{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T04:45:59Z","timestamp":1761108359616,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,12,10]],"date-time":"2020-12-10T00:00:00Z","timestamp":1607558400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,12,10]]},"DOI":"10.1109\/bigdata50022.2020.9378315","type":"proceedings-article","created":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T21:10:21Z","timestamp":1616188221000},"page":"1663-1670","source":"Crossref","is-referenced-by-count":11,"title":["Deep Anomaly Detection with Ensemble-Based Active Learning"],"prefix":"10.1109","author":[{"given":"Xuning","family":"Tang","sequence":"first","affiliation":[]},{"given":"Yihua Shi","family":"Astle","sequence":"additional","affiliation":[]},{"given":"Craig","family":"Freeman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Wikipedia the Free Encyclopedia Web","article-title":"Information Retrieval (Average Precision)","year":"2020","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"205","DOI":"10.21105\/joss.00205","article-title":"hdbscan: Hierarchical density based clustering","volume":"2","author":"mcinnes","year":"2017","journal-title":"Journal of Open Source Software The Open Journal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769"},{"key":"ref15","first-page":"972","article-title":"A Linear Method for Deviation Detection in Large Databases","volume":"1141","author":"arning","year":"1996","journal-title":"KDD"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611970036"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref19","first-page":"4393","article-title":"Deep one-class classification","author":"ruff","year":"2018","journal-title":"International Conference on Machine Learning"},{"year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a high-dimensional distribution","volume":"13","author":"sch\u00f6lkopf","year":"2001","journal-title":"Neural Compute"},{"year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1995.380415"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00087-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481252"},{"key":"ref9","first-page":"170","article-title":"Outlier Detection Using Replicator Neural Networks","author":"hawkins","year":"2000","journal-title":"International Conference on Data Warehousing and Knowledge Discovery"},{"article-title":"Deep semi-supervised anomaly detection","year":"0","author":"ruff","key":"ref1"},{"key":"ref20","first-page":"1","article-title":"Variational Autoencoder based anomaly detection using Reconstruction Probability","volume":"2","author":"an","year":"2015","journal-title":"Special Lecture on IE"},{"key":"ref22","article-title":"Active Learning Literature Survey","author":"settles","year":"0","journal-title":"Computer Sciences Technical Report"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10925-7_1"},{"key":"ref24","article-title":"A generalized active learning approach for unsupervised anomaly detection","volume":"2018","author":"pimentel","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258071"},{"key":"ref26","first-page":"2712","article-title":"Robust random cut forest based anomaly detection on streams","author":"guha","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref25","first-page":"110","article-title":"Ensemble learning","author":"dietterich","year":"2002","journal-title":"The Handbook of Brain Theory and Neural Networks"}],"event":{"name":"2020 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2020,12,10]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2020,12,13]]}},"container-title":["2020 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9377717\/9377728\/09378315.pdf?arnumber=9378315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T16:12:47Z","timestamp":1656346367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9378315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata50022.2020.9378315","relation":{},"subject":[],"published":{"date-parts":[[2020,12,10]]}}}