Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211000202-9.doi: 10.11896/jsjkx.211000202
• Big Data & Data Science • Previous Articles Next Articles
ZHOU Shi-jin, XING Hong-jieHebei
CLC Number:
[1]GOODFELLOW I,POUGET-ABADIE J,MIRZA M,et al.Generative adversarial net [C]//Neural Information Processing Systems.MIT Press,2014. [2]RADFORD A,METZ L,CHINTALA S.Unsupervised repre-sentation learning with deep convolutional generative adversarial networks[J].arXiv:1511,06434,2016. [3]CHEN D,YUE L,CHANG X,et al.NM-GAN:Noise-modulated generative adversarial network for video anomaly detection [J].Pattern Recognition,2021,116:107969. [4]SIDDIQUI M A,STOKES J W,SEIFERT C,et al.Detecting cyber attacks using anomaly detection with explanations and expert feedback[C]//IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP 2019).IEEE,Brighton,UK,2019. [5]GUI J,SUN Z,WEN Y,et al.A review on generative adversarial networks:Algorithms,theory,and applications[J].arXiv:2001.06937,2020. [6]MIRZA M,OSINDERO S.Conditional generative adversarialnets [J].arXiv:1411.1784,2014. [7]CHEN X,DUAN Y,HOUTHOOFT R,et al.Infogan:Interpretable representation learning by information maximizing gene-rative adversarial nets[C]//Proceedings of the 30th International Conference on Neural Information Processing Systems.Barcelona,Spain,2016. [8]ARJOVSKY M,CHINTALA S,BOTTOU L.Wasserstein gene-rative adversarial networks[C]//Proceedings of the Interna-tional Conference on Machine Learning.PMLR,Sydney,2017. [9]MAO X,LI Q,XIE H,et al.Least squares generative adversarial networks[C]//Proceedings of the IEEE International Confe-rence on Computer Vision.Beijing,China,2017. [10]BERTHELOT D,SCHUMM T,METZ L.Began:Boundaryequilibrium generative adversarial networks [J].arXiv:1703.10717,2017. [11]DONAHUE J,KRÄHENBÜHL P,DARRELL T.Adversarialfeature learning [J].arXiv:1605.09782,2016. [12]ZHU J Y,PARK T,ISOLA P,et al.Unpaired image-to-image translation using cycle-consistent adversarial networks[C]//Proceedings of the IEEE International Conference on Computer Vision.Venice,Italy,2017. [13]SCHLEGL T,SEEBÖCK P,WALDSTEIN S M,et al.Unsupervised anomaly detection with generative adversarial networks to guide marker discovery[C]//Proceedings of the International Conference on Information Processing in Medical Imaging.Springer:Boone,NC,USA,2017. [14]ZENATI H,FOO C S,LECOUAT B,et al.Efficient gan-based anomaly detection [J].arXiv:1802.06222,2018. [15]ZENATI H,ROMAIN M,FOO C S,et al.Adversarially learned anomaly detection [C]//Proceedings of the 2018 IEEE International conference on data mining(ICDM).IEEE,Sentosa,Singapore,2018. [16]HOU Y,CHEN Z,WU M,et al.Mahalanobis distance based adversarial network for anomaly detection [C]//2020 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP).IEEE,Barcelona,Spain,2020. [17]AKCAY S,ATAPOUR-ABARGHOUEI A,BRECKON T P.Ganomaly:Semi-supervised anomaly detection via adversarial training[C]//Proceedings of the Asian Conference on Computer Vision.Springer:Kyoto,2018. [18]NGO P C,WINARTO A A,KOU C K L,et al.Fence GAN:Towards better anomaly detection[C]//31st International Confe-rence on Tools with Artificial Intelligence(ICTAI).IEEE,Portland,OR,USA,2019. [19]AKÇAY S,ATAPOUR-ABARGHOUEI A,BRECKON T P.Skip-ganomaly:Skip connected and adversarially trained encoder-decoder anomaly detection[C]//proceedings of the 2019 International Joint Conference on Neural Networks(IJCNN).IEEE,Budapest,2019. [20]HOCHREITER S,SCHMIDHUBER J.Long short-term memory [J].Neural Computation,1997,9(8):1735-80. [21]SUKHBAATAR S,WESTON J,FERGUS R.End-to-end memo-ry networks[C]//Proceedings of the 28th International Confe-rence on Neural Information Processing Systems.Montreal,Ca-nada,2015. [22]GULCEHRE C,CHANDAR S,CHO K,et al.Dynamic neural turing machine with continuous and discrete addressing schemes [J].Neural Computation,2018,30(4):857-884. [23]MILLER A,FISCH A,DODGE J,et al.Key-value memory networks for directly reading documents [J].arXiv:1606.03126,2016. [24]SANTORO A,BARTUNOV S,BOTVINICK M,et al.Meta-learning with memory-augmented neural networks [C]//Proceedings of the International Conference on Machine Learning.New York,USA,2016. [25]GONG D,LIU L,LE V,et al.Memorizing normality to detectanomaly:Memory-augmented deep autoencoder for unsupervised anomaly detection [C]//Proceedings of the IEEE/CVF International Conference on Computer Vision.Long Beach,CA,USA,2019. [26]PARK H,NOH J,HAM B.Learning memory-guided normality for anomaly detection[C]//Proceedings of IEEE/CVF Confe-rence on Computer Vision and Pattern Recognition.Seattle,WA,USA,2020. [27]SALIMANS T,GOODFELLOW I,ZAREMBA W,et al.Im-proved techniques for training gans[C]//Proceedings of the 30th International Conference on Neural Information Processing Systems.Barcelona,Spain,2016. [28]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-basedlearning applied to document recognition [J].Proceedings of the IEEE,1998,86(11):2278-2324. [29]XIAO H,RASUL K,VOLLGRAF R.Fashion-mnist:a novelimage dataset for benchmarking machine learning algorithms [J].arXiv:1708.07747,2017. [30]KRIZHEVSKY A,HINTON G.Learning multiple layers of features from tiny images [J].Journal of Software Engineering and Applications,2009,11(2):1-60. [31]FAWCETT T J P R L.An introduction to ROC analysis [J].Pattern Recognition Letters,2006,27(8):861-874. [32]CAMPOS G O,ZIMEK A,SANDER J,et al.On the evaluation of unsupervised outlier detection:measures,datasets,and an empirical study [J].Data Mining Knowledge Discovery,2016,30(4):891-927. [33]AHMED F,COURVILLE A.Detecting semantic anomalies[C]//Proceedings of the AAAI Conference on Artificial Intelligence.New York,2020. [34]LIU F T,TING K M,ZHOU Z H.Isolation forest[C]//Proceedings of the 2008 Eighth IEEE International Conference on Data Mining.Pisa,Italy,2008. [35]ZONG B,SONG Q,MIN M R,et al.Deep autoencoding gaussian mixture model for unsupervised anomaly detection[C]//Proceedings of the International Conference on Learning Representations.Vancouver,BC,Canada,2018. [36]RUFF L,VANDERMEULEN R,GOERNITZ N,et al.Deepone-class classification [C]//Proceedings of the International Conference on Machine Learning.Stockholm,Sweden,2018. [37]SCHLEGL T,SEEBÖCK P,WALDSTEIN S M,et al.fAno-GAN:Fast unsupervised anomaly detection with generative adversarial networks[J].Medical Image Analysis,2019,54:30-44. |
[1] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[4] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[5] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[6] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[7] | DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202. |
[8] | GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328. |
[9] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[10] | LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184. |
[11] | TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115. |
[12] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
[13] | ZHANG Wei-qi, TANG Yi-feng, LI Lin-yan, HU Fu-yuan. Image Stream From Paragraph Method Based on Scene Graph [J]. Computer Science, 2022, 49(1): 233-240. |
[14] | XU Tao, TIAN Chong-yang, LIU Cai-hua. Deep Learning for Abnormal Crowd Behavior Detection:A Review [J]. Computer Science, 2021, 48(9): 125-134. |
[15] | LIN Zhen-xian, ZHANG Meng-kai, WU Cheng-mao, ZHENG Xing-ning. Face Image Inpainting with Generative Adversarial Network [J]. Computer Science, 2021, 48(9): 174-180. |
|