{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:01:50Z","timestamp":1730250110813,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/icme46284.2020.9102929","type":"proceedings-article","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T21:40:07Z","timestamp":1591738807000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Peanet: The Products of Experts Autoencoder for Abnormal Detection"],"prefix":"10.1109","author":[{"given":"Xinchao","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Chengwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chunyun","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Haichuan","family":"Song","sequence":"additional","affiliation":[]},{"given":"Lizhuang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Latent space autoregression for novelty detection","author":"davide","year":"2019","journal-title":"Proceedings of the IEEE Conference on CVPR"},{"article-title":"Anomaly detection with generative adversarial networks","year":"2018","author":"lucas","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"ref14","article-title":"Generative adversarial nets","author":"goodfellow ian","year":"2014","journal-title":"NIPS Int Conference"},{"key":"ref15","article-title":"Detecting collective anomalies from multiple spatio-temporal datasets across different domains","author":"yu","year":"2015","journal-title":"the 23rd SIGSPATIAL International Conference"},{"key":"ref16","first-page":"5575","article-title":"Multimodal generative models for scalable weakly-supervised learning","author":"wu","year":"2018","journal-title":"Advances in NIPS"},{"article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","year":"2018","author":"bo","key":"ref17"},{"article-title":"Products of experts","year":"1999","author":"hinton geoffrey","key":"ref18"},{"key":"ref19","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Tech Rep"},{"key":"ref28","first-page":"807","article-title":"Rectified linear units improve restricted boltzmann machines","author":"nair","year":"2010","journal-title":"Proceedings of the 27th ICML"},{"key":"ref4","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","author":"aaron","year":"2017","journal-title":"Workshops at the Thirty-First AAAI Conference"},{"key":"ref27","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"2017","journal-title":"Thirty-First AAAI Conference"},{"key":"ref3","article-title":"Principal component analysis","volume":"2","author":"svante","year":"1987","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"ref6","article-title":"Unsupervised and semi-supervised anomaly detection with lstm neural networks","author":"tolga","year":"2017","journal-title":"arXiv preprint arXiv 1710 09207"},{"key":"ref5","article-title":"Learning deep representations of appearance and motion for anomalous event detection","author":"dan","year":"2015","journal-title":"arXiv preprint arXiv 1510 01553"},{"key":"ref8","article-title":"Adversarial autoencoders","author":"alireza","year":"2015","journal-title":"arXiv preprint arXiv 1511 05271"},{"key":"ref7","article-title":"Stan: spatio-temporal adversarial networks for abnormal event detection","author":"sangmin","year":"2018","journal-title":"IEEE ICASSP 2018"},{"key":"ref2","article-title":"Future frame prediction for anomaly detection&#x2013;a new baseline","author":"wen","year":"2018","journal-title":"Proceedings of the IEEE Conference on CVPR"},{"journal-title":"Auto-encoding variational bayes","year":"2013","author":"kingma diederik","key":"ref9"},{"key":"ref1","article-title":"Adversarially learned one-class classifier for novelty detection","author":"mohammad","year":"2018","journal-title":"Proceedings of the IEEE Conference on CVPR"},{"key":"ref20","article-title":"Anomaly detection using one-class neural networks","author":"chalapathy","year":"2018","journal-title":"arXiv preprint arXiv 1802 06360"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1991.3.1.79"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683414"},{"article-title":"Dcase 2017 challenge setup: Tasks, datasets and baseline system","year":"2017","author":"mesaros","key":"ref23"},{"key":"ref26","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref25","article-title":"Tensorflow: Large-scale machine learning on heterogeneous distributed systems","author":"abadi","year":"2016","journal-title":"arXiv preprint arXiv 1603 04467"}],"event":{"name":"2020 IEEE International Conference on Multimedia and Expo (ICME)","start":{"date-parts":[[2020,7,6]]},"location":"London, United Kingdom","end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE International Conference on Multimedia and Expo (ICME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9099125\/9102711\/09102929.pdf?arnumber=9102929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:26:19Z","timestamp":1656375979000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9102929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icme46284.2020.9102929","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}