{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:26:44Z","timestamp":1775665604653,"version":"3.50.1"},"reference-count":53,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2022ZD0115302"],"award-info":[{"award-number":["2022ZD0115302"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002371"],"award-info":[{"award-number":["62002371"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076079"],"award-info":[{"award-number":["62076079"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2067"],"award-info":[{"award-number":["U19A2067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379052"],"award-info":[{"award-number":["61379052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472439"],"award-info":[{"award-number":["61472439"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019048","name":"Science Foundation of Ministry of Education of China","doi-asserted-by":"publisher","award":["2018A02002"],"award-info":[{"award-number":["2018A02002"]}],"id":[{"id":"10.13039\/501100019048","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019092","name":"Science Fund for Distinguished Young Scholars of Hunan Province","doi-asserted-by":"publisher","award":["14JJ1026"],"award-info":[{"award-number":["14JJ1026"]}],"id":[{"id":"10.13039\/501100019092","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation of National University of Defense Technology","award":["ZK21-17"],"award-info":[{"award-number":["ZK21-17"]}]},{"name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1","award":["21SISSMU031"],"award-info":[{"award-number":["21SISSMU031"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tkde.2024.3393996","type":"journal-article","created":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T18:06:07Z","timestamp":1714154767000},"page":"5723-5736","source":"Crossref","is-referenced-by-count":102,"title":["Calibrated One-Class Classification for Unsupervised Time Series Anomaly Detection"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8074-1244","authenticated-orcid":false,"given":"Hongzuo","family":"Xu","sequence":"first","affiliation":[{"name":"Intelligent Game and Decision Lab (IGDL), Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2913-4016","authenticated-orcid":false,"given":"Yijie","family":"Wang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Parallel and Distributed Computing, College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5760-6431","authenticated-orcid":false,"given":"Songlei","family":"Jian","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1012-5301","authenticated-orcid":false,"given":"Qing","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3257-539X","authenticated-orcid":false,"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9877-2716","authenticated-orcid":false,"given":"Guansong","family":"Pang","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref5","article-title":"Anomaly transformer: Time series anomaly detection with association discrepancy","volume-title":"Proc. Int. Conf. Learn. Representation","author":"Xu"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/3494124.3494142"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467075"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140058"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/icde53745.2022.00273"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/378"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3128667"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"ref17","first-page":"9781","article-title":"Deep anomaly detection using geometric transformations","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Golan"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449903"},{"key":"ref20","article-title":"Revisiting time series outlier detection: Definitions and benchmarks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Lai"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14778\/3529337.3529354"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14778\/3538598.3538602"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476307"},{"key":"ref25","article-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection","author":"Malhotra","year":"2016"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3139916"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.03.048"},{"key":"ref29","first-page":"13 016","article-title":"Timeseries anomaly detection using temporal hierarchical one-class network","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Shen"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512067"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467137"},{"key":"ref33","first-page":"18 153","article-title":"Latent outlier exposure for anomaly detection with contaminated data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qiu"},{"key":"ref34","article-title":"A survey of label-noise representation learning: Past, present and future","author":"Han","year":"2020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747461"},{"key":"ref36","first-page":"8703","article-title":"Neural transformation learning for deep anomaly detection beyond images","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qiu"},{"key":"ref37","article-title":"Deep anomaly detection with outlier exposure","volume-title":"Proc. Int. Conf. Learn. Representation","author":"Hendrycks"},{"key":"ref38","first-page":"14 317","article-title":"Perturbation learning based anomaly detection","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Cai"},{"key":"ref39","first-page":"3711","article-title":"DROCC: Deep robust one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Goyal"},{"key":"ref40","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"Bai","year":"2018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref42","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.06.005"},{"key":"ref44","first-page":"38 655","article-title":"Fascinating supervisory signals and where to find them: Deep anomaly detection with scale learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Xu"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103459"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3112126"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105827"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0320-4"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.5555\/944790.944808"},{"key":"ref50","article-title":"Classification-based anomaly detection for general data","volume-title":"Proc. Int. Conf. Learn. Representation","author":"Bergman"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"ref52","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Representation","author":"Zong"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10709365\/10508984.pdf?arnumber=10508984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T11:21:58Z","timestamp":1728559318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10508984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":53,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3393996","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}