{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T21:45:04Z","timestamp":1778535904112,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,14]],"date-time":"2021-08-14T00:00:00Z","timestamp":1628899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF III","award":["1910880"],"award-info":[{"award-number":["1910880"]}]},{"name":"NSF CSSI","award":["2103832"],"award-info":[{"award-number":["2103832"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,14]]},"DOI":"10.1145\/3447548.3467320","type":"proceedings-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T18:21:39Z","timestamp":1628878899000},"page":"2174-2182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["ELITE"],"prefix":"10.1145","author":[{"given":"Huayi","family":"Zhang","sequence":"first","affiliation":[{"name":"WPI, Worcester, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Cao","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"VanNostrand","sequence":"additional","affiliation":[{"name":"WPI, Worcester, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samuel","family":"Madden","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elke A.","family":"Rundensteiner","sequence":"additional","affiliation":[{"name":"WPI, Worcester, MA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2021,8,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00057"},{"key":"e_1_3_2_1_2_1","volume-title":"Asian conference on computer vision. Springer, 622--637","author":"Akcay Samet","year":"2018","unstructured":"Samet Akcay , Amir Atapour-Abarghouei , and Toby P Breckon . 2018 . Ganomaly: Semi-supervised anomaly detection via adversarial training . In Asian conference on computer vision. Springer, 622--637 . Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian conference on computer vision. Springer, 622--637."},{"key":"e_1_3_2_1_3_1","first-page":"21","article-title":"Detecting anomalous data using auto-encoders","volume":"6","author":"Andrews Jerone TA","year":"2016","unstructured":"Jerone TA Andrews , Edward J Morton , and Lewis D Griffin . 2016 . Detecting anomalous data using auto-encoders . International Journal of Machine Learning and Computing , Vol. 6 , 1 (2016), 21 . Jerone TA Andrews, Edward J Morton, and Lewis D Griffin. 2016. Detecting anomalous data using auto-encoders. International Journal of Machine Learning and Computing, Vol. 6, 1 (2016), 21.","journal-title":"International Journal of Machine Learning and Computing"},{"key":"e_1_3_2_1_4_1","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 206--222","author":"Beggel Laura","year":"2019","unstructured":"Laura Beggel , Michael Pfeiffer , and Bernd Bischl . 2019 . Robust anomaly detection in images using adversarial autoencoders . In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 206--222 . Laura Beggel, Michael Pfeiffer, and Bernd Bischl. 2019. Robust anomaly detection in images using adversarial autoencoders. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 206--222."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71249-9_3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"e_1_3_2_1_7_1","volume-title":"Residuals and influence in regression","author":"Dennis Cook R","unstructured":"R Dennis Cook and Sanford Weisberg . 1982. Residuals and influence in regression . New York : Chapman and Hall . R Dennis Cook and Sanford Weisberg. 1982. Residuals and influence in regression. New York: Chapman and Hall."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3182\/20140824-6-ZA-1003.00295"},{"key":"e_1_3_2_1_10_1","unstructured":"Izhak Golan and Ran El-Yaniv. 2018. Deep anomaly detection using geometric transformations. In NeurIPS. 9758--9769.  Izhak Golan and Ran El-Yaniv. 2018. Deep anomaly detection using geometric transformations. In NeurIPS. 9758--9769."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2512538.2512545"},{"key":"e_1_3_2_1_12_1","unstructured":"Lan-Zhe Guo Zhen-Yu Zhang Yuan Jiang Yu-Feng Li and Zhi-Hua Zhou. 2020. Safe Deep Semi-Supervised Learning for Unseen-Class Unlabeled Data. ICML.  Lan-Zhe Guo Zhen-Yu Zhang Yuan Jiang Yu-Feng Li and Zhi-Hua Zhou. 2020. Safe Deep Semi-Supervised Learning for Unseen-Class Unlabeled Data. ICML."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646111.679466"},{"key":"e_1_3_2_1_14_1","volume-title":"Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606","author":"Hendrycks Dan","year":"2018","unstructured":"Dan Hendrycks , Mantas Mazeika , and Thomas Dietterich . 2018. Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606 ( 2018 ). Dan Hendrycks, Mantas Mazeika, and Thomas Dietterich. 2018. Deep anomaly detection with outlier exposure. arXiv preprint arXiv:1812.04606 (2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Understanding black-box predictions via influence functions. arXiv preprint arXiv:1703.04730","author":"Koh Pang Wei","year":"2017","unstructured":"Pang Wei Koh and Percy Liang . 2017. Understanding black-box predictions via influence functions. arXiv preprint arXiv:1703.04730 ( 2017 ). Pang Wei Koh and Percy Liang. 2017. Understanding black-box predictions via influence functions. arXiv preprint arXiv:1703.04730 (2017)."},{"key":"e_1_3_2_1_16_1","volume-title":"Robust Subspace Recovery Layer for Unsupervised Anomaly Detection. arXiv preprint arXiv:1904.00152","author":"Lai Chieh-Hsin","year":"2019","unstructured":"Chieh-Hsin Lai , Dongmian Zou , and Gilad Lerman . 2019. Robust Subspace Recovery Layer for Unsupervised Anomaly Detection. arXiv preprint arXiv:1904.00152 ( 2019 ). Chieh-Hsin Lai, Dongmian Zou, and Gilad Lerman. 2019. Robust Subspace Recovery Layer for Unsupervised Anomaly Detection. arXiv preprint arXiv:1904.00152 (2019)."},{"key":"e_1_3_2_1_17_1","volume-title":"Ocgan: One-class novelty detection using gans with constrained latent representations. In CVPR. 2898--2906.","author":"Perera Pramuditha","year":"2019","unstructured":"Pramuditha Perera , Ramesh Nallapati , and Bing Xiang . 2019 . Ocgan: One-class novelty detection using gans with constrained latent representations. In CVPR. 2898--2906. Pramuditha Perera, Ramesh Nallapati, and Bing Xiang. 2019. Ocgan: One-class novelty detection using gans with constrained latent representations. In CVPR. 2898--2906."},{"key":"e_1_3_2_1_18_1","volume-title":"Learning to reweight examples for robust deep learning. arXiv preprint arXiv:1803.09050","author":"Ren Mengye","year":"2018","unstructured":"Mengye Ren , Wenyuan Zeng , Bin Yang , and Raquel Urtasun . 2018. Learning to reweight examples for robust deep learning. arXiv preprint arXiv:1803.09050 ( 2018 ). Mengye Ren, Wenyuan Zeng, Bin Yang, and Raquel Urtasun. 2018. Learning to reweight examples for robust deep learning. arXiv preprint arXiv:1803.09050 (2018)."},{"key":"e_1_3_2_1_19_1","volume-title":"Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft.","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff , Robert Vandermeulen , Nico Goernitz , Lucas Deecke , Shoaib Ahmed Siddiqui , Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018 . Deep one-class classification. In ICML. 4393--4402. Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In ICML. 4393--4402."},{"key":"e_1_3_2_1_20_1","volume-title":"Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations.","author":"Ruff Lukas","year":"2020","unstructured":"Lukas Ruff , Robert A. Vandermeulen , Nico G\u00f6rnitz , Alexander Binder , Emmanuel M\u00fcller , Klaus-Robert M\u00fcller , and Marius Kloft . 2020 . Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations. Lukas Ruff, Robert A. Vandermeulen, Nico G\u00f6rnitz, Alexander Binder, Emmanuel M\u00fcller, Klaus-Robert M\u00fcller, and Marius Kloft. 2020. Deep Semi-Supervised Anomaly Detection. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Mohammad Sabokrou Mohammad Khalooei Mahmood Fathy and Ehsan Adeli. 2018. Adversarially learned one-class classifier for novelty detection. In CVPR. 3379--3388.  Mohammad Sabokrou Mohammad Khalooei Mahmood Fathy and Ehsan Adeli. 2018. Adversarially learned one-class classifier for novelty detection. In CVPR. 3379--3388.","DOI":"10.1109\/CVPR.2018.00356"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"e_1_3_2_1_23_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation","author":"Sch\u00f6lkopf Bernhard","year":"2001","unstructured":"Bernhard Sch\u00f6lkopf , John C Platt , John Shawe-Taylor , Alex J Smola , and Robert C Williamson . 2001. Estimating the support of a high-dimensional distribution. Neural computation , Vol. 13 , 7 ( 2001 ), 1443--1471. Bernhard Sch\u00f6lkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation, Vol. 13, 7 (2001), 1443--1471."},{"key":"e_1_3_2_1_24_1","unstructured":"Ningxin Shi Xiaohong Yuan and William Nick. 2017. Semi-supervised Random Forest for Intrusion Detection Network.. In MAICS. 181--185.  Ningxin Shi Xiaohong Yuan and William Nick. 2017. Semi-supervised Random Forest for Intrusion Detection Network.. In MAICS. 181--185."},{"key":"e_1_3_2_1_25_1","volume-title":"A hybrid semi-supervised anomaly detection model for high-dimensional data. Computational intelligence and neuroscience","author":"Song Hongchao","year":"2017","unstructured":"Hongchao Song , Zhuqing Jiang , Aidong Men , and Bo Yang . 2017. A hybrid semi-supervised anomaly detection model for high-dimensional data. Computational intelligence and neuroscience , Vol. 2017 ( 2017 ). Hongchao Song, Zhuqing Jiang, Aidong Men, and Bo Yang. 2017. A hybrid semi-supervised anomaly detection model for high-dimensional data. Computational intelligence and neuroscience, Vol. 2017 (2017)."},{"key":"e_1_3_2_1_26_1","volume-title":"Support vector data description. Machine learning","author":"Tax David MJ","year":"2004","unstructured":"David MJ Tax and Robert PW Duin . 2004. Support vector data description. Machine learning , Vol. 54 , 1 ( 2004 ), 45--66. David MJ Tax and Robert PW Duin. 2004. Support vector data description. Machine learning, Vol. 54, 1 (2004), 45--66."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2018.07.014"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.177"},{"key":"e_1_3_2_1_29_1","volume-title":"Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar.","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati , Chuan Sheng Foo , Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018 . Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018). Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018. Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)."},{"key":"e_1_3_2_1_30_1","volume-title":"Deep structured energy based models for anomaly detection. arXiv preprint arXiv:1605.07717","author":"Zhai Shuangfei","year":"2016","unstructured":"Shuangfei Zhai , Yu Cheng , Weining Lu , and Zhongfei Zhang . 2016. Deep structured energy based models for anomaly detection. arXiv preprint arXiv:1605.07717 ( 2016 ). Shuangfei Zhai, Yu Cheng, Weining Lu, and Zhongfei Zhang. 2016. Deep structured energy based models for anomaly detection. arXiv preprint arXiv:1605.07717 (2016)."},{"key":"e_1_3_2_1_31_1","volume-title":"Rundensteiner","author":"Zhang Huayi","year":"2020","unstructured":"Huayi Zhang , Lei Cao , Yizhou Yan , Samuel Madden , and Elke A . Rundensteiner . 2020 . Continuously Adaptive Similarity Search. In SIGMOD. 2601--2616. Huayi Zhang, Lei Cao, Yizhou Yan, Samuel Madden, and Elke A. Rundensteiner. 2020. Continuously Adaptive Similarity Search. In SIGMOD. 2601--2616."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In SIGKDD. 665--674.  Chong Zhou and Randy C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In SIGKDD. 665--674.","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396195"}],"event":{"name":"KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event Singapore","acronym":"KDD '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447548.3467320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:22Z","timestamp":1750191502000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447548.3467320"}},"subtitle":["Robust Deep Anomaly Detection with Meta Gradient"],"short-title":[],"issued":{"date-parts":[[2021,8,14]]},"references-count":33,"alternative-id":["10.1145\/3447548.3467320","10.1145\/3447548"],"URL":"https:\/\/doi.org\/10.1145\/3447548.3467320","relation":{},"subject":[],"published":{"date-parts":[[2021,8,14]]},"assertion":[{"value":"2021-08-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}