{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T22:00:41Z","timestamp":1772143241273,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Innovation Workstation of State Key Laboratory of Intelligent Gaming","award":["ZBKF-23-03"],"award-info":[{"award-number":["ZBKF-23-03"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101455"],"award-info":[{"award-number":["62101455"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471395"],"award-info":[{"award-number":["62471395"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tnsm.2024.3485545","type":"journal-article","created":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T17:48:29Z","timestamp":1729705709000},"page":"941-954","source":"Crossref","is-referenced-by-count":6,"title":["TFD-Net: Transformer Deviation Network for Weakly Supervised Anomaly Detection"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4853-5077","authenticated-orcid":false,"given":"Hongping","family":"Gan","sequence":"first","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4102-2060","authenticated-orcid":false,"given":"Hejie","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3009-9661","authenticated-orcid":false,"given":"Zhangfa","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Electronic Information, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7549-7926","authenticated-orcid":false,"given":"Chunyan","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2587-9210","authenticated-orcid":false,"given":"Jie","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3242320"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3215006"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3224974"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3069225"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3229706"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3239522"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2023.3253085"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2838668"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3197591"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3034647"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1016\/j.artmed.2022.102386","article-title":"Domain generalization in deep learning based mass detection in mammography: A large-scale multi-center study","volume":"132","author":"Garrucho","year":"2022","journal-title":"Artif. Intell. Med."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2944377"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3471808"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3397719"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3225753"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03613-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3160861"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800079"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164087"},{"key":"ref23","first-page":"4027","article-title":"Graph neural network-based anomaly detection in multivariate time series","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"35","author":"Deng"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2962701"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.neucom.2021.01.146","article-title":"Deep anomaly detection in packet payload","volume":"485","author":"Liu","year":"2022","journal-title":"Neurocomputing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"ref27","first-page":"1395","article-title":"Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"36","author":"Li"},{"key":"ref28","first-page":"1","article-title":"Prototypical networks for few-shot learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Snell"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3086137"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ESOLEC54569.2022.10009167"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3505244"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2023\/759"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3227044"},{"key":"ref36","first-page":"387","article-title":"MGFN: Magnitude-contrastive glance-and-focus network for weakly-supervised video anomaly detection","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"37","author":"Chen"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2021.107443","article-title":"Unsupervised anomaly detection with LSTM autoencoders using statistical data-filtering","volume":"108","author":"Maleki","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"ref39","article-title":"Deep semi-supervised anomaly detection","author":"Ruff","year":"2019","journal-title":"arXiv:1906.02694"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3522690"},{"issue":"2","key":"ref41","doi-asserted-by":"crossref","first-page":"144","DOI":"10.4097\/kjae.2017.70.2.144","article-title":"Central limit theorem: The cornerstone of modern statistics","volume":"70","author":"Kwak","year":"2017","journal-title":"Korean J. Anesthesiol."},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.4324\/9780080938318-15"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.425"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.355\/supp-1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852295"},{"key":"ref46","volume-title":"Statlog (shuttle and mammography)","author":"Rayana","year":"2016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1142\/9789812815132_0016"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4275028\/10927606\/10730761.pdf?arnumber=10730761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T17:39:56Z","timestamp":1742233196000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10730761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":48,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3485545","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}