{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T18:16:36Z","timestamp":1771611396437,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1109\/tai.2025.3562505","type":"journal-article","created":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T13:41:21Z","timestamp":1745242881000},"page":"3248-3257","source":"Crossref","is-referenced-by-count":3,"title":["Model Selection of Anomaly Detectors in the Absence of Labeled Validation Data"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2514-6108","authenticated-orcid":false,"given":"Clement","family":"Fung","sequence":"first","affiliation":[{"name":"Software and Societal Systems Department, Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3699-7976","authenticated-orcid":false,"given":"Chen","family":"Qiu","sequence":"additional","affiliation":[{"name":"Bosch Center for Artificial Intelligence, Pittsburgh, PA, USA"}]},{"given":"Aodong","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of California Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3739-2203","authenticated-orcid":false,"given":"Maja","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Bosch Center for Artificial Intelligence, Pittsburgh, PA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"ref2","article-title":"Deep nearest neighbor anomaly detection","author":"Bergman","year":"2020"},{"key":"ref3","article-title":"Classification-based anomaly detection for general data","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Bergman","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00393"},{"key":"ref8","article-title":"Unsupervised detection of lesions in brain MRI using constrained adversarial auto-encoders","volume-title":"Proc. MIDL Conf. Book","author":"Chen","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01118"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"ref11","first-page":"33912","article-title":"VillanDiffusion: A unified backdoor attack framework for diffusion models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Chou","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"ref13","first-page":"2546","article-title":"Transfer-based semantic anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Deecke","year":"2021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref15","first-page":"8780","article-title":"Diffusion models beat GANs on image synthesis","author":"Dhariwal","year":"2021","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref16","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Dosovitskiy","year":"2021"},{"key":"ref17","article-title":"A meta-analysis of the anomaly detection problem","author":"Emmott","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20610"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3464423"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3528223.3530164"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3623"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4266498"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref25","article-title":"Deep anomaly detection with outlier exposure","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Hendrycks","year":"2019"},{"key":"ref26","first-page":"15663","article-title":"Using self-supervised learning can improve model robustness and uncertainty","author":"Hendrycks","year":"2019","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref27","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref28","article-title":"Distilling model failures as directions in latent space","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Jain","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00507"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2024.102874"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00453"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00813"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00582"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00246"},{"key":"ref36","article-title":"Diffusion models already have a semantic latent space","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Kwon","year":"2023"},{"key":"ref37","first-page":"19882","article-title":"Deep anomaly detection under labeling budget constraints","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Li","year":"2023"},{"key":"ref38","article-title":"Zero-shot anomaly detection without foundation models","author":"Li","year":"2023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01594"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00113"},{"key":"ref42","article-title":"Exposing outlier exposure: What can be learned from few, one, and zero outlier images","author":"Liznerski","year":"2022","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01119"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3606274.3606277"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3394053"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2791347.2791352"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref48","article-title":"Fake it until you make it: Towards accurate near-distribution novelty detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Mirzaei","year":"2023"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00585"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.15625\/1813-9663\/32\/3\/8455"},{"key":"ref51","first-page":"8162","article-title":"Improved denoising diffusion probabilistic models","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Nichol","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.47"},{"key":"ref53","article-title":"Uncertainty-aware evaluation of auxiliary anomalies with the expected anomaly posterior","author":"Perini","year":"2025","journal-title":"Trans. Mach. Learn. Res."},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966273"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/305"},{"key":"ref56","first-page":"18153","article-title":"Latent outlier exposure for anomaly detection with contaminated data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qiu","year":"2022"},{"key":"ref57","first-page":"8703","article-title":"Neural transformation learning for deep anomaly detection beyond images","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qiu","year":"2021"},{"key":"ref58","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Radford","year":"2021"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"ref60","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff","year":"2018"},{"key":"ref61","article-title":"Deep semi-supervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Ruff","year":"2019"},{"key":"ref62","first-page":"5234","article-title":"Assessing generative models via precision and recall","author":"Sajjadi","year":"2018","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref63","article-title":"Detecting anomalies within time series using local neural transformations","author":"Schneider","year":"2022"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30047-9_31"},{"key":"ref65","first-page":"31633","article-title":"Synthetic data for model selection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Shoshan","year":"2023"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134003"},{"key":"ref67","article-title":"Learning and evaluating representations for deep one-class classification","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Sohn","year":"2020"},{"key":"ref68","article-title":"Denoising diffusion implicit models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Song","year":"2021"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114372"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00191"},{"key":"ref71","article-title":"The Caltech-UCSD Birds-200-2011 dataset,","author":"Wah","year":"2011"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127061"},{"key":"ref74","article-title":"A survey on diffusion models for time series and spatio-temporal data","author":"Yang","year":"2024"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599518"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1905"},{"key":"ref77","first-page":"4489","article-title":"Automatic unsupervised outlier model selection","author":"Zhao","year":"2021","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00088"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19815-1_40"},{"key":"ref80","article-title":"AnomalyCLIP: Object-agnostic prompt learning for zero-shot anomaly detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhou","year":"2024"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20056-4_23"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/11269951\/10970745.pdf?arnumber=10970745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T06:49:19Z","timestamp":1764312559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10970745\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":81,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tai.2025.3562505","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]}}}