{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T12:28:15Z","timestamp":1777984095626,"version":"3.51.4"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004836","name":"Independent Research Fund Denmark","doi-asserted-by":"publisher","award":["0136-00251B"],"award-info":[{"award-number":["0136-00251B"]}],"id":[{"id":"10.13039\/501100004836","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Universal Robots A\/S"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3289068","type":"journal-article","created":{"date-parts":[[2023,6,24]],"date-time":"2023-06-24T01:47:26Z","timestamp":1687571246000},"page":"65834-65848","source":"Crossref","is-referenced-by-count":17,"title":["An Experimental Comparison of Anomaly Detection Methods for Collaborative Robot Manipulators"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7264-986X","authenticated-orcid":false,"given":"S\u00f8ren G.","family":"Graab\u00e6k","sequence":"first","affiliation":[{"name":"The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Odense, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6114-2753","authenticated-orcid":false,"given":"Emil Vincent","family":"Ancker","sequence":"additional","affiliation":[{"name":"Dynatest A\/S, Ballerup, Denmark"}]},{"given":"Andreas Rune","family":"Fugl","sequence":"additional","affiliation":[{"name":"Vitec Aloc A\/S, Odense, Denmark"}]},{"given":"Anders Lyhne","family":"Christensen","sequence":"additional","affiliation":[{"name":"The Maersk Mc-Kinney Moller Institute, University of Southern Denmark, Odense, Denmark"}]}],"member":"263","reference":[{"key":"ref57","year":"2018","journal-title":"Technical Details"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/app9061072"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2931511"},{"key":"ref59","author":"robots","year":"2021","journal-title":"Real-Time Data Exchange (RTDE) Guide"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/aerospace6110117"},{"key":"ref58","first-page":"463","article-title":"Simplified programming of re-usable skills on a safe industrial robot&#x2013;prototype and evaluation","author":"stenmark","year":"2017","journal-title":"Proc 12th ACM\/IEEE Int Conf Hum -Robot Interact (HRI"},{"key":"ref14","first-page":"317","author":"gael","year":"2011","journal-title":"Nonparametric Hidden Markov Models"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2869225"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2017.8280812"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/S1481803500013336"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ASET.2017.7983729"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132964"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/1019\/1\/012095"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref19","article-title":"Auto-encoding variational Bayes","author":"kingma","year":"2013","journal-title":"arXiv 1312 6114"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2977892"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886457"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref46","article-title":"Tutorial on variational autoencoders","author":"doersch","year":"2016","journal-title":"arXiv 1606 05908"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00270"},{"key":"ref48","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref47","first-page":"1","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref42","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref41","author":"o\u2019malley","year":"2019","journal-title":"KerasTuner"},{"key":"ref44","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","author":"abadi","year":"2016","journal-title":"Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI)"},{"key":"ref43","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"pedregosa","year":"2012","journal-title":"J Mach Learn Res"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00305-w"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3146389"},{"key":"ref7","author":"graab\u00e6k","year":"2022","journal-title":"Dataset for An Experimental Comparison of Anomaly Detection Methods for Collaborative Robot Manipulators"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2016.03.084"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHM.2017.7998309"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2005.1545370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S1474-6670(17)33427-4"},{"key":"ref40","first-page":"6765","article-title":"Hyperband: A novel bandit-based approach to hyperparameter optimization","volume":"18","author":"li","year":"2017","journal-title":"J Mach Learn Res"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/089976699300016728"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"ref31","article-title":"Building a balanced k-d tree in O(kn log n) time","author":"brown","year":"2014","journal-title":"arXiv 1410 5420"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-54765-7","author":"aggarwal","year":"2017","journal-title":"Outlier Ensembles An Introduction"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2019.03.003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2019.11.415"},{"key":"ref39","article-title":"Hyperparameter search in machine learning","author":"claesen","year":"2015","journal-title":"arXiv 1502 02127"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-007-0075-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10777"},{"key":"ref26","article-title":"A review on outlier\/anomaly detection in time series data","author":"bl\u00e1zquez-garc\u00eda","year":"2020","journal-title":"arXiv 2002 04236"},{"key":"ref25","article-title":"Deep learning for anomaly detection: A survey","author":"chalapathy","year":"2019","journal-title":"arXiv 1901 03407"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5010001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1285773"},{"key":"ref63","year":"2021","journal-title":"tirne - Time access and conversions"},{"key":"ref22","article-title":"Is joint training better for deep auto-encoders?","author":"zhou","year":"2014","journal-title":"arXiv 1405 1380"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-014-0754-y"},{"key":"ref27","author":"aggarwal","year":"2016","journal-title":"Outlier Analysis"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-2649-2"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/58.2.341"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10160007.pdf?arnumber=10160007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T13:42:02Z","timestamp":1690810922000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10160007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3289068","relation":{"has-preprint":[{"id-type":"doi","id":"10.36227\/techrxiv.19006643.v3","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19006643.v2","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19006643.v1","asserted-by":"object"},{"id-type":"doi","id":"10.36227\/techrxiv.19006643","asserted-by":"object"}]},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}