{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:48:14Z","timestamp":1755794894108,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","funder":[{"name":"Shanghai Science and Technology Innovation Action Plan Project","award":["No.23511100700"],"award-info":[{"award-number":["No.23511100700"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,3]]},"DOI":"10.1145\/3711896.3737100","type":"proceedings-article","created":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T21:07:39Z","timestamp":1754255259000},"page":"2586-2596","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["READ: Robust and Efficient Anomaly Detection under Data Contamination and Limited Supervision"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3589-0642","authenticated-orcid":false,"given":"Hongzhe","family":"Shou","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2071-1366","authenticated-orcid":false,"given":"Guanyu","family":"Lu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1495-2128","authenticated-orcid":false,"given":"Martin","family":"Pavlovski","sequence":"additional","affiliation":[{"name":"Samsung Electronics America, Mountain View, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6417-3192","authenticated-orcid":false,"given":"Fang","family":"Zhou","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,3]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"622","volume-title":"Perth","author":"Akcay Samet","year":"2019","unstructured":"Samet Akcay, Amir Atapour-Abarghouei, and Toby P Breckon. 2019. Ganomaly: Semi-supervised anomaly detection via adversarial training. In Computer Vision-ACCV 2018: 14th Asian Conference on Computer Vision, Perth, Australia, December 2-6, 2018, Revised Selected Papers, Part III 14. Springer, 622-637."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.105988"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3635637.3662879"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974973.11"},{"key":"e_1_3_2_2_5_1","unstructured":"Anindya Sundar Das Guansong Pang and Monowar Bhuyan. 2024. Adaptive Deviation Learning for Visual Anomaly Detection with Data Contamination. arXiv preprint arXiv:2411.09558(2024)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00724"},{"key":"e_1_3_2_2_7_1","unstructured":"Jeff Donahue Philipp Kr\u00e4henb\u00fchl and Trevor Darrell. 2016. Adversarial feature learning. arXiv preprint arXiv:1605.09782(2016)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Shijie Fang Qianhan Feng and Tong Lin. 2024. VCC-INFUSE: Towards Accurate and Efficient Selection of Unlabeled Examples in Semi-supervised Learning. arXiv preprint arXiv:2404.11947(2024).","DOI":"10.24963\/ijcai.2024\/437"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.adi8022"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318960"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121502"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599258"},{"key":"e_1_3_2_2_13_1","volume-title":"FiFrauD: unsupervised financial fraud detection in dynamic graph streams. ACM Transactions on Knowledge Discovery from Data","author":"Khodabandehlou Samira","year":"2024","unstructured":"Samira Khodabandehlou and Alireza Hashemi Golpayegani. 2024. FiFrauD: unsupervised financial fraud detection in dynamic graph streams. ACM Transactions on Knowledge Discovery from Data, Vol. 18, 5 (2024), 1-29."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_15_1","unstructured":"Wenyuan Li Yunlong Wang Yong Cai Corey Arnold Emily Zhao and Yilian Yuan. 2018. Semi-supervised rare disease detection using generative adversarial network. arXiv preprint arXiv:1812.00547(2018)."},{"key":"e_1_3_2_2_16_1","first-page":"413","article-title":"Isolation forest. In 2008 eighth IEEE International Conference on Data Mining","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth IEEE International Conference on Data Mining. IEEE, 413-422.","journal-title":"IEEE"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00065"},{"volume-title":"Forty-first International Conference on Machine Learning.","author":"Lv Wenxi","key":"e_1_3_2_2_18_1","unstructured":"Wenxi Lv, Qinliang Su, Hai Wan, Hongteng Xu, and Wenchao Xu. [n.d.]. Contamination-Resilient Anomaly Detection via Adversarial Learning on Partially-Observed Normal and Anomalous Data. In Forty-first International Conference on Machine Learning."},{"key":"e_1_3_2_2_19_1","unstructured":"Volodymyr Mnih Koray Kavukcuoglu David Silver Alex Graves Ioannis Antonoglou Daan Wierstra and Martin Riedmiller. 2013. Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602(2013)."},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1480-1490","author":"Garud Iyengar Oh","year":"2019","unstructured":"Min-hwan Oh and Garud Iyengar. 2019. Sequential anomaly detection using inverse reinforcement learning. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1480-1490."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"volume-title":"Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795-1807","author":"Pang Guansong","key":"e_1_3_2_2_22_1","unstructured":"Guansong Pang, Chunhua Shen, Huidong Jin, and Anton van den Hengel. 2023. Deep weakly-supervised anomaly detection. In Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1795-1807."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"volume-title":"Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1298-1308","author":"Pang Guansong","key":"e_1_3_2_2_24_1","unstructured":"Guansong Pang, Anton van den Hengel, Chunhua Shen, and Longbing Cao. 2021. Toward deep supervised anomaly detection: Reinforcement learning from partially labeled anomaly data. In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining. 1298-1308."},{"key":"e_1_3_2_2_25_1","volume-title":"Deep learning on a data diet: Finding important examples early in training. Advances in neural information processing systems","author":"Paul Mansheej","year":"2021","unstructured":"Mansheej Paul, Surya Ganguli, and Gintare Karolina Dziugaite. 2021. Deep learning on a data diet: Finding important examples early in training. Advances in neural information processing systems, Vol. 34 (2021), 20596-20607."},{"key":"e_1_3_2_2_26_1","volume-title":"International Conference on Machine Learning. PMLR","author":"Qiu Chen","year":"2022","unstructured":"Chen Qiu, Aodong Li, Marius Kloft, Maja Rudolph, and Stephan Mandt. 2022. Latent outlier exposure for anomaly detection with contaminated data. In International Conference on Machine Learning. PMLR, 18153-18167."},{"key":"e_1_3_2_2_27_1","volume-title":"International Conference on Machine Learning. PMLR, 4393-4402","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep one-class classification. In International Conference on Machine Learning. PMLR, 4393-4402."},{"key":"e_1_3_2_2_28_1","unstructured":"Lukas Ruff Robert A Vandermeulen Nico G\u00f6rnitz Alexander Binder Emmanuel M\u00fcller Klaus-Robert M\u00fcller and Marius Kloft. 2019. Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694(2019)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_2_30_1","volume-title":"International Conference on Learning Representations.","author":"Shenkar Tom","year":"2022","unstructured":"Tom Shenkar and Lior Wolf. 2022. Anomaly detection for tabular data with internal contrastive learning. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330687"},{"key":"e_1_3_2_2_32_1","volume-title":"Support vector data description. Machine learning","author":"Tax David MJ","year":"2004","unstructured":"David MJ Tax and Robert PW Duin. 2004. Support vector data description. Machine learning, Vol. 54 (2004), 45-66."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3697467.3697643"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679634"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103459"},{"key":"e_1_3_2_2_37_1","volume-title":"International Conference on Machine Learning. PMLR, 38655-38673","author":"Xu Hongzuo","year":"2023","unstructured":"Hongzuo Xu, Yijie Wang, Juhui Wei, Songlei Jian, Yizhou Li, and Ning Liu. 2023c. Fascinating supervisory signals and where to find them: Deep anomaly detection with scale learning. In International Conference on Machine Learning. PMLR, 38655-38673."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-023-06481-z"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02346"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00694-8"},{"key":"e_1_3_2_2_41_1","unstructured":"Jinsung Yoon Kihyuk Sohn Chun-Liang Li Sercan O Arik Chen-Yu Lee and Tomas Pfister. 2021. Self-supervise refine repeat: Improving unsupervised anomaly detection. arXiv preprint arXiv:2106.06115(2021)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00086"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01561"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3086137"}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711896.3737100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T14:38:58Z","timestamp":1755355138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711896.3737100"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,3]]},"references-count":45,"alternative-id":["10.1145\/3711896.3737100","10.1145\/3711896"],"URL":"https:\/\/doi.org\/10.1145\/3711896.3737100","relation":{},"subject":[],"published":{"date-parts":[[2025,8,3]]},"assertion":[{"value":"2025-08-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}