{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:30Z","timestamp":1750309410390,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["2014-3-00123"],"award-info":[{"award-number":["2014-3-00123"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679859","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:11Z","timestamp":1729452851000},"page":"1080-1088","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Transformer for Point Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8444-4758","authenticated-orcid":false,"given":"Harim","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, Handong Global University, Pohang, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8205-4533","authenticated-orcid":false,"given":"Chang Ha","family":"Lee","sequence":"additional","affiliation":[{"name":"GMDSOFT, Seongnam, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8176-252X","authenticated-orcid":false,"given":"Charmgil","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Electrical Engineering, Handong Global University, Pohang, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"volume-title":"outlier analysis","author":"Aggarwal Charu C","key":"e_1_3_2_1_1_1","unstructured":"Charu C Aggarwal and Charu C Aggarwal. 2017. outlier analysis. Springer."},{"volume-title":"Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE national aerospace and electronics conference (NAECON)","author":"Alom Md Zahangir","key":"e_1_3_2_1_2_1","unstructured":"Md Zahangir Alom and Tarek M Taha. 2017. Network intrusion detection for cyber security using unsupervised deep learning approaches. In 2017 IEEE national aerospace and electronics conference (NAECON). IEEE, 63--69."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"E. Alpaydin and C. Kaynak. 1998. Optical recognition of handwritten digits. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C50P49. (1998).","DOI":"10.24432\/C50P49"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.035246"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_6_1","unstructured":"Yuri Burda Harrison Edwards Amos Storkey and Oleg Klimov. 2018. Exploration by random network distillation. arXiv preprint arXiv:1810.12894."},{"key":"e_1_3_2_1_7_1","unstructured":"Alexey Dosovitskiy et al. 2020. An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206772"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Geoffrey E Hinton and Ruslan R Salakhutdinov. 2006. Reducing the dimensionality of data with neural networks. science 313 5786 504--507.","DOI":"10.1126\/science.1127647"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Z.Q. Hong and J.Y. Yang. 1992. Lung cancer. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C57596. (1992).","DOI":"10.24432\/C57596"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.88"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.12.009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00153"},{"key":"e_1_3_2_1_15_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"volume-title":"Anomaly detection in manufacturing systems using structured neural networks. In 2018 13th world congress on intelligent control and automation (wcica)","author":"Liu Jie","key":"e_1_3_2_1_16_1","unstructured":"Jie Liu, Jianlin Guo, Philip Orlik, Masahiko Shibata, Daiki Nakahara, Satoshi Mii, and Martin Tak\u00e1. 2018. Anomaly detection in manufacturing systems using structured neural networks. In 2018 13th world congress on intelligent control and automation (wcica). IEEE, 175--180."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Michael McCann and Adrian Johnston. 2008. Secom. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C54305. (2008).","DOI":"10.24432\/C54305"},{"key":"e_1_3_2_1_18_1","volume-title":"Umap: uniform manifold approximation and projection for dimension reduction. arxiv","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes, John Healy, and James Melville. 1802. Umap: uniform manifold approximation and projection for dimension reduction. arxiv 2018. arXiv preprint arXiv:1802.03426."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the ACM SIGKDD 2014 Workshop on Outlier Detection and Description under Data Diversity (ODD2). Citeseer, 51--54","author":"Micenkov\u00e1 Barbora","year":"2014","unstructured":"Barbora Micenkov\u00e1, Brian McWilliams, and Ira Assent. 2014. Learning outlier ensembles: the best of bothworlds--supervised and unsupervised. In Proceedings of the ACM SIGKDD 2014 Workshop on Outlier Detection and Description under Data Diversity (ODD2). Citeseer, 51--54."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton Van Den Hengel. 2021. Deep learning for anomaly detection: a review. ACM computing surveys (CSUR) 54 2 1--38.","DOI":"10.1145\/3439950"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2019.8679157"},{"key":"e_1_3_2_1_23_1","volume-title":"International conference on machine learning. PMLR, 4393--4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International conference on machine learning. PMLR, 4393--4402."},{"key":"e_1_3_2_1_24_1","unstructured":"Salvatore Stolfo Wei Fan Wenke Lee Andreas Prodromidis and Philip Chan. 1999. Kdd cup 1999 data. UCI Machine Learning Repository. DOI: https:\/\/doi.o rg\/10.24432\/C51C7N. (1999)."},{"key":"e_1_3_2_1_25_1","unstructured":"Ashish Vaswani Noam Shazeer Niki Parmar Jakob Uszkoreit Llion Jones Aidan N Gomez Lukasz Kaiser and Illia Polosukhin. 2017. Attention is all you need. Advances in neural information processing systems 30."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Hu Wang Guansong Pang Chunhua Shen and Congbo Ma. 2019. Unsupervised representation learning by predicting random distances. arXiv preprint arXiv:1912.12186.","DOI":"10.24963\/ijcai.2020\/408"},{"key":"e_1_3_2_1_27_1","unstructured":"Siqi Wang Yijie Zeng Xinwang Liu En Zhu Jianping Yin Chuanfu Xu and Marius Kloft. 2019. Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network. Advances in neural information processing systems 32."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"William Wolberg Olvi Mangasarian Nick Street and W. Street. 1995. Breast cancer wisconsin (diagnostic). UCI Machine Learning Repository. DOI: https: \/\/doi.org\/10.24432\/C5DW2B. (1995).","DOI":"10.24432\/C5DW2B"},{"key":"e_1_3_2_1_29_1","unstructured":"Jiehui Xu Haixu Wu Jianmin Wang and Mingsheng Long. 2021. Anomaly transformer: time series anomaly detection with association discrepancy. arXiv preprint arXiv:2110.02642."},{"key":"e_1_3_2_1_30_1","first-page":"623","article-title":"Unsupervised data anomaly detection based on pca-oritened deep auto-encoder network","volume":"23","author":"Yang Rui","year":"2021","unstructured":"Rui Yang and Dong Ye. 2021. Unsupervised data anomaly detection based on pca-oritened deep auto-encoder network. International Journal of Network Security, 23, 4, 623--630.","journal-title":"International Journal of Network Security"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.089"},{"key":"e_1_3_2_1_32_1","volume-title":"International conference on learning representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min,Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International conference on learning representations."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"M. Zwitter and M. Soklic. 1988. Lymphography. UCI Machine Learning Repository. DOI: https:\/\/doi.org\/10.24432\/C54598. (1988).","DOI":"10.24432\/C54598"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:08Z","timestamp":1750294688000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":33,"alternative-id":["10.1145\/3627673.3679859","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679859","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}