{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:09:35Z","timestamp":1725606575010},"reference-count":54,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892011","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Transfer Anomaly Detection for Maximizing the Partial AUC"],"prefix":"10.1109","author":[{"given":"Atsutoshi","family":"Kumagai","sequence":"first","affiliation":[{"name":"NTT Computer and Data Science Laboratories"}]},{"given":"Tomoharu","family":"Iwata","sequence":"additional","affiliation":[{"name":"NTT Communication Science Laboratories"}]},{"given":"Taishi","family":"Nishiyama","sequence":"additional","affiliation":[{"name":"NTT Security,Japan"}]},{"given":"Yasuhiro","family":"Fujiwara","sequence":"additional","affiliation":[{"name":"NTT Computer and Data Science Laboratories"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Conditional neural processes","author":"garnelo","year":"2018","journal-title":"ICML"},{"key":"ref38","article-title":"Meta-learning without memorization","author":"yin","year":"2020","journal-title":"ICLRE"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/TKDE.2009.191"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1609\/aaai.v34i04.5846"},{"key":"ref31","article-title":"Learning imbalanced datasets with label-distribution-aware margin loss","author":"cao","year":"2019","journal-title":"NeurIPS"},{"key":"ref30","article-title":"Deep semi-supervised anomaly detection","author":"ruff","year":"2020","journal-title":"ICLRE"},{"key":"ref37","article-title":"Meta-learning with implicit gradients","author":"rajeswaran","year":"2019","journal-title":"NeurIPS"},{"key":"ref36","article-title":"Prototypical networks for few-shot learning","author":"snell","year":"2017","journal-title":"NeurIPS"},{"key":"ref35","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","author":"finn","year":"2017","journal-title":"ICML"},{"key":"ref34","article-title":"Zero-shot domain adaptation without domain semantic descriptors","author":"kumagai","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1162\/089976601750264965"},{"key":"ref29","article-title":"Autoencoding binary classifiers for supervised anomaly detection","author":"yamanaka","year":"2019","journal-title":"PRICAI"},{"key":"ref2","first-page":"21","article-title":"Data mining for network intrusion detection","author":"dokas","year":"0","journal-title":"Proc NSF Workshop on next Generation Data Mining"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1541880.1541882"},{"key":"ref20","article-title":"Transfer anomaly detection by inferring latent domain representations","author":"kumagai","year":"2019","journal-title":"NeurIPS"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/AIPR.2008.4906450"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1107622.1107648"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1148\/radiol.2020200642"},{"key":"ref23","article-title":"Deep transfer learning for person re-identification","author":"geng","year":"2016","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2689746.2689747"},{"key":"ref25","article-title":"Deep learning for anomaly detection: A survey","author":"chalapathy","year":"2019","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/ICDM.2017.27"},{"key":"ref51","article-title":"Meta-learning for relative density-ratio estimation","author":"kumagai","year":"2021","journal-title":"NeurIPS"},{"year":"2017","author":"paszke","journal-title":"Automatic differentiation in pytorch","key":"ref54"},{"key":"ref53","article-title":"Deep one-class classification","author":"ruff","year":"2018","journal-title":"ICML"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/ICCV.2015.293"},{"key":"ref10","article-title":"Scalable nonlinear auc maximization methods","author":"khalid","year":"2018","journal-title":"ECML PKDD"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-540-85735-8_14"},{"key":"ref40","article-title":"Neural processes","author":"garnelo","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1198\/016214501753168136"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1089\/big.2020.0069"},{"key":"ref14","article-title":"A structural svm based approach for optimizing partial auc","author":"narasimhan","year":"2013","journal-title":"ICML"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/2487575.2487674"},{"key":"ref16","article-title":"Partial auc maximization via nonlinear scoring functions","author":"ueda","year":"2018","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1186\/1471-2105-11-314"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1111\/1541-0420.00071"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-981-16-8531-6_3"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.jbi.2012.08.004"},{"key":"ref3","article-title":"Survey of fraud detection techniques","author":"kou","year":"2004","journal-title":"ICNSC"},{"key":"ref6","article-title":"Auc: a statistically consistent and more discriminating measure than accuracy","author":"ling","year":"2003","journal-title":"IJCAI"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref8","article-title":"Auc maximizing support vector learning","author":"brefeld","year":"0","journal-title":"Workshop on ROC Analysis in Machine Learning"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref49","article-title":"Adam: a method for stochastic optimization","author":"kingma","year":"2014","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1609\/aaai.v29i1.9577"},{"key":"ref46","article-title":"Auc optimization vs. error rate minimization","author":"cortes","year":"2004","journal-title":"NeurIPS"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/978-3-030-58558-7_8"},{"key":"ref48","article-title":"Set trans-former: A framework for attention-based permutation-invariant neural networks","author":"lee","year":"2019","journal-title":"ICML"},{"key":"ref47","article-title":"Deep sets","author":"zaheer","year":"2017","journal-title":"NeurIPS"},{"key":"ref42","article-title":"Meta-learning one-class classifiers with eigenvalue solvers for supervised anomaly detection","author":"iwata","year":"2021","journal-title":"ArXiv Preprint"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/3442381.3449922"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1609\/aaai.v35i8.16913"},{"year":"2016","author":"andrews","journal-title":"Transfer Representation-Learning for Anomaly Detection","key":"ref43"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892011.pdf?arnumber=9892011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:56:41Z","timestamp":1667516201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892011","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}