{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T09:10:33Z","timestamp":1765357833137,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61925203 & U22B2021"],"award-info":[{"award-number":["61925203 & U22B2021"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714626","type":"proceedings-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T16:42:02Z","timestamp":1746463322000},"page":"2111-2119","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Semi-Supervised Anomaly Detection through Denoising-Aware Contrastive Distance Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2685-1230","authenticated-orcid":false,"given":"Jianling","family":"Gao","sequence":"first","affiliation":[{"name":"SKLSDE Lab, Beihgang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4162-2119","authenticated-orcid":false,"given":"Chongyang","family":"Tao","sequence":"additional","affiliation":[{"name":"SKLSDE Lab, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9590-0962","authenticated-orcid":false,"given":"Zhenchao","family":"Sun","sequence":"additional","affiliation":[{"name":"SKLSDE Lab, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9715-6034","authenticated-orcid":false,"given":"Xiya","family":"Jiang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4050-0443","authenticated-orcid":false,"given":"Shuai","family":"Ma","sequence":"additional","affiliation":[{"name":"SKLSDE Lab, Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Theoretical foundations and algorithms for outlier ensembles. Acm sigkdd explorations newsletter 17, 1","author":"Aggarwal Charu C","year":"2015","unstructured":"Charu C Aggarwal and Saket Sathe. 2015. Theoretical foundations and algorithms for outlier ensembles. Acm sigkdd explorations newsletter 17, 1 (2015), 24--47."},{"key":"e_1_3_2_1_2_1","volume-title":"Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6","author":"Akcay Samet","year":"2019","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision--ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2--6, 2018, Revised Selected Papers, Part III 14. Springer, 622--637."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2014.70"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"e_1_3_2_1_6_1","volume-title":"International conference on machine learning. PMLR, 1597--1607","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PMLR, 1597--1607."},{"key":"e_1_3_2_1_7_1","volume-title":"Credit card fraud detection: a realistic modeling and a novel learning strategy","author":"Pozzolo Andrea Dal","year":"2017","unstructured":"Andrea Dal Pozzolo, Giacomo Boracchi, Olivier Caelen, Cesare Alippi, and Gianluca Bontempi. 2017. Credit card fraud detection: a realistic modeling and a novel learning strategy. IEEE transactions on neural networks and learning systems 29, 8 (2017), 3784--3797."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464423"},{"key":"e_1_3_2_1_10_1","volume-title":"Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security 28, 1--2","author":"Garcia-Teodoro Pedro","year":"2009","unstructured":"Pedro Garcia-Teodoro, Jesus Diaz-Verdejo, Gabriel Maci\u00e1-Fern\u00e1ndez, and Enrique V\u00e1zquez. 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. computers & security 28, 1--2 (2009), 18--28."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1969.10490657"},{"key":"e_1_3_2_1_12_1","first-page":"32142","article-title":"Adbench: Anomaly detection benchmark","volume":"35","author":"Han Songqiao","year":"2022","unstructured":"Songqiao Han, Xiyang Hu, Hailiang Huang, Minqi Jiang, and Yue Zhao. 2022. Adbench: Anomaly detection benchmark. Advances in Neural Information Processing Systems 35 (2022), 32142--32159.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_1_14_1","volume-title":"Discovering cluster-based local outliers. Pattern recognition letters 24, 9--10","author":"He Zengyou","year":"2003","unstructured":"Zengyou He, Xiaofei Xu, and Shengchun Deng. 2003. Discovering cluster-based local outliers. Pattern recognition letters 24, 9--10 (2003), 1641--1650."},{"key":"e_1_3_2_1_15_1","volume-title":"Anomaly detection to predict relapse risk in schizophrenia. Translational psychiatry 11, 1","author":"Henson Philip","year":"2021","unstructured":"Philip Henson, Ryan D'Mello, Aditya Vaidyam, Matcheri Keshavan, and John Torous. 2021. Anomaly detection to predict relapse risk in schizophrenia. Translational psychiatry 11, 1 (2021), 28."},{"key":"e_1_3_2_1_16_1","volume-title":"Supervised contrastive learning. Advances in neural information processing systems 33","author":"Khosla Prannay","year":"2020","unstructured":"Prannay Khosla, Piotr Teterwak, Chen Wang, Aaron Sarna, Yonglong Tian, Phillip Isola, Aaron Maschinot, Ce Liu, and Dilip Krishnan. 2020. Supervised contrastive learning. Advances in neural information processing systems 33 (2020), 18661--18673."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Tung Kieu Bin Yang Chenjuan Guo and Christian S Jensen. 2019. Outlier detection for time series with recurrent autoencoder ensembles. In IJCAI. 2725--2732.","DOI":"10.24963\/ijcai.2019\/378"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00135"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3159580"},{"key":"e_1_3_2_1_20_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_1_21_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2012","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2012. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD) 6, 1 (2012), 1--39."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449989"},{"key":"e_1_3_2_1_23_1","first-page":"1517","article-title":"Generative adversarial active learning for unsupervised outlier detection","volume":"32","author":"Liu Yezheng","year":"2019","unstructured":"Yezheng Liu, Zhe Li, Chong Zhou, Yuanchun Jiang, Jianshan Sun, Meng Wang, and Xiangnan He. 2019. Generative adversarial active learning for unsupervised outlier detection. IEEE Transactions on Knowledge and Data Engineering 32, 8 (2019), 1517--1528.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_1_24_1","first-page":"3","article-title":"Semi-supervised Anomaly Detection using AutoEncoders","volume":"5","author":"Minhas Manpreet Singh","year":"2019","unstructured":"Manpreet Singh Minhas and John Zelek. 2019. Semi-supervised Anomaly Detection using AutoEncoders. Journal of Computational Vision and Imaging Systems 5, 1 (2019), 3--3.","journal-title":"Journal of Computational Vision and Imaging Systems"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"volume-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795--1807","author":"Pang Guansong","key":"e_1_3_2_1_26_1","unstructured":"Guansong Pang, Chunhua Shen, Huidong Jin, and Anton van den Hengel. 2023. Deep weakly-supervised anomaly detection. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795--1807."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"e_1_3_2_1_28_1","volume-title":"International conference on machine learning. PMLR, 4393--4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International conference on machine learning. PMLR, 4393--4402."},{"key":"e_1_3_2_1_29_1","volume-title":"Deep Semi-Supervised Anomaly Detection. In 8th International Conference on Learning Representations, ICLR.","author":"Ruff Lukas","year":"2020","unstructured":"Lukas Ruff, Robert A. Vandermeulen, Nico G\u00f6rnitz, Alexander Binder, Emmanuel M\u00fcller, Klaus-Robert M\u00fcller, and Marius Kloft. 2020. Deep Semi-Supervised Anomaly Detection. In 8th International Conference on Learning Representations, ICLR."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_1_31_1","volume-title":"Estimating the support of a high-dimensional distribution. Neural computation 13, 7","author":"Sch\u00f6lkopf Bernhard","year":"2001","unstructured":"Bernhard Sch\u00f6lkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation 13, 7 (2001), 1443--1471."},{"key":"e_1_3_2_1_32_1","volume-title":"SSD: A UNIFIED FRAMEWORK FOR SELF-SUPERVISED OUTLIER DETECTION. In 9th International Conference on Learning Representations, ICLR","author":"Sehwag Vikash","year":"2021","unstructured":"Vikash Sehwag, Mung Chiang, and Prateek Mittal. 2021. SSD: A UNIFIED FRAMEWORK FOR SELF-SUPERVISED OUTLIER DETECTION. In 9th International Conference on Learning Representations, ICLR 2021."},{"key":"e_1_3_2_1_33_1","volume-title":"Reasoning with neural tensor networks for knowledge base completion. Advances in neural information processing systems 26","author":"Socher Richard","year":"2013","unstructured":"Richard Socher, Danqi Chen, Christopher D Manning, and Andrew Ng. 2013. Reasoning with neural tensor networks for knowledge base completion. Advances in neural information processing systems 26 (2013)."},{"key":"e_1_3_2_1_34_1","volume-title":"Rapid distance-based outlier detection via sampling. Advances in neural information processing systems 26","author":"Sugiyama Mahito","year":"2013","unstructured":"Mahito Sugiyama and Karsten Borgwardt. 2013. Rapid distance-based outlier detection via sampling. Advances in neural information processing systems 26 (2013)."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 2950--2956","author":"Wang Hu","year":"2021","unstructured":"Hu Wang, Guansong Pang, Chunhua Shen, and Congbo Ma. 2021. Unsupervised representation learning by predicting random distances. In Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence. 2950--2956."},{"key":"e_1_3_2_1_36_1","volume-title":"Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar.","author":"Zenati Houssam","year":"2018","unstructured":"Houssam Zenati, Chuan Sheng Foo, Bruno Lecouat, Gaurav Manek, and Vijay Ramaseshan Chandrasekhar. 2018. Efficient gan-based anomaly detection. arXiv preprint arXiv:1802.06222 (2018)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.08.033"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.66"},{"key":"e_1_3_2_1_39_1","first-page":"4489","article-title":"Automatic unsupervised outlier model selection","volume":"34","author":"Zhao Yue","year":"2021","unstructured":"Yue Zhao, Ryan Rossi, and Leman Akoglu. 2021. Automatic unsupervised outlier model selection. Advances in Neural Information Processing Systems 34 (2021), 4489--4502.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3266755"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3086137"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:56Z","timestamp":1750295936000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":42,"alternative-id":["10.1145\/3696410.3714626","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714626","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}