{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:56:20Z","timestamp":1764402980832,"version":"3.41.2"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ieem44572.2019.8978509","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T21:27:12Z","timestamp":1580765232000},"page":"1031-1037","source":"Crossref","is-referenced-by-count":14,"title":["Case Study: A Semi-Supervised Methodology for Anomaly Detection and Diagnosis"],"prefix":"10.1109","author":[{"given":"A.","family":"Morales-Forero","sequence":"first","affiliation":[{"name":"Mathematics and Industrial Engineering (MAGI), Ecole Polytechnique de Montreal,Montreal,Canada"}]},{"given":"S.","family":"Bassetto","sequence":"additional","affiliation":[{"name":"Mathematics and Industrial Engineering (MAGI), Ecole Polytechnique de Montreal,Montreal,Canada"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/j.patcog.2014.11.007"},{"year":"2018","author":"akcay","journal-title":"GANomaly Semi-supervised anomaly detection via adversarial training","key":"ref11"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3178876.3185996"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1093\/biomet\/70.1.41"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.18637\/jss.v045.i07"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-319-93040-4_21"},{"year":"2012","author":"russell","journal-title":"Data-Driven Methods for Fault Detection and Diagnosis in Chemical Processes","key":"ref16"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1155\/2014\/836895","article-title":"Study on support vector machine-based fault detection in Tennessee Eastman Process","volume":"2014","author":"yin","year":"2014","journal-title":"Abstract and Applied Analysis"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.chemolab.2015.11.010"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1002\/aic.16497"},{"key":"ref4","article-title":"An analysis of unsupervised pre-training in light of recent advances","author":"paine","year":"2014","journal-title":"CoRR vol abs\/1412 6597"},{"key":"ref3","first-page":"97","article-title":"Unsupervised and transfer learning challenge: a deep learning approach","author":"mesnil","year":"0","journal-title":"Proceedings of the 2011 International Conference on Unsupervised and Transfer Learning workshop-Volume 27 JMLR org"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1613\/jair.3623"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.matcom.2010.02.007"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ICCCT.2013.6749614"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1155\/2017\/8501683"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIT.1970.1054472"},{"year":"2017","author":"tilouche","journal-title":"Nouvelle approche de ma&#x00EE;trise de processus int&#x00E9;grant les cartes de contr&#x00F4;le multidimensionnelles et les graphes en coordonnes parall&#x00E8;les","key":"ref1"},{"key":"ref9","article-title":"A novel anomaly detection scheme based on principal component classifier","author":"shyu","year":"2003","journal-title":"MIAMI UNIV CORAL GABLES FL DEPT OF ELECTRICAL AND COMPUTER ENGINEERING"},{"key":"ref20","first-page":"1929","article-title":"Dropout: a simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"The Journal of Machine Learning Research"},{"year":"2016","author":"goodfellow","journal-title":"Deep Learning","key":"ref22"},{"key":"ref21","first-page":"1019","article-title":"A theoretically grounded application of dropout in recurrent neural networks","author":"gal","year":"2016","journal-title":"Advances in neural information processing systems"},{"year":"2017","author":"rieth","journal-title":"Additional Tennessee Eastman Process simulation data for anomaly detection evaluation","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/0098-1354(93)80018-I"}],"event":{"name":"2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2019,12,15]]},"location":"Macao, China","end":{"date-parts":[[2019,12,18]]}},"container-title":["2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961317\/8978490\/08978509.pdf?arnumber=8978509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:39:48Z","timestamp":1753731588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8978509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/ieem44572.2019.8978509","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}