{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T13:54:14Z","timestamp":1758981254423,"version":"3.37.3"},"reference-count":117,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Pattern Anal. Mach. Intell."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tpami.2021.3092999","type":"journal-article","created":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T21:39:28Z","timestamp":1624916368000},"page":"6993-7009","source":"Crossref","is-referenced-by-count":5,"title":["Generalized One-Class Learning Using Pairs of Complementary Classifiers"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5566-0351","authenticated-orcid":false,"given":"Anoop","family":"Cherian","sequence":"first","affiliation":[{"name":"Mitsubishi Electric Research Labs (MERL), Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8546-4522","authenticated-orcid":false,"given":"Jue","family":"Wang","sequence":"additional","affiliation":[{"name":"Research School of Engineering, Australian National University, Canberra, ACT, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2063-6_225"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-8655(97)00049-4"},{"key":"ref4","first-page":"1025","article-title":"One-class novelty detection for seizure analysis from intracranial EEG","volume":"7","author":"Gardner","year":"2006","journal-title":"J. Mach. Learn. Res."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17080-5_21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46454-1_21"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247917"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00684"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.38"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.177"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.460"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.05.007"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/s131217130"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1023\/b:mach.0000008084.60811.49"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00057"},{"article-title":"Anomaly detection using one-class neural networks","year":"2018","author":"Chalapathy","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.45"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00206"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1137\/S0895479895290954"},{"key":"ref25","volume-title":"An Introduction to Differentiable Manifolds and Riemannian Geometry","volume":"120","author":"Boothby","year":"1986"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1515\/9781400830244"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2006.889442"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2004.835526"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.111"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.396"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00829"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2014.2315772"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"ref35","first-page":"2","article-title":"One class support vector machines for detecting anomalous windows registry accesses","volume-title":"Proc. Workshop Data Mining Comput. Secur.","author":"Heller"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2178594"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.07.068"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.107"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"article-title":"Deep learning for anomaly detection: A review","year":"2020","author":"Pang","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1069362732"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/0047-259X(91)90106-C"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/11744047_33"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.316"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2173156"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2011.12.004"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33712-3_47"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539882"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2011.03.003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2010.11.003"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/s0042-6989(99)00163-7"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459462"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.03.040"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2016.7738016"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"ref62","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Ruff"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.10.010"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2917862"},{"article-title":"Enhancing the reliability of out-of-distribution image detection in neural networks","year":"2017","author":"Liang","key":"ref65"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.5244\/C.29.8"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019325"},{"key":"ref69","first-page":"7167","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Lee"},{"article-title":"Enhancing the reliability of out-of-distribution image detection in neural networks","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Liang","key":"ref70"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5966"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01401"},{"article-title":"Efficient Riemannian optimization on the stiefel manifold via the Cayley transform","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li","key":"ref76"},{"article-title":"On differentiating parameterized argmin and argmax problems with application to bi-level optimization","year":"2016","author":"Gould","key":"ref77"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2015.7302178"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2006.884673"},{"article-title":"One-class classification: Concept-learning in the absence of counter-examples","year":"2001","author":"Tax","key":"ref80"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2018.8545819"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref83","first-page":"117","article-title":"A framework for robust subspace learning","volume-title":"Proc. Int. J. Comput. Vis.","author":"De La Torre"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.07.009"},{"key":"ref85","first-page":"1185","article-title":"Robust kernel principal component analysis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Nguyen"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2212415"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.433"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.483"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7899670"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00126"},{"issue":"1","key":"ref91","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1011215321374","article-title":"SSVM: A smooth support vector machine for classification","volume":"20","author":"Lee","year":"2001","journal-title":"Comput. Optimization Appl."},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1162\/15324430152748218"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206609"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2545667"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2003.811708"},{"article-title":"L2-constrained softmax loss for discriminative face verification","year":"2017","author":"Ranjan","key":"ref96"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00234"},{"article-title":"Feature scaling in support vector data descriptions","year":"2000","author":"Tax","key":"ref98"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.805090"},{"key":"ref100","volume-title":"Learning with Kernels","volume":"4","author":"Smola","year":"1998"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2006.1661433"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-012-0584-1"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1002\/9780470316559"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1137\/090765018"},{"issue":"1","key":"ref105","first-page":"1455","article-title":"Manopt, a Matlab toolbox for optimization on manifolds","volume":"15","author":"Boumal","year":"2014","journal-title":"J. Mach. Learn. Res."},{"volume-title":"Motor Vehicle Collision Injuries: Biomechanics, Diagnosis, and Management","year":"2005","author":"Nordhoff","key":"ref106"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1097\/00005373-199607000-00018"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2929257"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.207"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.115"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","year":"2018","author":"Bai","key":"ref112"},{"issue":"137","key":"ref113","first-page":"1","article-title":"Pymanopt: A python toolbox for optimization on manifolds using automatic differentiation","volume":"17","author":"Townsend","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2007.430.435"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2003.1247294"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00188"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334558"}],"container-title":["IEEE Transactions on Pattern Analysis and Machine Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/34\/9893033\/09466440.pdf?arnumber=9466440","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:34:03Z","timestamp":1705016043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9466440\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":117,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tpami.2021.3092999","relation":{},"ISSN":["0162-8828","2160-9292","1939-3539"],"issn-type":[{"type":"print","value":"0162-8828"},{"type":"electronic","value":"2160-9292"},{"type":"electronic","value":"1939-3539"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}