{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:13:31Z","timestamp":1772907211643,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T00:00:00Z","timestamp":1660435200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Samsung Electronics Co., Ltd","award":["IO201211-08051-01"],"award-info":[{"award-number":["IO201211-08051-01"]}]},{"name":"Research Foundation of Korea","award":["2021R1A6A3A14043765"],"award-info":[{"award-number":["2021R1A6A3A14043765"]}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["2022-0-00157"],"award-info":[{"award-number":["2022-0-00157"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,8,14]]},"DOI":"10.1145\/3534678.3539348","type":"proceedings-article","created":{"date-parts":[[2022,8,12]],"date-time":"2022-08-12T19:06:41Z","timestamp":1660331201000},"page":"2347-2357","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Adaptive Model Pooling for Online Deep Anomaly Detection from a Complex Evolving Data Stream"],"prefix":"10.1145","author":[{"given":"Susik","family":"Yoon","sequence":"first","affiliation":[{"name":"UIUC, Champaign, IL, USA"}]},{"given":"Youngjun","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Jae-Gil","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]},{"given":"Byung Suk","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Vermont, Burlington, VT, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,8,14]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450023"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972771.42"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"issue":"3","key":"e_1_3_2_2_5_1","first-page":"810","article-title":"Online and non-parametric drift detection methods based on hoeffding's bounds","volume":"27","author":"Fr\u00edas-Blanco I.","year":"2014","unstructured":"I. Fr\u00edas-Blanco, J. del Campo-\u00c1vila, G. Ramos-Jimenez, R. Morales-Bueno, A. Ortiz-D\u00edaz, and Y. Caballero-Mota. Online and non-parametric drift detection methods based on hoeffding's bounds. IEEE TKDE, 27(3):810--823, 2014.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5320-9"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11564089_7"},{"key":"e_1_3_2_2_8_1","first-page":"2712","volume-title":"Proc. ICML","author":"Guha S.","year":"2016","unstructured":"S. Guha, N. Mishra, G. Roy, and O. Schrijvers. Robust random cut forest based anomaly detection on streams. In Proc. ICML, pages 2712--2721, 2016."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.92"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-0865-5_26"},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. ICLR","author":"Kim K. H.","year":"2020","unstructured":"K. H. Kim, S. Shim, Y. Lim, J. Jeon, J. Choi, B. Kim, and A. S. Yoon. RaPP: Novelty detection with reconstruction along projection pathway. In Proc. ICLR, 2020."},{"key":"e_1_3_2_2_12_1","first-page":"392","volume-title":"Proc. VLDB","author":"Knox E. M.","year":"1998","unstructured":"E. M. Knox and R. T. Ng. Algorithms for mining distance-based outliers in large datasets. In Proc. VLDB, pages 392--403, 1998."},{"key":"e_1_3_2_2_13_1","first-page":"3519","volume-title":"Proc. ICML","author":"Kornblith S.","year":"2019","unstructured":"S. Kornblith, M. Norouzi, H. Lee, and G. Hinton. Similarity of neural network representations revisited. In Proc. ICML, pages 3519--3529, 2019."},{"key":"e_1_3_2_2_14_1","volume-title":"Proc. ICLR","author":"Lai C.-H.","year":"2020","unstructured":"C.-H. Lai, D. Zou, and G. Lerman. Robust subspace recovery layer for unsupervised anomaly detection. In Proc. ICLR, 2020."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_16_1","volume-title":"Proc. ICLR","author":"Li X.","year":"2019","unstructured":"X. Li, K. Huang, W. Yang, S. Wang, and Z. Zhang. On the convergence of fedavg on non-iid data. In Proc. ICLR, 2019."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0040"},{"issue":"12","key":"e_1_3_2_2_19_1","first-page":"2346","article-title":"Learning under concept drift: A review","volume":"31","author":"Lu J.","year":"2018","unstructured":"J. Lu, A. Liu, F. Dong, F. Gu, J. Gama, and G. Zhang. Learning under concept drift: A review. IEEE TKDE, 31(12):2346--2363, 2018.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. ICML Anomaly Detection Workshop","author":"Malhotra P.","year":"2016","unstructured":"P. Malhotra, A. Ramakrishnan, G. Anand, L. Vig, P. Agarwal, and G. Shroff. LS\u2122-based encoder-decoder for multi-sensor anomaly detection. In Proc. ICML Anomaly Detection Workshop, 2016."},{"key":"e_1_3_2_2_21_1","first-page":"1273","volume-title":"Proc. AISTATS","author":"McMahan B.","year":"2017","unstructured":"B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas. Communication-efficient learning of deep networks from decentralized data. In Proc. AISTATS, pages 1273--1282, 2017."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220022"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"e_1_3_2_2_24_1","volume-title":"Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2):1--38","author":"Pang G.","year":"2021","unstructured":"G. Pang, C. Shen, L. Cao, and A. V. D. Hengel. Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2):1--38, 2021."},{"key":"e_1_3_2_2_25_1","volume-title":"Proc. ICLR","author":"Ruff L.","year":"2020","unstructured":"L. Ruff, R. A. Vandermeulen, N. G\u00f6rnitz, A. Binder, E. M\u00fcller, K.-R. M\u00fcller, and M. Kloft. Deep semi-supervised anomaly detection. In Proc. ICLR, 2020."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/369"},{"issue":"12","key":"e_1_3_2_2_27_1","first-page":"3246","article-title":"Fast memory efficient local outlier detection in data streams","volume":"28","author":"Salehi M.","year":"2016","unstructured":"M. Salehi, C. Leckie, J. C. Bezdek, T. Vaithianathan, and X. Zhang. Fast memory efficient local outlier detection in data streams. IEEE TKDE, 28(12):3246--3260, 2016.","journal-title":"IEEE TKDE"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152494.3152501"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-020-00698-5"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2012.01.074"},{"key":"e_1_3_2_2_31_1","volume-title":"Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747","author":"Xiao H.","year":"2017","unstructured":"H. Xiao, K. Rasul, and R. Vollgraf. Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv:1708.07747, 2017."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330865"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342269"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403171"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452810"},{"key":"e_1_3_2_2_36_1","first-page":"1100","volume-title":"Proc. ICML","author":"Zhai S.","year":"2016","unstructured":"S. Zhai, Y. Cheng, W. Lu, and Z. Zhang. Deep structured energy based models for anomaly detection. In Proc. ICML, pages 1100--1109, 2016."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. ICLR","author":"Zong B.","year":"2018","unstructured":"B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, and H. Chen. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In Proc. ICLR, 2018."}],"event":{"name":"KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Washington DC USA","acronym":"KDD '22","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3534678.3539348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:47Z","timestamp":1750186967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3534678.3539348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,14]]},"references-count":38,"alternative-id":["10.1145\/3534678.3539348","10.1145\/3534678"],"URL":"https:\/\/doi.org\/10.1145\/3534678.3539348","relation":{},"subject":[],"published":{"date-parts":[[2022,8,14]]},"assertion":[{"value":"2022-08-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}