{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:49:23Z","timestamp":1746859763124,"version":"3.38.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,8]]},"DOI":"10.1109\/globecom52923.2024.10901747","type":"proceedings-article","created":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T17:30:35Z","timestamp":1741714235000},"page":"1215-1220","source":"Crossref","is-referenced-by-count":1,"title":["A Deep Learning Approach for Outlier Detection in Heterogeneous\/Non-IID Data"],"prefix":"10.1109","author":[{"given":"Phai Vu","family":"Dinh","sequence":"first","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]},{"given":"Diep N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]},{"given":"Hoang Dinh","family":"Thai","sequence":"additional","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]},{"given":"Quang Uy","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Hanoi,Vietnam"}]},{"given":"Trung Hieu","family":"Le","sequence":"additional","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]},{"given":"Son Pham","family":"Bao","sequence":"additional","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]},{"given":"Eryk","family":"Dutkiewicz","sequence":"additional","affiliation":[{"name":"University of Technology,School of Electrical and Data Engineering,Sydney,Australia"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ACCESS.2023.3294096"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1093\/comjnl\/bxt084"},{"key":"ref3","first-page":"425","article-title":"Gaussian process subset scanning for anomalous pattern detection in non-iid data","volume-title":"Proc. AISTATS","author":"Herlands"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/s10618-021-00750-y"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.24963\/ijcai.2017\/360"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/NICS.2016.7725645"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ICMLC.2003.1260106"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3439950"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1137\/1.9781611974973.11"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3097983.3098052"},{"volume-title":"Proc. ICLR","author":"Zong","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TNNLS.2021.3086137"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1609\/aaai.v34i04.5755"},{"key":"ref14","first-page":"1","article-title":"Perfedmask: Personalized federated learning with optimized masking vectors","volume-title":"Proc. the 11th ICLR","author":"Setayesh"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/ICC51166.2024.10622942"},{"year":"2024","author":"Dinh","article-title":"Multiple-input auto-encoder guided feature selection for iot intrusion detection systems","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1080\/03610920701215126"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1186\/s40537-020-00390-x"}],"event":{"name":"GLOBECOM 2024 - 2024 IEEE Global Communications Conference","start":{"date-parts":[[2024,12,8]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2024,12,12]]}},"container-title":["GLOBECOM 2024 - 2024 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10900933\/10900934\/10901747.pdf?arnumber=10901747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T05:25:19Z","timestamp":1741757119000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10901747\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/globecom52923.2024.10901747","relation":{},"subject":[],"published":{"date-parts":[[2024,12,8]]}}}