{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:53:49Z","timestamp":1765356829267,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:00:00Z","timestamp":1607644800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IR"],"published-print":{"date-parts":[[2021,9,21]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>This study aims to address the challenge of training a detection model for the robot to detect the abnormal samples in the industrial environment, while abnormal patterns are very rare under this condition.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors propose a new model with double encoder\u2013decoder (DED) generative adversarial networks to detect anomalies when the model is trained without any abnormal patterns. The DED approach is used to map high-dimensional input images to a low-dimensional space, through which the latent variables are obtained. Minimizing the change in the latent variables during the training process helps the model learn the data distribution. Anomaly detection is achieved by calculating the distance between two low-dimensional vectors obtained from two encoders.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The proposed method has better accuracy and F1 score when compared with traditional anomaly detection models.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>A new architecture with a DED pipeline is designed to capture the distribution of images in the training process so that anomalous samples are accurately identified. A new weight function is introduced to control the proportion of losses in the encoding reconstruction and adversarial phases to achieve better results. An anomaly detection model is proposed to achieve superior performance against prior state-of-the-art approaches.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ir-09-2020-0200","type":"journal-article","created":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T18:31:04Z","timestamp":1607625064000},"page":"643-648","source":"Crossref","is-referenced-by-count":9,"title":["An anomaly detection method based on double encoder\u2013decoder generative adversarial networks"],"prefix":"10.1108","volume":"48","author":[{"given":"Hui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tinglong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Jake","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Baole","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yirong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2020,12,11]]},"reference":[{"issue":"1","key":"key2021091915523632200_ref001","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","article-title":"Unsupervised real-time anomaly detection for streaming data","volume":"262","year":"2017","journal-title":"Neurocomputing"},{"year":"2018","key":"key2021091915523632200_ref002","article-title":"GANomaly: semi-Supervised anomaly detection via adversarial training"},{"key":"key2021091915523632200_ref003","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"12","year":"2015","journal-title":"Special Lecture on IE"},{"issue":"6","key":"key2021091915523632200_ref004","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.jnca.2016.02.021","article-title":"Mining social networks for anomalies: methods and challenges","volume":"68","year":"2016","journal-title":"Journal of Network and Computer Applications"},{"year":"2019","key":"key2021091915523632200_ref005","article-title":"Deep learning for anomaly detection: a survey"},{"issue":"9","key":"key2021091915523632200_ref006","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.engappai.2014.05.007","article-title":"Ensemble aggregation methods for relocating models of rare events","volume":"34","year":"2014","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"key2021091915523632200_ref007","unstructured":"Dimokranitou, A. and Gavriil, T. (2017), \u201cAdversarial autoencoders for anomalous event detection in images\u201d, ProQuest Dissertations and Theses, pp. 1-41."},{"year":"2016","key":"key2021091915523632200_ref008","article-title":"Adversarially learned inference"},{"issue":"1","key":"key2021091915523632200_ref009","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TIP.2011.2159730","article-title":"Anomaly detection and reconstruction from random projections","volume":"21","year":"2011","journal-title":"IEEE Transactions on Image Processing"},{"issue":"21","key":"key2021091915523632200_ref010","doi-asserted-by":"publisher","first-page":"5","DOI":"10.5120\/7470-0475","article-title":"Anomaly detection based on machine learning dimensionality reduction using PCA and classification using SVM","volume":"47","year":"2012","journal-title":"International Journal of Computer Applications"},{"key":"key2021091915523632200_ref011","first-page":"2672","article-title":"Generative adversarial nets","volume":"2","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"key":"key2021091915523632200_ref012","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1002\/ett.3647","article-title":"Clustering-based real-time anomaly detection \u2013 a breakthrough in big data technologies","year":"2019","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"key2021091915523632200_ref013","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.neucom.2018.06.078","article-title":"A survey on deep learning based bearing fault diagnosis","volume":"335","year":"2019","journal-title":"Neurocomputing"},{"key":"key2021091915523632200_ref014","first-page":"1866","article-title":"Stacked generative adversarial networks","year":"2017","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"year":"2015","key":"key2021091915523632200_ref015","article-title":"Batch normalization: accelerating deep network training by reducing internal covariate shift"},{"key":"key2021091915523632200_ref016","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.asoc.2019.105650","article-title":"Unsupervised anomaly detection in unmanned aerial vehicles","volume":"83","year":"2019","journal-title":"Applied Soft Computing"},{"issue":"2","key":"key2021091915523632200_ref017","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/jimaging4020036","article-title":"An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos","volume":"4","year":"2018","journal-title":"Journal of Imaging"},{"key":"key2021091915523632200_ref018","unstructured":"Krizhevsky, A. Nair, V. and Hinton, G. (2014), \u201cThe cifar-10 dataset\u201d, online: www.cs.toronto.edu\/kriz\/cifar.html"},{"year":"2016","key":"key2021091915523632200_ref019","article-title":"Anomaly detection in video using predictive convolutional long short-term memory networks"},{"key":"key2021091915523632200_ref020","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/ICPR.2010.493","article-title":"CUDA implementation of deformable pattern recognition and its application to MNIST handwritten digit database","volume":"202","year":"2010","journal-title":"Respiratory Physiology and Neurobiology"},{"issue":"7","key":"key2021091915523632200_ref021","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.neucom.2018.12.041","article-title":"Exploiting the generative adversarial framework for one-class multi-dimensional fault detection","volume":"332","year":"2019","journal-title":"Neurocomputing"},{"year":"2016","key":"key2021091915523632200_ref022","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks"},{"key":"key2021091915523632200_ref023","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-019-7702-5","article-title":"Unsupervised deep learning system for local anomaly event detection in crowded scenes","volume":"54","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"key2021091915523632200_ref024","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/ICIP.2017.8296547","article-title":"Abnormal event detection in videos using generative adversarial nets","volume-title":"IEEE International Conference on Image Processing","year":"2017"},{"key":"key2021091915523632200_ref025","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/CVPRW.2015.7301284","article-title":"Real-time anomaly detection and localization in crowded scenes","volume-title":"IEEE Conference on Computer Vision and Pattern Recognition Workshops","year":"2015"},{"key":"key2021091915523632200_ref026","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","article-title":"Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","year":"2017","journal-title":"Information Processing in Medical Imaging"},{"key":"key2021091915523632200_ref027","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","article-title":"f-AnoGAN: fast unsupervised anomaly detection with generative adversarial networks","volume":"54","year":"2019","journal-title":"Medical Image Analysis"},{"issue":"3","key":"key2021091915523632200_ref028","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10845-019-01476-x","article-title":"Segmentation-based deep-learning approach for surface-defect detection","volume":"31","year":"2019","journal-title":"Journal of Intelligent Manufacturing"},{"key":"key2021091915523632200_ref029","doi-asserted-by":"publisher","first-page":"107964","DOI":"10.1109\/ACCESS.2019.2932769","article-title":"Progress in outlier detection techniques: a survey","volume":"7","year":"2019","journal-title":"IEEE Access"},{"year":"2019","key":"key2021091915523632200_ref030","article-title":"Efficient GAN-based anomaly detection"},{"issue":"11","key":"key2021091915523632200_ref031","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1016\/j.renene.2018.05.024","article-title":"Anomaly detection and fault analysis of wind turbine components based on deep learning network","volume":"127","year":"2018","journal-title":"Renewable Energy"},{"key":"key2021091915523632200_ref032","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1145\/3097983.3098052","article-title":"Anomaly detection with robust deep autoencoders","volume-title":"The 23rd ACM SIGKDD International Conference","year":"2017"}],"container-title":["Industrial Robot: the international journal of robotics research and application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IR-09-2020-0200\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IR-09-2020-0200\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:39:57Z","timestamp":1753393197000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ir\/article\/48\/5\/643-648\/176262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,11]]},"references-count":32,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,12,11]]},"published-print":{"date-parts":[[2021,9,21]]}},"alternative-id":["10.1108\/IR-09-2020-0200"],"URL":"https:\/\/doi.org\/10.1108\/ir-09-2020-0200","relation":{},"ISSN":["0143-991X","0143-991X"],"issn-type":[{"type":"print","value":"0143-991X"},{"type":"print","value":"0143-991X"}],"subject":[],"published":{"date-parts":[[2020,12,11]]}}}