{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:45:07Z","timestamp":1758271507638,"version":"3.40.5"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T00:00:00Z","timestamp":1742774400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,24]]},"DOI":"10.1109\/wcnc61545.2025.10978209","type":"proceedings-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:53:33Z","timestamp":1746813213000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Dual-Decoder Variational Auto-Encoder for Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Phai Vu","family":"Dinh","sequence":"first","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology,Sydney,Australia"}]},{"given":"Diep N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology,Sydney,Australia"}]},{"given":"Hoang Dinh","family":"Thai","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology,Sydney,Australia"}]},{"given":"Quang Uy","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University,Hanoi,Vietnam"}]},{"given":"Son Pham","family":"Bao","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology,Sydney,Australia"}]},{"given":"Eryk","family":"Dutkiewicz","sequence":"additional","affiliation":[{"name":"School of Electrical and Data Engineering, University of Technology,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294096"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1186\/s40854-023-00470-w"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/info15060298"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3344842"},{"key":"ref5","article-title":"Twin auto-encoder model for learning separable representation in cyberattack detection","author":"Dinh","year":"2024","journal-title":"arXiv preprint"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2016.7725645"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2003.1260106"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3086137"},{"issue":"1","key":"ref10","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An","year":"2015","journal-title":"Spec. Lectu. on IE"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46150-8_13"},{"article-title":"Auto-encoding variational bayes","volume-title":"Proc. ICLR","author":"Kingma","key":"ref15"},{"article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. ICLR","author":"Zong","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM52923.2024.10901747"}],"event":{"name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2025,3,24]]},"location":"Milan, Italy","end":{"date-parts":[[2025,3,27]]}},"container-title":["2025 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10978109\/10978116\/10978209.pdf?arnumber=10978209","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T06:36:06Z","timestamp":1746858966000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10978209\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,24]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/wcnc61545.2025.10978209","relation":{},"subject":[],"published":{"date-parts":[[2025,3,24]]}}}