{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:23:24Z","timestamp":1740101004201,"version":"3.37.3"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000163","name":"ARC","doi-asserted-by":"publisher","award":["DP180100966,DP210101347"],"award-info":[{"award-number":["DP180100966,DP210101347"]}],"id":[{"id":"10.13039\/100000163","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892076","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Diminishing Empirical Risk Minimization for Unsupervised Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Shaoshen","family":"Wang","sequence":"first","affiliation":[{"name":"Australian Artificial Intelligence Institute, University of Technology Sydney,Sydney,Australia"}]},{"given":"Yanbin","family":"Liu","sequence":"additional","affiliation":[{"name":"The University of Western Australia,Centre for Medical Research,Perth,Australia"}]},{"given":"Ling","family":"Chen","sequence":"additional","affiliation":[{"name":"Australian Artificial Intelligence Institute, University of Technology Sydney,Sydney,Australia"}]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Australian Artificial Intelligence Institute, University of Technology Sydney,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.ins.2011.08.011","article-title":"Toward a more practical unsupervised anomaly detection system","volume":"231","author":"j","year":"2013","journal-title":"Information Sciences"},{"key":"ref38","article-title":"Certifying some distri-butional robustness with principled adversarial training","author":"a","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref33","first-page":"1","article-title":"Healthcare and anomaly detection: using machine learning to predict anomalies in heart rate data","author":"e","year":"2020","journal-title":"AI & Society"},{"key":"ref32","first-page":"4393","article-title":"International conference on machine learning","author":"l","year":"2018","journal-title":"Deep one-class classification"},{"journal-title":"ODDS Library","year":"2016","author":"rayana","key":"ref31"},{"key":"ref30","article-title":"Fraud detection: A sys-tematic literature review of graph-based anomaly detection approaches","volume":"133","author":"t","year":"2020","journal-title":"Decision Support Systems"},{"key":"ref37","first-page":"307","article-title":"Outlier detection: applications and techniques","volume":"9","author":"k","year":"2012","journal-title":"International Journal of Computer Science issues (IJCSI)"},{"key":"ref36","first-page":"5739","article-title":"International Conference on Machine Learning","author":"y","year":"2019","journal-title":"Learning with bad training data via iterative trimmed loss minimization"},{"key":"ref35","first-page":"146","article-title":"Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","author":"t","year":"0","journal-title":"International Conference on In-formation Processing in Medical Imaging"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","article-title":"f-anogan: Fast unsupervised anomaly detection with generative adversarial networks","volume":"54","author":"t","year":"2019","journal-title":"Medical Image Analysis"},{"key":"ref28","first-page":"89","article-title":"Ensemble of exemplar-svms for object detection and beyond","author":"t","year":"0","journal-title":"2011 International Conference on Computer Vision"},{"key":"ref27","first-page":"1517","article-title":"Generative adversarial active learning for unsupervised outlier detection","volume":"32","author":"y","year":"2019","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref29","first-page":"1","article-title":"Deep learning for anomaly detection: A review","volume":"54","author":"g","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref2","first-page":"1","article-title":"Clustering and unsupervised anomaly detection with 1 2 normalized deep auto-encoder represen-tations","author":"c","year":"2018","journal-title":"2018 International Joint Conference on Neural Networks (IJCNN)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54765-7"},{"journal-title":"On human-aligned risk minimization","year":"2019","author":"l","key":"ref20"},{"key":"ref22","article-title":"Tilted empirical risk minimization","volume":"1162","author":"t","year":"2007","journal-title":"ArXiv Preprint"},{"key":"ref21","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","volume":"38","author":"k","year":"2005","journal-title":"Proceedings of the Twenty-eighth Australasian Conference on Computer Science"},{"key":"ref24","article-title":"Rca: A deep collab-orative autoencoder approach for anomaly detection","author":"b","year":"2021","journal-title":"Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI-21)"},{"key":"ref23","first-page":"2980","article-title":"Proceedings of the IEEE international conference on computer vision","author":"t y","year":"2017","journal-title":"Focal loss for dense object detection"},{"key":"ref26","article-title":"Online active learning for drifting data streams","author":"s","year":"2021","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"ref25","first-page":"413","article-title":"Isolation forest","author":"f t","year":"2008","journal-title":"2008 Eighth IEEE International Conference on Data Mining"},{"key":"ref10","article-title":"A meta-analysis of the anomaly detection problem","volume":"1158","author":"a","year":"2015","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection","author":"d","year":"2019","journal-title":"CVPR"},{"key":"ref40","article-title":"Anomaly detection for industrial control system based on autoencoder neural network","author":"c","year":"2020","journal-title":"Wireless Commu-nications and Mobile Computing"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","article-title":"Multilayer feedforward networks are universal approximators","volume":"2","author":"k","year":"1989","journal-title":"Neural Networks"},{"key":"ref13","article-title":"Learning data-driven curriculum for very deep neural networks on corrupted labels","author":"l","year":"0","journal-title":"ECOC 2017 arXiv preprint arXiv"},{"key":"ref14","first-page":"2304","article-title":"International Conference on Machine Learning","author":"l","year":"2018","journal-title":"Mentornet Learning data-driven curriculum for very deep neural networks on corrupted labels"},{"key":"ref15","article-title":"Biased importance sampling for deep neural network training","author":"a","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref16","article-title":"Learning from noisy singly-labeled data","author":"a","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref17","article-title":"Auto-encoding variational bayes","author":"d p","year":"2013","journal-title":"ArXiv Preprint"},{"key":"ref18","first-page":"2","article-title":"Self-paced learning for latent variable models","volume":"1","author":"m p","year":"2010","journal-title":"NIPS"},{"key":"ref19","article-title":"Robust subspace recovery layer for un-supervised anomaly detection","author":"c h","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref4","first-page":"1","volume":"58","author":"e j","year":"2011","journal-title":"Robust principal component analysis? Journal of the ACM (JACM)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"9428","DOI":"10.1609\/aaai.v33i01.33019428","article-title":"Anomaly detection using autoencoders in high performance computing systems","volume":"33","author":"a","year":"2019","journal-title":"Proceedings of the AAAI Conference on Artificial Intelli-gence"},{"key":"ref6","first-page":"36","article-title":"Robust, deep and inductive anomaly detection","author":"r","year":"2017","journal-title":"Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases"},{"key":"ref5","article-title":"Deep learning for anomaly detection: A survey","author":"r","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1007\/s10115-021-01567-3","article-title":"Attentive multi-task learning for group itinerary recommendation","volume":"63","author":"l","year":"2021","journal-title":"Knowledge and Information Systems"},{"key":"ref7","first-page":"1","volume":"41","author":"v","year":"2009","journal-title":"Anomaly Detection A Survey ACM Computing Surveys (CSUR"},{"key":"ref49","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","author":"b","year":"2018","journal-title":"International Conference on Learning Representations"},{"key":"ref9","article-title":"One-class svm for learning in image retrieval","author":"y","year":"2001","journal-title":"Proceedings 2001 International Conference on Image Processing"},{"key":"ref46","first-page":"1409","article-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"33","author":"c","year":"2019","journal-title":"A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/3446776","article-title":"Understanding deep learning (still) requires rethinking generalization","volume":"64","author":"c","year":"2021","journal-title":"Communications of the ACM"},{"key":"ref48","first-page":"665","article-title":"Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining","author":"c","year":"2017","journal-title":"Anomaly Detection with Robust Deep Autoencoders"},{"key":"ref47","article-title":"Pyod: A python toolbox for scalable outlier detection","author":"y","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref42","first-page":"1511","article-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"y","year":"2015","journal-title":"Learning discriminative reconstructions for unsupervised outlier removal"},{"key":"ref41","first-page":"1","article-title":"Principal component analysis","volume":"2","author":"s","year":"1987","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"ref44","first-page":"2532","article-title":"Relaxed clipping: A global training method for robust regression and classification","author":"y","year":"2010","journal-title":"NIPS"},{"key":"ref43","first-page":"187","article-title":"Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications","author":"h","year":"2018","journal-title":"Proceedings of the 2018 World Wide Web Conference"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892076.pdf?arnumber=9892076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:20Z","timestamp":1667516300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892076","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}