{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T06:30:26Z","timestamp":1772605826681,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,23]]},"DOI":"10.1109\/case49439.2021.9551267","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T20:53:51Z","timestamp":1633640031000},"page":"409-415","source":"Crossref","is-referenced-by-count":18,"title":["Anomaly Detection Based on Selection and Weighting in Latent Space"],"prefix":"10.1109","author":[{"given":"Yiwen","family":"Liao","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Bartler","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2016.2578706"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803166"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.2376492"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2015.45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2349359"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2783682"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.2983061"},{"key":"ref8","article-title":"Deep learning for anomaly detection: A survey","author":"Chalapathy","year":"2019","journal-title":"arXiv preprint"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2417501"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref15","volume-title":"High-performance large-scale image recognition without normalization","author":"Brock","year":"2021"},{"key":"ref16","first-page":"4171","article-title":"Bert: Pre-training of deep bidirectional transformers for language understanding","volume-title":"Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers)","author":"Devlin"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSW.2019.8755576"},{"key":"ref19","first-page":"4393","article-title":"Deep one-class classification","volume-title":"International conference on machine learning","author":"Ruff"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902848"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref23","article-title":"Feature selection using batch-wise attenuation and feature mask normalization","author":"Liao","year":"2020","journal-title":"arXiv preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref25","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv preprint"},{"key":"ref26","first-page":"265","article-title":"Tensorflow: A system for large-scale machine learning","volume-title":"12th {USENIX} symposium on operating systems design and implementation ({OSDI} 16)","author":"Abadi","year":"2016"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref28","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref30","article-title":"Anomaly detection using one-class neural networks","author":"Chalapathy","year":"2018","journal-title":"arXiv preprint"}],"event":{"name":"2021 IEEE 17th International Conference on Automation Science and Engineering (CASE)","location":"Lyon, France","start":{"date-parts":[[2021,8,23]]},"end":{"date-parts":[[2021,8,27]]}},"container-title":["2021 IEEE 17th International Conference on Automation Science and Engineering (CASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9551387\/9551265\/09551267.pdf?arnumber=9551267","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T01:10:42Z","timestamp":1706058642000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9551267\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/case49439.2021.9551267","relation":{},"subject":[],"published":{"date-parts":[[2021,8,23]]}}}