SR, Singh SK (2023) Transformer-based generative adversarial networks in computer vision: a comprehensive survey. arXiv:2302.08641"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.46481\/jnsps.2023.1364","volume":"5","author":"GS Fuhnwi","year":"2023","unstructured":"Fuhnwi GS, Agbaje JO, Oshinubi K et al (2023) An empirical study on anomaly detection using density-based and representative-based clustering algorithms[J]. J Nig Soc Phys Sci 5(2):1364\u20131364","journal-title":"J Nig Soc Phys Sci"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"4313","DOI":"10.1109\/JSYST.2023.3266554","volume":"17","author":"D Guha","year":"2023","unstructured":"Guha D, Chatterjee R, Sikdar B (2023) Anomaly detection using LSTM-based variational autoencoder in unsupervised data in power grid[J]. IEEE Syst J 17:4313\u20134323","journal-title":"IEEE Syst J"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"101945","DOI":"10.1016\/j.asej.2022.101945","volume":"14","author":"M Hakim","year":"2023","unstructured":"Hakim M, Omran AAB, Ahmed AN, Al-Waily M, Abdellatif A (2023) A systematic review of rolling bearing fault diagnoses based on deep learning and transfer learning: Taxonomy, overview, application, open challenges, weaknesses and recommendations[J]. Ain Shams Eng J 14:101945","journal-title":"Ain Shams Eng J"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Han D, Wang Z, Chen W, Wang K, Yu R, Wang S, Zhang H, Wang Z, Jin M, Yang J, Shi X, Yin X (2023) Anomaly detection in the open world: normality shift detection, explanation, and adaptation[J]. Proceedings 2023 Network and Distributed System Security Symposium, Internet Society, San Diego, CA, USA, pp 24830. https:\/\/doi.org\/10.14722\/ndss.2023.24830","DOI":"10.14722\/ndss.2023.24830"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"116429","DOI":"10.1016\/j.eswa.2021.116429","volume":"193","author":"W Hilal","year":"2022","unstructured":"Hilal W, Gadsden SA, Yawney J (2022) Financial fraud: a review of anomaly detection techniques and recent advances[J]. Expert Syst Appl 193:116429","journal-title":"Expert Syst Appl"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.hspr.2023.11.001","volume":"1","author":"W Hu","year":"2023","unstructured":"Hu W, Xin G, Wu J, An G, Li Y, Feng K, Antoni J (2023) Vibration-based bearing fault diagnosis of high-speed trains: a literature review[J]. High-Speed Railway 1:219\u2013223","journal-title":"High-Speed Railway"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"103911","DOI":"10.1016\/j.compind.2023.103911","volume":"148","author":"SB Jha","year":"2023","unstructured":"Jha SB, Babiceanu RF (2023) Deep CNN-based visual defect detection: Survey of current literature[J]. Comput Ind 148:103911","journal-title":"Comput Ind"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/systems11060305","volume":"11","author":"S Jiang","year":"2023","unstructured":"Jiang S, Dong R, Wang J, Xia M (2023) Credit card fraud detection based on unsupervised attentional anomaly detection network[J]. Systems 11:305","journal-title":"Systems"},{"key":"21_CR19","first-page":"24431","volume":"11","author":"RRZ Koko","year":"2023","unstructured":"Koko RRZ, Yassine IA, Wahed MA, Madete JK, Rushdi MA (2023) Dynamic construction of outlier detector ensembles with bisecting k-means clustering[J]. IEEE 11:24431\u201324447","journal-title":"IEEE"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"105503","DOI":"10.1016\/j.engappai.2022.105503","volume":"117","author":"O Koren","year":"2023","unstructured":"Koren O, Koren M, Peretz O (2023) A procedure for anomaly detection and analysis[J]. Eng Appl Artif Intell 117:105503","journal-title":"Eng Appl Artif Intell"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"8209","DOI":"10.1007\/s10489-022-03905-6","volume":"53","author":"H Li","year":"2023","unstructured":"Li H, Li Y (2023) Anomaly detection methods based on GAN: a survey[J]. Appl Intell 53:8209\u20138231","journal-title":"Appl Intell"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"1635","DOI":"10.1016\/j.compchemeng.2004.01.009","volume":"28","author":"H Liu","year":"2004","unstructured":"Liu H, Shah S, Jiang W (2004) On-line outlier detection and data cleaning[J]. Comput Chem Eng 28:1635\u20131647","journal-title":"Comput Chem Eng"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.ymssp.2018.02.016","volume":"108","author":"R Liu","year":"2018","unstructured":"Liu R, Yang B, Zio E, Chen X (2018) Artificial intelligence for fault diagnosis of rotating machinery: a review[J]. Mech Syst Signal Process 108:33\u201347","journal-title":"Mech Syst Signal Process"},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"108664","DOI":"10.1016\/j.ymssp.2021.108664","volume":"168","author":"J Liu","year":"2022","unstructured":"Liu J, Zhang C, Jiang X (2022) Imbalanced fault diagnosis of rolling bearing using improved MsR-GAN and feature enhancement-driven CapsNet[J]. Mech Syst Signal Process 168:108664","journal-title":"Mech Syst Signal Process"},{"key":"21_CR25","doi-asserted-by":"publisher","first-page":"22869","DOI":"10.1109\/JIOT.2024.3358871","volume":"11","author":"R Liu","year":"2024","unstructured":"Liu R, Xiao D, Lin D, Zhang W (2024) Intelligent bearing anomaly detection for industrial Internet of Things based on auto-encoder Wasserstein generative adversarial network[J]. IEEE Internet Things J 11:22869\u201322879","journal-title":"IEEE Internet Things J"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Liu Y, Li Z, Zhou C, Jiang Y, Sun J, Wang M, He X (2019) Generative adversarial active learning for unsupervised outlier detection. detection[J]. IEEE Transactions on Knowledge and Data Engineering 32(8):1517\u20131528","DOI":"10.1109\/TKDE.2019.2905606"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Ma T, Zhang A (2017) Integrate multi-omic data using affinity network fusion (ANF) for cancer patient clustering. In: 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Kansas City, pp 398\u2013403","DOI":"10.1109\/BIBM.2017.8217682"},{"key":"21_CR28","doi-asserted-by":"publisher","first-page":"3971","DOI":"10.3390\/electronics12183971","volume":"12","author":"MA Panza","year":"2023","unstructured":"Panza MA, Pota M, Esposito M (2023) Anomaly detection methods for industrial applications: a comparative study[J]. Electronics 12:3971","journal-title":"Electronics"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"88","DOI":"10.9781\/ijimai.2023.05.006","volume":"8","author":"M QasimGandapur","year":"2023","unstructured":"QasimGandapur M, Verd\u00fa E (2023) ConvGRU-CNN: Spatiotemporal deep learning for real-world anomaly detection in video surveillance system[J]. IJIMAI 8:88","journal-title":"IJIMAI"},{"key":"21_CR30","doi-asserted-by":"publisher","unstructured":"Rajbahadur GK, Malton AJ, Walenstein A, Hassan AE (2018) A survey of anomaly detection for connected vehicle cybersecurity and safety[C]. 2018 IEEE Intelligent Vehicles Symposium (IV), IEEE, Changshu, pp 421\u2013426. https:\/\/doi.org\/10.1109\/IVS.2018.8500383","DOI":"10.1109\/IVS.2018.8500383"},{"issue":"01","key":"21_CR31","doi-asserted-by":"publisher","first-page":"2050001","DOI":"10.1142\/S0219525920500010","volume":"23","author":"Y Shang","year":"2020","unstructured":"Shang Y (2020) Multi-hop generalized core percolation on complex networks[J]. Adv Complex Syst 23(01):2050001","journal-title":"Adv Complex Syst"},{"key":"21_CR32","doi-asserted-by":"publisher","unstructured":"Sharma A, Jigyasu R, Mathew L, Chatterji S (2018) Bearing fault diagnosis using weighted K-nearest neighbor[C]. 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), IEEE, Tirunelveli, pp 1132\u20131137. https:\/\/doi.org\/10.1109\/ICOEI.2018.8553800","DOI":"10.1109\/ICOEI.2018.8553800"},{"key":"21_CR33","doi-asserted-by":"publisher","unstructured":"Sliti O, Devanne M, Kohler S, Samet N, Weber J, Cudel C (2023) f-AnoGAN for non-destructive testing in industrial anomaly detection[C]. Sixteenth International Conference on Quality Control by Artificial Vision, SPIE, Albi, France, pp 46. https:\/\/doi.org\/10.1117\/12.3000063","DOI":"10.1117\/12.3000063"},{"key":"21_CR34","doi-asserted-by":"publisher","unstructured":"Song H, Li P, Liu H (2021) Deep clustering based fair outlier detection[C]. Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, ACM, Virtual Event Singapore, pp 1481\u20131489. https:\/\/doi.org\/10.1145\/3447548.3467225","DOI":"10.1145\/3447548.3467225"},{"key":"21_CR35","doi-asserted-by":"publisher","first-page":"109607","DOI":"10.1016\/j.patcog.2023.109607","volume":"141","author":"LA Souto Arias","year":"2023","unstructured":"Souto Arias LA, Oosterlee CW, Cirillo P (2023) AIDA: Analytic isolation and distance-based anomaly detection algorithm[J]. Pattern Recog 141:109607","journal-title":"Pattern Recog"},{"key":"21_CR36","doi-asserted-by":"publisher","first-page":"e2296","DOI":"10.1002\/stc.2296","volume":"26","author":"Z Tang","year":"2019","unstructured":"Tang Z, Chen Z, Bao Y, Li H (2019) Convolutional neural network-based data anomaly detection method using multiple information for structural health monitoring[J]. Struct Control Health Monit 26:e2296","journal-title":"Struct Control Health Monit"},{"key":"21_CR37","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TITS.2019.2906038","volume":"21","author":"F van Wyk","year":"2020","unstructured":"van Wyk F, Wang Y, Khojandi A, Masoud N (2020) Real-time sensor anomaly detection and identification in automated vehicles[J]. IEEE Trans Intell Transport Syst 21:1264\u20131276","journal-title":"IEEE Trans Intell Transport Syst"},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1109\/TCYB.2022.3228524","volume":"54","author":"M Wang","year":"2024","unstructured":"Wang M, Zhou D, Chen M (2024) Hybrid variable monitoring mixture model for anomaly detection in industrial processes[J]. IEEE Trans Cybern 54:319\u2013331","journal-title":"IEEE Trans Cybern"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Wang Y, Bernat S, Vinogradov A (2024) BC-GAN: a threshold-free framework for unsupervised early fault detection in rotating machinery[J].\u00a0Expert Syst Appl\u00a0258:124832","DOI":"10.1016\/j.eswa.2024.124832"},{"key":"21_CR40","doi-asserted-by":"publisher","first-page":"12591","DOI":"10.1109\/TKDE.2023.3270293","volume":"35","author":"H Xu","year":"2023","unstructured":"Xu H, Pang G, Wang Y, Wang Y (2023) Deep isolation forest for anomaly detection[J]. IEEE Trans Knowl Data Eng 35:12591\u201312604","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"21_CR41","doi-asserted-by":"publisher","unstructured":"Yan H, Mu H, Yi X, Yang Y, Chen G (2019) Fault diagnosis of rolling bearing with small samples based on wavelet packet theory and random forest[C]. 2019 International Conference on Sensing, Diagnostics, Prognostics, and Control (SDPC), IEEE, Beijing, China, pp. 305\u2013310. https:\/\/doi.org\/10.1109\/SDPC.2019.00062","DOI":"10.1109\/SDPC.2019.00062"},{"key":"21_CR42","doi-asserted-by":"publisher","first-page":"107377","DOI":"10.1016\/j.measurement.2019.107377","volume":"152","author":"W Zhang","year":"2020","unstructured":"Zhang W, Li X, Jia X-D, Ma H, Luo Z, Li X (2020) Machinery fault diagnosis with imbalanced data using deep generative adversarial networks[J]. Measurement 152:107377","journal-title":"Measurement"},{"issue":"7","key":"21_CR43","doi-asserted-by":"publisher","first-page":"8528","DOI":"10.1109\/TII.2022.3218666","volume":"19","author":"J Zhang","year":"2022","unstructured":"Zhang J, Li Y, Xiao W et al (2022) Online spatiotemporal modeling for robust and lightweight device-free localization in nonstationary environments[J]. IEEE Trans Industr Inf 19(7):8528\u20138538","journal-title":"IEEE Trans Industr Inf"},{"key":"21_CR44","doi-asserted-by":"crossref","unstructured":"Zhang J, Li Y, Li Q et al (2023) Variance-constrained local\u2013global modeling for device-free localization under uncertainties[J]. IEEE Trans Ind Inform 20(4):5229\u20135240","DOI":"10.1109\/TII.2023.3330340"},{"key":"21_CR45","doi-asserted-by":"publisher","first-page":"112421","DOI":"10.1016\/j.measurement.2022.112421","volume":"210","author":"H Zhong","year":"2023","unstructured":"Zhong H, Yu S, Trinh H, Lv Y, Yuan R, Wang Y (2023) Fine-tuning transfer learning based on DCGAN integrated with self-attention and spectral normalization for bearing fault diagnosis[J]. Measurement 210:112421","journal-title":"Measurement"},{"key":"21_CR46","doi-asserted-by":"publisher","first-page":"109045","DOI":"10.1016\/j.cie.2023.109045","volume":"177","author":"J Zipfel","year":"2023","unstructured":"Zipfel J, Verworner F, Fischer M, Wieland U, Kraus M, Zschech P (2023) Anomaly detection for industrial quality assurance: a comparative evaluation of unsupervised deep learning models[J]. Comput Ind Eng 177:109045","journal-title":"Comput Ind Eng"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00021-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00021-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00021-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T16:24:18Z","timestamp":1744647858000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00021-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,18]]},"references-count":46,"journal-issue":{"issue":"1-2","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["21"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00021-6","relation":{},"ISSN":["1319-1578"],"issn-type":[{"value":"1319-1578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,18]]},"assertion":[{"value":"7 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"5"}}