{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T03:35:45Z","timestamp":1769052945230,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892270","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"01-09","source":"Crossref","is-referenced-by-count":2,"title":["D-AnoGAN: Anomaly Detection in Disconnected Data Manifolds with Generative Adversarial Networks"],"prefix":"10.1109","author":[{"given":"Walker L.","family":"Dimon","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]},{"given":"Nicholas B.","family":"Chase","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]},{"given":"Neale","family":"Van Stralen","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]},{"given":"Rupal","family":"Nigam","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]},{"given":"Michael F.","family":"Lembeck","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]},{"given":"Huy T.","family":"Tran","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign,Champaign,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Unsupervised Anomaly Detection with Generative Adver-sarial Networks to Guide Marker Discovery","author":"Schlegl","year":"2017","journal-title":"IPMI 2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2018.2877080"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2980749"},{"key":"ref7","first-page":"117","article-title":"Traffic Anomaly Detection via Perspective Map based on Spatial-temporal Information Matrix","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops","author":"Bai","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2893124"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"ref10","volume-title":"Deep learning for anomaly detection: A survey","author":"Chalapathy","year":"2019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W16-6101"},{"key":"ref12","volume-title":"Bidirectional lstm-crf for clinical concept extraction","author":"Chalapathy"},{"key":"ref13","article-title":"Efficient gan-based anomaly detection","author":"Zenati","year":"2018","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref15","first-page":"899","volume-title":"Generalized denoising auto-encoders as generative models","author":"Bengio","year":"2013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref21","volume-title":"Unsupervised learning of anomaly detection from contaminated image data using simultaneous encoder training","author":"Berg","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00301"},{"key":"ref23","first-page":"7343","article-title":"Disconnected manifold learning for generative adversarial networks","volume-title":"32nd Conference on Neural Information Processing Systems (NeurIPS 2018)","author":"Khayatkhoei","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014610"},{"key":"ref25","volume-title":"Auto-Encoding Variational Bayes","author":"Kingma","year":"2014"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7566-5"},{"key":"ref31","first-page":"6981","article-title":"Deep one-class classification","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018","volume":"10","author":"Ruff","year":"2018"},{"key":"ref32","article-title":"Deep Semi-Supervised Anomaly Detection","author":"Ruff","year":"2020","journal-title":"ICLR 2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979049"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00057"},{"key":"ref36","article-title":"Anomaly Detection With Multiple-Hypotheses Predictions","volume-title":"Proceedings of the 36th International Conference on Machine Learning","author":"Nguyen","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014610"},{"key":"ref39","article-title":"Disconnected manifold learning for generative adversarial networks","volume":"abs\/1806.00880","author":"Khayatkhoei","year":"2018","journal-title":"CoRR"},{"key":"ref40","article-title":"Wasserstein gan","author":"Arjovsky","year":"2017","journal-title":"arXiv preprint"},{"key":"ref41","first-page":"5767","article-title":"Improved training of wasserstein gans","author":"Gulrajani","year":"2017","journal-title":"Advances in neural infor-mation processing systems"},{"key":"ref42","article-title":"Conditional generative adversarial nets","volume":"abs\/1411.1784","author":"Mirza","year":"2014","journal-title":"CoRR"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","location":"Padua, Italy","start":{"date-parts":[[2022,7,18]]},"end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892270.pdf?arnumber=9892270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T05:28:42Z","timestamp":1727501322000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892270","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}