{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:36:35Z","timestamp":1730313395624,"version":"3.28.0"},"reference-count":30,"publisher":"SPIE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,4,3]]},"DOI":"10.1117\/12.3023403","type":"proceedings-article","created":{"date-parts":[[2024,4,3]],"date-time":"2024-04-03T16:49:36Z","timestamp":1712162976000},"page":"27","source":"Crossref","is-referenced-by-count":0,"title":["Methods for non-intrusive out-of-distribution images detection"],"prefix":"10.1117","author":[{"given":"Anastasiia V.","family":"Vlasova","sequence":"first","affiliation":[]},{"given":"Aleksandr Y.","family":"Shkanaev","sequence":"additional","affiliation":[]},{"given":"Dmitry L.","family":"Sholomov","sequence":"additional","affiliation":[]}],"member":"189","reference":[{"key":"B1","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","volume":"31","author":"Lee","year":"2018","journal-title":"in Advances in Neural Information Processing Systems"},{"article-title":"Why is the mahalanobis distance effective for anomaly detection?","year":"2020","author":"Kamoi","key":"B2"},{"key":"B3","first-page":"09022","article-title":"A simple fix to mahalanobis distance for improving near-ood detectio","volume":"2106","author":"Ren","year":"2021","journal-title":"CoRR"},{"article-title":"Back to the basics: Revisiting out-of-distribution detection baselines","year":"2022","author":"Kuan","key":"B4"},{"key":"B5","first-page":"11297","article-title":"Generalized ODIN: detecting out-of-distribution image without learning from out-of-distribution data","volume":"2002","author":"Hsu","year":"2020","journal-title":"CoRR"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1002\/cjs.v34:4"},{"key":"B7","article-title":"Support vector machines with a reject option","volume":"21","author":"Grandvalet","year":"2008","journal-title":"in Ad-vances in Neural Information Processing Systems"},{"article-title":"Confident learning: Estimating uncertainty in dataset labels","year":"2022","author":"Northcutt","key":"B8"},{"key":"B9","first-page":"11732","article-title":"A unifying review of deep and shallow anomaly detection","volume":"2009","author":"Ruff","year":"2020","journal-title":"CoRR"},{"key":"B10","first-page":"11334","article-title":"Generalized out-of-distribution detection: A survey","volume":"2110","author":"Yang","year":"2021","journal-title":"CoRR"},{"key":"B11","first-page":"14051","article-title":"A unified survey on anomaly, novelty, open-set, and out-of-distribution detection: Solutions and future challenges","volume":"2110","author":"Salehi","year":"2021","journal-title":"CoRR"},{"key":"B12","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"van der Maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"B13","first-page":"00204","article-title":"Trimap: Large-scale dimensionality reduction using triplets","volume":"1910","author":"Amid","year":"2019","journal-title":"CoRR"},{"key":"B14","article-title":"Deep inside convolutional networks: Visualising image classification models and saliency maps","volume-title":"in Workshop at International Conference on Learning Representations","author":"Simonyan","year":"2014"},{"key":"B15","first-page":"770","article-title":"Deep residual learning for image recognition","volume-title":"in Proceedings of the IEEE conference on computer vision and pattern recognition","author":"He","year":"2016"},{"key":"B16","first-page":"13678","article-title":"Designing network design spaces","volume":"2003","author":"Radosavovic","year":"2020","journal-title":"CoRR"},{"key":"B17","first-page":"14030","article-title":"Swin transformer: Hierarchical vision transformer using shifted windows","volume":"2103","author":"Liu","year":"2021","journal-title":"CoRR"},{"article-title":"Pytorch image models","year":"2019","author":"Wightman","key":"B18"},{"key":"B19","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"B20","first-page":"20827","article-title":"Out-of-distribution detection with deep nearest neighbors","volume-title":"in Proceedings of the 39th International Conference on Machine Learning","volume":"162","author":"Sun","year":"2022"},{"year":"2023","key":"B21"},{"article-title":"Oodanalyzer: Interactive analysis of out-of-distribution samples","year":"2020","author":"Chen","key":"B22"},{"issue":"01","key":"B23","first-page":"1","article-title":"Data clustering: A user\u2019s dilemma","author":"Jain","year":"2005"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2019.102578"},{"key":"B25","first-page":"07","article-title":"Libsvm: A library for support vector machines","volume":"2","author":"Chang","year":"2007","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"B27","article-title":"On calibration of modern neural networks","author":"Guo","year":"2017","journal-title":"CoRR, vol. abs\/1706.04599"},{"key":"B28","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/CVPR.2009.5206848","article-title":"Imagenet: A large-scale hierarchical image database","volume-title":"in 2009 IEEE Conference on Computer Vision and Pattern Recognition","author":"Deng","year":"2009"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"article-title":"Fashion mnist","year":"2017","author":"SE","key":"B30"}],"event":{"name":"Sixteenth International Conference on Machine Vision (ICMV 2023)","start":{"date-parts":[[2023,11,15]]},"location":"Yerevan, Armenia","end":{"date-parts":[[2023,11,18]]}},"container-title":["Sixteenth International Conference on Machine Vision (ICMV 2023)"],"original-title":[],"deposited":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T22:23:49Z","timestamp":1716589429000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.spiedigitallibrary.org\/conference-proceedings-of-spie\/13072\/3023403\/Methods-for-non-intrusive-out-of-distribution-images-detection\/10.1117\/12.3023403.full"}},"subtitle":[],"editor":[{"given":"Wolfgang","family":"Osten","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,4,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1117\/12.3023403","relation":{},"subject":[],"published":{"date-parts":[[2024,4,3]]}}}