{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:25:16Z","timestamp":1772781916833,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338501.3357368","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["CADENCE"],"prefix":"10.1145","author":[{"given":"Mohammad Ruhul","family":"Amin","sequence":"first","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"Pranav","family":"Garg","sequence":"additional","affiliation":[{"name":"Amazon Web Services, New York, NY, USA"}]},{"given":"Baris","family":"Coskun","sequence":"additional","affiliation":[{"name":"Amazon Web Services, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ROCK: A Robust Clustering Algorithm for Categorical Attributes. In Proceedings of the 15th International Conference on Data Engineering (ICDE '99)","unstructured":"1999. ROCK: A Robust Clustering Algorithm for Categorical Attributes. In Proceedings of the 15th International Conference on Data Engineering (ICDE '99) . IEEE Computer Society, Washington, DC, USA, 512?. http:\/\/dl.acm.org\/citation.cfm?id=846218.847264 1999. ROCK: A Robust Clustering Algorithm for Categorical Attributes. In Proceedings of the 15th International Conference on Data Engineering (ICDE '99). IEEE Computer Society, Washington, DC, USA, 512?. http:\/\/dl.acm.org\/citation.cfm?id=846218.847264"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/66.2.229"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1989.10488517"},{"key":"e_1_3_2_1_4_1","volume-title":"Outlier Analysis","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2013. Outlier Analysis . Springer . https:\/\/doi.org\/10.1007\/978-1-4614-6396-2 10.1007\/978-1-4614-6396-2 Charu C. Aggarwal. 2013. Outlier Analysis. Springer. https:\/\/doi.org\/10.1007\/978-1-4614-6396-2"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data (SIGMOD '01)","author":"Charu","unstructured":"Charu C. Aggarwal and Philip S. Yu. 2001. Outlier Detection for High Dimensional Data . In Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data (SIGMOD '01) . ACM, New York, NY, USA, 37--46. https:\/\/doi.org\/10.1145\/375663.375668 10.1145\/375663.375668 Charu C. Aggarwal and Philip S. Yu. 2001. Outlier Detection for High Dimensional Data. In Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data (SIGMOD '01). ACM, New York, NY, USA, 37--46. https:\/\/doi.org\/10.1145\/375663.375668"},{"key":"e_1_3_2_1_6_1","unstructured":"Jinwon An and Sungzoon Cho. 2015. Variational Autoencoder based Anomaly Detection using Reconstruction Probability.  Jinwon An and Sungzoon Cho. 2015. Variational Autoencoder based Anomaly Detection using Reconstruction Probability."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860505"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/for.768"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. Credit Scoring and Credit Control VII. 5--7.","author":"Bolton Richard J.","unstructured":"Richard J. Bolton , David J. Hand , and David J. H . 2001. Unsupervised Profiling Methods for Fraud Detection . In Proc. Credit Scoring and Credit Control VII. 5--7. Richard J. Bolton, David J. Hand, and David J. H. 2001. Unsupervised Profiling Methods for Fraud Detection. In Proc. Credit Scoring and Credit Control VII. 5--7."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_11_1","first-page":"2","article-title":"LOF","volume":"29","author":"Breunig Markus M.","year":"2000","unstructured":"Markus M. Breunig , Hans-Peter Kriegel , Raymond T. Ng , and J\u00f6rg Sander . 2000 . LOF : Identifying Density-based Local Outliers. SIGMOD Rec. , Vol. 29 , 2 (May 2000), 93--104. https:\/\/doi.org\/10.1145\/335191.335388 10.1145\/335191.335388 Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J\u00f6rg Sander. 2000. LOF: Identifying Density-based Local Outliers. SIGMOD Rec., Vol. 29, 2 (May 2000), 93--104. https:\/\/doi.org\/10.1145\/335191.335388","journal-title":"Identifying Density-based Local Outliers. SIGMOD Rec."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_14_1","volume-title":"Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274","author":"Chen Tianqi","year":"2015","unstructured":"Tianqi Chen , Mu Li , Yutian Li , Min Lin , Naiyan Wang , Minjie Wang , Tianjun Xiao , Bing Xu , Chiyuan Zhang , and Zheng Zhang . 2015 . Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274 (2015). Tianqi Chen, Mu Li, Yutian Li, Min Lin, Naiyan Wang, Minjie Wang, Tianjun Xiao, Bing Xu, Chiyuan Zhang, and Zheng Zhang. 2015. Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems. arXiv preprint arXiv:1512.01274 (2015)."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016","author":"Chen Ting","year":"2016","unstructured":"Ting Chen , Lu An Tang , Yizhou Sun , Zhengzhang Chen , and Kai Zhang . 2016 b. Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events . In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016 , New York, NY, USA , 9-15 July 2016. 1396--1403. http:\/\/www.ijcai.org\/Abstract\/16\/201 Ting Chen, Lu An Tang, Yizhou Sun, Zhengzhang Chen, and Kai Zhang. 2016b. Entity Embedding-Based Anomaly Detection for Heterogeneous Categorical Events. In Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016. 1396--1403. http:\/\/www.ijcai.org\/Abstract\/16\/201"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1186"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0371-9"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Twentieth Annual Conference on Neural Information Processing Systems","author":"El-Yaniv Ran","year":"2006","unstructured":"Ran El-Yaniv and Mordechai Nisenson . 2006 . Optimal Single-Class Classification Strategies. In Advances in Neural Information Processing Systems 19 , Proceedings of the Twentieth Annual Conference on Neural Information Processing Systems , Vancouver, British Columbia, Canada , December 4-7, 2006. 377--384. http:\/\/papers.nips.cc\/paper\/2987-optimal-single-class-classification-strategies Ran El-Yaniv and Mordechai Nisenson. 2006. Optimal Single-Class Classification Strategies. In Advances in Neural Information Processing Systems 19, Proceedings of the Twentieth Annual Conference on Neural Information Processing Systems, Vancouver, British Columbia, Canada, December 4-7, 2006. 377--384. http:\/\/papers.nips.cc\/paper\/2987-optimal-single-class-classification-strategies"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312195"},{"key":"e_1_3_2_1_22_1","volume-title":"Battista Biggio, and Giorgio Giacinto.","author":"Freeman David","year":"2016","unstructured":"David Freeman , Sakshi Jain , Markus D\u00fc rmuth , Battista Biggio, and Giorgio Giacinto. 2016 . Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS. The Internet Society . David Freeman, Sakshi Jain, Markus D\u00fc rmuth, Battista Biggio, and Giorgio Giacinto. 2016. Who Are You? A Statistical Approach to Measuring User Authenticity. In NDSS. The Internet Society."},{"key":"e_1_3_2_1_23_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , Aaron Courville , and Yoshua Bengio . 2016. Deep learning . Vol. 1 . MIT press Cambridge . Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Guha Sudipto","year":"2016","unstructured":"Sudipto Guha , Nina Mishra , Gourav Roy , and Okke Schrijvers . 2016 . Robust Random Cut Forest Based Anomaly Detection on Streams . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 2712--2721. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045676 Sudipto Guha, Nina Mishra, Gourav Roy, and Okke Schrijvers. 2016. Robust Random Cut Forest Based Anomaly Detection on Streams. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 2712--2721. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045676"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010","author":"Gutmann Michael","year":"2010","unstructured":"Michael Gutmann and Aapo Hyv\"a rinen. 2010 . Noise-contrastive estimation: A new estimation principle for unnormalized statistical models . In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010 , Chia Laguna Resort, Sardinia, Italy , May 13-15, 2010. 297--304. http:\/\/www.jmlr.org\/proceedings\/papers\/v9\/gutmann10a.html Michael Gutmann and Aapo Hyv\"a rinen. 2010. Noise-contrastive estimation: A new estimation principle for unnormalized statistical models. In Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, May 13-15, 2010. 297--304. http:\/\/www.jmlr.org\/proceedings\/papers\/v9\/gutmann10a.html"},{"key":"e_1_3_2_1_26_1","volume-title":"Applied logistic regression","author":"Hosmer David W","unstructured":"David W Hosmer Jr , Stanley Lemeshow , and Rodney X Sturdivant . 2013. Applied logistic regression . Vol. 398 . John Wiley & Sons . David W Hosmer Jr, Stanley Lemeshow, and Rodney X Sturdivant. 2013. Applied logistic regression. Vol. 398. John Wiley & Sons."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959134"},{"key":"#cr-split#-e_1_3_2_1_28_1.1","unstructured":"Alexander D. Kent. 2015. Comprehensive Multi-Source Cyber-Security Events. Los Alamos National Laboratory. https:\/\/doi.org\/10.17021\/1179829 10.17021\/1179829"},{"key":"#cr-split#-e_1_3_2_1_28_1.2","unstructured":"Alexander D. Kent. 2015. Comprehensive Multi-Source Cyber-Security Events. Los Alamos National Laboratory. https:\/\/doi.org\/10.17021\/1179829"},{"key":"e_1_3_2_1_29_1","volume-title":"On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima. CoRR","author":"Keskar Nitish Shirish","year":"2016","unstructured":"Nitish Shirish Keskar , Dheevatsa Mudigere , Jorge Nocedal , Mikhail Smelyanskiy , and Ping Tak Peter Tang . 2016. On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima. CoRR , Vol. abs\/ 1609 .04836 ( 2016 ). arxiv: 1609.04836 http:\/\/arxiv.org\/abs\/1609.04836 Nitish Shirish Keskar, Dheevatsa Mudigere, Jorge Nocedal, Mikhail Smelyanskiy, and Ping Tak Peter Tang. 2016. On Large-Batch Training for Deep Learning: Generalization Gap and Sharp Minima. CoRR, Vol. abs\/1609.04836 (2016). arxiv: 1609.04836 http:\/\/arxiv.org\/abs\/1609.04836"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. 3rd Int. Conf. Learn. Representations.","author":"Kingma Diederik P","year":"2014","unstructured":"Diederik P Kingma and Jimmy Lei Ba . 2014 . Adam: Amethod for stochastic optimization . In Proc. 3rd Int. Conf. Learn. Representations. Diederik P Kingma and Jimmy Lei Ba. 2014. Adam: Amethod for stochastic optimization. In Proc. 3rd Int. Conf. Learn. Representations."},{"key":"e_1_3_2_1_31_1","volume-title":"Machine Learning and Cybernetics, 2003 International Conference on","volume":"5","author":"Li Kun-Lun","year":"2003","unstructured":"Kun-Lun Li , Hou-Kuan Huang , Sheng-Feng Tian , and Wei Xu . 2003 . Improving one-class SVM for anomaly detection . In Machine Learning and Cybernetics, 2003 International Conference on , Vol. 5 . IEEE, 3077--3081. Kun-Lun Li, Hou-Kuan Huang, Sheng-Feng Tian, and Wei Xu. 2003. Improving one-class SVM for anomaly detection. In Machine Learning and Cybernetics, 2003 International Conference on, Vol. 5. IEEE, 3077--3081."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250986"},{"key":"e_1_3_2_1_34_1","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geoffrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research , Vol. 9 , Nov (2008), 2579 -- 2605 . Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research, Vol. 9, Nov (2008), 2579--2605.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCBDA.2017.7951886"},{"key":"e_1_3_2_1_36_1","volume-title":"Efficient Estimation of Word Representations in Vector Space. CoRR","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013a. Efficient Estimation of Word Representations in Vector Space. CoRR , Vol. abs\/ 1301 .3781 ( 2013 ). arxiv: 1301.3781 http:\/\/arxiv.org\/abs\/1301.3781 Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013a. Efficient Estimation of Word Representations in Vector Space. CoRR, Vol. abs\/1301.3781 (2013). arxiv: 1301.3781 http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"2","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg Corrado , and Jeffrey Dean . 2013 b. Distributed Representations of Words and Phrases and Their Compositionality . In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13). Curran Associates Inc., USA, 3111--3119. http:\/\/dl.acm.org\/citation.cfm?id=2999792.2999959 Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013b. Distributed Representations of Words and Phrases and Their Compositionality. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13). Curran Associates Inc., USA, 3111--3119. http:\/\/dl.acm.org\/citation.cfm?id=2999792.2999959"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2013.2258948"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"2","author":"Mnih Andriy","year":"2013","unstructured":"Andriy Mnih and Koray Kavukcuoglu . 2013 . Learning Word Embeddings Efficiently with Noise-contrastive Estimation . In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13). Curran Associates Inc., USA, 2265--2273. http:\/\/dl.acm.org\/citation.cfm?id=2999792.2999865 Andriy Mnih and Koray Kavukcuoglu. 2013. Learning Word Embeddings Efficiently with Noise-contrastive Estimation. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 2 (NIPS'13). Curran Associates Inc., USA, 2265--2273. http:\/\/dl.acm.org\/citation.cfm?id=2999792.2999865"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning, ICML 2012","author":"Mnih Andriy","year":"2012","unstructured":"Andriy Mnih and Yee Whye Teh . 2012 . A fast and simple algorithm for training neural probabilistic language models . In Proceedings of the 29th International Conference on Machine Learning, ICML 2012 , Edinburgh, Scotland, UK, June 26 - July 1, 2012. http:\/\/icml.cc\/2012\/papers\/855.pdf Andriy Mnih and Yee Whye Teh. 2012. A fast and simple algorithm for training neural probabilistic language models. In Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012. http:\/\/icml.cc\/2012\/papers\/855.pdf"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_42_1","volume-title":"Rousseeuw and Mia Hubert","author":"Peter","year":"2018","unstructured":"Peter J. Rousseeuw and Mia Hubert . 2018 . Anomaly detection by robust statistics. Wiley Interdisc . Rew.: Data Mining and Knowledge Discovery, Vol. 8 , 2 (2018). https:\/\/doi.org\/10.1002\/widm.1236 10.1002\/widm.1236 Peter J. Rousseeuw and Mia Hubert. 2018. Anomaly detection by robust statistics. Wiley Interdisc. Rew.: Data Mining and Knowledge Discovery, Vol. 8, 2 (2018). https:\/\/doi.org\/10.1002\/widm.1236"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-005-4610-3"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502567"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378372"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1009"},{"key":"e_1_3_2_1_48_1","volume-title":"Mach. Learn. Res.","volume":"6","author":"Steinwart Ingo","year":"2005","unstructured":"Ingo Steinwart , Don Hush , and Clint Scovel . 2005 . A Classification Framework for Anomaly Detection. J . Mach. Learn. Res. , Vol. 6 (Dec. 2005), 211--232. http:\/\/dl.acm.org\/citation.cfm?id=1046920.1058109 Ingo Steinwart, Don Hush, and Clint Scovel. 2005. A Classification Framework for Anomaly Detection. J. Mach. Learn. Res., Vol. 6 (Dec. 2005), 211--232. http:\/\/dl.acm.org\/citation.cfm?id=1046920.1058109"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032649.1033456"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the 1990 IEEE Symposium on Research in Computer Security and Privacy. 278--284","author":"Teng H. S.","unstructured":"H. S. Teng , K. Chen , and S. C. Lu . 1990. Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns . In Proceedings of the 1990 IEEE Symposium on Research in Computer Security and Privacy. 278--284 . H. S. Teng, K. Chen, and S. C. Lu. 1990. Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In Proceedings of the 1990 IEEE Symposium on Research in Computer Security and Privacy. 278--284."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP","author":"Vaswani Ashish","year":"2013","unstructured":"Ashish Vaswani , Yinggong Zhao , Victoria Fossum , and David Chiang . 2013. Decoding with Large-Scale Neural Language Models Improves Translation . In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP 2013 , 18--21 October 2013, Grand Hyatt Seattle, Seattle, Washington, USA , A meeting of SIGDAT, a Special Interest Group of the ACL. 1387--1392. http:\/\/aclweb.org\/anthology\/D\/D13\/D13--1140.pdf Ashish Vaswani, Yinggong Zhao, Victoria Fossum, and David Chiang. 2013. Decoding with Large-Scale Neural Language Models Improves Translation. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP 2013, 18--21 October 2013, Grand Hyatt Seattle, Seattle, Washington, USA, A meeting of SIGDAT, a Special Interest Group of the ACL. 1387--1392. http:\/\/aclweb.org\/anthology\/D\/D13\/D13--1140.pdf"},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Xie Junyuan","year":"2016","unstructured":"Junyuan Xie , Ross Girshick , and Ali Farhadi . 2016 . Unsupervised Deep Embedding for Clustering Analysis . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 478--487. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045442 Junyuan Xie, Ross Girshick, and Ali Farhadi. 2016. Unsupervised Deep Embedding for Clustering Analysis. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 478--487. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045442"},{"key":"e_1_3_2_1_53_1","volume-title":"Mach. Learn. Res.","volume":"10","author":"Xu Huan","year":"2009","unstructured":"Huan Xu , Constantine Caramanis , and Shie Mannor . 2009 . Robustness and Regularization of Support Vector Machines. J . Mach. Learn. Res. , Vol. 10 (Dec. 2009), 1485--1510. http:\/\/dl.acm.org\/citation.cfm?id=1577069.1755834 Huan Xu, Constantine Caramanis, and Shie Mannor. 2009. Robustness and Regularization of Support Vector Machines. J. Mach. Learn. Res., Vol. 10 (Dec. 2009), 1485--1510. http:\/\/dl.acm.org\/citation.cfm?id=1577069.1755834"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2614491"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 34th International Conference on Machine Learning, ICML 2017","author":"Yang Bo","year":"2017","unstructured":"Bo Yang , Xiao Fu , Nicholas D. Sidiropoulos , and Mingyi Hong . 2017 b. Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering . In Proceedings of the 34th International Conference on Machine Learning, ICML 2017 , Sydney, NSW, Australia, 6- -11 August 2017. 3861--3870. http:\/\/proceedings.mlr.press\/v70\/yang17b.html Bo Yang, Xiao Fu, Nicholas D. Sidiropoulos, and Mingyi Hong. 2017b. Towards K-means-friendly Spaces: Simultaneous Deep Learning and Clustering. In Proceedings of the 34th International Conference on Machine Learning, ICML 2017, Sydney, NSW, Australia, 6--11 August 2017. 3861--3870. http:\/\/proceedings.mlr.press\/v70\/yang17b.html"},{"key":"e_1_3_2_1_56_1","volume-title":"Joint Unsupervised Learning of Deep Representations and Image Clusters. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016","author":"Yang Jianwei","year":"2016","unstructured":"Jianwei Yang , Devi Parikh , and Dhruv Batra . 2016 . Joint Unsupervised Learning of Deep Representations and Image Clusters. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016 , Las Vegas, NV, USA , June 27-30, 2016. 5147--5156. https:\/\/doi.org\/10.1109\/CVPR.2016.556 10.1109\/CVPR.2016.556 Jianwei Yang, Devi Parikh, and Dhruv Batra. 2016. Joint Unsupervised Learning of Deep Representations and Image Clusters. In 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016. 5147--5156. https:\/\/doi.org\/10.1109\/CVPR.2016.556"},{"key":"e_1_3_2_1_57_1","volume-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning -","volume":"48","author":"Zhai Shuangfei","year":"2016","unstructured":"Shuangfei Zhai , Yu Cheng , Weining Lu , and Zhongfei Zhang . 2016 . Deep Structured Energy Based Models for Anomaly Detection . In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1100--1109. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045507 Shuangfei Zhai, Yu Cheng, Weining Lu, and Zhongfei Zhang. 2016. Deep Structured Energy Based Models for Anomaly Detection. In Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48 (ICML'16). JMLR.org, 1100--1109. http:\/\/dl.acm.org\/citation.cfm?id=3045390.3045507"},{"key":"e_1_3_2_1_58_1","unstructured":"Manqi Zhao and Venkatesh Saligrama. 2009. Anomaly detection with score functions based on nearest neighbor graphs. In Advances in neural information processing systems. 2250--2258.  Manqi Zhao and Venkatesh Saligrama. 2009. Anomaly detection with score functions based on nearest neighbor graphs. In Advances in neural information processing systems. 2250--2258."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132987"},{"key":"e_1_3_2_1_61_1","volume-title":"Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong , Qi Song , Martin Renqiang Min , Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018 . Deep autoencoding gaussian mixture model for unsupervised anomaly detection. (2018). Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. (2018)."},{"key":"e_1_3_2_1_62_1","volume-title":"NAACL HLT","author":"Zoph Barret","year":"2016","unstructured":"Barret Zoph , Ashish Vaswani , Jonathan May , and Kevin Knight . 2016. Simple , Fast Noise-Contrastive Estimation for Large RNN Vocabularies . In NAACL HLT 2016 , The 2016 Conference of the North American Chapter of the Association for Computational Linguistics : Human Language Technologies, San Diego California, USA, June 12-17, 2016. 1217--1222. http:\/\/aclweb.org\/anthology\/N\/N16\/N16-1145.pdf Barret Zoph, Ashish Vaswani, Jonathan May, and Kevin Knight. 2016. Simple, Fast Noise-Contrastive Estimation for Large RNN Vocabularies. In NAACL HLT 2016, The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego California, USA, June 12-17, 2016. 1217--1222. http:\/\/aclweb.org\/anthology\/N\/N16\/N16-1145.pdf"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338501.3357368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338501.3357368"}},"subtitle":["Conditional Anomaly Detection for Events Using Noise-Contrastive Estimation"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":63,"alternative-id":["10.1145\/3338501.3357368","10.1145\/3338501"],"URL":"https:\/\/doi.org\/10.1145\/3338501.3357368","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}