{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:18:00Z","timestamp":1775578680013,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":84,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3485447.3512221","type":"proceedings-article","created":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T05:11:23Z","timestamp":1650863483000},"page":"610-621","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["MemStream: Memory-Based Streaming Anomaly Detection"],"prefix":"10.1145","author":[{"given":"Siddharth","family":"Bhatia","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Arjit","family":"Jain","sequence":"additional","affiliation":[{"name":"IIT Bombay, India"}]},{"given":"Shivin","family":"Srivastava","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Kenji","family":"Kawaguchi","sequence":"additional","affiliation":[{"name":"Harvard University, USA"}]},{"given":"Bryan","family":"Hooi","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2022,4,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Charu\u00a0C Aggarwal. 2015. Outlier analysis. In Data mining.","DOI":"10.1007\/978-3-319-14142-8_8"},{"key":"e_1_3_2_1_2_1","volume-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training. In ACCV.","author":"Akcay Samet","year":"2018","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby\u00a0P Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In ACCV."},{"key":"e_1_3_2_1_3_1","unstructured":"Jinwon An and Sungzoon Cho. 2015. Variational autoencoder based anomaly detection using reconstruction probability. Special Lecture on IE(2015)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Fabrizio Angiulli and Fabio Fassetti. 2007. Detecting distance-based outliers in streams of data. In CIKM.","DOI":"10.1145\/1321440.1321552"},{"key":"e_1_3_2_1_5_1","volume-title":"An Optimization Model for Clustering Categorical Data Streams with Drifting Concepts. TKDE","author":"Bai Liang","year":"2016","unstructured":"Liang Bai, Xueqi Cheng, Jiye Liang, and Huawei Shen. 2016. An Optimization Model for Clustering Categorical Data Streams with Drifting Concepts. TKDE (2016)."},{"key":"e_1_3_2_1_6_1","unstructured":"Vic Barnett and Toby Lewis. 1984. Outliers in statistical data. (1984)."},{"key":"e_1_3_2_1_7_1","volume-title":"TAnoGAN: Time Series Anomaly Detection with Generative Adversarial Networks. SSCI","author":"Bashar Md\u00a0Abul","year":"2020","unstructured":"Md\u00a0Abul Bashar and Richi Nayak. 2020. TAnoGAN: Time Series Anomaly Detection with Generative Adversarial Networks. SSCI (2020)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Laura Beggel Michael Pfeiffer and Bernd Bischl. 2019. Robust anomaly detection in images using adversarial autoencoders. In ECMLPKDD.","DOI":"10.1007\/978-3-030-46150-8_13"},{"key":"e_1_3_2_1_9_1","volume-title":"Unsupervised Methods, and Concept Drift in Stream Learning. In Encyclopedia of Big Data Technologies.","author":"Bencz\u00far A.","unstructured":"Andr\u00e1s\u00a0A. Bencz\u00far, Levente Kocsis, and R\u00f3bert P\u00e1lovics. 2019. Reinforcement Learning, Unsupervised Methods, and Concept Drift in Stream Learning. In Encyclopedia of Big Data Technologies."},{"key":"e_1_3_2_1_10_1","volume-title":"Learning Deep Architectures for AI","author":"Bengio Yoshua","unstructured":"Yoshua Bengio. 2009. Learning Deep Architectures for AI. Now Publishers Inc."},{"key":"e_1_3_2_1_11_1","volume-title":"MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams. In AAAI.","author":"Bhatia Siddharth","year":"2020","unstructured":"Siddharth Bhatia, Bryan Hooi, Minji Yoon, Kijung Shin, and Christos Faloutsos. 2020. MIDAS: Microcluster-Based Detector of Anomalies in Edge Streams. In AAAI."},{"key":"e_1_3_2_1_12_1","volume-title":"MSTREAM: Fast Anomaly Detection in Multi-Aspect Streams. TheWebConf (WWW)","author":"Bhatia Siddharth","year":"2021","unstructured":"Siddharth Bhatia, Arjit Jain, Pan Li, Ritesh Kumar, and Bryan Hooi. 2021. MSTREAM: Fast Anomaly Detection in Multi-Aspect Streams. TheWebConf (WWW) (2021)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Markus\u00a0M Breunig Hans-Peter Kriegel Raymond\u00a0T Ng and J\u00f6rg Sander. 2000. LOF: identifying density-based local outliers. In SIGMOD.","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_14_1","volume":"201","author":"Cand\u00e8s E","unstructured":"E Cand\u00e8s, X Li, Y Ma, and J Wright. 2011. Robust principal component analysis?JACM (2011).","journal-title":"J Wright."},{"key":"e_1_3_2_1_15_1","unstructured":"Raghavendra Chalapathy and Sanjay Chawla. 2019. Deep Learning for Anomaly Detection: A Survey. ArXiv abs\/1901.03407(2019)."},{"key":"e_1_3_2_1_16_1","unstructured":"Raghavendra Chalapathy Aditya\u00a0Krishna Menon and Sanjay Chawla. 2018. Anomaly Detection using One-Class Neural Networks. ArXiv abs\/1802.06360(2018)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Varun Chandola Arindam Banerjee and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Computing Survey(2009).","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2708979"},{"key":"e_1_3_2_1_19_1","unstructured":"[19] KDD\u00a0Cup Dataset.1999. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"L. Deecke R. Vandermeulen L. Ruff S. Mandt and M. Kloft. 2018. Image Anomaly Detection with Generative Adversarial Networks. In ECMLPKDD.","DOI":"10.1007\/978-3-030-10925-7_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Zhiguo Ding and Minrui Fei. 2013. An Anomaly Detection Approach Based on Isolation Forest Algorithm for Streaming Data Using Sliding Window. In ICONS.","DOI":"10.3182\/20130902-3-CN-3020.00044"},{"key":"e_1_3_2_1_22_1","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_1_23_1","volume-title":"High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition","author":"Erfani M","year":"2016","unstructured":"Sarah\u00a0M Erfani, Sutharshan Rajasegarar, Shanika Karunasekera, and Christopher Leckie. 2016. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition (2016)."},{"key":"e_1_3_2_1_24_1","volume-title":"van\u00a0den Hengel","author":"Gong D.","year":"2019","unstructured":"D. Gong, L. Liu, V. Le, B. Saha, M.\u00a0R. Mansour, S. Venkatesh, and A. van\u00a0den Hengel. 2019. Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection. ICCV (2019)."},{"key":"e_1_3_2_1_25_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press Cambridge."},{"key":"e_1_3_2_1_26_1","volume-title":"LUNAR: Unifying Local Outlier Detection Methods via Graph Neural Networks. arXiv preprint arXiv:2112.05355(2021).","author":"Goodge Adam","year":"2021","unstructured":"Adam Goodge, Bryan Hooi, See\u00a0Kiong Ng, and Wee\u00a0Siong Ng. 2021. LUNAR: Unifying Local Outlier Detection Methods via Graph Neural Networks. arXiv preprint arXiv:2112.05355(2021)."},{"key":"e_1_3_2_1_27_1","unstructured":"Sudipto Guha Nina Mishra Gourav Roy and Okke Schrijvers. 2016. Robust Random Cut Forest Based Anomaly Detection on Streams. In ICML."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"S. G\u00fcnter N.\u00a0N. Schraudolph and S. Vishwanathan. 2007. Fast Iterative Kernel Principal Component Analysis. JMLR (2007).","DOI":"10.7551\/mitpress\/7503.003.0158"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2621979"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"S. Hariri M. Kind and R. Brunner. 2021. Extended Isolation Forest. TKDE (2021).","DOI":"10.1109\/TKDE.2019.2947676"},{"key":"e_1_3_2_1_31_1","unstructured":"Geoffrey\u00a0E Hinton and Richard\u00a0S Zemel. 1994. Autoencoders minimum description length and Helmholtz free energy. In NIPS."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Ian\u00a0T Jolliffe. 1986. Principal components in regression analysis. In Principal component analysis.","DOI":"10.1007\/978-1-4757-1904-8"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Jaechul Kim and Kristen Grauman. 2009. Observe locally infer globally: A space-time MRF for detecting abnormal activities with incremental updates. In CVPR.","DOI":"10.1109\/CVPRW.2009.5206569"},{"key":"e_1_3_2_1_34_1","volume-title":"Robust kernel density estimation. JMLR","author":"Kim J.","year":"2012","unstructured":"J. Kim and C.\u00a0D. Scott. 2012. Robust kernel density estimation. JMLR (2012)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Artemy Kolchinsky Brendan\u00a0D. Tracey and David\u00a0H. Wolpert. 2019. Nonlinear Information Bottleneck.","DOI":"10.3390\/e21121181"},{"key":"e_1_3_2_1_36_1","unstructured":"Rithesh Kumar Anirudh Goyal Aaron\u00a0C Courville and Yoshua Bengio. 2019. Maximum Entropy Generators for Energy-Based Models. ArXiv abs\/1901.08508(2019)."},{"key":"e_1_3_2_1_37_1","volume-title":"DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN. ICDM","author":"Lim Swee\u00a0Kiat","year":"2018","unstructured":"Swee\u00a0Kiat Lim, Yi Loo, Ngoc-Trung Tran, Ngai-Man Cheung, Gemma Roig, and Yuval Elovici. 2018. DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN. ICDM (2018)."},{"key":"e_1_3_2_1_38_1","unstructured":"Fei\u00a0Tony Liu Kai\u00a0Ming Ting and Zhi-Hua Zhou. 2008. Isolation Forest. ICDM (2008)."},{"key":"e_1_3_2_1_39_1","volume-title":"International Encyclopedia of Statistical Science","author":"Lovric Miodrag","unstructured":"Miodrag Lovric. 2011. International Encyclopedia of Statistical Science.Springer."},{"key":"e_1_3_2_1_40_1","volume-title":"Abnormal Event Detection at 150 FPS in MATLAB. ICCV","author":"Lu Cewu","year":"2013","unstructured":"Cewu Lu, Jianping Shi, and Jiaya Jia. 2013. Abnormal Event Detection at 150 FPS in MATLAB. ICCV (2013)."},{"key":"e_1_3_2_1_41_1","volume-title":"Learning under Concept Drift: A Review. TKDE","author":"Lu Jie","year":"2019","unstructured":"Jie Lu, Anjin Liu, Fan Dong, Feng Gu, Joao Gama, and Guangquan Zhang. 2019. Learning under Concept Drift: A Review. TKDE (2019)."},{"key":"e_1_3_2_1_42_1","volume-title":"Anomaly detection in crowded scenes. CVPR","author":"Mahadevan Vijay","year":"2010","unstructured":"Vijay Mahadevan, Weixin Li, Viral Bhalodia, and Nuno Vasconcelos. 2010. Anomaly detection in crowded scenes. CVPR (2010)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220107"},{"key":"e_1_3_2_1_44_1","volume-title":"DDD: A new ensemble approach for dealing with concept drift. TKDE","author":"Minku L","year":"2011","unstructured":"Leandro\u00a0L Minku and Xin Yao. 2011. DDD: A new ensemble approach for dealing with concept drift. TKDE (2011)."},{"key":"e_1_3_2_1_45_1","volume-title":"Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS","author":"Mirsky Yisroel","year":"2018","unstructured":"Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS (2018)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In MilCIS.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220022"},{"key":"e_1_3_2_1_48_1","volume-title":"Fence GAN: Towards Better Anomaly Detection. ICTAI","author":"Ngo C.","year":"2019","unstructured":"P.\u00a0C. Ngo, A.\u00a0A. Winarto, C.\u00a0K.\u00a0L. Kou, S. Park, F. Akram, and H.\u00a0K. Lee. 2019. Fence GAN: Towards Better Anomaly Detection. ICTAI (2019)."},{"key":"e_1_3_2_1_49_1","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton van\u00a0den Hengel. 2020. Deep learning for anomaly detection: A review. arXiv preprint arXiv:2007.02500(2020)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Ravdeep Pasricha Ekta Gujral and Evangelos\u00a0E. Papalexakis. 2018. Identifying and Alleviating Concept Drift in Streaming Tensor Decomposition. In ECML\/PKDD.","DOI":"10.1007\/978-3-030-10928-8_20"},{"key":"e_1_3_2_1_51_1","volume-title":"Scikit-learn: Machine Learning in Python. JMLR","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, 2011. Scikit-learn: Machine Learning in Python. JMLR (2011)."},{"key":"e_1_3_2_1_52_1","volume-title":"Loda: Lightweight on-line detector of anomalies. Machine Learning","author":"Pevn\u00fd T.","year":"2015","unstructured":"T. Pevn\u00fd. 2015. Loda: Lightweight on-line detector of anomalies. Machine Learning (2015)."},{"key":"e_1_3_2_1_53_1","volume-title":"Incremental Local Outlier Detection for Data Streams. CIDM","author":"Pokrajac Dragoljub","year":"2007","unstructured":"Dragoljub Pokrajac, Aleksandar Lazarevic, and Longin Latecki. 2007. Incremental Local Outlier Detection for Data Streams. CIDM (2007)."},{"key":"e_1_3_2_1_54_1","volume-title":"Training Adversarial Discriminators for Cross-Channel Abnormal Event Detection in Crowds. WACV","author":"Ravanbakhsh M.","year":"2019","unstructured":"M. Ravanbakhsh, E. Sangineto, M. Nabi, and N. S.2019. Training Adversarial Discriminators for Cross-Channel Abnormal Event Detection in Crowds. WACV (2019)."},{"key":"e_1_3_2_1_55_1","unstructured":"Shebuti Rayana. 2016. ODDS Library. http:\/\/odds.cs.stonybrook.edu"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Markus Ring Sarah Wunderlich Deniz Scheuring Dieter Landes and Andreas Hotho. 2019. A survey of network-based intrusion detection data sets. Computers & Security(2019).","DOI":"10.1016\/j.cose.2019.06.005"},{"key":"e_1_3_2_1_57_1","unstructured":"Lukas Ruff Robert Vandermeulen Nico Goernitz Lucas Deecke Shoaib\u00a0Ahmed Siddiqui Alexander Binder Emmanuel M\u00fcller and Marius Kloft. 2018. Deep One-Class Classification. In ICML."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"M. Salehi C. Leckie J. Bezdek T. Vaithianathan and X. Zhang. 2016. Fast Memory Efficient Local Outlier Detection in Data Streams. TKDE (2016).","DOI":"10.1109\/ICDE.2017.32"},{"key":"e_1_3_2_1_59_1","volume-title":"Sathe and Charu Aggarwal","author":"K.","year":"2016","unstructured":"Saket\u00a0K. Sathe and Charu Aggarwal. 2016. Subspace Outlier Detection in Linear Time with Randomized Hashing. ICDM (2016)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"S. Saurav P. Malhotra V. TV N. Gugulothu L. Vig P. Agarwal and G. Shroff. 2018. Online anomaly detection with concept drift adaptation using recurrent neural networks. CODS-COMAD (2018).","DOI":"10.1145\/3152494.3152501"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Thomas Schlegl Philipp Seeb\u00f6ck Sebastian\u00a0M Waldstein Ursula Schmidt-Erfurth and Georg Langs. 2017. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In IPMI.","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_1_62_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation","author":"Sch\u00f6lkopf B.","year":"2001","unstructured":"B. Sch\u00f6lkopf, J.\u00a0C Platt, J. Shawe-Taylor, A.\u00a0J Smola, and R.\u00a0C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation (2001)."},{"key":"e_1_3_2_1_63_1","unstructured":"B. Sch\u00f6lkopf R.\u00a0C Williamson A.\u00a0J Smola J. Shawe-Taylor John\u00a0C Platt 2000. Support vector method for novelty detection. In NIPS."},{"key":"e_1_3_2_1_64_1","volume-title":"Prototype-based learning on concept-drifting data streams. KDD","author":"Shao Junming","year":"2014","unstructured":"Junming Shao, Zahra Ahmadi, and Stefan Kramer. 2014. Prototype-based learning on concept-drifting data streams. KDD (2014)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"I. Sharafaldin A.\u00a0H. Lashkari and A.\u00a0A Ghorbani. 2018. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. In ICISSP.","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_2_1_66_1","volume-title":"van\u00a0der Smagt","author":"S\u00f6lch M.","year":"2016","unstructured":"M. S\u00f6lch, J. Bayer, M. Ludersdorfer, and P. van\u00a0der Smagt. 2016. Variational Inference for Online Anomaly Detection in High-Dimensional Time Series. ArXiv abs\/1602.07109(2016)."},{"key":"e_1_3_2_1_67_1","volume-title":"Credit card fraud detection using hidden Markov model. TDSC","author":"Srivastava Abhinav","year":"2008","unstructured":"Abhinav Srivastava, Amlan Kundu, Shamik Sural, and Arun Majumdar. 2008. Credit card fraud detection using hidden Markov model. TDSC (2008)."},{"key":"e_1_3_2_1_68_1","volume-title":"2019. Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network. KDD","author":"Su Y","year":"2019","unstructured":"Y Su, Y Zhao, C Niu, R Liu, and et al.2019. Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network. KDD (2019)."},{"key":"e_1_3_2_1_69_1","unstructured":"Swee\u00a0Chuan Tan Kai\u00a0Ming Ting and Tony\u00a0Fei Liu. 2011. Fast Anomaly Detection for Streaming Data. In IJCAI."},{"key":"e_1_3_2_1_70_1","unstructured":"Swee\u00a0Chuan Tan Kai\u00a0Ming Ting and Tony\u00a0Fei Liu. 2011. Fast Anomaly Detection for Streaming Data. In IJCAI."},{"key":"e_1_3_2_1_71_1","volume-title":"A detailed analysis of the KDD CUP 99 data set. CISDA","author":"Tavallaee Mahbod","year":"2009","unstructured":"Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali\u00a0A Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. CISDA (2009)."},{"key":"e_1_3_2_1_72_1","unstructured":"Naftali Tishby Fernando\u00a0C Pereira and William Bialek. 2000. The information bottleneck method. arXiv preprint physics\/0004057(2000)."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"crossref","unstructured":"P. Vincent H. Larochelle Y. Bengio and P.-A. Manzagol. 2008. Extracting and Composing Robust Features with Denoising Autoencoders. In ICML.","DOI":"10.1145\/1390156.1390294"},{"key":"e_1_3_2_1_74_1","unstructured":"Graham Williams Rohan Baxter Hongxing He Simon Hawkins and Lifang Gu. 2002. A comparative study of RNN for outlier detection in data mining. In ICDM."},{"key":"e_1_3_2_1_75_1","unstructured":"Liang Xiong Barnab\u00e1s P\u00f3czos and Jeff Schneider. 2011. Group Anomaly Detection using Flexible Genre Models. In NIPS."},{"key":"e_1_3_2_1_76_1","volume-title":"Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. WWW","author":"Xu Haowen","year":"2018","unstructured":"Haowen Xu, Wenxiao Chen, Nengwen Zhao, Zeyan Li, Jiahao Bu, Zhihan Li, Ying Liu, Youjian Zhao, Dan Pei, Yang Feng, 2018. Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. WWW (2018)."},{"key":"e_1_3_2_1_77_1","unstructured":"Z. Yang T. Zhang I.\u00a0S. Bozchalooi and E. Darve. 2020. Memory Augmented Generative Adversarial Networks for Anomaly Detection. ArXiv abs\/2002.02669(2020)."},{"key":"e_1_3_2_1_78_1","unstructured":"Selim\u00a0F Yilmaz and Suleyman\u00a0S Kozat. 2020. PySAD: A Streaming Anomaly Detection Framework in Python. ArXiv abs\/2009.02572(2020)."},{"key":"e_1_3_2_1_79_1","volume-title":"Adversarially Learned Anomaly Detection. ICDM","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati, Manon Romain, Chuan-Sheng Foo, Bruno Lecouat, and Vijay Chandrasekhar. 2018. Adversarially Learned Anomaly Detection. ICDM (2018)."},{"key":"e_1_3_2_1_80_1","unstructured":"Shuangfei Zhai Yu Cheng Weining Lu and Zhongfei Zhang. 2016. Deep structured energy based models for anomaly detection. In ICML."},{"key":"e_1_3_2_1_81_1","volume-title":"Spatio-temporal autoencoder for video anomaly detection. ACM MM","author":"Zhao Yiru","year":"2017","unstructured":"Yiru Zhao, Bing Deng, Chen Shen, Yao Liu, Hongtao Lu, and Xian-Sheng Hua. 2017. Spatio-temporal autoencoder for video anomaly detection. ACM MM (2017)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Chong Zhou and Randy\u00a0C Paffenroth. 2017. Anomaly detection with robust deep autoencoders. In KDD.","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"crossref","unstructured":"A. Zimek E. Schubert and H.-P. Kriegel. 2012. A survey on unsupervised outlier detection in high-dimensional numerical data. Statistical Analysis and Data Mining(2012).","DOI":"10.1002\/sam.11161"},{"key":"e_1_3_2_1_84_1","unstructured":"Bo Zong Qi Song Martin\u00a0Renqiang Min Wei Cheng Cristian Lumezanu Daeki Cho and Haifeng Chen. 2018. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In ICLR."}],"event":{"name":"WWW '22: The ACM Web Conference 2022","location":"Virtual Event, Lyon France","acronym":"WWW '22","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512221","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3485447.3512221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:13Z","timestamp":1750188613000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3485447.3512221"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":84,"alternative-id":["10.1145\/3485447.3512221","10.1145\/3485447"],"URL":"https:\/\/doi.org\/10.1145\/3485447.3512221","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-04-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}