{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:57:11Z","timestamp":1773413831662,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/iolts56730.2022.9897805","type":"proceedings-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T15:57:10Z","timestamp":1664294230000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["Open-Set Recognition: an Inexpensive Strategy to Increase DNN Reliability"],"prefix":"10.1109","author":[{"given":"G.","family":"Gavarini","sequence":"first","affiliation":[{"name":"Politecnico di Torino, DAUIN,Torino,Italy"}]},{"given":"D.","family":"Stucchi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,Milano,Italy"}]},{"given":"A.","family":"Ruospo","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, DAUIN,Torino,Italy"}]},{"given":"G.","family":"Boracchi","sequence":"additional","affiliation":[{"name":"Politecnico di Milano,Milano,Italy"}]},{"given":"E.","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, DAUIN,Torino,Italy"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126685"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.256"},{"key":"ref12","article-title":"Towards open set deep networks","volume":"abs 1511 6233","author":"bendale","year":"2015","journal-title":"CoRR"},{"key":"ref13","article-title":"Energy-based out-of-distribution detection","volume":"abs 2010 3759","author":"liu","year":"2020","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01096"},{"key":"ref15","article-title":"Open-set recognition: A good closed-set classifier is all you need","volume":"abs 2110 6207","author":"vaze","year":"2021","journal-title":"CoRR"},{"key":"ref16","article-title":"Deep anomaly detection with outlier exposure","volume":"abs 1812 4606","author":"hendrycks","year":"2018","journal-title":"CoRR"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2021.3116999"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2017.47"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2878387"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/DDECS54261.2022.9770168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2742698"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.2000.1663"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00033"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2017.66"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/app11146455"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITC44170.2019.9000150"},{"key":"ref2","article-title":"Deep residual learning for image recognition","volume":"abs 1512 3385","author":"he","year":"2015","journal-title":"CoRR"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01099"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462105"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2003166"},{"key":"ref22","article-title":"Open set learning with counterfactual images","author":"neal","year":"2018","journal-title":"Proceedings of the European Conference on Computer Vision (ECCV)"},{"key":"ref21","article-title":"Fault impact estimation for lightweight fault detection in image filtering","author":"bolchini","year":"2020","journal-title":"IEEE Transactions on Computers"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090716"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3126908.3126964"},{"key":"ref26","article-title":"Reading digits in natural images with unsupervised feature learning","author":"netzer","year":"2011","journal-title":"NIPS 2011 Workshop on Deep Learning and Unsupervised Feature Learning"},{"key":"ref25","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009","journal-title":"Tech Rep"}],"event":{"name":"2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)","location":"Torino, Italy","start":{"date-parts":[[2022,9,12]]},"end":{"date-parts":[[2022,9,14]]}},"container-title":["2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9897157\/9897171\/09897805.pdf?arnumber=9897805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T16:54:34Z","timestamp":1665766474000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9897805\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iolts56730.2022.9897805","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}