{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T12:54:57Z","timestamp":1763643297896,"version":"3.28.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1109\/dsaa53316.2021.9564136","type":"proceedings-article","created":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T18:54:28Z","timestamp":1634756068000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["Decoupling Autoencoders for Robust One-vs-Rest Classification"],"prefix":"10.1109","author":[{"given":"Max","family":"Lubbering","sequence":"first","affiliation":[]},{"given":"Michael","family":"Gebauer","sequence":"additional","affiliation":[]},{"given":"Rajkumar","family":"Ramamurthy","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Bauckhage","sequence":"additional","affiliation":[]},{"given":"Rafet","family":"Sifa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"One-class classifier networks for target recognition applications","year":"1993","author":"moya","key":"ref39"},{"key":"ref38","article-title":"Utilizing representation learning for robust text classification under datasetshift","author":"l\u00fcbbering","year":"0","journal-title":"Proceedings of the Conference &#x201C;Lernen Wissen Daten Analysen&#x201D; CEUR Workshop Proceedings"},{"journal-title":"Simple and scalable predictive uncertainty estimation using deep ensembles","year":"2017","author":"lakshminarayanan","key":"ref33"},{"key":"ref32","article-title":"Beyond Temperature Scaling: Obtaining Well-calibrated Multi-class Probabilities with Dirichlet Calibration","author":"kull","year":"0","journal-title":"Advances in neural information processing systems"},{"journal-title":"Auto-encoding variational bayes","year":"2014","author":"kingma","key":"ref31"},{"key":"ref30","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"0","journal-title":"3rd International Conference on Learning Representations ICLR 2015 San Diego CA USA May 7&#x2013;9 2015 Conference Track Proceedings"},{"key":"ref37","article-title":"From Imbalanced Classification to Supervised Outlier Detection Problems: Adversarially Trained Auto Encoders","author":"l\u00fcbbering","year":"0","journal-title":"Artificial Neural Networks and Machine Learning - ICANN 2020"},{"key":"ref36","article-title":"Supervised autoencoder variants for end to end anomaly detection","author":"l\u00fcbbering","year":"0","journal-title":"Pattern Recognition ICPR International Workshops and Challenges"},{"key":"ref35","article-title":"Improving robustness without sacrificing accuracy with patch gaussian augmentation","author":"lopes","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1038\/nature14539","article-title":"Deep learning","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-6736(03)12775-4"},{"key":"ref27","first-page":"2445","article-title":"Pu learning for matrix completion","author":"hsieh","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SIU.2017.7960180"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54765-7"},{"key":"ref1","article-title":"Outlier analysis","author":"aggarwal","year":"2015","journal-title":"Data Mining"},{"key":"ref20","article-title":"Training Independent Subnetworks for Robust Prediction","author":"havasi","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46145-0_17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref24","article-title":"A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks","author":"dan","year":"0","journal-title":"Proceedings of International Conference on Learning Representations"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref26","article-title":"Augmix: A simple data processing method to improve robustness and uncertainty","author":"dan","year":"2019","journal-title":"ArXiv Preprint"},{"journal-title":"Deep anomaly detection with outlier exposure","year":"2019","author":"dan","key":"ref25"},{"key":"ref50","article-title":"Support Vector Method for Novelty Detection","author":"sch\u00f6lkopf","year":"0","journal-title":"Proc of Advances in Neural Information Processing systems"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3347034"},{"key":"ref59","article-title":"Credit Card Fraud Detection Using Autoencoder Neural Network","author":"zou","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref58","first-page":"609","article-title":"Obtaining calibrated probability estimates from decision trees and naive bayesian classifiers","volume":"1","author":"zadrozny","year":"0","journal-title":"ICML"},{"key":"ref57","article-title":"XLNet: Generalized Autoregressive Pretraining for Language Understanding","author":"zhilin","year":"0","journal-title":"Advances in neural information processing systems"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.8"},{"key":"ref54","article-title":"Brain Tumor Anomaly Detection via Latent Regularized Adversarial Network","volume":"abs 2007 4734","author":"wang","year":"2020","journal-title":"CoRR"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-7-91"},{"key":"ref52","article-title":"Uncertainty Estimation Using a Single Deep Deterministic Neural Network","volume":"119","author":"van amersfoort","year":"0","journal-title":"Proceedings of the 37th International Conference on Machine Learning"},{"key":"ref10","article-title":"Learning confidence for out-of-distribution detection in neural networks","author":"devries","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"Probabilistic Modeling for Novelty Detection with Applications to Fraud Identification","author":"domingues","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref40","article-title":"Obtaining Well Calibrated Probabilities Using Bayesian Binning","author":"naeini","year":"0","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref14","first-page":"38","article-title":"Using pu-learning to detect deceptive opinion spam","author":"fusilier","year":"0","journal-title":"Proceedings of the 4th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis"},{"key":"ref15","article-title":"AutoIDS: Auto-encoder based Method for Intrusion Detection System","author":"gharib","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref16","volume":"1","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref17","article-title":"Explaining and Harnessing Adversarial Examples","author":"goodfellow","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref18","article-title":"Generative adversarial networks","author":"goodfellow","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref19","article-title":"On Calibration of Modern Neural Networks","author":"guo","year":"0","journal-title":"International Conference on Machine Learning"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"ref4"},{"journal-title":"Concrete problems in ai safety","year":"2016","author":"amodei","key":"ref3"},{"key":"ref6","article-title":"Anomaly Detection using One-Class Neural Networks","author":"chalapathy","year":"2018","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0493(1950)078<0001:VOFEIT>2.0.CO;2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13563-2_27"},{"key":"ref7","article-title":"Unsupervised Detection of Lesions in Brain MRI using constrained Adversarial Auto-Encoders","author":"chen","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref46","article-title":"Model Evaluation, Model Selection, and Algorithm Selection in Machine Learning","author":"raschka","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref45","article-title":"A comprehensive survey of data mining-based fraud detection research","author":"phua","year":"2010","journal-title":"ArXiv Preprint"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118432"},{"key":"ref47","first-page":"4393","article-title":"Deep one-class classification","author":"ruff","year":"0","journal-title":"Proceedings of the 35th International Conference on Machine Learning Volume 80 of Proceedings of Machine Learning Research"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2019.00038"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref43","article-title":"Data and its (dis)contents: A survey of dataset development and use in machine learning research","author":"paullada","year":"2020","journal-title":"ArXiv"}],"event":{"name":"2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)","start":{"date-parts":[[2021,10,6]]},"location":"Porto, Portugal","end":{"date-parts":[[2021,10,9]]}},"container-title":["2021 IEEE 8th International Conference on Data Science and Advanced Analytics (DSAA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9564091\/9564109\/09564136.pdf?arnumber=9564136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:47:22Z","timestamp":1652183242000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9564136\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/dsaa53316.2021.9564136","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}