{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T23:22:03Z","timestamp":1769556123500,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/imcom56909.2023.10035610","type":"proceedings-article","created":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T18:57:50Z","timestamp":1675882670000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["An Improved Reverse Distillation Model for Unsupervised Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Nguyen","family":"Van Duc","sequence":"first","affiliation":[{"name":"Ho Chi Minh City University of Technology (HCMUT),Faculty of Computer Science and Engineering,Ho Chi Minh City,Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hoang Huu","family":"Bach","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology (UET),Faculty of Information Technology,Ha Noi Hanoi,Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Le Hong","family":"Trang","sequence":"additional","affiliation":[{"name":"Ho Chi Minh City University of Technology (HCMUT),Faculty of Computer Science and Engineering,Ho Chi Minh City,Vietnam"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref2","article-title":"Uninformed students: Student-teacher anomaly detection with discrimi-native latent embeddings","volume":"abs\/1911.02357","author":"Bergmann","year":"2019","journal-title":"CoRR"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5220\/0010865000003124"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5220\/0007364503720380"},{"key":"ref5","article-title":"Sub-image anomaly detection with deep pyramid correspondences","volume":"abs\/2005.02357","author":"Cohen","year":"2020","journal-title":"CoRR"},{"key":"ref6","article-title":"Padim: a patch distribution modeling framework for anomaly detection and localization","volume":"abs\/2011.08785","author":"Defard","year":"2020","journal-title":"CoRR"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"ref8","article-title":"Deep anomaly detection using geometric transformations","volume":"31","author":"Golan","year":"2018","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref10","author":"Goodfellow","year":"2014","journal-title":"Generative adversarial networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00867"},{"key":"ref12","author":"Kingma","year":"2013","journal-title":"Auto-encoding variational bayes"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00954"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE45552.2021.9576231"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/icpr48806.2021.9412109"},{"key":"ref17","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proceedings of the 35th International Conference on Machine Learning, volume 80 of Proceedings of Machine Learning Research","author":"Ruff"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref22","author":"Wang","year":"2021","journal-title":"Student-teacher feature pyramid matching for anomaly detection"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00433"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107706"}],"event":{"name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","location":"Seoul, Korea, Republic of","start":{"date-parts":[[2023,1,3]]},"end":{"date-parts":[[2023,1,5]]}},"container-title":["2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10035563\/10035540\/10035610.pdf?arnumber=10035610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:48:55Z","timestamp":1707832135000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10035610\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/imcom56909.2023.10035610","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}