{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T19:24:35Z","timestamp":1776367475916,"version":"3.51.2"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100017610","name":"Establishment of Key Laboratory of Shenzhen Science and Technology Innovation Committee","doi-asserted-by":"publisher","award":["ZDSYS20190902093015527"],"award-info":[{"award-number":["ZDSYS20190902093015527"]}],"id":[{"id":"10.13039\/501100017610","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012271","name":"Shenzhen Fundamental Research and Discipline Layout project","doi-asserted-by":"publisher","award":["JCYJ20190806142416685"],"award-info":[{"award-number":["JCYJ20190806142416685"]}],"id":[{"id":"10.13039\/501100012271","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1109\/tcyb.2021.3127716","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T20:36:24Z","timestamp":1638390984000},"page":"13834-13847","source":"Crossref","is-referenced-by-count":82,"title":["Self-Supervision-Augmented Deep Autoencoder for Unsupervised Visual Anomaly Detection"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1490-2171","authenticated-orcid":false,"given":"Chao","family":"Huang","sequence":"first","affiliation":[{"name":"Shenzhen Key Laboratory of Visual Object Detection and Recognition, Harbin Institute of Technology, Shenzhen, China"}]},{"given":"Zehua","family":"Yang","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory of Visual Object Detection and Recognition, Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9554-2379","authenticated-orcid":false,"given":"Jie","family":"Wen","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory of Visual Object Detection and Recognition, Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0530-2123","authenticated-orcid":false,"given":"Yong","family":"Xu","sequence":"additional","affiliation":[{"name":"Shenzhen Key Laboratory of Visual Object Detection and Recognition, Harbin Institute of Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6025-9343","authenticated-orcid":false,"given":"Qiuping","family":"Jiang","sequence":"additional","affiliation":[{"name":"Faculty of Information Science and Engineering, Ningbo University, Ningbo, China"}]},{"given":"Jian","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2197-9038","authenticated-orcid":false,"given":"Yaowei","family":"Wang","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01061"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.628"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.76"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.278"},{"key":"ref31","article-title":"Puzzle-AE: Novelty detection in images through solving puzzles","author":"salehi","year":"2020","journal-title":"arXiv 2008 12959"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46466-4_5"},{"key":"ref36","article-title":"An image is worth 16&#x00D7;16 words: Transformers for image recognition at scale","author":"dosovitskiy","year":"2020","journal-title":"arXiv 2010 11929"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00973"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46487-9_40"},{"key":"ref60","first-page":"1","article-title":"Exploring deep anomaly detection methods based on capsule net","author":"li","year":"2019","journal-title":"Proc Int Conf Mach Learn Workshops"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2799862"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2987164"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2330853"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00803"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2944377"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123451"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3036766"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-012-0993-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2601655"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173156"},{"key":"ref50","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref51","first-page":"1","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"2018","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref59","article-title":"Iterative energy-based projection on a normal data manifold for anomaly localization","author":"dehaene","year":"2020","journal-title":"arXiv 2002 03734"},{"key":"ref58","first-page":"488","article-title":"AVID: Adversarial visual irregularity detection","author":"sabokrou","year":"2018","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref57","first-page":"9758","article-title":"Deep anomaly detection using geometric transformations","author":"golan","year":"2018","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00301"},{"key":"ref55","first-page":"1","article-title":"GANomaly: Semi-supervised anomaly detection via adversarial training","author":"akcay","year":"2018","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref54","first-page":"3","article-title":"Anomaly detection with generative adversarial networks","author":"deecke","year":"2018","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref52","article-title":"Deep structured energy based models for anomaly detection","author":"zhai","year":"2016","journal-title":"arXiv 1605 07717"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2876615"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00961"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00637"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"ref13","article-title":"Attribute restoration framework for anomaly detection","author":"fei","year":"2020","journal-title":"IEEE Trans Multimedia"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00684"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"ref18","article-title":"Abnormal event detection using deep contrastive learning for intelligent video surveillance system","author":"huang","year":"2021","journal-title":"IEEE Trans Ind Informat"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00265"},{"key":"ref4","article-title":"TCDesc: Learning topology consistent descriptors for image matching","author":"pan","year":"2021","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2497711"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107300"},{"key":"ref8","article-title":"Viral pneumonia screening on chest X-ray images using confidence-aware anomaly detection","author":"zhang","year":"2020","journal-title":"arXiv 2003 12338"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2968750"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2979049"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00057"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00822"},{"key":"ref48","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"xiao","year":"2017","journal-title":"ArXiv 1708 07747"},{"key":"ref47","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref42","first-page":"1","article-title":"Auto-encoding variational bayes","author":"kingma","year":"2014","journal-title":"Proc Int Conf Learn Represent"},{"key":"ref41","first-page":"139","article-title":"Deep clustering for unsupervised learning of visual features","author":"caron","year":"2018","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref44","first-page":"201","article-title":"The IM algorithm: A variational approach to information maximization","volume":"16","author":"agakov","year":"2004","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref43","article-title":"Steerable CNNs","author":"cohen","year":"2016","journal-title":"arXiv 1612 08498"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9954937\/09632460.pdf?arnumber=9632460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:13:32Z","timestamp":1670872412000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9632460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":60,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2021.3127716","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]}}}