{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:21:25Z","timestamp":1730204485568,"version":"3.28.0"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,8]],"date-time":"2023-03-08T00:00:00Z","timestamp":1678233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3,8]]},"DOI":"10.1109\/ccwc57344.2023.10099329","type":"proceedings-article","created":{"date-parts":[[2023,4,18]],"date-time":"2023-04-18T17:28:01Z","timestamp":1681838881000},"page":"0229-0237","source":"Crossref","is-referenced-by-count":0,"title":["Generatively Augmented Neural Network Watchdog for Image Classification Networks"],"prefix":"10.1109","author":[{"given":"Justin M.","family":"Bui","sequence":"first","affiliation":[{"name":"Baylor University,Department of Electrical and Computer Engineering,Waco,TX"}]},{"given":"Glauco A.","family":"Amigo","sequence":"additional","affiliation":[{"name":"Baylor University,Department of Electrical and Computer Engineering,Waco,TX"}]},{"given":"Robert J.","family":"Marks","sequence":"additional","affiliation":[{"name":"Baylor University,Department of Electrical and Computer Engineering,Waco,TX"}]}],"member":"263","reference":[{"article-title":"Tensorflow: A system for large-scale machine learning","volume-title":"12th USENIX symposium on operating systems design and implementation (OSDI 16)","author":"Martin","key":"ref1"},{"key":"ref2","article-title":"Toward Metrics for Differentiating Out-of-Distribution Sets","author":"Mahdieh","year":"2019","journal-title":"arXiv preprint"},{"key":"ref3","article-title":"Cascade Watchdog: A Multi-tiered Adversarial Guard for Outlier Detection","author":"Galan","year":"2021","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/36.843009"},{"key":"ref5","article-title":"Autoencoder Watchdog Outlier Detection for Classifiers","author":"Justin","year":"2020","journal-title":"arXiv preprint"},{"key":"ref6","article-title":"Symbiotic Hybrid Neural Network Watchdog For Outlier Detection","author":"Justin","year":"2021","journal-title":"arXiv preprint"},{"key":"ref7","first-page":"24","article-title":"Measuring image simi-larity: an overview of some useful applications","volume":"16.1","author":"Edmond","year":"2013","journal-title":"IEEE Instrumentation & Measurement Magazine"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0174202"},{"key":"ref9","article-title":"Training connectionist networks with queries and selective sampling","volume-title":"Advances in Neural Network Information Processing Systems 2","author":"Cohn","year":"1990"},{"key":"ref10","first-page":"53","article-title":"Generative adversarial networks: An overview","volume":"35.1","author":"Antonia","year":"2018","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.891679"},{"key":"ref12","first-page":"85","article-title":"Detection and Localization of Shorted-Turns in the DC-Field Winding of Turbine-Generator Rotors Using Novelty Filters and Fuzzified Neural Networks","volume-title":"Fuzzy System Theory in Electrical Power Engineering","author":"El-Sharkawi","year":"1998"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/acssc.2003.1292214"},{"key":"ref14","article-title":"Classification of Common Waveforms Including a Watchdog for Unknown Signals","author":"Fredieu","year":"2021","journal-title":"arXiv preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100370"},{"key":"ref16","article-title":"Deep anomaly detection using geo-metric transformations","author":"Izhak","year":"2018","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0041"},{"key":"ref18","article-title":"Generative adversarial nets","volume":"27","author":"Ian","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref19","first-page":"139","article-title":"Generative adversarial networks","volume":"63.11","author":"Ian","year":"2020","journal-title":"Communications of the ACM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/60.749142"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.08.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2021.3056669"},{"key":"ref23","article-title":"Deep anomaly detection with outlier exposure","author":"Dan","year":"2018","journal-title":"arXiv preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137541"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137824"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137541"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1990.137824"},{"key":"ref28","first-page":"209","article-title":"Location of Operating Points on the Dynamic Security Border Using Constrained Neural Network Inversion","volume-title":"Proceedings of the International Conference on Intelligent Systems Applications to Power Systems (ISAP)","author":"Jensen"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/5.784232"},{"issue":"9","key":"ref30","first-page":"215","article-title":"Power Security Boundary Enhancement Using Evolutionary-Based Query Learning","volume":"7","author":"Craig","year":"1999","journal-title":"Engineering Intelligent Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1117\/12.477771"},{"article-title":"A style-based generator architecture for generative adversarial networks","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Tero","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2002.1004392"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/UT.2017.7890316"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.06.008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2013-130"},{"article-title":"Least squares generative adversarial networks","volume-title":"Proceedings of the IEEE international conference on computer vision","author":"Xudong","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178320"},{"key":"ref39","article-title":"Unrolled generative adversarial networks","author":"Luke","year":"2016","journal-title":"arXiv preprint"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IIPHDW.2018.8388338"},{"key":"ref41","first-page":"2872","article-title":"Set Constraint Discovery: Missing Sensor Data Restoration Using Auto-Associative Regression Machines","volume-title":"Proceedings of the 2002 International Joint Conference on Neural Networks, 2002 IEEE World Congress on Computational Intelligence","author":"Sreeram"},{"article-title":"Anomaly detection with multiple-hypotheses predictions","volume-title":"International Conference on Machine Learning. PMLR","author":"Nguyen","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ANN.1991.213500"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106384"},{"key":"ref45","article-title":"Chal-lenges in deploying machine learning: a survey of case studies","author":"Andrei","year":"2020","journal-title":"arXiv preprint"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2812809"},{"key":"ref47","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Adam","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref48","article-title":"The effectiveness of data augmen-tation in image classification using deep learning","author":"Luis","year":"2017","journal-title":"arXiv preprint"},{"key":"ref49","first-page":"29","article-title":"Anomaly detection using artificial neural network","volume":"2.1","author":"Manoranjan","year":"2012","journal-title":"International Journal of Engineering Sciences & Emerging Technologies"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2728010"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1995.487487"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5244\/C.9.35"},{"article-title":"Development Method-ologies for Safety Critical Machine Learning Applications in the Auto-motive Domain: A Survey","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Martin","key":"ref53"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.02.004"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0197-0"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2011.6033395"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/60.507183"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628742"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2002.1007605"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2003.1224051"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.1991.575420"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/36.175336"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.930649"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1117\/12.2293408"},{"key":"ref68","article-title":"Time series data augmentation for deep learning: A survey","author":"Qingsong","year":"2020","journal-title":"arXiv preprint"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref70","article-title":"Data augmentation in emotion classification using generative adversarial networks","author":"Xinyue","year":"2017","journal-title":"arXiv preprint"}],"event":{"name":"2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)","start":{"date-parts":[[2023,3,8]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2023,3,11]]}},"container-title":["2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10099037\/10098906\/10099329.pdf?arnumber=10099329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T23:59:31Z","timestamp":1709251171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10099329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,8]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/ccwc57344.2023.10099329","relation":{},"subject":[],"published":{"date-parts":[[2023,3,8]]}}}