{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:30:13Z","timestamp":1727065813998},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tnsm.2022.3229706","type":"journal-article","created":{"date-parts":[[2022,12,16]],"date-time":"2022-12-16T18:41:52Z","timestamp":1671216112000},"page":"1305-1318","source":"Crossref","is-referenced-by-count":11,"title":["ARCADE: Adversarially Regularized Convolutional Autoencoder for Network Anomaly Detection"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-0718-0019","authenticated-orcid":false,"given":"Willian Tessaro","family":"Lunardi","sequence":"first","affiliation":[{"name":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4170-4341","authenticated-orcid":false,"given":"Martin Andreoni","family":"Lopez","sequence":"additional","affiliation":[{"name":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"}]},{"given":"Jean-Pierre","family":"Giacalone","sequence":"additional","affiliation":[{"name":"Secure System Research Center, Technology and Innovation Institute, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref13","first-page":"5769","article-title":"Improved training of Wasserstein GANs","volume":"30","author":"gulrajani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref12","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489489"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2971776"},{"key":"ref37","author":"kastryulin","year":"2019","journal-title":"PyTorch Image Quality Metrics and Measure for Image Quality Assessment"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3155133.3155175"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref31","article-title":"Deep nearest neighbor anomaly detection","author":"bergman","year":"2020","journal-title":"arXiv 2002 10445"},{"key":"ref30","article-title":"Do we really need to learn representations from in-domain data for outlier detection?","author":"xiao","year":"2021","journal-title":"arXiv 2105 09270"},{"key":"ref11","first-page":"1","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.012"},{"key":"ref10","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"radford","year":"2015","journal-title":"arXiv 1511 06434"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.09.004"},{"key":"ref1","article-title":"Cisco annual Internet report (2018–2023)","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2780250"},{"key":"ref38","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv 1412 6980"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2017.8004872"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/4184196"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"600","DOI":"10.1109\/TIP.2003.819861","article-title":"Image quality assessment: From error visibility to structural similarity","volume":"13","author":"wang","year":"2004","journal-title":"IEEE Trans Image Process"},{"key":"ref23","article-title":"Improving unsupervised defect segmentation by applying structural similarity to autoencoders","author":"bergmann","year":"2018","journal-title":"arXiv 1807 02011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2899085"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW55395.2022.00020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04030-2"},{"key":"ref28","first-page":"622","article-title":"Ganomaly: Semisupervised anomaly detection via adversarial training","author":"akcay","year":"2018","journal-title":"Proc Asian Conf Comput Vis"},{"key":"ref27","article-title":"Efficient GAN-based anomaly detection","author":"zenati","year":"2018","journal-title":"arXiv 1802 06222"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"ref9","first-page":"1100","article-title":"Deep structured energy based models for anomaly detection","author":"zhai","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4150"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00904-5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3385003.3410924"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10168539\/09990598.pdf?arnumber=9990598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:45:51Z","timestamp":1689615951000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9990598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":38,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3229706","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}