{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:06:58Z","timestamp":1771614418372,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/ijcnn48605.2020.9207209","type":"proceedings-article","created":{"date-parts":[[2020,9,30]],"date-time":"2020-09-30T00:40:33Z","timestamp":1601426433000},"page":"1-9","source":"Crossref","is-referenced-by-count":30,"title":["Simple and Effective Prevention of Mode Collapse in Deep One-Class Classification"],"prefix":"10.1109","author":[{"given":"Penny","family":"Chong","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Ruff","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Kloft","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Binder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.5244\/C.30.87","article-title":"Wide residual networks","author":"zagoruyko","year":"2016"},{"key":"ref38","article-title":"Automatic differentiation in pytorch","author":"paszke","year":"2017"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296985"},{"key":"ref32","article-title":"Wikiart.org - visual art encyclopedia","year":"0"},{"key":"ref31","article-title":"The PASCAL Visual Object Classes Challenge 2012 (VOC2012) Results","author":"everingham","year":"0"},{"key":"ref30","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref37","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963436"},{"key":"ref34","article-title":"Feature squeezing: Detecting adversarial examples in deep neural networks","author":"xu","year":"2017"},{"key":"ref10","first-page":"582","article-title":"Support vector method for novelty detection","author":"sch\u00f6lkopf","year":"2000","journal-title":"Advances in neural information processing systems"},{"key":"ref40","article-title":"Keras","author":"chollet","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref13","first-page":"4393","article-title":"Deep one-class classification","author":"ruff","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref14","article-title":"Deep semi-supervised anomaly detection","author":"ruff","year":"2019"},{"key":"ref15","article-title":"Towards principled methods for training generative adversarial networks","author":"arjovsky","year":"0"},{"key":"ref16","first-page":"2234","article-title":"Improved techniques for training gans","author":"salimans","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref18","article-title":"Robust anomaly detection in images using adversarial autoencoders","author":"beggel","year":"2019"},{"key":"ref19","first-page":"3","article-title":"Image anomaly detection with generative adversarial networks","author":"deecke","year":"2018","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.514"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.428"},{"key":"ref3","article-title":"Deep structured energy based models for anomaly detection","author":"zhai","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2017.36"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/089976604773135104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2816564"},{"key":"ref8","first-page":"665","article-title":"Anomaly detection with robust deep autoencoders","author":"zhou","year":"0"},{"key":"ref7","first-page":"211","article-title":"A classification framework for anomaly detection","volume":"6","author":"steinwart","year":"2005","journal-title":"Journal of Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_3"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","article-title":"Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","author":"schlegl","year":"2017","journal-title":"International Conference on Information Processing in Medical Imaging"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref20","article-title":"Efficient gan-based anomaly detection","author":"zenati","year":"2018"},{"key":"ref22","first-page":"9758","article-title":"Deep anomaly detection using geometric transformations","author":"golan","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref21","first-page":"622","article-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training","author":"akcay","year":"2018","journal-title":"Asian Conference on Computer Vision"},{"key":"ref24","first-page":"3308","article-title":"Veegan: Reducing mode collapse in gans using implicit variational learning","author":"srivastava","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref23","article-title":"Mode regularized generative adversarial networks","author":"che","year":"2016"},{"key":"ref26","article-title":"Began: Boundary equilibrium generative adversarial networks","author":"berthelot","year":"2017"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01234-2_13"}],"event":{"name":"2020 International Joint Conference on Neural Networks (IJCNN)","location":"Glasgow, United Kingdom","start":{"date-parts":[[2020,7,19]]},"end":{"date-parts":[[2020,7,24]]}},"container-title":["2020 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9200848\/9206590\/09207209.pdf?arnumber=9207209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:53:45Z","timestamp":1656453225000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9207209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/ijcnn48605.2020.9207209","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}