{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:58:12Z","timestamp":1770969492147,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100014219","name":"National Science Fund for Distinguished Young Scholars","doi-asserted-by":"publisher","award":["62025201"],"award-info":[{"award-number":["62025201"]}],"id":[{"id":"10.13039\/501100014219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102138"],"award-info":[{"award-number":["62102138"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972144"],"award-info":[{"award-number":["61972144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976087"],"award-info":[{"award-number":["61976087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China National Postdoctoral Program for Innovative Talents","award":["BX20200120"],"award-info":[{"award-number":["BX20200120"]}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2021JJ40115"],"award-info":[{"award-number":["2021JJ40115"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6231101260"],"award-info":[{"award-number":["6231101260"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Hunan Province","award":["2023GK2001"],"award-info":[{"award-number":["2023GK2001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tkde.2023.3332784","type":"journal-article","created":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T19:08:49Z","timestamp":1700075329000},"page":"4346-4360","source":"Crossref","is-referenced-by-count":10,"title":["A Light-Weight and Robust Tensor Convolutional Autoencoder for Anomaly Detection"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5957-4901","authenticated-orcid":false,"given":"Xiaocan","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-2723","authenticated-orcid":false,"given":"Kun","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8639-3818","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, State University of New York at Stony Brook, Stony Brook, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4964-1135","authenticated-orcid":false,"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[{"name":"Computer Network Information Center, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2635-7716","authenticated-orcid":false,"given":"Kenli","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of computing, The Hong Kong Polytechnic University, Hung Hom, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0765-6857","authenticated-orcid":false,"given":"Dafang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-881X","authenticated-orcid":false,"given":"Jigang","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Computer Science, Engineering, Hunan University of Science, Technology, Hunan, China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Outliers in statistical data","author":"Bamnett","year":"1994"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015492"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962595"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2853589"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2745573"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1137\/07070111X"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2893530"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3213259"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2797094"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2954868"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2937027"},{"key":"ref14","first-page":"268","article-title":"Tensor vs. matrix methods: Robust tensor decomposition under block sparse perturbations","volume-title":"Proc. Artif. Intell. Statist.","author":"Anandkumar"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4070090"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2761704"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486332"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2984093"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/378"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISPA52656.2021.9552041"},{"key":"ref23","first-page":"1","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zong"},{"key":"ref24","first-page":"1100","article-title":"Deep structured energy based models for anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Zhai"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-016-0550-y"},{"key":"ref26","first-page":"833","article-title":"Contractive auto-encoders: Explicit invariance during feature extraction","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Rifai"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412842"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854900"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512221"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00027"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3010277"},{"issue":"48","key":"ref35","article-title":"Approximation with artificial neural networks","volume":"24","author":"Cs\u00e1ji","year":"2001","journal-title":"Fac. Sci., Etvs Lornd Univ., Hung."},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551274"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref39","article-title":"A guide to convolution arithmetic for deep learning","author":"Dumoulin","year":"2016"},{"key":"ref40","first-page":"6677","article-title":"Adagrad stepsizes: Sharp convergence over nonconvex landscapes","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ward"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1287\/moor.1070.0291"},{"key":"ref42","article-title":"The abilene observatory data collections","year":"2003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111341"},{"key":"ref44","first-page":"299","article-title":"Network coordinates in the wild","volume-title":"Proc. 4th Symp. Netw. Syst. Des. Implementation","author":"Ledlie"},{"key":"ref45","article-title":"Compromising PCA-based anomaly detectors for network-wide traffic","author":"Rubinstein","year":"2008"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2982685"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1137\/130905010"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.79"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/69\/10629652\/10319310-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10629652\/10319310.pdf?arnumber=10319310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:37:01Z","timestamp":1725079021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10319310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":48,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2023.3332784","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}