{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:34Z","timestamp":1750220074470,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T00:00:00Z","timestamp":1679011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,3,17]]},"DOI":"10.1145\/3590003.3590009","type":"proceedings-article","created":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T18:22:56Z","timestamp":1685384576000},"page":"31-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ADCapsNet: An Efficient and Robust Capsule Network Model for Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8506-0349","authenticated-orcid":false,"given":"Xiangyu","family":"Cai","sequence":"first","affiliation":[{"name":"Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2173-4612","authenticated-orcid":false,"given":"Ruliang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7339-9417","authenticated-orcid":false,"given":"Zhixia","family":"Zeng","sequence":"additional","affiliation":[{"name":"Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4680-2530","authenticated-orcid":false,"given":"Ping","family":"Gong","sequence":"additional","affiliation":[{"name":"Fujian Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1458-9050","authenticated-orcid":false,"given":"Shi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fujian Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Asian conference on computer vision. Springer, Cham, 622\u2013637","author":"Akcay Samet","year":"2018","unstructured":"Samet Akcay , Amir Atapour-Abarghouei , and Toby\u00a0 P Breckon . 2018 . Ganomaly: Semi-supervised anomaly detection via adversarial training . In Asian conference on computer vision. Springer, Cham, 622\u2013637 . Samet Akcay, Amir Atapour-Abarghouei, and Toby\u00a0P Breckon. 2018. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Asian conference on computer vision. Springer, Cham, 622\u2013637."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.06.032"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings 2001 International Conference on Image Processing (ICIP), Vol.\u00a01. IEEE, 34\u201337","author":"Chen Yunqiang","year":"2001","unstructured":"Yunqiang Chen , Xiang\u00a0Sean Zhou , and Thomas\u00a0 S Huang . 2001 . One-class SVM for learning in image retrieval . In Proceedings 2001 International Conference on Image Processing (ICIP), Vol.\u00a01. IEEE, 34\u201337 . Yunqiang Chen, Xiang\u00a0Sean Zhou, and Thomas\u00a0S Huang. 2001. One-class SVM for learning in image retrieval. In Proceedings 2001 International Conference on Image Processing (ICIP), Vol.\u00a01. IEEE, 34\u201337."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.09.078"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86514-6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.021"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106522"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP40778.2020.9190706"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_39"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6812"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CACML55074.2022.00026"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 38th International Conference on Machine Learning. PMLR, 7358\u20137367","author":"Makarychev Konstantin","year":"2021","unstructured":"Konstantin Makarychev and Liren Shan . 2021 . Near-Optimal Algorithms for Explainable k-Medians and k-Means . In Proceedings of the 38th International Conference on Machine Learning. PMLR, 7358\u20137367 . Konstantin Makarychev and Liren Shan. 2021. Near-Optimal Algorithms for Explainable k-Medians and k-Means. In Proceedings of the 38th International Conference on Machine Learning. PMLR, 7358\u20137367."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.116918"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108227"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00154"},{"key":"e_1_3_2_1_19_1","volume-title":"Arae: Adversarially robust training of autoencoders improves novelty detection. Neural Networks","author":"Salehi Mohammadreza","year":"2021","unstructured":"Mohammadreza Salehi , Atrin Arya , Barbod Pajoum , Mohammad Otoofi , Amirreza Shaeiri , Mohammad\u00a0Hossein Rohban , and Hamid\u00a0 R Rabiee . 2021 . Arae: Adversarially robust training of autoencoders improves novelty detection. Neural Networks (2021). Mohammadreza Salehi, Atrin Arya, Barbod Pajoum, Mohammad Otoofi, Amirreza Shaeiri, Mohammad\u00a0Hossein Rohban, and Hamid\u00a0R Rabiee. 2021. Arae: Adversarially robust training of autoencoders improves novelty detection. Neural Networks (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412930"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371876"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CACML55074.2022.00062"},{"key":"e_1_3_2_1_25_1","volume-title":"Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati , Chuan\u00a0Sheng Foo , Bruno Lecouat , Gaurav Manek , and Vijay\u00a0Ramaseshan Chandrasekhar . 2018. Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 ( 2018 ). Houssam Zenati, Chuan\u00a0Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay\u00a0Ramaseshan Chandrasekhar. 2018. Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108234"},{"key":"e_1_3_2_1_27_1","volume-title":"Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In International Conference on Learning Representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong , Qi Song , Martin\u00a0Renqiang Min , Wei Cheng , Cristian Lumezanu , Daeki Cho , and Haifeng Chen . 2018 . Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In International Conference on Learning Representations. Bo Zong, Qi Song, Martin\u00a0Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In International Conference on Learning Representations."}],"event":{"name":"CACML 2023: 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning","acronym":"CACML 2023","location":"Shanghai China"},"container-title":["Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590003.3590009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590003.3590009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:16Z","timestamp":1750183756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590003.3590009"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,17]]},"references-count":27,"alternative-id":["10.1145\/3590003.3590009","10.1145\/3590003"],"URL":"https:\/\/doi.org\/10.1145\/3590003.3590009","relation":{},"subject":[],"published":{"date-parts":[[2023,3,17]]},"assertion":[{"value":"2023-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}