{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T17:23:29Z","timestamp":1775669009112,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100013290","name":"National Key Research and Development Program of China Stem Cell and Translational Research","doi-asserted-by":"publisher","award":["2018YFC0808600"],"award-info":[{"award-number":["2018YFC0808600"]}],"id":[{"id":"10.13039\/501100013290","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833014"],"award-info":[{"award-number":["61833014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61722310"],"award-info":[{"award-number":["61722310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LR18F030001"],"award-info":[{"award-number":["LR18F030001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011311","name":"State Key Laboratory of Industrial Control Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011311","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002928","name":"Zhejiang University","doi-asserted-by":"publisher","award":["ICT20041"],"award-info":[{"award-number":["ICT20041"]}],"id":[{"id":"10.13039\/501100002928","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1109\/tii.2021.3053106","type":"journal-article","created":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T21:02:12Z","timestamp":1611176532000},"page":"7535-7545","source":"Crossref","is-referenced-by-count":136,"title":["Auxiliary Information-Guided Industrial Data Augmentation for Any-Shot Fault Learning and Diagnosis"],"prefix":"10.1109","volume":"17","author":[{"given":"Yue","family":"Zhuo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2071-4380","authenticated-orcid":false,"given":"Zhiqiang","family":"Ge","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"3483","article-title":"Learning structured output representation using deep conditional generative models","author":"sohn","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref32","article-title":"Conditional generative adversarial nets","author":"mirza","year":"2014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/I2MTC.2015.7151267"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.11.010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0098-1354(93)80018-I"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46475-6_4"},{"key":"ref10","article-title":"Generating adversarial malware examples for black-box attacks based on GAN","author":"hu","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2934901"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2020.2998467"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2020.06.014"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2889629"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206594"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2487986"},{"key":"ref18","first-page":"2152","article-title":"Embarrassingly simple approach to zero-shot learning","author":"romeraparedes","year":"0","journal-title":"Proc IEEE 32nd Int Conf Mach Learn"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298911"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807121"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2019.01.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3011069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103966"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01065"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.04.075"},{"key":"ref8","article-title":"Style transfer generative adversarial networks: Learning to play chess differently","author":"chidambaram","year":"2017"},{"key":"ref7","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2020.106843"},{"key":"ref9","article-title":"EEG-GAN: Generative adversarial networks for electroencephalograhic (EEG) brain signals","author":"hartmann","year":"2018"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2756872"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/246"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01052"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00111"},{"key":"ref24","article-title":"Optimization as a model for few-shot learning","author":"ravi","year":"2017"},{"key":"ref23","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","author":"finn","year":"0","journal-title":"Proc 34th Int Conf Mach Learn"},{"key":"ref26","first-page":"2642","article-title":"Conditional image synthesis with auxiliary classifier GANs","author":"odena","year":"0","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref25","first-page":"1","article-title":"Generalizing from a few examples: A survey on few-shot learning","volume":"53","author":"wang","year":"2020","journal-title":"ACM Comput Surv (CSUR)"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9502581\/09329076.pdf?arnumber=9329076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:36Z","timestamp":1652194356000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9329076\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":35,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tii.2021.3053106","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11]]}}}