%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Gerry Murray",
%%%     version         = "1.2",
%%%     date            = "2 April 2012",
%%%     filename        = "acmsmall-sample-bibfile.bib",
%%%     address         = "ACM, NY",
%%%     email           = "murray at hq.acm.org",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "ACM Reference Format, bibliography, citation, references",
%%%     supported       = "yes",
%%%     docstring       = "This BibTeX database file contains 'bibdata' entries
%%%                        that 'match' the examples provided in the Specifications Document
%%%                        AND, also, 'legacy'-type bibs. It should assist authors in
%%%                        choosing the 'correct' at-bibtype and necessary bib-fields
%%%                        so as to obtain the appropriate ACM Reference Format output.
%%%                        It also contains many 'Standard Abbreviations'. "
%%%  }
%%% ====================================================================

% Journals

% First the Full Name is given, then the abbreviation used in the AMS Math
% Reviews, with an indication if it could not be found there.
% Note the 2nd overwrites the 1st, so swap them if you want the full name.

 %{AMS}
 @String{AMSTrans = "American Mathematical Society Translations" }
 @String{AMSTrans = "Amer. Math. Soc. Transl." }
 @String{BullAMS = "Bulletin of the American Mathematical Society" }
 @String{BullAMS = "Bull. Amer. Math. Soc." }
 @String{ProcAMS = "Proceedings of the American Mathematical Society" }
 @String{ProcAMS = "Proc. Amer. Math. Soc." }
 @String{TransAMS = "Transactions of the American Mathematical Society" }
 @String{TransAMS = "Trans. Amer. Math. Soc." }

 %ACM
 @String{CACM = "Communications of the {ACM}" }
 @String{CACM = "Commun. {ACM}" }
 @String{CompServ = "Comput. Surveys" }
 @String{JACM = "J. ACM" }
 @String{ACMMathSoft = "{ACM} Transactions on Mathematical Software" }
 @String{ACMMathSoft = "{ACM} Trans. Math. Software" }
 @String{SIGNUM = "{ACM} {SIGNUM} Newsletter" }
 @String{SIGNUM = "{ACM} {SIGNUM} Newslett." }

 @String{AmerSocio = "American Journal of Sociology" }
 @String{AmerStatAssoc = "Journal of the American Statistical Association" }
 @String{AmerStatAssoc = "J. Amer. Statist. Assoc." }
 @String{ApplMathComp = "Applied Mathematics and Computation" }
 @String{ApplMathComp = "Appl. Math. Comput." }
 @String{AmerMathMonthly = "American Mathematical Monthly" }
 @String{AmerMathMonthly = "Amer. Math. Monthly" }
 @String{BIT = "{BIT}" }
 @String{BritStatPsych = "British Journal of Mathematical and Statistical
          Psychology" }
 @String{BritStatPsych = "Brit. J. Math. Statist. Psych." }
 @String{CanMathBull = "Canadian Mathematical Bulletin" }
 @String{CanMathBull = "Canad. Math. Bull." }
 @String{CompApplMath = "Journal of Computational and Applied Mathematics" }
 @String{CompApplMath = "J. Comput. Appl. Math." }
 @String{CompPhys = "Journal of Computational Physics" }
 @String{CompPhys = "J. Comput. Phys." }
 @String{CompStruct = "Computers and Structures" }
 @String{CompStruct = "Comput. \& Structures" }
 @String{CompJour = "The Computer Journal" }
 @String{CompJour = "Comput. J." }
 @String{CompSysSci = "Journal of Computer and System Sciences" }
 @String{CompSysSci = "J. Comput. System Sci." }
 @String{Computing = "Computing" }
 @String{ContempMath = "Contemporary Mathematics" }
 @String{ContempMath = "Contemp. Math." }
 @String{Crelle = "Crelle's Journal" }
 @String{GiornaleMath = "Giornale di Mathematiche" }
 @String{GiornaleMath = "Giorn. Mat." } % didn't find in AMS MR., ibid.

 %IEEE
 @String{Computer = "{IEEE} Computer" }
 @String{IEEETransComp = "{IEEE} Transactions on Computers" }
 @String{IEEETransComp = "{IEEE} Trans. Comput." }
 @String{IEEETransAC = "{IEEE} Transactions on Automatic Control" }
 @String{IEEETransAC = "{IEEE} Trans. Automat. Control" }
 @String{IEEESpec = "{IEEE} Spectrum" } % didn't find in AMS MR
 @String{ProcIEEE = "Proceedings of the {IEEE}" }
 @String{ProcIEEE = "Proc. {IEEE}" } % didn't find in AMS MR
 @String{IEEETransAeroElec = "{IEEE} Transactions on Aerospace and Electronic
     Systems" }
 @String{IEEETransAeroElec = "{IEEE} Trans. Aerospace Electron. Systems" }

 @String{IMANumerAna = "{IMA} Journal of Numerical Analysis" }
 @String{IMANumerAna = "{IMA} J. Numer. Anal." }
 @String{InfProcLet = "Information Processing Letters" }
 @String{InfProcLet = "Inform. Process. Lett." }
 @String{InstMathApp = "Journal of the Institute of Mathematics and
     its Applications" }
 @String{InstMathApp = "J. Inst. Math. Appl." }
 @String{IntControl = "International Journal of Control" }
 @String{IntControl = "Internat. J. Control" }
 @String{IntNumerEng = "International Journal for Numerical Methods in
     Engineering" }
 @String{IntNumerEng = "Internat. J. Numer. Methods Engrg." }
 @String{IntSuper = "International Journal of Supercomputing Applications" }
 @String{IntSuper = "Internat. J. Supercomputing Applic." } % didn't find
%% in AMS MR
 @String{Kibernetika = "Kibernetika" }
 @String{JResNatBurStand = "Journal of Research of the National Bureau
     of Standards" }
 @String{JResNatBurStand = "J. Res. Nat. Bur. Standards" }
 @String{LinAlgApp = "Linear Algebra and its Applications" }
 @String{LinAlgApp = "Linear Algebra Appl." }
 @String{MathAnaAppl = "Journal of Mathematical Analysis and Applications" }
 @String{MathAnaAppl = "J. Math. Anal. Appl." }
 @String{MathAnnalen = "Mathematische Annalen" }
 @String{MathAnnalen = "Math. Ann." }
 @String{MathPhys = "Journal of Mathematical Physics" }
 @String{MathPhys = "J. Math. Phys." }
 @String{MathComp = "Mathematics of Computation" }
 @String{MathComp = "Math. Comp." }
 @String{MathScand = "Mathematica Scandinavica" }
 @String{MathScand = "Math. Scand." }
 @String{TablesAidsComp = "Mathematical Tables and Other Aids to Computation" }
 @String{TablesAidsComp = "Math. Tables Aids Comput." }
 @String{NumerMath = "Numerische Mathematik" }
 @String{NumerMath = "Numer. Math." }
 @String{PacificMath = "Pacific Journal of Mathematics" }
 @String{PacificMath = "Pacific J. Math." }
 @String{ParDistComp = "Journal of Parallel and Distributed Computing" }
 @String{ParDistComp = "J. Parallel and Distrib. Comput." } % didn't find
%% in AMS MR
 @String{ParComputing = "Parallel Computing" }
 @String{ParComputing = "Parallel Comput." }
 @String{PhilMag = "Philosophical Magazine" }
 @String{PhilMag = "Philos. Mag." }
 @String{ProcNAS = "Proceedings of the National Academy of Sciences
                    of the USA" }
 @String{ProcNAS = "Proc. Nat. Acad. Sci. U. S. A." }
 @String{Psychometrika = "Psychometrika" }
 @String{QuartMath = "Quarterly Journal of Mathematics, Oxford, Series (2)" }
 @String{QuartMath = "Quart. J. Math. Oxford Ser. (2)" }
 @String{QuartApplMath = "Quarterly of Applied Mathematics" }
 @String{QuartApplMath = "Quart. Appl. Math." }
 @String{RevueInstStat = "Review of the International Statisical Institute" }
 @String{RevueInstStat = "Rev. Inst. Internat. Statist." }

 %SIAM
 @String{JSIAM = "Journal of the Society for Industrial and Applied
     Mathematics" }
 @String{JSIAM = "J. Soc. Indust. Appl. Math." }
 @String{JSIAMB = "Journal of the Society for Industrial and Applied
     Mathematics, Series B, Numerical Analysis" }
 @String{JSIAMB = "J. Soc. Indust. Appl. Math. Ser. B Numer. Anal." }
 @String{SIAMAlgMeth = "{SIAM} Journal on Algebraic and Discrete Methods" }
 @String{SIAMAlgMeth = "{SIAM} J. Algebraic Discrete Methods" }
 @String{SIAMAppMath = "{SIAM} Journal on Applied Mathematics" }
 @String{SIAMAppMath = "{SIAM} J. Appl. Math." }
 @String{SIAMComp = "{SIAM} Journal on Computing" }
 @String{SIAMComp = "{SIAM} J. Comput." }
 @String{SIAMMatrix = "{SIAM} Journal on Matrix Analysis and Applications" }
 @String{SIAMMatrix = "{SIAM} J. Matrix Anal. Appl." }
 @String{SIAMNumAnal = "{SIAM} Journal on Numerical Analysis" }
 @String{SIAMNumAnal = "{SIAM} J. Numer. Anal." }
 @String{SIAMReview = "{SIAM} Review" }
 @String{SIAMReview = "{SIAM} Rev." }
 @String{SIAMSciStat = "{SIAM} Journal on Scientific and Statistical
     Computing" }
 @String{SIAMSciStat = "{SIAM} J. Sci. Statist. Comput." }

 @String{SoftPracExp = "Software Practice and Experience" }
 @String{SoftPracExp = "Software Prac. Experience" } % didn't find in AMS MR
 @String{StatScience = "Statistical Science" }
 @String{StatScience = "Statist. Sci." }
 @String{Techno = "Technometrics" }
 @String{USSRCompMathPhys = "{USSR} Computational Mathematics and Mathematical
     Physics" }
 @String{USSRCompMathPhys = "{U. S. S. R.} Comput. Math. and Math. Phys." }
 @String{VLSICompSys = "Journal of {VLSI} and Computer Systems" }
 @String{VLSICompSys = "J. {VLSI} Comput. Syst." }
 @String{ZAngewMathMech = "Zeitschrift fur Angewandte Mathematik und
     Mechanik" }
 @String{ZAngewMathMech = "Z. Angew. Math. Mech." }
 @String{ZAngewMathPhys = "Zeitschrift fur Angewandte Mathematik und Physik" }
 @String{ZAngewMathPhys = "Z. Angew. Math. Phys." }

% Publishers % ================================================= |

 @String{Academic = "Academic Press" }
 @String{ACMPress = "{ACM} Press" }
 @String{AdamHilger = "Adam Hilger" }
 @String{AddisonWesley = "Addison-Wesley" }
 @String{AllynBacon = "Allyn and Bacon" }
 @String{AMS = "American Mathematical Society" }
 @String{Birkhauser = "Birkha{\"u}ser" }
 @String{CambridgePress = "Cambridge University Press" }
 @String{Chelsea = "Chelsea" }
 @String{ClaredonPress = "Claredon Press" }
 @String{DoverPub = "Dover Publications" }
 @String{Eyolles = "Eyolles" }
 @String{HoltRinehartWinston = "Holt, Rinehart and Winston" }
 @String{Interscience = "Interscience" }
 @String{JohnsHopkinsPress = "The Johns Hopkins University Press" }
 @String{JohnWileySons = "John Wiley and Sons" }
 @String{Macmillan = "Macmillan" }
 @String{MathWorks = "The Math Works Inc." }
 @String{McGrawHill = "McGraw-Hill" }
 @String{NatBurStd = "National Bureau of Standards" }
 @String{NorthHolland = "North-Holland" }
 @String{OxfordPress = "Oxford University Press" }  %address Oxford or London?
 @String{PergamonPress = "Pergamon Press" }
 @String{PlenumPress = "Plenum Press" }
 @String{PrenticeHall = "Prentice-Hall" }
 @String{SIAMPub = "{SIAM} Publications" }
 @String{Springer = "Springer-Verlag" }
 @String{TexasPress = "University of Texas Press" }
 @String{VanNostrand = "Van Nostrand" }
 @String{WHFreeman = "W. H. Freeman and Co." }

%Entries

@Article{Abril07,
  author        = "Patricia S. Abril and Robert Plant",
  title         = "The patent holder's dilemma: Buy, sell, or troll?",
  journal       = "Communications of the ACM",
  volume        = "50",
  number        = "1",
  month         = jan,
  year          = "2007",
  pages         = "36--44",
  doi           = "10.1145/1188913.1188915",
  url           = "http://doi.acm.org/10.1145/1219092.1219093",
  note          = "",
}

@Article{Cohen07,
  author        = "Sarah Cohen and Werner Nutt and Yehoshua Sagic",
  title         = "Deciding equivalances among conjunctive aggregate queries",
  journal       = JACM,
  articleno     = "5",
  numpages      = "50",
  volume        = "54",
  number        = "2",
  month         = apr,
  year          = "2007",
  doi           = "10.1145/1219092.1219093",
  url           = "http://doi.acm.org/10.1145/1219092.1219093",
  acmid         = "1219093",
  note          = "",
}

@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}

@article{tuor2017deep,
  title={Deep learning for unsupervised insider threat detection in structured cybersecurity data streams},
  author={Tuor, Aaron and Kaplan, Samuel and Hutchinson, Brian and Nichols, Nicole and Robinson, Sean},
  journal={arXiv preprint arXiv:1710.00811},
  year={2017}
}

@periodical{JCohen96,
  key =          "Cohen",
  editor =       "Jacques Cohen",
  title =        "Special issue: Digital Libraries",
  journal =      CACM,
  volume =       "39",
  number =       "11",
  month =        nov,
  year =         "1996",
}


@Book{Kosiur01,
  author =       "David Kosiur",
  title =        "Understanding Policy-Based Networking",
  publisher =    "Wiley",
  year =         "2001",
  address =      "New York, NY",
  edition =      "2nd.",
  editor =       "",
  volume =       "",
  number =       "",
  series =       "",
  month =        "",
  note =         "",
}

@book{phoha2002internet,
  title={Internet security dictionary},
  author={Phoha, Vir V},
  volume={1},
  year={2002},
  publisher={Taylor \& Francis}
}

@book{ctu-13dataset,
  title={The ctu-13 dataset},
  year={2002},
  publisher={https://stratosphereips.org/category/dataset.html}
}

@article{jamkRGCE,
  title={JAMK University of Applied Sciences,Realistic Global Cyber Environment (RGCE)},
  publisher={http://www.jyvsectec.fi/en/rgce/},
  year={2009},
}


@article{shiravi2012toward,
  title={Toward developing a systematic approach to generate benchmark datasets for intrusion detection},
  author={Shiravi, Ali and Shiravi, Hadi and Tavallaee, Mahbod and Ghorbani, Ali A},
  journal={computers \& security},
  volume={31},
  number={3},
  pages={357--374},
  year={2012},
  publisher={Elsevier}
}

@article{lin2018idsgan,
  title={IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection},
  author={Lin, Zilong and Shi, Yong and Xue, Zhi},
  journal={arXiv preprint arXiv:1809.02077},
  year={2018}
}

@inproceedings{yin2018enhancing,
  title={An enhancing framework for botnet detection using generative adversarial networks},
  author={Yin, Chuanlong and Zhu, Yuefei and Liu, Shengli and Fei, Jinlong and Zhang, Hetong},
  booktitle={2018 International Conference on Artificial Intelligence and Big Data (ICAIBD)},
  pages={228--234},
  year={2018},
  organization={IEEE}
}

@article{li2018anomaly,
  title={Anomaly Detection with Generative Adversarial Networks for Multivariate Time Series},
  author={Li, Dan and Chen, Dacheng and Goh, Jonathan and Ng, See-kiong},
  journal={arXiv preprint arXiv:1809.04758},
  year={2018}
}

@article{al2018deep,
  title={Deep Learning Approach Combining Sparse Autoen-coder with SVM for Network Intrusion Detection},
  author={Al-Qatf, Majjed and Alhabib, Mohammed and Al-Sabahi, Kamal and others},
  journal={IEEE Access},
  year={2018},
  publisher={IEEE}
}

@article{fiore2013network,
  title={Network anomaly detection with the restricted Boltzmann machine},
  author={Fiore, Ugo and Palmieri, Francesco and Castiglione, Aniello and De Santis, Alfredo},
  journal={Neurocomputing},
  volume={122},
  pages={13--23},
  year={2013},
  publisher={Elsevier}
}

@article{umer2018two,
  title={A two-stage flow-based intrusion detection model for next-generation networks},
  author={Umer, Muhammad Fahad and Sher, Muhammad and Bi, Yaxin},
  journal={PloS one},
  volume={13},
  number={1},
  pages={e0180945},
  year={2018},
  publisher={Public Library of Science}
}
@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}



@article{blanchard2010semi,
  title={Semi-supervised novelty detection},
  author={Blanchard, Gilles and Lee, Gyemin and Scott, Clayton},
  journal={Journal of Machine Learning Research},
  volume={11},
  number={Nov},
  pages={2973--3009},
  year={2010}
}

@article{hayes2015contextual,
  title={Contextual anomaly detection framework for big sensor data},
  author={Hayes, Michael A and Capretz, Miriam AM},
  journal={Journal of Big Data},
  volume={2},
  number={1},
  pages={2},
  year={2015},
  publisher={Springer}
}

@article{deeplearningVstraditionalAlgorithms,
  title={Building AI Applications Using Deep Learning},
  author={Alejandro, Correa, Bahnsen},
  url={https://blog.easysol.net/wp-content/uploads/2017/06/image1.png},
  year={2016},

}


@InProceedings{pmlrv80ruff18a,
  title =    {Deep One-Class Classification},
  author =   {Ruff, Lukas and Vandermeulen, Robert and Goernitz, Nico and Deecke, Lucas and Siddiqui, Shoaib Ahmed and Binder, Alexander and M{\"u}ller, Emmanuel and Kloft, Marius},
  booktitle =    {Proceedings of the 35th International Conference on Machine Learning},
  pages =    {4393--4402},
  year =   {2018},
  editor =   {Dy, Jennifer and Krause, Andreas},
  volume =   {80},
  series =   {Proceedings of Machine Learning Research},
  address =    {Stockholmsmässan, Stockholm Sweden},
  month =    {10--15 Jul},
  publisher =    {PMLR},
  pdf =    {http://proceedings.mlr.press/v80/ruff18a/ruff18a.pdf},
  url =    {http://proceedings.mlr.press/v80/ruff18a.html},
  abstract =   {Despite the great advances made by deep learning in many machine learning problems, there is a relative dearth of deep learning approaches for anomaly detection. Those approaches which do exist involve networks trained to perform a task other than anomaly detection, namely generative models or compression, which are in turn adapted for use in anomaly detection; they are not trained on an anomaly detection based objective. In this paper we introduce a new anomaly detection method—Deep Support Vector Data Description—, which is trained on an anomaly detection based objective. The adaptation to the deep regime necessitates that our neural network and training procedure satisfy certain properties, which we demonstrate theoretically. We show the effectiveness of our method on MNIST and CIFAR-10 image benchmark datasets as well as on the detection of adversarial examples of GTSRB stop signs.}
}





@inproceedings{wulsin2010semi,
  title={Semi-supervised anomaly detection for EEG waveforms using deep belief nets},
  author={Wulsin, Drausin and Blanco, Justin and Mani, Ram and Litt, Brian},
  booktitle={Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on},
  pages={436--441},
  year={2010},
  organization={IEEE}
}

@article{gu2018semi,
  title={Semi-supervised Outlier Detection using Generative And Adversary Framework},
  author={Gu, Jindong and Schubert, Matthias and Tresp, Volker},
  year={2018}
}

@article{song2017hybrid,
  title={A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data},
  author={Song, Hongchao and Jiang, Zhuqing and Men, Aidong and Yang, Bo},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{wu2015harvesting,
  title={Harvesting discriminative meta objects with deep CNN features for scene classification},
  author={Wu, Ruobing and Wang, Baoyuan and Wang, Wenping and Yu, Yizhou},
  booktitle={Proceedings of the IEEE International Conference on Computer Vision},
  pages={1287--1295},
  year={2015}
}

@inproceedings{erfani2016robust,
  title={Robust domain generalisation by enforcing distribution invariance},
  author={Erfani, Sarah and Baktashmotlagh, Mahsa and Moshtaghi, Masoud and Nguyen, Vinh and Leckie, Christopher and Bailey, James and Kotagiri, Ramamohanarao},
  booktitle={Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence},
  pages={1455--1461},
  year={2016},
  organization={AAAI Press/International Joint Conferences on Artificial Intelligence}
}
@inproceedings{erfani2017shared,
  title={From Shared Subspaces to Shared Landmarks: A Robust Multi-Source Classification Approach.},
  author={Erfani, Sarah M and Baktashmotlagh, Mahsa and Moshtaghi, Masud and Nguyen, Vinh and Leckie, Christopher and Bailey, James and Ramamohanarao, Kotagiri},
  booktitle={AAAI},
  pages={1854--1860},
  year={2017}
}

@article{peharz2018probabilistic,
  title={Probabilistic Deep Learning using Random Sum-Product Networks},
  author={Peharz, Robert and Vergari, Antonio and Stelzner, Karl and Molina, Alejandro and Trapp, Martin and Kersting, Kristian and Ghahramani, Zoubin},
  journal={arXiv preprint arXiv:1806.01910},
  year={2018}
}

@article{kim2015deep,
  title={Deep learning with support vector data description},
  author={Kim, Sangwook and Choi, Yonghwa and Lee, Minho},
  journal={Neurocomputing},
  volume={165},
  pages={111--117},
  year={2015},
  publisher={Elsevier}

@inproceedings{vinayakumar2017applying,
  title={Applying convolutional neural network for network intrusion detection},
  author={Vinayakumar, R and Soman, KP and Poornachandran, Prabaharan},
  booktitle={Advances in Computing, Communications and Informatics (ICACCI), 2017 International Conference on},
  pages={1222--1228},
  year={2017},
  organization={IEEE}
}

@article{staudemeyer2015applying,
  title={Applying long short-term memory recurrent neural networks to intrusion detection},
  author={Staudemeyer, Ralf C},
  journal={South African Computer Journal},
  volume={56},
  number={1},
  pages={136--154},
  year={2015},
  publisher={South African Computer Society (SAICSIT)}
}

@article{sohi2018recurrent,
  title={Recurrent Neural Networks for Enhancement of Signature-based Network Intrusion Detection Systems},
  author={Sohi, Soroush M and Ganji, Fatemeh and Seifert, Jean-Pierre},
  journal={arXiv preprint arXiv:1807.03212},
  year={2018}
}

@inproceedings{gao2014intrusion,
  title={An intrusion detection model based on deep belief networks},
  author={Gao, Ni and Gao, Ling and Gao, Quanli and Wang, Hai},
  booktitle={Advanced Cloud and Big Data (CBD), 2014 Second International Conference on},
  pages={247--252},
  year={2014},
  organization={IEEE}
}

@inproceedings{kwon2018empirical,
  title={An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks},
  author={Kwon, Donghwoon and Natarajan, Kathiravan and Suh, Sang C and Kim, Hyunjoo and Kim, Jinoh},
  booktitle={2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
  pages={1595--1598},
  year={2018},
  organization={IEEE}
}

@inproceedings{malaiya2018empirical,
  title={An Empirical Evaluation of Deep Learning for Network Anomaly Detection},
  author={Malaiya, Ritesh K and Kwon, Donghwoon and Kim, Jinoh and Suh, Sang C and Kim, Hyunjoo and Kim, Ikkyun},
  booktitle={2018 International Conference on Computing, Networking and Communications (ICNC)},
  pages={893--898},
  year={2018},
  organization={IEEE}
}


@inproceedings{matsubara2018anomaly,
  title={Anomaly Machine Component Detection by Deep Generative Model with Unregularized Score},
  author={Matsubara, Takashi and Tachibana, Ryosuke and Uehara, Kuniaki},
  booktitle={2018 International Joint Conference on Neural Networks (IJCNN)},
  pages={1--8},
  year={2018},
  organization={IEEE}
}

@article{intrator2018mdgan,
  title={MDGAN: Boosting Anomaly Detection Using$\backslash$$\backslash$Multi-Discriminator Generative Adversarial Networks},
  author={Intrator, Yotam and Katz, Gilad and Shabtai, Asaf},
  journal={arXiv preprint arXiv:1810.05221},
  year={2018}
}

@article{mirsky2018kitsune,
  title={Kitsune: an ensemble of autoencoders for online network intrusion detection},
  author={Mirsky, Yisroel and Doitshman, Tomer and Elovici, Yuval and Shabtai, Asaf},
  journal={arXiv preprint arXiv:1802.09089},
  year={2018}
}

@inproceedings{madani2018robustness,
  title={Robustness of deep autoencoder in intrusion detection under adversarial contamination},
  author={Madani, Pooria and Vlajic, Natalija},
  booktitle={Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security},
  pages={1},
  year={2018},
  organization={ACM}
}

@article{ring2018flow,
  title={Flow-based Network Traffic Generation using Generative Adversarial Networks},
  author={Ring, Markus and Schl{\"o}r, Daniel and Landes, Dieter and Hotho, Andreas},
  journal={arXiv preprint arXiv:1810.07795},
  year={2018}
}

@article{latah2018deep,
  title={When deep learning meets security},
  author={Latah, Majd},
  journal={arXiv preprint arXiv:1807.04739},
  year={2018}
}

@article{aghakhani2018detecting,
  title={Detecting Deceptive Reviews using Generative Adversarial Networks},
  author={Aghakhani, Hojjat and Machiry, Aravind and Nilizadeh, Shirin and Kruegel, Christopher and Vigna, Giovanni},
  journal={arXiv preprint arXiv:1805.10364},
  year={2018}
}


@inproceedings{tavallaee2009detailed,
  title={A detailed analysis of the KDD CUP 99 data set},
  author={Tavallaee, Mahbod and Bagheri, Ebrahim and Lu, Wei and Ghorbani, Ali A},
  booktitle={Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on},
  pages={1--6},
  year={2009},
  organization={IEEE}
}

. Computer Immune Systems Data Sets. , 2012. [Online].
@inproceedings{fontugne2010mawilab,
  title={Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking},
  author={Fontugne, Romain and Borgnat, Pierre and Abry, Patrice and Fukuda, Kensuke},
  booktitle={Proceedings of the 6th International COnference},
  pages={8},
  year={2010},
  organization={ACM}
}

@article{stolfo2000cost,
  title={Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection},
  author={Stolfo, J and Fan, Wei and Lee, Wenke and Prodromidis, Andreas and Chan, Philip K},
  journal={Results from the JAM Project by Salvatore},
  pages={1--15},
  year={2000}
}


@article{ImmuneDatasets,
  title={Computer Immune Systems Data Sets},
  author={University , New Mexico},
  year={2012},
  publisher={http://www.cs.unm.edu/˜immsec/systemcalls.htm}
}


@article{creech2014semantic,
  title={A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns},
  author={Creech, Gideon and Hu, Jiankun},
  journal={IEEE Transactions on Computers},
  volume={63},
  number={4},
  pages={807--819},
  year={2014},
  publisher={IEEE}
}

@inproceedings{chawla2018host,
  title={Host based Intrusion Detection System with Combined CNN/RNN Model},
  author={Chawla, Ashima and Lee, Brian and Fallon, Sheila and Jacob, Paul},
  booktitle={Proceedings of Second International Workshop on AI in Security},
  year={2018}
}

@article{shu2017doc,
  title={Doc: Deep open classification of text documents},
  author={Shu, Lei and Xu, Hu and Liu, Bing},
  journal={arXiv preprint arXiv:1709.08716},
  year={2017}
}

@article{fengming2017anomaly,
  title={Anomaly detection in smart grid based on encoder-decoder framework with recurrent neural network},
  author={Fengming, Zheng and Shufang, Li and Zhimin, Guo and Bo, Wu and Shiming, Tian and Mingming, Pan},
  journal={The Journal of China Universities of Posts and Telecommunications},
  volume={24},
  number={6},
  pages={67--73},
  year={2017},
  publisher={Elsevier}
}
@article{zhai2016deep,
  title={Deep structured energy based models for anomaly detection},
  author={Zhai, Shuangfei and Cheng, Yu and Lu, Weining and Zhang, Zhongfei},
  journal={arXiv preprint arXiv:1605.07717},
  year={2016}
}

@inproceedings{yang2015unsupervised,
  title={Unsupervised extraction of video highlights via robust recurrent auto-encoders},
  author={Yang, Huan and Wang, Baoyuan and Lin, Stephen and Wipf, David and Guo, Minyi and Guo, Baining},
  booktitle={Proceedings of the IEEE international conference on computer vision},
  pages={4633--4641},
  year={2015}
}
@inproceedings{chalapathy2017robust,
  title={Robust, deep and inductive anomaly detection},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  booktitle={Joint European Conference on Machine Learning and Knowledge Discovery in Databases},
  pages={36--51},
  year={2017},
  organization={Springer}
}

@inproceedings{qi2014robust,
  title={Robust feature learning by stacked autoencoder with maximum correntropy criterion},
  author={Qi, Yu and Wang, Yueming and Zheng, Xiaoxiang and Wu, Zhaohui},
  booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
  pages={6716--6720},
  year={2014},
  organization={IEEE}
}

@inproceedings{zhao2015robust,
  title={Robust feature learning by improved auto-encoder from non-Gaussian noised images},
  author={Zhao, Dan and Guo, Baolong and Wu, Jinfu and Ning, Weikang and Yan, Yunyi},
  booktitle={Imaging Systems and Techniques (IST), 2015 IEEE International Conference on},
  pages={1--5},
  year={2015},
  organization={IEEE}
}

@inproceedings{hawkins2002outlier,
  title={Outlier detection using replicator neural networks},
  author={Hawkins, Simon and He, Hongxing and Williams, Graham and Baxter, Rohan},
  booktitle={International Conference on Data Warehousing and Knowledge Discovery},
  pages={170--180},
  year={2002},
  organization={Springer}
}

@article{xu2015learning,
  title={Learning deep representations of appearance and motion for anomalous event detection},
  author={Xu, Dan and Ricci, Elisa and Yan, Yan and Song, Jingkuan and Sebe, Nicu},
  journal={arXiv preprint arXiv:1510.01553},
  year={2015}
}

@inproceedings{dau2014anomaly,
  title={Anomaly detection using replicator neural networks trained on examples of one class},
  author={Dau, Hoang Anh and Ciesielski, Vic and Song, Andy},
  booktitle={Asia-Pacific Conference on Simulated Evolution and Learning},
  pages={311--322},
  year={2014},
  organization={Springer}
}
@inproceedings{sakurada2014anomaly,
  title={Anomaly detection using autoencoders with nonlinear dimensionality reduction},
  author={Sakurada, Mayu and Yairi, Takehisa},
  booktitle={Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis},
  pages={4},
  year={2014},
  organization={ACM}
}
@inproceedings{wu2015adaptive,
  title={Adaptive anomalies detection with deep network},
  author={Wu, C and Guo, Y and Ma, Y},
  booktitle={Proceeding of the Seventh International Conference on Adaptive and Self-Adaptive Systems and Applications},
  year={2015}
}
@inproceedings{tagawa2015structured,
  title={Structured denoising autoencoder for fault detection and analysis},
  author={Tagawa, Takaaki and Tadokoro, Yukihiro and Yairi, Takehisa},
  booktitle={Asian Conference on Machine Learning},
  pages={96--111},
  year={2015}
}
@inproceedings{chianucci2016unsupervised,
  title={Unsupervised change detection using Spatial Transformer Networks},
  author={Chianucci, Dan and Savakis, Andreas},
  booktitle={Signal Processing Workshop (WNYISPW), 2016 IEEE Western New York Image and},
  pages={1--5},
  year={2016},
  organization={IEEE}
}

@article{gu2018semi,
  title={Semi-supervised Outlier Detection using Generative And Adversary Framework},
  author={Gu, Jindong and Schubert, Matthias and Tresp, Volker},
  year={2018}
}

@article{kliger2018novelty,
  title={Novelty Detection with GAN},
  author={Kliger, Mark and Fleishman, Shachar},
  journal={arXiv preprint arXiv:1802.10560},
  year={2018}
}

@article{zong2018deep,
  title={Deep autoencoding gaussian mixture model for unsupervised anomaly detection},
  author={Zong, Bo and Song, Qi and Min, Martin Renqiang and Cheng, Wei and Lumezanu, Cristian and Cho, Daeki and Chen, Haifeng},
  year={2018}
}

@inproceedings{sabokrou2018adversarially,
  title={Adversarially Learned One-Class Classifier for Novelty Detection},
  author={Sabokrou, Mohammad and Khalooei, Mohammad and Fathy, Mahmood and Adeli, Ehsan},
  booktitle={Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition},
  pages={3379--3388},
  year={2018}
}

@article{ravanbakhsh2017training,
  title={Training adversarial discriminators for cross-channel abnormal event detection in crowds},
  author={Ravanbakhsh, Mahdyar and Sangineto, Enver and Nabi, Moin and Sebe, Nicu},
  journal={arXiv preprint arXiv:1706.07680},
  year={2017}
}

@misc{rigaki2017adversarial,
  title={Adversarial Deep Learning Against Intrusion Detection Classifiers},
  author={Rigaki, Maria},
  year={2017}
}

@article{leveau2017adversarial,
  title={Adversarial autoencoders for novelty detection},
  author={Leveau, Valentin and Joly, Alexis},
  year={2017}
}

@inproceedings{thomas2016learning,
  title={Learning hyperparameters for unsupervised anomaly detection},
  author={Thomas, Albert and Clemencon, Stephan and Feuillard, Vincent and Gramfort, Alexandre},
  booktitle={Proceedings of the 2016 international conference on machine learning workshop on anomaly detection, New York, USA},
  year={2016}
}


@inproceedings{lawson2017finding,
  title={Finding Anomalies with Generative Adversarial Networks for a Patrolbot.},
  author={Lawson, Wallace E and Bekele, Esube and Sullivan, Keith},
  booktitle={CVPR Workshops},
  pages={484--485},
  year={2017}
}

@inproceedings{nolle2016unsupervised,
  title={Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders},
  author={Nolle, Timo and Seeliger, Alexander and M{\"u}hlh{\"a}user, Max},
  booktitle={International conference on discovery science},
  pages={442--456},
  year={2016},
  organization={Springer}
}

@misc{wolpher2018anomaly,
  title={Anomaly Detection in Unstructured Time Series Datausing an LSTM Autoencoder},
  author={Wolpher, Maxim},
  year={2018}
}

@inproceedings{nanduri2016anomaly,
  title={Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)},
  author={Nanduri, Anvardh and Sherry, Lance},
  booktitle={Integrated Communications Navigation and Surveillance (ICNS), 2016},
  pages={5C2--1},
  year={2016},
  organization={IEEE}
}


@article{nolle2018analyzing,
  title={Analyzing business process anomalies using autoencoders},
  author={Nolle, Timo and Luettgen, Stefan and Seeliger, Alexander and M{\"u}hlh{\"a}user, Max},
  journal={Machine Learning},
  pages={1--19},
  year={2018},
  publisher={Springer}
}

@inproceedings{nolle2016unsupervised,
  title={Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders},
  author={Nolle, Timo and Seeliger, Alexander and M{\"u}hlh{\"a}user, Max},
  booktitle={International conference on discovery science},
  pages={442--456},
  year={2016},
  organization={Springer}
}


@article{cheng2017deep,
  title={Deep Convolutional Neural Networks for Anomaly Event Classification on Distributed Systems},
  author={Cheng, Jiechao and Ren, Rui and Wang, Lei and Zhan, Jianfeng},
  journal={arXiv preprint arXiv:1710.09052},
  year={2017}
}

@article{zhang2018alphamex,
  title={AlphaMEX: A smarter global pooling method for convolutional neural networks},
  author={Zhang, Boxue and Zhao, Qi and Feng, Wenquan and Lyu, Shuchang},
  journal={Neurocomputing},
  volume={321},
  pages={36--48},
  year={2018},
  publisher={Elsevier}
}
@article{liu2017generalized,
  title={Generalized Zero-Shot Learning for Action Recognition with Web-Scale Video Data},
  author={Liu, Kun and Liu, Wu and Ma, Huadong and Huang, Wenbing and Dong, Xiongxiong},
  journal={arXiv preprint arXiv:1710.07455},
  year={2017}
}
@article{liang2018transfer,
  title={Transfer learning for aluminium extrusion electricity consumption anomaly detection via deep neural networks},
  author={Liang, Peng and Yang, Hai-Dong and Chen, Wen-Si and Xiao, Si-Yuan and Lan, Zhao-Ze},
  journal={International Journal of Computer Integrated Manufacturing},
  volume={31},
  number={4-5},
  pages={396--405},
  year={2018},
  publisher={Taylor \& Francis}
}
@article{kumar2017transfer,
  title={A transfer learning framework for traffic video using neuro-fuzzy approach},
  author={Kumar, PM Ashok and Vaidehi, V},
  journal={S{\=a}dhan{\=a}},
  volume={42},
  number={9},
  pages={1431--1442},
  year={2017},
  publisher={Springer}
}

@incollection{almajai2012anomaly,
  title={Anomaly detection and knowledge transfer in automatic sports video annotation},
  author={Almajai, Ibrahim and Yan, Fei and de Campos, Teofilo and Khan, Aftab and Christmas, William and Windridge, David and Kittler, Josef},
  booktitle={Detection and identification of rare audiovisual cues},
  pages={109--117},
  year={2012},
  publisher={Springer}
}
@inproceedings{li2012detecting,
  title={Detecting ECG abnormalities via transductive transfer learning},
  author={Li, Kang and Du, Nan and Zhang, Aidong},
  booktitle={Proceedings of the ACM Conference on Bioinformatics, Computational Biology and Biomedicine},
  pages={210--217},
  year={2012},
  organization={ACM}
}
@article{lu2017unsupervised,
  title={Unsupervised sequential outlier detection with deep architectures},
  author={Lu, Weining and Cheng, Yu and Xiao, Cao and Chang, Shiyu and Huang, Shuai and Liang, Bin and Huang, Thomas},
  journal={IEEE Transactions on Image Processing},
  volume={26},
  number={9},
  pages={4321--4330},
  year={2017},
  publisher={IEEE}
}

@inproceedings{parchami2017using,
  title={Using deep autoencoders to learn robust domain-invariant representations for still-to-video face recognition},
  author={Parchami, Mostafa and Bashbaghi, Saman and Granger, Eric and Sayed, Saif},
  booktitle={Advanced Video and Signal Based Surveillance (AVSS), 2017 14th IEEE International Conference on},
  pages={1--6},
  year={2017},
  organization={IEEE}
}

@article{meng2018relational,
  title={Relational autoencoder for feature extraction},
  author={Meng, Qinxue and Catchpoole, Daniel and Skillicorn, David and Kennedy, Paul J},
  journal={arXiv preprint arXiv:1802.03145},
  year={2018}
}
@inproceedings{zhuang2017group,
  title={Group activity recognition with differential recurrent convolutional neural networks},
  author={Zhuang, Naifan and Yusufu, Tuoerhongjiang and Ye, Jun and Hua, Kien A},
  booktitle={Automatic Face \& Gesture Recognition (FG 2017), 2017 12th IEEE International Conference on},
  pages={526--531},
  year={2017},
  organization={IEEE}
}
@inproceedings{baldi2012autoencoders,
  title={Autoencoders, unsupervised learning, and deep architectures},
  author={Baldi, Pierre},
  booktitle={Proceedings of ICML workshop on unsupervised and transfer learning},
  pages={37--49},
  year={2012}
}
@article{goldstein2016comparative,
  title={A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data},
  author={Goldstein, Markus and Uchida, Seiichi},
  journal={PloS one},
  volume={11},
  number={4},
  pages={e0152173},
  year={2016},
  publisher={Public Library of Science}
}


@inproceedings{mehrotra2017deep,
  title={Deep Sequential Models for Task Satisfaction Prediction},
  author={Mehrotra, Rishabh and Awadallah, Ahmed Hassan and Shokouhi, Milad and Yilmaz, Emine and Zitouni, Imed and El Kholy, Ahmed and Khabsa, Madian},
  booktitle={Proceedings of the 2017 ACM on Conference on Information and Knowledge Management},
  pages={737--746},
  year={2017},
  organization={ACM}
}

@article{filonov2017rnn,
  title={RNN-based Early Cyber-Attack Detection for the Tennessee Eastman Process},
  author={Filonov, Pavel and Kitashov, Fedor and Lavrentyev, Andrey},
  journal={arXiv preprint arXiv:1709.02232},
  year={2017}
}

@inproceedings{malhotra2015long,
  title={Long short term memory networks for anomaly detection in time series},
  author={Malhotra, Pankaj and Vig, Lovekesh and Shroff, Gautam and Agarwal, Puneet},
  booktitle={Proceedings},
  pages={89},
  year={2015},
  organization={Presses universitaires de Louvain}
}
@misc{singh2017anomaly,
  title={Anomaly Detection for Temporal Data using Long Short-Term Memory (LSTM)},
  author={Singh, Akash},
  year={2017}
}

@article{kim2016lstm,
  title={LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems},
  author={Kim, Gyuwan and Yi, Hayoon and Lee, Jangho and Paek, Yunheung and Yoon, Sungroh},
  journal={arXiv preprint arXiv:1611.01726},
  year={2016}
}
@inproceedings{dasigi2014modeling,
  title={Modeling newswire events using neural networks for anomaly detection},
  author={Dasigi, Pradeep and Hovy, Eduard},
  booktitle={Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers},
  pages={1414--1422},
  year={2014}
}

@inproceedings{dasigi2014modeling,
  title={Modeling newswire events using neural networks for anomaly detection},
  author={Dasigi, Pradeep and Hovy, Eduard},
  booktitle={Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers},
  pages={1414--1422},
  year={2014}
}
@article{medel2016anomaly,
  title={Anomaly detection in video using predictive convolutional long short-term memory networks},
  author={Medel, Jefferson Ryan and Savakis, Andreas},
  journal={arXiv preprint arXiv:1612.00390},
  year={2016}
}

@article{gamboa2017deep,
  title={Deep learning for time-series analysis},
  author={Gamboa, John Cristian Borges},
  journal={arXiv preprint arXiv:1701.01887},
  year={2017}
}

@article{pan2010survey,
  title={A survey on transfer learning},
  author={Pan, Sinno Jialin and Yang, Qiang and others},
  journal={IEEE Transactions on knowledge and data engineering},
  volume={22},
  number={10},
  pages={1345--1359},
  year={2010},
  publisher={Institute of Electrical and Electronics Engineers, Inc., 345 E. 47 th St. NY~…}
}
@article{litjens2017survey,
  title={A survey on deep learning in medical image analysis},
  author={Litjens, Geert and Kooi, Thijs and Bejnordi, Babak Ehteshami and Setio, Arnaud Arindra Adiyoso and Ciompi, Francesco and Ghafoorian, Mohsen and Van Der Laak, Jeroen Awm and Van Ginneken, Bram and S{\'a}nchez, Clara I},
  journal={Medical image analysis},
  volume={42},
  pages={60--88},
  year={2017},
  publisher={Elsevier}
}

@inproceedings{chandola2008comparative,
  title={Comparative evaluation of anomaly detection techniques for sequence data},
  author={Chandola, Varun and Mithal, Varun and Kumar, Vipin},
  booktitle={Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on},
  pages={743--748},
  year={2008},
  organization={IEEE}
}



@article{vercruyssen2017transfer,
  title={Transfer learning for time series anomaly detection},
  author={Vercruyssen, Vincent and Meert, Wannes and Davis, Jesse},
  journal={IAL ECML PKDD 2017},
  pages={27},
  year={2017}
}

@inproceedings{rivero2017grassmannian,
  title={A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection},
  author={Rivero, Jorge and Ribeiro, Bernardete and Chen, Ning and Leite, F{\'a}tima Silva},
  booktitle={International Conference on Neural Information Processing},
  pages={565--575},
  year={2017},
  organization={Springer}
}

@article{xian2017zero,
  title={Zero-shot learning-the good, the bad and the ugly},
  author={Xian, Yongqin and Schiele, Bernt and Akata, Zeynep},
  journal={arXiv preprint arXiv:1703.04394},
  year={2017}
}

@inproceedings{socher2013zero,
  title={Zero-shot learning through cross-modal transfer},
  author={Socher, Richard and Ganjoo, Milind and Manning, Christopher D and Ng, Andrew},
  booktitle={Advances in neural information processing systems},
  pages={935--943},
  year={2013}
}

@inproceedings{romera2015embarrassingly,
  title={An embarrassingly simple approach to zero-shot learning},
  author={Romera-Paredes, Bernardino and Torr, Philip},
  booktitle={International Conference on Machine Learning},
  pages={2152--2161},
  year={2015}
}

@article{mishra2017generative,
  title={A generative model for zero shot learning using conditional variational autoencoders},
  author={Mishra, Ashish and Reddy, M and Mittal, Anurag and Murthy, Hema A},
  journal={arXiv preprint arXiv:1709.00663},
  year={2017}
}

@inproceedings{gorokhov2017convolutional,
  title={Convolutional Neural Networks for Unsupervised Anomaly Detection in Text Data},
  author={Gorokhov, Oleg and Petrovskiy, Mikhail and Mashechkin, Igor},
  booktitle={International Conference on Intelligent Data Engineering and Automated Learning},
  pages={500--507},
  year={2017},
  organization={Springer}
}
@inproceedings{liao2017deep,
  title={Deep convolutional player modeling on log and level data},
  author={Liao, Nicholas and Guzdial, Matthew and Riedl, Mark},
  booktitle={Proceedings of the 12th International Conference on the Foundations of Digital Games},
  pages={41},
  year={2017},
  organization={ACM}
}

@article{zhou2016spatial,
  title={Spatial--temporal convolutional neural networks for anomaly detection and localization in crowded scenes},
  author={Zhou, Shifu and Shen, Wei and Zeng, Dan and Fang, Mei and Wei, Yuanwang and Zhang, Zhijiang},
  journal={Signal Processing: Image Communication},
  volume={47},
  pages={358--368},
  year={2016},
  publisher={Elsevier}
}
@inproceedings{racki2018compact,
  title={A compact convolutional neural network for textured surface anomaly detection},
  author={Racki, Domen and Tomazevic, Dejan and Skocaj, Danijel},
  booktitle={2018 IEEE Winter Conference on Applications of Computer Vision (WACV)},
  pages={1331--1339},
  year={2018},
  organization={IEEE}
}

@inproceedings{zhang2018role,
  title={Role-based Log Analysis Applying Deep Learning for Insider Threat Detection},
  author={Zhang, Dongxue and Zheng, Yang and Wen, Yu and Xu, Yujue and Wang, Jingchuo and Yu, Yang and Meng, Dan},
  booktitle={Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors},
  pages={18--20},
  year={2018},
  organization={ACM}
}

@inproceedings{yuan2018insider,
  title={Insider Threat Detection with Deep Neural Network},
  author={Yuan, Fangfang and Cao, Yanan and Shang, Yanmin and Liu, Yanbing and Tan, Jianlong and Fang, Binxing},
  booktitle={International Conference on Computational Science},
  pages={43--54},
  year={2018},
  organization={Springer}
}
@inproceedings{sakurada2014anomaly,
  title={Anomaly detection using autoencoders with nonlinear dimensionality reduction},
  author={Sakurada, Mayu and Yairi, Takehisa},
  booktitle={Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis},
  pages={4},
  year={2014},
  organization={ACM}
}


@inproceedings{zhang2018role,
  title={Role-based Log Analysis Applying Deep Learning for Insider Threat Detection},
  author={Zhang, Dongxue and Zheng, Yang and Wen, Yu and Xu, Yujue and Wang, Jingchuo and Yu, Yang and Meng, Dan},
  booktitle={Proceedings of the 1st Workshop on Security-Oriented Designs of Computer Architectures and Processors},
  pages={18--20},
  year={2018},
  organization={ACM}
}

@article{cheng2017deep,
  title={Deep Convolutional Neural Networks for Anomaly Event Classification on Distributed Systems},
  author={Cheng, Jiechao and Ren, Rui and Wang, Lei and Zhan, Jianfeng},
  journal={arXiv preprint arXiv:1710.09052},
  year={2017}
}


@inproceedings{lu2018detecting,
  title={Detecting Anomaly in Big Data System Logs Using Convolutional Neural Network},
  author={Lu, Siyang and Wei, Xiang and Li, Yandong and Wang, Liqiang},
  booktitle={2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)},
  pages={151--158},
  year={2018},
  organization={IEEE}
}


@inproceedings{du2017deeplog,
  title={Deeplog: Anomaly detection and diagnosis from system logs through deep learning},
  author={Du, Min and Li, Feifei and Zheng, Guineng and Srikumar, Vivek},
  booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
  pages={1285--1298},
  year={2017},
  organization={ACM}
}
@techreport{lyudchik2016outlier,
  title={Outlier detection using autoencoders},
  author={Lyudchik, Olga},
  year={2016}
}

@article{mishra2017generative,
  title={A generative model for zero shot learning using conditional variational autoencoders},
  author={Mishra, Ashish and Reddy, M and Mittal, Anurag and Murthy, Hema A},
  journal={arXiv preprint arXiv:1709.00663},
  year={2017}
}

@inproceedings{xu2018unsupervised,
  title={Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications},
  author={Xu, Haowen and Chen, Wenxiao and Zhao, Nengwen and Li, Zeyan and Bu, Jiahao and Li, Zhihan and Liu, Ying and Zhao, Youjian and Pei, Dan and Feng, Yang and others},
  booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web},
  pages={187--196},
  year={2018},
  organization={International World Wide Web Conferences Steering Committee}
}

@article{solch2016variational,
  title={Variational inference for on-line anomaly detection in high-dimensional time series},
  author={S{\"o}lch, Maximilian and Bayer, Justin and Ludersdorfer, Marvin and van der Smagt, Patrick},
  journal={arXiv preprint arXiv:1602.07109},
  year={2016}
}
@inproceedings{suh2016echo,
  title={Echo-state conditional variational autoencoder for anomaly detection},
  author={Suh, Suwon and Chae, Daniel H and Kang, Hyon-Goo and Choi, Seungjin},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={1015--1022},
  year={2016},
  organization={IEEE}
}

@article{an2015variational,
  title={Variational autoencoder based anomaly detection using reconstruction probability},
  author={An, Jinwon and Cho, Sungzoon},
  journal={Special Lecture on IE},
  volume={2},
  pages={1--18},
  year={2015}
}

@inproceedings{kanarachos2015anomaly,
  title={Anomaly detection in time series data using a combination of wavelets, neural networks and Hilbert transform.},
  author={Kanarachos, S and Mathew, J and Chroneos, A and Fitzpatrick, M},
  booktitle={IISA},
  pages={1--6},
  year={2015}
}
@inproceedings{de2017learning,
  title={Learning of binocular fixations using anomaly detection with deep reinforcement learning},
  author={de La Bourdonnaye, Fran{\c{c}}ois and Teuli{\`e}re, C{\'e}line and Chateau, Thierry and Triesch, Jochen},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={760--767},
  year={2017},
  organization={IEEE}
}

@article{kim2015deep,
  title={Deep learning of support vector machines with class probability output networks},
  author={Kim, Sangwook and Yu, Zhibin and Kil, Rhee Man and Lee, Minho},
  journal={Neural Networks},
  volume={64},
  pages={19--28},
  year={2015},
  publisher={Elsevier}
}
@inproceedings{ruchansky2017csi,
  title={Csi: A hybrid deep model for fake news detection},
  author={Ruchansky, Natali and Seo, Sungyong and Liu, Yan},
  booktitle={Proceedings of the 2017 ACM on Conference on Information and Knowledge Management},
  pages={797--806},
  year={2017},
  organization={ACM}
}
@inproceedings{araya2016collective,
  title={Collective contextual anomaly detection framework for smart buildings},
  author={Araya, Daniel B and Grolinger, Katarina and ElYamany, Hany F and Capretz, Miriam AM and Bitsuamlak, G},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={511--518},
  year={2016},
  organization={IEEE}
}

@inproceedings{bontemps2016collective,
  title={Collective anomaly detection based on long short-term memory recurrent neural networks},
  author={Bontemps, Lo{\"\i}c and McDermott, James and Le-Khac, Nhien-An and others},
  booktitle={International Conference on Future Data and Security Engineering},
  pages={141--152},
  year={2016},
  organization={Springer}
}

@article{roshan2016online,
  title={An Online Anomaly-Detection Neural Networks-based Clustering for Adaptive Intrusion Detection Systems},
  author={Roshan Kokabha, Setareh and others},
  year={2016}
}

@inproceedings{yuan2017deep,
  title={A deep learning enabled subspace spectral ensemble clustering approach for web anomaly detection},
  author={Yuan, Guiqin and Li, Bo and Yao, Yiyang and Zhang, Simin},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={3896--3903},
  year={2017},
  organization={IEEE}
}

@article{rlanomaly,
  title={Towards Experienced Anomaly Detector through Reinforcement Learning},
  author={Chengqiang Huang, Yulei Wu, Yuan Zuo, Ke Pei, Geyong Min},
  journal={The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18)},
  year={2016}
}

@article{liou2008modeling,
  title={Modeling word perception using the Elman network},
  author={Liou, Cheng-Yuan and Huang, Jau-Chi and Yang, Wen-Chie},
  journal={Neurocomputing},
  volume={71},
  number={16-18},
  pages={3150--3157},
  year={2008},
  publisher={Elsevier}
}

@article{liou2014autoencoder,
  title={Autoencoder for words},
  author={Liou, Cheng-Yuan and Cheng, Wei-Chen and Liou, Jiun-Wei and Liou, Daw-Ran},
  journal={Neurocomputing},
  volume={139},
  pages={84--96},
  year={2014},
  publisher={Elsevier}
}

@article{pearson1901liii,
  title={LIII. On lines and planes of closest fit to systems of points in space},
  author={Pearson, Karl},
  journal={The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science},
  volume={2},
  number={11},
  pages={559--572},
  year={1901},
  publisher={Taylor \& Francis}
}

@inproceedings{ruchansky2017csi,
  title={Csi: A hybrid deep model for fake news detection},
  author={Ruchansky, Natali and Seo, Sungyong and Liu, Yan},
  booktitle={Proceedings of the 2017 ACM on Conference on Information and Knowledge Management},
  pages={797--806},
  year={2017},
  organization={ACM}
}

@inproceedings{kira1992feature,
  title={The feature selection problem: Traditional methods and a new algorithm},
  author={Kira, Kenji and Rendell, Larry A},
  booktitle={Aaai},
  volume={2},
  pages={129--134},
  year={1992}
}

@inproceedings{ho1995random,
  title={Random decision forests},
  author={Ho, Tin Kam},
  booktitle={Document analysis and recognition, 1995., proceedings of the third international conference on},
  volume={1},
  pages={278--282},
  year={1995},
  organization={IEEE}
}

@article{altman1992introduction,
  title={An introduction to kernel and nearest-neighbor nonparametric regression},
  author={Altman, Naomi S},
  journal={The American Statistician},
  volume={46},
  number={3},
  pages={175--185},
  year={1992},
  publisher={Taylor \& Francis Group}
}

@article{cortes1995support,
  title={Support-vector networks},
  author={Cortes, Corinna and Vapnik, Vladimir},
  journal={Machine learning},
  volume={20},
  number={3},
  pages={273--297},
  year={1995},
  publisher={Springer}
}

@article{scholkopf2002support,
  title={Support vector machines, regularization, optimization, and beyond},
  author={Sch{\"o}lkopf, Bernhard and Smola, Alexander J},
  journal={Learning with Kernels},
  year={2002}
}


@article{dilokthanakul2016deep,
  title={Deep unsupervised clustering with gaussian mixture variational autoencoders},
  author={Dilokthanakul, Nat and Mediano, Pedro AM and Garnelo, Marta and Lee, Matthew CH and Salimbeni, Hugh and Arulkumaran, Kai and Shanahan, Murray},
  journal={arXiv preprint arXiv:1611.02648},
  year={2018}
}

@inproceedings{mani2018scalable,
  title={Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems},
  author={Mani, Ganapathy and Bhargava, Bharat and Kobes, Jason},
  booktitle={2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering (AIKE)},
  pages={146--151},
  year={2018},
  organization={IEEE}
}


@inproceedings{wang2016learning,
  title={Learning a task-specific deep architecture for clustering},
  author={Wang, Zhangyang and Chang, Shiyu and Zhou, Jiayu and Wang, Meng and Huang, Thomas S},
  booktitle={Proceedings of the 2016 SIAM International Conference on Data Mining},
  pages={369--377},
  year={2016},
  organization={SIAM}
}

@article{sreekanth2010generalized,
  title={Generalized RBF feature maps for efficient detection},
  author={Sreekanth, V and Vedaldi, Andrea and Zisserman, Andrew and Jawahar, C},
  year={2010}
}

@inproceedings{guo2017deep,
  title={Deep clustering with convolutional autoencoders},
  author={Guo, Xifeng and Liu, Xinwang and Zhu, En and Yin, Jianping},
  booktitle={International Conference on Neural Information Processing},
  pages={373--382},
  year={2017},
  organization={Springer}
}

@inproceedings{guo2017improved,
  title={Improved deep embedded clustering with local structure preservation},
  author={Guo, Xifeng and Gao, Long and Liu, Xinwang and Yin, Jianping},
  booktitle={International Joint Conference on Artificial Intelligence (IJCAI-17)},
  pages={1753--1759},
  year={2017}
}

@inproceedings{xie2016unsupervised,
  title={Unsupervised deep embedding for clustering analysis},
  author={Xie, Junyuan and Girshick, Ross and Farhadi, Ali},
  booktitle={International conference on machine learning},
  pages={478--487},
  year={2016}
}

@article{aytekin2018clustering,
  title={Clustering and Unsupervised Anomaly Detection with L2 Normalized Deep Auto-Encoder Representations},
  author={Aytekin, Caglar and Ni, Xingyang and Cricri, Francesco and Aksu, Emre},
  journal={arXiv preprint arXiv:1802.00187},
  year={2018}
}

@article{mikolov2013efficient,
  title={Efficient estimation of word representations in vector space},
  author={Mikolov, Tomas and Chen, Kai and Corrado, Greg and Dean, Jeffrey},
  journal={arXiv preprint arXiv:1301.3781},
  year={2013}
}

@inproceedings{ester1996density,
  title={A density-based algorithm for discovering clusters in large spatial databases with noise.},
  author={Ester, Martin and Kriegel, Hans-Peter and Sander, J{\"o}rg and Xu, Xiaowei and others},
  booktitle={Kdd},
  volume={96},
  number={34},
  pages={226--231},
  year={1996}
}

@inproceedings{chen2017outlier,
  title={Outlier detection with autoencoder ensembles},
  author={Chen, Jinghui and Sathe, Saket and Aggarwal, Charu and Turaga, Deepak},
  booktitle={Proceedings of the 2017 SIAM International Conference on Data Mining},
  pages={90--98},
  year={2017},
  organization={SIAM}
}
@article{peharz2018probabilistic,
  title={Probabilistic Deep Learning using Random Sum-Product Networks},
  author={Peharz, Robert and Vergari, Antonio and Stelzner, Karl and Molina, Alejandro and Trapp, Martin and Kersting, Kristian and Ghahramani, Zoubin},
  journal={arXiv preprint arXiv:1806.01910},
  year={2018}
}
@inproceedings{bakarov2018anomaly,
  title={Anomaly Detection for Short Texts: Identifying Whether Your Chatbot Should Switch from Goal-Oriented Conversation to Chit-Chatting},
  author={Bakarov, Amir and Yadrintsev, Vasiliy and Sochenkov, Ilya},
  booktitle={International Conference on Digital Transformation and Global Society},
  pages={289--298},
  year={2018},
  organization={Springer}
}
@inproceedings{bertero2017experience,
  title={Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection},
  author={Bertero, Christophe and Roy, Matthieu and Sauvanaud, Carla and Tr{\'e}dan, Gilles},
  booktitle={Software Reliability Engineering (ISSRE), 2017 IEEE 28th International Symposium on},
  pages={351--360},
  year={2017},
  organization={IEEE}
}
@article{kingma2013auto,
  title={Auto-encoding variational bayes},
  author={Kingma, Diederik P and Welling, Max},
  journal={arXiv preprint arXiv:1312.6114},
  year={2013}
}
@incollection{NIPS2014_5423,
title = {Generative Adversarial Nets},
author = {Goodfellow, Ian and Pouget-Abadie, Jean and Mirza, Mehdi and Xu, Bing and Warde-Farley, David and Ozair, Sherjil and Courville, Aaron and Bengio, Yoshua},
booktitle = {Advances in Neural Information Processing Systems 27},
editor = {Z. Ghahramani and M. Welling and C. Cortes and N. D. Lawrence and K. Q. Weinberger},
pages = {2672--2680},
year = {2014},
publisher = {Curran Associates, Inc.},
url = {http://papers.nips.cc/paper/5423-generative-adversarial-nets.pdf}
}
@article{makhzani2015adversarial,
  title={Adversarial autoencoders},
  author={Makhzani, Alireza and Shlens, Jonathon and Jaitly, Navdeep and Goodfellow, Ian and Frey, Brendan},
  journal={arXiv preprint arXiv:1511.05644},
  year={2015}
}
@article{bamler2017dynamic,
  title={Dynamic word embeddings},
  author={Bamler, Robert and Mandt, Stephan},
  journal={arXiv preprint arXiv:1702.08359},
  year={2017}
}

@inproceedings{schnabel2015evaluation,
  title={Evaluation methods for unsupervised word embeddings},
  author={Schnabel, Tobias and Labutov, Igor and Mimno, David and Joachims, Thorsten},
  booktitle={Proceedings of the 2015 Conference on Empirical Methods in Natural Language Processing},
  pages={298--307},
  year={2015}
}
@article{altszyler2016comparative,
  title={Comparative study of LSA vs Word2vec embeddings in small corpora: a case study in dreams database},
  author={Altszyler, Edgar and Sigman, Mariano and Ribeiro, Sidarta and Slezak, Diego Fern{\'a}ndez},
  journal={arXiv preprint arXiv:1610.01520},
  year={2016}
}
@article{naili2017comparative,
  title={Comparative study of word embedding methods in topic segmentation},
  author={Naili, Marwa and Chaibi, Anja Habacha and Ghezala, Henda Hajjami Ben},
  journal={Procedia Computer Science},
  volume={112},
  pages={340--349},
  year={2017},
  publisher={Elsevier}
}
@mastersthesis{eide2018applying,
  title={Applying generative adversarial networks for anomaly detection in hyperspectral remote sensing imagery},
  author={Eide, Aksel Wilhelm Wold},
  year={2018},
  school={NTNU}
}
@article{vskvara2018generative,
  title={Are generative deep models for novelty detection truly better?},
  author={{\v{S}}kv{\'a}ra, V{\'\i}t and Pevn{\`y}, Tom{\'a}{\v{s}} and {\v{S}}m{\'\i}dl, V{\'a}clav},
  journal={arXiv preprint arXiv:1807.05027},
  year={2018}
}
@inproceedings{ravanbakhsh2017abnormal,
  title={Abnormal event detection in videos using generative adversarial nets},
  author={Ravanbakhsh, Mahdyar and Nabi, Moin and Sangineto, Enver and Marcenaro, Lucio and Regazzoni, Carlo and Sebe, Nicu},
  booktitle={Image Processing (ICIP), 2017 IEEE International Conference on},
  pages={1577--1581},
  year={2017},
  organization={IEEE}
}

@article{deecke2018anomaly,
  title={Anomaly Detection with Generative Adversarial Networks},
  author={Deecke, Lucas and Vandermeulen, Robert and Ruff, Lukas and Mandt, Stephan and Kloft, Marius},
  year={2018}
}

@inproceedings{schlegl2017unsupervised,
  title={Unsupervised anomaly detection with generative adversarial networks to guide marker discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@article{li2018anomaly,
  title={Anomaly Detection with Generative Adversarial Networks for Multivariate Time Series},
  author={Li, Dan and Chen, Dacheng and Goh, Jonathan and Ng, See-kiong},
  journal={arXiv preprint arXiv:1809.04758},
  year={2018}
}
@article{rezaeinia2017improving,
  title={Improving the Accuracy of Pre-trained Word Embeddings for Sentiment Analysis},
  author={Rezaeinia, Seyed Mahdi and Ghodsi, Ali and Rahmani, Rouhollah},
  journal={arXiv preprint arXiv:1711.08609},
  year={2017}
}
@inproceedings{goodfellow2014generative,
  title={Generative adversarial nets},
  author={Goodfellow, Ian and Pouget-Abadie, Jean and Mirza, Mehdi and Xu, Bing and Warde-Farley, David and Ozair, Sherjil and Courville, Aaron and Bengio, Yoshua},
  booktitle={Advances in neural information processing systems},
  pages={2672--2680},
  year={2014}
}
@article{mikolov2013efficient,
  title={Efficient estimation of word representations in vector space},
  author={Mikolov, Tomas and Chen, Kai and Corrado, Greg and Dean, Jeffrey},
  journal={arXiv preprint arXiv:1301.3781},
  year={2013}
}

@inproceedings{poon2011sum,
  title={Sum-product networks: A new deep architecture},
  author={Poon, Hoifung and Domingos, Pedro},
  booktitle={Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on},
  pages={689--690},
  year={2011},
  organization={IEEE}
}




@article{dereszynski2011spatiotemporal,
  title={Spatiotemporal models for data-anomaly detection in dynamic environmental monitoring campaigns},
  author={Dereszynski, Ethan W and Dietterich, Thomas G},
  journal={ACM Transactions on Sensor Networks (TOSN)},
  volume={8},
  number={1},
  pages={3},
  year={2011},
  publisher={ACM}
}

@misc{szeker2014spatio,
  title={Spatio-temporal outlier detection in streaming trajectory data},
  author={SZEK{\'E}R, M{\'A}T{\'E}},
  year={2014}
}
@article{zhang2018detecting,
  title={Detecting Urban Anomalies Using Multiple Spatio-Temporal Data Sources},
  author={Zhang, Huichu and Zheng, Yu and Yu, Yong},
  journal={Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies},
  volume={2},
  number={1},
  pages={54},
  year={2018},
  publisher={ACM}
}
@article{lee2018stan,
  title={STAN: Spatio-Temporal Adversarial Networks for Abnormal Event Detection},
  author={Lee, Sangmin and Kim, Hak Gu and Ro, Yong Man},
  journal={arXiv preprint arXiv:1804.08381},
  year={2018}
}

@article{nie2018spatio,
  title={Spatio-Temporal Network Traffic Estimation and Anomaly Detection Based on Convolutional Neural Network in Vehicular Ad-Hoc Networks},
  author={Nie, Laisen and Li, Yongkang and Kong, Xiangjie},
  journal={IEEE Access},
  volume={6},
  pages={40168--40176},
  year={2018},
  publisher={IEEE}
}

@article{werbos1990backpropagation,
  title={Backpropagation through time: what it does and how to do it},
  author={Werbos, Paul J},
  journal={Proceedings of the IEEE},
  volume={78},
  number={10},
  pages={1550--1560},
  year={1990},
  publisher={IEEE}
}

@inproceedings{wulsin2010semi,
  title={Semi-supervised anomaly detection for EEG waveforms using deep belief nets},
  author={Wulsin, Drausin and Blanco, Justin and Mani, Ram and Litt, Brian},
  booktitle={Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on},
  pages={436--441},
  year={2010},
  organization={IEEE}
}

@article{lecun2015deep,
  title={Deep learning},
  author={LeCun, Yann and Bengio, Yoshua and Hinton, Geoffrey},
  journal={nature},
  volume={521},
  number={7553},
  pages={436},
  year={2015},
  publisher={Nature Publishing Group}
}

@article{bengio2009learning,
  title={Learning deep architectures for AI},
  author={Bengio, Yoshua and others},
  journal={Foundations and trends{\textregistered} in Machine Learning},
  volume={2},
  number={1},
  pages={1--127},
  year={2009},
  publisher={Now Publishers, Inc.}
}

@article{schmidhuber2015deep,
  title={Deep learning in neural networks: An overview},
  author={Schmidhuber, J{\"u}rgen},
  journal={Neural networks},
  volume={61},
  pages={85--117},
  year={2015},
  publisher={Elsevier}
}

@inproceedings{kwon2018empirical,
  title={An Empirical Study on Network Anomaly Detection Using Convolutional Neural Networks},
  author={Kwon, Donghwoon and Natarajan, Kathiravan and Suh, Sang C and Kim, Hyunjoo and Kim, Jinoh},
  booktitle={2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)},
  pages={1595--1598},
  year={2018},
  organization={IEEE}
}
@article{kim2014convolutional,
  title={Convolutional neural networks for sentence classification},
  author={Kim, Yoon},
  journal={arXiv preprint arXiv:1408.5882},
  year={2014}
}
@inproceedings{gorokhov2017convolutional,
  title={Convolutional Neural Networks for Unsupervised Anomaly Detection in Text Data},
  author={Gorokhov, Oleg and Petrovskiy, Mikhail and Mashechkin, Igor},
  booktitle={International Conference on Intelligent Data Engineering and Automated Learning},
  pages={500--507},
  year={2017},
  organization={Springer}
}

@article{ergen2017unsupervised,
  title={Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks},
  author={Ergen, Tolga and Mirza, Ali Hassan and Kozat, Suleyman Serdar},
  journal={arXiv preprint arXiv:1710.09207},
  year={2017}
}
@techreport{williams1989complexity,
  title={Complexity of exact gradient computation algorithms for recurrent neural networks},
  author={Williams, Ronald J},
  year={1989},
  institution={Technical Report Technical Report NU-CCS-89-27, Boston: Northeastern~…}
}

@article{haque2018image,
  title={Image denoising and restoration with CNN-LSTM Encoder Decoder with Direct Attention},
  author={Haque, Kazi Nazmul and Yousuf, Mohammad Abu and Rana, Rajib},
  journal={arXiv preprint arXiv:1801.05141},
  year={2018}
}

@inproceedings{masci2011stacked,
  title={Stacked convolutional auto-encoders for hierarchical feature extraction},
  author={Masci, Jonathan and Meier, Ueli and Cire{\c{s}}an, Dan and Schmidhuber, J{\"u}rgen},
  booktitle={International Conference on Artificial Neural Networks},
  pages={52--59},
  year={2011},
  organization={Springer}
}


@inproceedings{masci2011stacked,
  title={Stacked convolutional auto-encoders for hierarchical feature extraction},
  author={Masci, Jonathan and Meier, Ueli and Cire{\c{s}}an, Dan and Schmidhuber, J{\"u}rgen},
  booktitle={International Conference on Artificial Neural Networks},
  pages={52--59},
  year={2011},
  organization={Springer}
}

@inproceedings{krizhevsky2012imagenet,
  title={Imagenet classification with deep convolutional neural networks},
  author={Krizhevsky, Alex and Sutskever, Ilya and Hinton, Geoffrey E},
  booktitle={Advances in neural information processing systems},
  pages={1097--1105},
  year={2012}
}
@article{cho2014learning,
  title={Learning phrase representations using RNN encoder-decoder for statistical machine translation},
  author={Cho, Kyunghyun and Van Merri{\"e}nboer, Bart and Gulcehre, Caglar and Bahdanau, Dzmitry and Bougares, Fethi and Schwenk, Holger and Bengio, Yoshua},
  journal={arXiv preprint arXiv:1406.1078},
  year={2014}
}

@article{vincent2010stacked,
  title={Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion},
  author={Vincent, Pascal and Larochelle, Hugo and Lajoie, Isabelle and Bengio, Yoshua and Manzagol, Pierre-Antoine},
  journal={Journal of machine learning research},
  volume={11},
  number={Dec},
  pages={3371--3408},
  year={2010}
}

@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}
@inproceedings{zhou2017anomaly,
  title={Anomaly detection with robust deep autoencoders},
  author={Zhou, Chong and Paffenroth, Randy C},
  booktitle={Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  pages={665--674},
  year={2017},
  organization={ACM}
}


@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}

@inproceedings{marchi2015non,
  title={Non-linear prediction with LSTM recurrent neural networks for acoustic novelty detection},
  author={Marchi, Erik and Vesperini, Fabio and Weninger, Felix and Eyben, Florian and Squartini, Stefano and Schuller, Bj{\"o}rn},
  booktitle={Neural Networks (IJCNN), 2015 International Joint Conference on},
  pages={1--7},
  year={2015},
  organization={IEEE}
}

@inproceedings{marchi2015novel,
  title={A novel approach for automatic acoustic novelty detection using a denoising autoencoder with bidirectional LSTM neural networks},
  author={Marchi, Erik and Vesperini, Fabio and Eyben, Florian and Squartini, Stefano and Schuller, Bj{\"o}rn},
  booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on},
  pages={1996--2000},
  year={2015},
  organization={IEEE}
}


@inproceedings{malhotra2015long,
  title={Long short term memory networks for anomaly detection in time series},
  author={Malhotra, Pankaj and Vig, Lovekesh and Shroff, Gautam and Agarwal, Puneet},
  booktitle={Proceedings},
  pages={89},
  year={2015},
  organization={Presses universitaires de Louvain}
}

@inproceedings{das2018desh,
  title={Desh: deep learning for system health prediction of lead times to failure in HPC},
  author={Das, Anwesha and Mueller, Frank and Siegel, Charles and Vishnu, Abhinav},
  booktitle={Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing},
  pages={40--51},
  year={2018},
  organization={ACM}
}

@article{meng2018device,
  title={Device-agnostic log anomaly classification with partial labels},
  author={Meng, Weibin and Liu, Ying and Zhang, Shenglin and Pei, Dan and Dong, Hui and Song, Lei and Luo, Xulong},
  journal={Quality of Service (IWQoS)},
  pages={1--10},
  year={2018}
}


@article{brown2018recurrent,
  title={Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection},
  author={Brown, Andy and Tuor, Aaron and Hutchinson, Brian and Nichols, Nicole},
  journal={arXiv preprint arXiv:1803.04967},
  year={2018}
}



@article{wei2017new,
  title={Hybrid Models for anomaly detection in Social networks},
  author={Wei},
  journal={arXiv preprint arXiv:1709.08716},
  year={2017}
}
@article{yang2018anomaly,
  title={Anomaly Detection in Moving Crowds through Spatiotemporal Autoencoding and Additional Attention},
  author={Yang, Biao and Cao, Jinmeng and Ni, Rongrong and Zou, Ling},
  journal={Advances in Multimedia},
  volume={2018},
  year={2018},
  publisher={Hindawi}
}

@article{grover2018anomaly,
  title={Anomaly Detection for Application Log Data},
  author={Grover, Aarish},
  year={2018}
}


@phdthesis{memon2008log,
  title={Log file categorization and anomaly analysis using grammar inference},
  author={Memon, Ahmed Umar},
  year={2008}
}

@article{li2017detecting,
  title={Detecting event-related changes in organizational networks using optimized neural network models},
  author={Li, Ze and Sun, Duoyong and Zhu, Renqi and Lin, Zihan},
  journal={PloS one},
  volume={12},
  number={11},
  pages={e0188733},
  year={2017},
  publisher={Public Library of Science}
}

@article{sun2018detecting,
  title={Detecting anomalous emotion through big data from social networks based on a deep learning method},
  author={Sun, Xiao and Zhang, Chen and Ding, Shuai and Quan, Changqin},
  journal={Multimedia Tools and Applications},
  pages={1--22},
  year={2018},
  publisher={Springer}
}

@inproceedings{liu2017social,
  title={Social media anomaly detection: Challenges and solutions},
  author={Liu, Yan and Chawla, Sanjay},
  booktitle={Proceedings of the Tenth ACM International Conference on Web Search and Data Mining},
  pages={817--818},
  year={2017},
  organization={ACM}
}

@article{yu2016survey,
  title={A survey on social media anomaly detection},
  author={Yu, Rose and Qiu, Huida and Wen, Zhen and Lin, ChingYung and Liu, Yan},
  journal={ACM SIGKDD Explorations Newsletter},
  volume={18},
  number={1},
  pages={1--14},
  year={2016},
  publisher={ACM}
}

@article{naseer2018enhanced,
  title={Enhanced Network Anomaly Detection Based on Deep Neural Networks},
  author={Naseer, Sheraz and Saleem, Yasir and Khalid, Shehzad and Bashir, Muhammad Khawar and Han, Jihun and Iqbal, Muhammad Munwar and Han, Kijun},
  journal={IEEE Access},
  volume={6},
  pages={48231--48246},
  year={2018},
  publisher={IEEE}
}


@article{cao2018automatic,
  title={Automatic Rumor Detection on Microblogs: A Survey},
  author={Cao, Juan and Guo, Junbo and Li, Xirong and Jin, Zhiwei and Guo, Han and Li, Jintao},
  journal={arXiv preprint arXiv:1807.03505},
  year={2018}
}

@article{sun2018detecting,
  title={Detecting anomalous emotion through big data from social networks based on a deep learning method},
  author={Sun, Xiao and Zhang, Chen and Ding, Shuai and Quan, Changqin},
  journal={Multimedia Tools and Applications},
  pages={1--22},
  year={2018},
  publisher={Springer}
}


@article{yu2017network,
  title={Network intrusion detection through stacking dilated convolutional autoencoders},
  author={Yu, Yang and Long, Jun and Cai, Zhiping},
  journal={Security and Communication Networks},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{chen2018henet,
  title={Henet: A deep learning approach on intel{\textregistered} processor trace for effective exploit detection},
  author={Chen, Li and Sultana, Salmin and Sahita, Ravi},
  booktitle={2018 IEEE Security and Privacy Workshops (SPW)},
  pages={109--115},
  year={2018},
  organization={IEEE}
}

@article{kim2016lstm,
  title={LSTM-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems},
  author={Kim, Gyuwan and Yi, Hayoon and Lee, Jangho and Paek, Yunheung and Yoon, Sungroh},
  journal={arXiv preprint arXiv:1611.01726},
  year={2016}
}

@article{vigna2005host,
  title={Host-based intrusion detection},
  author={Vigna, Giovanna and Kruegel, Christopher},
  year={2005},
  publisher={Citeseer}
}
@Book{Harel79,
  author =       "David Harel",
  year =         "1979",
  title =        "First-Order Dynamic Logic",
  series =       "Lecture Notes in Computer Science",
  volume =       "68",
  address =      "New York, NY",
  publisher =    "Springer-Verlag",
  doi =          "10.1007/3-540-09237-4",
  url =          "http://dx.doi.org/10.1007/3-540-09237-4",
  editor =       "",
  number =       "",
  month =        "",
  note =         "",
}


@Inbook{Editor00,
  author =       "",
  editor =       "Ian Editor",
  title =        "The title of book one",
  subtitle =     "The book subtitle",
  series =       "The name of the series one",
  year =         "2007",
  volume =       "9",
  address =      "Chicago",
  edition =      "1st.",
  publisher =    "University of Chicago Press",
  doi =          "10.1007/3-540-09237-4",
  url =          "http://dx.doi.org/10.1007/3-540-09456-9",
  chapter =      "",
  pages =        "",
  number =       "",
  type =         "",
  month =        "",
  note =         "",
}

%
@InBook{Editor00a,
  author =       "",
  editor =       "Ian Editor",
  title =        "The title of book two",
  subtitle =     "The book subtitle",
  series =       "The name of the series two",
  year =         "2008",
  address =      "Chicago",
  edition =      "2nd.",
  publisher =    "University of Chicago Press",
  doi =          "10.1007/3-540-09237-4",
  url =          "http://dx.doi.org/10.1007/3-540-09456-9",
  volume =       "",
  chapter =      "100",
  pages =        "",
  number =       "",
  type =         "",
  month =        "",
  note =         "",
}


% incollection (has an editor, title, and possibly a booktitle)
@Incollection{Spector90,
  author =       "Asad Z. Spector",
  title =        "Achieving application requirements",
  booktitle =    "Distributed Systems",
  publisher =    "ACM Press",
  address =      "New York, NY",
  year =         "1990",
  edition =      "2nd.",
  chapter =      "",
  editor =       "Sape Mullender",
  pages =        "19--33",
  doi =          "10.1145/90417.90738",
  url =          "http://doi.acm.org/10.1145/90417.90738",
  volume =       "",
  number =       "",
  series =       "",
  type =         "",
  month =        "",
  note =         "",
}


% incollection (has an editor, title, and possibly a booktitle)
@Incollection{Douglass98,
  author =       "Bruce P. Douglass and David Harel and Mark B. Trakhtenbrot",
  title =        "Statecarts in use: structured analysis and object-orientation",
  series =       "Lecture Notes in Computer Science",
  booktitle =    "Lectures on Embedded Systems",
  publisher =    "Springer-Verlag",
  address =      "London",
  volume =       "1494",
  year =         "1998",
  chapter =      "",
  editor =       "Grzegorz Rozenberg and Frits W. Vaandrager",
  pages =        "368--394",
  doi =          "10.1007/3-540-65193-4_29",
  url =          "http://dx.doi.org/10.1007/3-540-65193-4_29",
  edition =      "",
  number =       "",
  type =         "",
  month =        "",
  note =         "",
}




@Book{Knuth97,
  author =       "Donald E. Knuth",
  title =        "The Art of Computer Programming, Vol. 1: Fundamental Algorithms (3rd. ed.)",
  publisher =    "Addison Wesley Longman Publishing Co., Inc.",
  year =         "1997",
  address =      "",
  edition =      "",
  editor =       "",
  volume =       "",
  number =       "",
  series =       "",
  month =        "",
  note =         "",
}


@Book{Knuth98,
  author =       "Donald E. Knuth",
  year =         "1998",
  title =        "The Art of Computer Programming",
  series =       "Fundamental Algorithms",
  volume =       "1",
  edition =      "3rd",
  address =      "",
  publisher =    "Addison Wesley Longman Publishing Co., Inc.",
  doi =          "",
  url =          "",
  editor =       "",
  number =       "",
  month =        "",
  note =         "(book)",
}

%Inbook{Knuth97,
%  author =       "Donald E. Knuth",
%  title =        "The Art of Computer Programming",
%  booktitle =    "the booktitle",
%  edition =      "3",
%  volume =       "1",
%  year =         "1997",
%  publisher =    "Addison Wesley Longman Publishing Co., Inc.",
%  editor =       "",
%  number =       "",
%  series =       "Fundamental Algorithms",
%  type =         "",
%  chapter =      "",
%  pages =        "",
%  address =      "",
%  month =        "",
%  note =         "(inbook)",
%}

%INBOOK{DK:73-inbook-full,
%   author = "Donald E. Knuth",
%   title = "Fundamental Algorithms (inbook w series)",
%   volume = 1,
%   series = "The Art of Computer Programming",
%   publisher = "Addison-Wesley",
%   address = "Reading, Massachusetts",
%   edition = "Second",
%   month = "10~" # jan,
%   year = "1973",
%   type = "Section",
%   chapter = "1.2",
%   pages = "10--119",
%   note = "Full INBOOK entry (w series)",
%}

%INcollection{DK:74-incoll,
%   author = "Donald E. Knuth",
%   title = "Fundamental Algorithms (incoll)",
%   volume = 1,
%   booktitle = "The Art of Computer Programming",
%   publisher = "Addison-Wesley",
%   address = "Reading, Massachusetts",
%   month = "10~" # jan,
%   year = "1974",
%   pages = "10--119",
%   editor = "Bernard Rous",
%   note = "This is a full incoll entry with an editor",
%}

%INcollection{DK:75-incollws,
%   author = "Donald E. Knuth",
%   title = "Fundamental Algorithms (incoll w series)",
%   volume = 1,
%   booktitle = "The Art of Computer Programming",
%   series = "The Art of Computer Programming",
%   publisher = "Addison-Wesley",
%   address = "Reading, Massachusetts",
%   month = "10~" # jan,
%   year = "1975",
%   pages = "10--119",
%   editor = "Bernard Rous",
%   note = "This is a full incoll entry with an editor and series",
%}


@incollection{GM05,
Author= "Dan Geiger and Christopher Meek",
Title= "Structured Variational Inference Procedures and their Realizations (as incol)",
Year= 2005,
Booktitle="Proceedings of Tenth International Workshop on Artificial Intelligence and Statistics, {\rm The Barbados}",
Publisher="The Society for Artificial Intelligence and Statistics",
Month= jan,
Editors= "Z. Ghahramani and R. Cowell"
}

@Inproceedings{Smith10,
  author =       "Stan W. Smith",
  title =        "An experiment in bibliographic mark-up: Parsing metadata for XML export",
  booktitle =    "Proceedings of the 3rd. annual workshop on Librarians and Computers",
  series =       "LAC '10",
  editor =       "Reginald N. Smythe and Alexander Noble",
  volume =       "3",
  year =         "2010",
  publisher =    "Paparazzi Press",
  address =      "Milan Italy",
  pages =        "422--431",
  doi =          "99.9999/woot07-S422",
  url =          "http://dx.doi.org/99.0000/woot07-S422",
  number =       "",
  month =        "",
  organization = "",
  note =         "",
}

@Inproceedings{VanGundy07,
  author =       "Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna",
  year =         "2007",
  title =        "Catch me, if you can: Evading network signatures with web-based polymorphic worms",
  booktitle =    "Proceedings of the first USENIX workshop on Offensive Technologies",
  series =       "WOOT '07",
  publisher =    "USENIX Association",
  address =      "Berkley, CA",
  articleno =    "7",
  numpages =     "9",
  editor =       "",
  volume =       "",
  number =       "",
  pages =        "",
  month =        "",
  organization = "",
  note =         "",
}

@Inproceedings{VanGundy08,
  author =       "Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna",
  year =         "2008",
  title =        "Catch me, if you can: Evading network signatures with web-based polymorphic worms",
  booktitle =    "Proceedings of the first USENIX workshop on Offensive Technologies",
  series =       "WOOT '08",
  publisher =    "USENIX Association",
  address =      "Berkley, CA",
  articleno =    "7",
  numpages =     "2",
  editor =       "",
  volume =       "",
  number =       "",
  pages =        "99-100",
  month =        "",
  organization = "",
  note =         "",
}

@Inproceedings{VanGundy09,
  author =       "Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna",
  year =         "2009",
  title =        "Catch me, if you can: Evading network signatures with web-based polymorphic worms",
  booktitle =    "Proceedings of the first USENIX workshop on Offensive Technologies",
  series =       "WOOT '09",
  publisher =    "USENIX Association",
  address =      "Berkley, CA",
  articleno =    "",
  numpages =     "",
  editor =       "",
  volume =       "",
  number =       "",
  pages =        "90--100",
  month =        "",
  organization = "",
  note =         "",
}

@Inproceedings{Andler79,
  author =       "Sten Andler",
  title =        "Predicate Path expressions",
  booktitle =    "Proceedings of the 6th. ACM SIGACT-SIGPLAN symposium on Principles of Programming Languages",
  series =       "POPL '79",
  year =         "1979",
  publisher =    "ACM Press",
  address =      "New York, NY",
  pages =        "226--236",
  doi =          "10.1145/567752.567774",
  url =          "http://doi.acm.org/10.1145/567752.567774",
  editor =       "",
  volume =       "",
  number =       "",
  month =        "",
  organization = "",
  note =         "",
}

@Techreport{Harel78,
  author =       "David Harel",
  year =         "1978",
  title =        "LOGICS of Programs: AXIOMATICS and DESCRIPTIVE POWER",
  institution =  "Massachusetts Institute of Technology",
  type =         "MIT Research Lab Technical Report",
  number =       "TR-200",
  address =      "Cambridge, MA",
  month =        "",
  note =         "",
}

@MASTERSTHESIS{anisi03,
author = {David A. Anisi},
title = {Optimal Motion Control of a Ground Vehicle},
school = {Royal Institute of Technology (KTH), Stockholm, Sweden},
intitution = {FOI-R-0961-SE, Swedish Defence Research Agency (FOI)},
year = {2003},
}


@Phdthesis{Clarkson85,
  author =       "Kenneth L. Clarkson",
  year =         "1985",
  title =        "Algorithms for Closest-Point Problems (Computational Geometry)",
  school =       "Stanford University",
  address =      "Palo Alto, CA",
  note =         "UMI Order Number: AAT 8506171",
  type =         "",
  month =        "",
}


@online{Thornburg01,
  author =       "Harry Thornburg",
  year =         "2001",
  title =        "Introduction to Bayesian Statistics",
  url =          "http://ccrma.stanford.edu/~jos/bayes/bayes.html",
  month =        mar,
  lastaccessed = "March 2, 2005",
}


@online{Ablamowicz07,
  author =       "Rafal Ablamowicz and Bertfried Fauser",
  year =         "2007",
  title =        "CLIFFORD: a Maple 11 Package for Clifford Algebra Computations, version 11",
  url =          "http://math.tntech.edu/rafal/cliff11/index.html",
  lastaccessed = "February 28, 2008",
}


@misc{Poker06,
  author =       "Poker-Edge.Com",
  year =         "2006",
  month =        mar,
  title =        "Stats and Analysis",
  lastaccessed = "June 7, 2006",
  url =          "http://www.poker-edge.com/stats.php",
}

@misc{Obama08,
  author        = "Barack Obama",
  year          = "2008",
  title         = "A more perfect union",
  howpublished  = "Video",
  day           = "5",
  url           = "http://video.google.com/videoplay?docid=6528042696351994555",
  month         = mar,
  lastaccessed  = "March 21, 2008",
  note          =  "",
}

@misc{JoeScientist001,
  author =       "Joseph Scientist",
  year =         "2009",
  title =        "The fountain of youth",
  note =         "Patent No. 12345, Filed July 1st., 2008, Issued Aug. 9th., 2009",
  url =          "",
  howpublished = "",
  month =        aug,
  lastaccessed = "",
}


@Inproceedings{Novak03,
  author =       "Dave Novak",
  title =        "Solder man",
  booktitle =    "ACM SIGGRAPH 2003 Video Review on Animation theater Program: Part I - Vol. 145 (July 27--27, 2003)",
  year =         "2003",
  publisher =    "ACM Press",
  address =      "New York, NY",
  pages =        "4",
  month =        "March 21, 2008",
  doi =          "99.9999/woot07-S422",
  url =          "http://video.google.com/videoplay?docid=6528042696351994555",
  note =         "",
  howpublished = "Video",
  editor =       "",
  volume =       "",
  number =       "",
  series =       "",
  organization = "",
}





@article{Lavion2018,
  author =       "Lavion, Didier; et al",
  year =         "2018",
  title =        "PwC's Global Economic Crime and Fraud Survey 2018",
  volume =          "PwC.com",
  url =          "https://www.pwc.com/gx/en/forensics/global-economic-crime-and-fraud-survey-2018.pdf",
}


@article{Lee05,
  author =       "Newton Lee",
  year =         "2005",
  title =        "Interview with Bill Kinder: January 13, 2005",
  journal =      "Comput. Entertain.",
  eid =          "4",
  volume =       "3",
  number =       "1",
  month =        "Jan.-March",
  doi =          "10.1145/1057270.1057278",
  url =          "http://doi.acm.org/10.1145/1057270.1057278",
  howpublished = "Video",
  note =         "",
}

@article{Rous08,
  author =       "Bernard Rous",
  year =         "2008",
  title =        "The Enabling of Digital Libraries",
  journal =      "Digital Libraries",
  volume =       "12",
  number =       "3",
  month =        jul,
  articleno =    "5",
  doi =          "",
  url =          "",
  howpublished = "",
  note =         "To appear",
}

@article{384253,
 author = {Werneck,, Renato and Setubal,, Jo\~{a}o and da Conceic\~{a}o,, Arlindo},
 title = {(old) Finding minimum congestion spanning trees},
 journal = {J. Exp. Algorithmics},
 volume = {5},
 year = {2000},
 issn = {1084-6654},
 pages = {11},
 doi = {http://doi.acm.org/10.1145/351827.384253},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


@article{Werneck:2000:FMC:351827.384253,
 author = {Werneck, Renato and Setubal, Jo\~{a}o and da Conceic\~{a}o, Arlindo},
 title = {(new) Finding minimum congestion spanning trees},
 journal = {J. Exp. Algorithmics},
 volume = {5},
 month = dec,
 year = {2000},
 issn = {1084-6654},
 articleno = {11},
 url = {http://portal.acm.org/citation.cfm?id=351827.384253},
 doi = {10.1145/351827.384253},
 acmid = {384253},
 publisher = {ACM},
 address = {New York, NY, USA},
}

@article{1555162,
 author = {Conti, Mauro and Di Pietro, Roberto and Mancini, Luigi V. and Mei, Alessandro},
 title = {(old) Distributed data source verification in wireless sensor networks},
 journal = {Inf. Fusion},
 volume = {10},
 number = {4},
 year = {2009},
 issn = {1566-2535},
 pages = {342--353},
 doi = {http://dx.doi.org/10.1016/j.inffus.2009.01.002},
 publisher = {Elsevier Science Publishers B. V.},
 address = {Amsterdam, The Netherlands, The Netherlands},
 }

 @article{mahapatra2012contextual,
   title={Contextual anomaly detection in text data},
   author={Mahapatra, Amogh and Srivastava, Nisheeth and Srivastava, Jaideep},
   journal={Algorithms},
   volume={5},
   number={4},
   pages={469--489},
   year={2012},
   publisher={Molecular Diversity Preservation International}
 }

 @inproceedings{du2017deeplog,
   title={Deeplog: Anomaly detection and diagnosis from system logs through deep learning},
   author={Du, Min and Li, Feifei and Zheng, Guineng and Srikumar, Vivek},
   booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
   pages={1285--1298},
   year={2017},
   organization={ACM}
 }

@article{Conti:2009:DDS:1555009.1555162,
 author = {Conti, Mauro and Di Pietro, Roberto and Mancini, Luigi V. and Mei, Alessandro},
 title = {(new) Distributed data source verification in wireless sensor networks},
 journal = {Inf. Fusion},
 volume = {10},
 number = {4},
 month = oct,
 year = {2009},
 issn = {1566-2535},
 pages = {342--353},
 numpages = {12},
 url = {http://portal.acm.org/citation.cfm?id=1555009.1555162},
 doi = {10.1016/j.inffus.2009.01.002},
 acmid = {1555162},
 publisher = {Elsevier Science Publishers B. V.},
 address = {Amsterdam, The Netherlands, The Netherlands},
 keywords = {Clone detection, Distributed protocol, Securing data fusion, Wireless sensor networks},
}

@article{ramotsoela2018survey,
  title={A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study},
  author={Ramotsoela, Daniel and Abu-Mahfouz, Adnan and Hancke, Gerhard},
  journal={Sensors},
  volume={18},
  number={8},
  pages={2491},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{Li:2008:PUC:1358628.1358946,
 author = {Li, Cheng-Lun and Buyuktur, Ayse G. and Hutchful, David K. and Sant, Natasha B. and Nainwal, Satyendra K.},
 title = {Portalis: using competitive online interactions to support aid initiatives for the homeless},
 booktitle = {CHI '08 extended abstracts on Human factors in computing systems},
 year = {2008},
 isbn = {978-1-60558-012-X},
 location = {Florence, Italy},
 pages = {3873--3878},
 numpages = {6},
 url = {http://portal.acm.org/citation.cfm?id=1358628.1358946},
 doi = {10.1145/1358628.1358946},
 acmid = {1358946},
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {cscw, distributed knowledge acquisition, incentive design, online games, recommender systems, reputation systems, user studies, virtual community},
}

@book{Hollis:1999:VBD:519964,
 author = {Hollis, Billy S.},
 title = {Visual Basic 6: Design, Specification, and Objects with Other},
 year = {1999},
 isbn = {0130850845},
 edition = {1st},
 publisher = {Prentice Hall PTR},
 address = {Upper Saddle River, NJ, USA},
 }


@book{Goossens:1999:LWC:553897,
 author = {Goossens, Michel and Rahtz, S. P. and Moore, Ross and Sutor, Robert S.},
 title = {The  Latex Web Companion: Integrating TEX, HTML, and XML},
 year = {1999},
 isbn = {0201433117},
 edition = {1st},
 publisher = {Addison-Wesley Longman Publishing Co., Inc.},
 address = {Boston, MA, USA},
 }

% need to test genres for errant isbn output

% techreport
@techreport{897367,
 author = {Buss, Jonathan F. and Rosenberg, Arnold L. and Knott, Judson D.},
 title = {Vertex Types in Book-Embeddings},
 year = {1987},
 source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Aumass_cs%3Ancstrl.umassa_cs%2F%2FUM-CS-1987-018},
 publisher = {University of Massachusetts},
 address = {Amherst, MA, USA},
 }

@techreport{Buss:1987:VTB:897367,
 author = {Buss, Jonathan F. and Rosenberg, Arnold L. and Knott, Judson D.},
 title = {Vertex Types in Book-Embeddings},
 year = {1987},
 source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Aumass_cs%3Ancstrl.umassa_cs%2F%2FUM-CS-1987-018},
 publisher = {University of Massachusetts},
 address = {Amherst, MA, USA},
 }

 @article{pimentel2014review,
   title={A review of novelty detection},
   author={Pimentel, Marco AF and Clifton, David A and Clifton, Lei and Tarassenko, Lionel},
   journal={Signal Processing},
   volume={99},
   pages={215--249},
   year={2014},
   publisher={Elsevier}
 }

% whole proceedings

@proceedings{Czerwinski:2008:1358628,
 author = {},
 note = {General Chair-Czerwinski, Mary and General Chair-Lund, Arnie and Program Chair-Tan, Desney},
 title = {CHI '08: CHI '08 extended abstracts on Human factors in computing systems},
 year = {2008},
 isbn = {978-1-60558-012-X},
 location = {Florence, Italy},
 order_no = {608085},
 publisher = {ACM},
 address = {New York, NY, USA},
 }

% phdthesis

@phdthesis{Clarkson:1985:ACP:911891,
 author = {Clarkson, Kenneth Lee},
 advisor = {Yao, Andrew C.},
 title = {Algorithms for Closest-Point Problems (Computational Geometry)},
 year = {1985},
 note = {AAT 8506171},
 school = {Stanford University},
 address = {Stanford, CA, USA},
 }
% school is being picked up -- but not publisher (which is OK)
% Also -- the title is NOT being output in italics !!! Arrrrgh! - I fixed it. :-)


%%% compare with 'old'
%%% atsign-Phdthesis{Clarkson85,
%%%  author =       "Kenneth L. Clarkson",
%%%  year =         "1985",
%%%  title =        "Algorithms for Closest-Point Problems (Computational Geometry)",
%%%  school =       "Stanford University",
%%%  address =      "Palo Alto, CA",
%%%  note =         "UMI Order Number: AAT 8506171",
%%%  type =         "",
%%%  month =        "",
%%%}

% A bibliography
@Article{1984:1040142,
 key = {{$\!\!$}},
 journal = {SIGCOMM Comput. Commun. Rev.},
 year = {1984},
 issn = {0146-4833},
 volume = {13-14},
 number = {5-1},
 issue_date = {January/April 1984},
 publisher = {ACM},
 address = {New York, NY, USA},
 }


% grinder
@inproceedings{2004:ITE:1009386.1010128,
 key = {IEEE},
 title = {IEEE TCSC Executive Committee},
 booktitle = {Proceedings of the IEEE International Conference on Web Services},
 series = {ICWS '04},
 year = {2004},
 isbn = {0-7695-2167-3},
 pages = {21--22},
 url = {http://dx.doi.org/10.1109/ICWS.2004.64},
 doi = {http://dx.doi.org/10.1109/ICWS.2004.64},
 acmid = {1010128},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
}

% div book
@book{Mullender:1993:DS(:302430,
 editor = {Mullender, Sape},
 title = {Distributed systems (2nd Ed.)},
 year = {1993},
 isbn = {0-201-62427-3},
 publisher = {ACM Press/Addison-Wesley Publishing Co.},
 address = {New York, NY, USA},
 }

% master thesis (as techreport and thesis)

@techreport{Petrie:1986:NAD:899644,
 author = {Petrie, Charles J.},
 title = {New Algorithms for Dependency-Directed Backtracking (Master's thesis)},
 year = {1986},
 source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Autexas_cs%3AUTEXAS_CS%2F%2FAI86-33},
 publisher = {University of Texas at Austin},
 address = {Austin, TX, USA},
 }

@MASTERSTHESIS{Petrie:1986:NAD:12345,
 author = {Petrie, Charles J.},
 title = {New Algorithms for Dependency-Directed Backtracking (Master's thesis)},
 year = {1986},
 source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Autexas_cs%3AUTEXAS_CS%2F%2FAI86-33},
 school = {University of Texas at Austin},
 address = {Austin, TX, USA},
 }




@BOOK{book-minimal,
   author = "Donald E. Knuth",
   title = "Seminumerical Algorithms",
   publisher = "Addison-Wesley",
   year = "1981",
}

% incollection (has an editor, title, and possibly a booktitle)
@INcollection{KA:2001,
 author = {Kong, Wei-Chang},
 Title = {The implementation of electronic commerce in SMEs in Singapore (as Incoll)},
 booktitle = {E-commerce and cultural values},
 year = {2001},
 isbn = {1-59140-056-2},
 pages = {51--74},
 numpages = {24},
 url = {http://portal.acm.org/citation.cfm?id=887006.887010},
 acmid = {887010},
 publisher = {IGI Publishing},
 address = {Hershey, PA, USA},
}


% with bibfield 'type' before chapter (note no editor)
@INBOOK{KAGM:2001,
 author = {Kong, Wei-Chang},
 type = {Name of Chapter:},
 chapter = {The implementation of electronic commerce in SMEs in Singapore (Inbook-w-chap-w-type)},
 title = {E-commerce and cultural values},
 year = {2001},
 isbn = {1-59140-056-2},
 pages = {51--74},
 numpages = {24},
 url = {http://portal.acm.org/citation.cfm?id=887006.887010},
 acmid = {887010},
 publisher = {IGI Publishing},
 address = {Hershey, PA, USA},
}

%%% Notes! This is because the atsign-INBOOK citation type specifies EITHER
%%% editor or author, but not both. In my experiments with the harvard/dcu
%%% bibtex style (and presumably this applies to other styles too), bibtex
%%% ignores the editor information if author information exists in an
%%% atsign-INBOOK entry. atsign-INCOLLECTION is far more commonly used in my references,
%%% and in the absence of an editor I believe most bibtex styles will just
%%% ommit the editor from the reference - the chapter information will not
%%% end up in the in-text citation as you suggest it should be but at least
%%% there is a place to put the editor if necessary.



% was 'Inbook' -- changed to incollection - (editor is different to author) - need to tell Asad to codify as such.
@incollection{Kong:2002:IEC:887006.887010,
  author =      {Kong, Wei-Chang},
  editor =      {Theerasak Thanasankit},
  title =       {Chapter 9},
  booktitle =   {E-commerce and cultural values (Incoll-w-text (chap 9) 'title')},
  year =        {2002},
  address =     {Hershey, PA, USA},
  publisher =   {IGI Publishing},
  url =         {http://portal.acm.org/citation.cfm?id=887006.887010},
  pages =       {51--74},
  numpages =    {24},
  acmid =       {887010},
  isbn =        {1-59140-056-2},
  number =      "",
  type =        "",
  month =       "",
  note =        "",
}

% incol when the chapter is 'text' - due to presence of editor (different to author)
@incollection{Kong:2003:IEC:887006.887011,
 author = {Kong, Wei-Chang},
 title = {The implementation of electronic commerce in SMEs in Singapore (Incoll)},
 booktitle = {E-commerce and cultural values},
 editor = {Thanasankit, Theerasak},
 year = {2003},
 isbn = {1-59140-056-2},
 pages = {51--74},
 numpages = {24},
 url = {http://portal.acm.org/citation.cfm?id=887006.887010},
 acmid = {887010},
 publisher = {IGI Publishing},
 address = {Hershey, PA, USA},
}

% ------ test
%incollection{Kong:2003:IEC:887006.887010,
% author = {Kong, Wei-Chang},
% chapter = {The implementation of electronic commerce in SMEs in Singapore (Incoll-text-in-chap)},
% booktitle = {booktitle E-commerce and cultural values},
% title =   {The title},
% editor = {Thanasankit, Theerasak},
% year = {2003},
% isbn = {1-59140-056-2},
% pages = {51--74},
% numpages = {24},
% url = {http://portal.acm.org/citation.cfm?id=887006.887010},
% acmid = {887010},
% publisher = {IGI Publishing},
% address = {Hershey, PA, USA},
%}


% ---------





% Need inbook with num in chapter

% and inbook with number in chapter
@InBook{Kong:2004:IEC:123456.887010,
  author =      {Kong, Wei-Chang},
  editor =      {Theerasak Thanasankit},
  title =       {E-commerce and cultural values - (InBook-num-in-chap)},
  chapter =     {9},
  year =        {2004},
  address =     {Hershey, PA, USA},
  publisher =   {IGI Publishing},
  url =         {http://portal.acm.org/citation.cfm?id=887006.887010},
  pages =       {51--74},
  numpages =    {24},
  acmid =       {887010},
  isbn =        {1-59140-056-2},
  number =      "",
  type =        "",
  month =       "",
  note =        "",
}


% and inbook with text in chapter
@Inbook{Kong:2005:IEC:887006.887010,
  author =      {Kong, Wei-Chang},
  editor =      {Theerasak Thanasankit},
  title =       {E-commerce and cultural values (Inbook-text-in-chap)},
  chapter =     {The implementation of electronic commerce in SMEs in Singapore},
  year =        {2005},
  address =     {Hershey, PA, USA},
  publisher =   {IGI Publishing},
  url =         {http://portal.acm.org/citation.cfm?id=887006.887010},
  type =        {Chapter:},
  pages =       {51--74},
  numpages =    {24},
  acmid =       {887010},
  isbn =        {1-59140-056-2},
  number =      "",
  month =       "",
  note =        "",
}


% and inbook with a num and type field
@Inbook{Kong:2006:IEC:887006.887010,
  author =      {Kong, Wei-Chang},
  editor =      {Theerasak Thanasankit},
  title =       {E-commerce and cultural values (Inbook-num chap)},
  chapter =     {22},
  year =        {2006},
  address =     {Hershey, PA, USA},
  publisher =   {IGI Publishing},
  url =         {http://portal.acm.org/citation.cfm?id=887006.887010},
  type =        {Chapter (in type field)},
  pages =       {51--74},
  numpages =    {24},
  acmid =       {887010},
  isbn =        {1-59140-056-2},
  number =      "",
  month =       "",
  note =        "",
}


% and incol coz we have a BLANK chapter - due to presence of editor
%atIncollection{Kong:2006:IEC:887006.887011,
%  author =     {Kong, Wei-Chang},
%  editor =     {Theerasak Thanasankit},
%  title =      "The title"
%  booktitle =  {E-commerce and cultural values (Incol-coz-blank-chap)},
%  year =       {2006},
%  address =    {Hershey, PA, USA},
%  publisher =  {IGI Publishing},
%  url =        {http://portal.acm.org/citation.cfm?id=887006.887010},
%  type =       {Type!},
%  chapter =    {},
%  pages =      {51--74},
%  numpages =   {24},
%  acmid =      {887010},
%  isbn =       {1-59140-056-2},
%  number =     "",
%  month =      "",
%  note =       "",
%}

@article{SaeediMEJ10,
            author = {Mehdi Saeedi and Morteza Saheb Zamani and Mehdi Sedighi},
            title = {A library-based synthesis methodology for reversible logic},
            journal = {Microelectron. J.},
            volume = {41},
            number = {4},
            month = apr,
            year = {2010},
            pages = {185--194},
}

@ARTICLE{SaeediJETC10,
            author = {Mehdi Saeedi and Morteza Saheb Zamani and Mehdi Sedighi and Zahra Sasanian},
            title = {Synthesis of Reversible Circuit Using Cycle-Based Approach},
            journal = {J. Emerg. Technol. Comput. Syst.},
            volume = {6},
            number = {4},
            month = dec,
            year = {2010}
            }

% Asad's new version
@article{Kirschmer:2010:AEI:1958016.1958018,
 author = {Kirschmer, Markus and Voight, John},
 title = {Algorithmic Enumeration of Ideal Classes for Quaternion Orders},
 journal = {SIAM J. Comput.},
 issue_date = {January 2010},
 volume = {39},
 number = {5},
 month = jan,
 year = {2010},
 issn = {0097-5397},
 pages = {1714--1747},
 numpages = {34},
 url = {http://dx.doi.org/10.1137/080734467},
 doi = {https://doi.org/10.1137/080734467},
 acmid = {1958018},
 publisher = {Society for Industrial and Applied Mathematics},
 address = {Philadelphia, PA, USA},
 keywords = {ideal classes, maximal orders, number theory, quaternion algebras},
}


% incol due to presence of booktitle
@incollection{Hoare:1972:CIN:1243380.1243382,
 author = {Hoare, C. A. R.},
 title = {Chapter II: Notes on data structuring},
 booktitle = {Structured programming (incoll)},
 editor = {Dahl, O. J. and Dijkstra, E. W. and Hoare, C. A. R.},
 year = {1972},
 isbn = {0-12-200550-3},
 pages = {83--174},
 numpages = {92},
 url = {http://portal.acm.org/citation.cfm?id=1243380.1243382},
 acmid = {1243382},
 publisher = {Academic Press Ltd.},
 address = {London, UK, UK},
}

% incol due to presence of booktitle
@incollection{Lee:1978:TQA:800025.1198348,
 author = {Lee, Jan},
 title = {Transcript of question and answer session},
 booktitle = {History of programming languages I (incoll)},
 editor = {Wexelblat, Richard L.},
 year = {1981},
 isbn = {0-12-745040-8},
 pages = {68--71},
 numpages = {4},
 url = {http://doi.acm.org/10.1145/800025.1198348},
 doi = {http://doi.acm.org/10.1145/800025.1198348},
 acmid = {1198348},
 publisher = {ACM},
 address = {New York, NY, USA},
}

% incol due to booktitle
@incollection{Dijkstra:1979:GSC:1241515.1241518,
 author = {Dijkstra, E.},
 title = {Go to statement considered harmful},
 booktitle = {Classics in software engineering (incoll)},
 year = {1979},
 isbn = {0-917072-14-6},
 pages = {27--33},
 numpages = {7},
 url = {http://portal.acm.org/citation.cfm?id=1241515.1241518},
 acmid = {1241518},
 publisher = {Yourdon Press},
 address = {Upper Saddle River, NJ, USA},
}

% incol due to booktitle
@incollection{Wenzel:1992:TVA:146022.146089,
 author = {Wenzel, Elizabeth M.},
 title = {Three-dimensional virtual acoustic displays},
 booktitle = {Multimedia interface design (incoll)},
 year = {1992},
 isbn = {0-201-54981-6},
 pages = {257--288},
 numpages = {32},
 url = {http://portal.acm.org/citation.cfm?id=146022.146089},
 doi = {10.1145/146022.146089},
 acmid = {146089},
 publisher = {ACM},
 address = {New York, NY, USA},
}

% incol due to booktitle
@incollection{Mumford:1987:MES:54905.54911,
 author = {Mumford, E.},
 title = {Managerial expert systems and organizational change: some critical research issues},
 booktitle = {Critical issues in information systems research (incoll)},
 year = {1987},
 isbn = {0-471-91281-6},
 pages = {135--155},
 numpages = {21},
 url = {http://portal.acm.org/citation.cfm?id=54905.54911},
 acmid = {54911},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
}

@book{McCracken:1990:SSC:575315,
 author = {McCracken, Daniel D. and Golden, Donald G.},
 title = {Simplified Structured COBOL with Microsoft/MicroFocus COBOL},
 year = {1990},
 isbn = {0471514071},
 publisher = {John Wiley \& Sons, Inc.},
 address = {New York, NY, USA},
}

% Let's include Boris / BBeeton entries  (multi-volume works)

@book {MR781537,
    AUTHOR = {H{\"o}rmander, Lars},
     TITLE = {The analysis of linear partial differential operators. {III}},
    SERIES = {Grundlehren der Mathematischen Wissenschaften [Fundamental
              Principles of Mathematical Sciences]},
    VOLUME = {275},
      NOTE = {Pseudodifferential operators},
PUBLISHER = {Springer-Verlag},
   ADDRESS = {Berlin, Germany},
      YEAR = {1985},
     PAGES = {viii+525},
      ISBN = {3-540-13828-5},
   MRCLASS = {35-02 (35Sxx 47G05 58G15)},
  MRNUMBER = {781536 (87d:35002a)},
MRREVIEWER = {Min You Qi},
}

@book {MR781536,
    AUTHOR = {H{\"o}rmander, Lars},
     TITLE = {The analysis of linear partial differential operators. {IV}},
    SERIES = {Grundlehren der Mathematischen Wissenschaften [Fundamental
              Principles of Mathematical Sciences]},
    VOLUME = {275},
      NOTE = {Fourier integral operators},
PUBLISHER = {Springer-Verlag},
   ADDRESS = {Berlin, Germany},
      YEAR = {1985},
     PAGES = {vii+352},
      ISBN = {3-540-13829-3},
   MRCLASS = {35-02 (35Sxx 47G05 58G15)},
  MRNUMBER = {781537 (87d:35002b)},
MRREVIEWER = {Min You Qi},
}

%%%%%%%%%%%%%%%%%%%%%% Start of Aptara sample bib entries

% acmsmall-sam.bib
@InProceedings{Adya-01,
  author        = {A. Adya and P. Bahl and J. Padhye and A.Wolman and L. Zhou},
  title         = {A multi-radio unification protocol for {IEEE} 802.11 wireless networks},
  booktitle     = {Proceedings of the IEEE 1st International Conference on Broadnets Networks (BroadNets'04)},
  publisher     = "IEEE",
  address       = "Los Alamitos, CA",
  year          = {2004},
  pages         = "210--217"
}

@article{Akyildiz-01,
  author        = {I. F. Akyildiz and W. Su and Y. Sankarasubramaniam and E. Cayirci},
  title         = {Wireless Sensor Networks: A Survey},
  journal       = {Comm. ACM},
  volume        = 38,
  number        = "4",
  year          = {2002},
  pages         = "393--422"
}

@article{Akyildiz-02,
  author        = {I. F. Akyildiz and T. Melodia and K. R. Chowdhury},
  title         = {A Survey on Wireless Multimedia Sensor Networks},
  journal       = {Computer Netw.},
  volume        = 51,
  number        = "4",
  year          = {2007},
  pages         = "921--960"
}

@InProceedings{Bahl-02,
  author        = {P. Bahl and R. Chancre and J. Dungeon},
  title         = {{SSCH}: Slotted Seeded Channel Hopping for Capacity Improvement in {IEEE} 802.11 Ad-Hoc Wireless Networks},
  booktitle     = {Proceeding of the 10th International Conference on Mobile Computing and Networking (MobiCom'04)},
  publisher     = "ACM",
  address       = "New York, NY",
  year          = {2004},
  pages         = "112--117"
}

@misc{CROSSBOW,
  key       = {CROSSBOW},
  title     = {{XBOW} Sensor Motes Specifications},
  note      = {http://www.xbow.com},
  year      = 2008
}

@article{Culler-01,
  author        = {D. Culler and D. Estrin and M. Srivastava},
  title         = {Overview of Sensor Networks},
  journal       = {IEEE Comput.},
  volume        = 37,
  number        = "8 (Special Issue on Sensor Networks)",
  publisher     = "IEEE",
  address       = "Los Alamitos, CA",
  year          = {2004},
  pages         = "41--49"
}

@misc{Harvard-01,
    key         = {Harvard CodeBlue},
    title       = {{CodeBlue}: Sensor Networks for Medical Care},
    note        = {http://www.eecs.harvard.edu/mdw/ proj/codeblue/},
    year        = 2008
}

@InProceedings{Natarajan-01,
    author      = {A. Natarajan and M. Motani and B. de Silva and K. Yap and K. C. Chua},
    title       = {Investigating Network Architectures for Body Sensor Networks},
    booktitle   = {Network Architectures},
    editor      = {G. Whitcomb and P. Neece},
    publisher   = "Keleuven Press",
    address     = "Dayton, OH",
    year        = {2007},
    pages       = "322--328",
    eprint      = "960935712",
    primaryclass = "cs",
}

@techreport{Tzamaloukas-01,
  author        = {A. Tzamaloukas and J. J. Garcia-Luna-Aceves},
  title         = {Channel-Hopping Multiple Access},
  number =        {I-CA2301},
  institution =   {Department of Computer Science, University of California},
  address =       {Berkeley, CA},
  year          = {2000}
}

@BOOK{Zhou-06,
  author        = {G. Zhou and J. Lu and C.-Y. Wan and M. D. Yarvis and J. A. Stankovic},
  title         = {Body Sensor Networks},
  publisher     = "MIT Press",
  address       = "Cambridge, MA",
  year          = {2008}
}

@mastersthesis{ko94,
author = "Jacob Kornerup",
title = "Mapping Powerlists onto Hypercubes",
school = "The University of Texas at Austin",
note = "(In preparation)",
year = "1994"}
%month = "dec",}

@PhdThesis{gerndt:89,
  author =       "Michael Gerndt",
  title =        "Automatic Parallelization for Distributed-Memory
                  Multiprocessing Systems",
  school =       "University of Bonn",
  year =         1989,
  address =      "Bonn, Germany",
  month =        dec
}

@article{6:1:1,
author = "J. E. {Archer, Jr.} and R. Conway and F. B. Schneider",
title = "User recovery and reversal in interactive systems",
journal = "ACM Trans. Program. Lang. Syst.",
volume =  "6",
number = "1",
month = jan,
year = 1984,
pages = "1--19"}

@article{7:1:137,
author = "D. D. Dunlop and V. R. Basili",
title = "Generalizing specifications for uniformly implemented loops",
journal = "ACM Trans. Program. Lang. Syst.",
volume =  "7",
number = "1",
month = jan,
year = 1985,
pages = "137--158"}

@article{7:2:183,
author = "J. Heering and P. Klint",
title = "Towards monolingual programming environments",
journal = "ACM Trans. Program. Lang. Syst.",
volume =  "7",
number = "2",
month = apr,
year = 1985,
pages = "183--213"}

@book{knuth:texbook,
author = "Donald E. Knuth",
title = "The {\TeX{}book}",
publisher = "Addison-Wesley",
address = "Reading, MA.",
year = 1984}

@article{6:3:380,
author = "E. Korach and D.  Rotem and N. Santoro",
title = "Distributed algorithms for finding centers and medians in networks",
journal = "ACM Trans. Program. Lang. Syst.",
volume =  "6",
number = "3",
month = jul,
year = 1984,
pages = "380--401"}

@book{lamport:latex,
author = "Leslie Lamport",
title = "\it {\LaTeX}: A Document Preparation System",
publisher = "Addison-Wesley",
address = "Reading, MA.",
year = 1986}

@article{7:3:359,
author = "F. Nielson",
title = "Program transformations in a denotational setting",
journal = "ACM Trans. Program. Lang. Syst.",
volume =  "7",
number = "3",
month = jul,
year = 1985,
pages = "359--379"}

% anomalies in Social networks

@article{savage2014anomaly,
  title={Anomaly detection in online social networks},
  author={Savage, David and Zhang, Xiuzhen and Yu, Xinghuo and Chou, Pauline and Wang, Qingmai},
  journal={Social Networks},
  volume={39},
  pages={62--70},
  year={2014},
  publisher={Elsevier}
}

@inproceedings{liu2017social,
  title={Social media anomaly detection: Challenges and solutions},
  author={Liu, Yan and Chawla, Sanjay},
  booktitle={Proceedings of the Tenth ACM International Conference on Web Search and Data Mining},
  pages={817--818},
  year={2017},
  organization={ACM}
}
@article{yu2016survey,
  title={A survey on social media anomaly detection},
  author={Yu, Rose and Qiu, Huida and Wen, Zhen and Lin, ChingYung and Liu, Yan},
  journal={ACM SIGKDD Explorations Newsletter},
  volume={18},
  number={1},
  pages={1--14},
  year={2016},
  publisher={ACM}
}

@inproceedings{anand2017anomaly,
  title={Anomaly detection in online social network: A survey},
  author={Anand, Ketan and Kumar, Jay and Anand, Kunal},
  booktitle={Inventive Communication and Computational Technologies (ICICCT), 2017 International Conference on},
  pages={456--459},
  year={2017},
  organization={IEEE}
}


% end of anomalies in  social networks






%testing
@BOOK{test,
   author = "Donald E. Knuth",
   title = "Seminumerical Algorithms",
   volume = 2,
   series = "The Art of Computer Programming",
   publisher = "Addison-Wesley",
   address = "Reading, MA",
   edition = "2nd",
   month = "10~" # jan,
   year = "1981",
}

@inproceedings{reid:scribe,
author = "Brian K. Reid",
title = "A high-level approach to computer document formatting",
booktitle = "Proceedings of the 7th Annual Symposium on Principles of
  Programming Languages",
month = jan,
year = 1980,
publisher = "ACM",
address = "New York",
pages = "24--31"}

@article{Zhou:2010:MMS:1721695.1721705,
 author = {Zhou, Gang and Wu, Yafeng and Yan, Ting and He, Tian and Huang, Chengdu and Stankovic, John A. and Abdelzaher, Tarek F.},
 title = {A multifrequency MAC specially designed for wireless sensor network applications},
 journal = {ACM Trans. Embed. Comput. Syst.},
 issue_date = {March 2010},
 volume = 9,
 number = 4,
 month = {April},
 year = 2010,
 issn = {1539-9087},
 pages = {39:1--39:41},
 articleno = 39,
 numpages = 41,
 url = {http://doi.acm.org/10.1145/1721695.1721705},
 doi = {10.1145/1721695.1721705},
 acmid = 1721705,
 publisher = {ACM},
 address = {New York, NY, USA},
 keywords = {Wireless sensor networks, media access control, multi-channel, radio interference, time synchronization},
}


@online{TUGInstmem,
  key =          {TUG},
  year  =        2017,
  title =        "Institutional members of the {\TeX} Users Group",
  url =          "http://wwtug.org/instmem.html",
  lastaccessed = "May 27, 2017",
}

@online{CTANacmart,
  author =    {Boris Veytsman},
  title =  {acmart---{C}lass for typesetting publications of {ACM}},
  url =    {http://www.ctan.org/pkg/acmart},
  lastaccessed = {May 27, 2017}
  }

@ARTICLE{bowman:reasoning,
    author = {Bowman, Mic and Debray, Saumya K. and Peterson, Larry L.},
    title = {Reasoning About Naming Systems},
    journal = {ACM Trans. Program. Lang. Syst.},
    volume = {15},
    number = {5},
    pages = {795-825},
    month = {November},
    year = {1993},
    doi = {10.1145/161468.161471},
}

@ARTICLE{braams:babel,
    author = {Braams, Johannes},
    title = {Babel, a Multilingual Style-Option System for Use with LaTeX's Standard Document Styles},
    journal = {TUGboat},
    volume = {12},
    number = {2},
    pages = {291-301},
    month = {June},
    year = {1991},
}

@INPROCEEDINGS{clark:pct,
  AUTHOR = "Malcolm Clark",
  TITLE = "Post Congress Tristesse",
  BOOKTITLE = "TeX90 Conference Proceedings",
  PAGES = "84-89",
  ORGANIZATION = "TeX Users Group",
  MONTH = "March",
  YEAR = {1991}
}

@ARTICLE{herlihy:methodology,
    author = {Herlihy, Maurice},
    title = {A Methodology for Implementing Highly Concurrent Data Objects},
    journal = {ACM Trans. Program. Lang. Syst.},
    volume = {15},
    number = {5},
    pages = {745-770},
    month = {November},
    year = {1993},
    doi = {10.1145/161468.161469},
}

@BOOK{salas:calculus,
  AUTHOR = "S.L. Salas and Einar Hille",
  TITLE = "Calculus: One and Several Variable",
  PUBLISHER = "John Wiley and Sons",
  ADDRESS = "New York",
  YEAR = "1978"
}

@MANUAL{Fear05,
  title =        {Publication quality tables in {\LaTeX}},
  author =       {Simon Fear},
  month =        {April},
  year =         2005,
  note =         {\url{http://www.ctan.org/pkg/booktabs}}
}

@Manual{Amsthm15,
  title =        {Using the amsthm Package},
  organization = {American Mathematical Society},
  month =        {April},
  year =         2015,
  note =         {\url{http://www.ctan.org/pkg/amsthm}}
}


@inproceedings{Lopez-Paz:2014,
 author = {Lopez-Paz, David and Sra, Suvrit and Smola, Alexander J. and Ghahramani, Zoubin and Sch\"{o}lkopf, Bernhard},
 title = {Randomized Nonlinear Component Analysis},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2014}
}

@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}

@article{perera2018learning,
  title={Learning Deep Features for One-Class Classification},
  author={Perera, Pramuditha and Patel, Vishal M},
  journal={arXiv preprint arXiv:1801.05365},
  year={2018}
}

@article{jumutc2014multi,
  title={Multi-class supervised novelty detection},
  author={Jumutc, Vilen and Suykens, Johan AK},
  journal={IEEE transactions on pattern analysis and machine intelligence},
  volume={36},
  number={12},
  pages={2510--2523},
  year={2014},
  publisher={IEEE}
}
@inproceedings{shilton2013combined,
  title={Combined multiclass classification and anomaly detection for large-scale wireless sensor networks},
  author={Shilton, Alistair and Rajasegarar, Sutharshan and Palaniswami, Marimuthu},
  booktitle={Intelligent Sensors, Sensor Networks and Information Processing, 2013 IEEE Eighth International Conference on},
  pages={491--496},
  year={2013},
  organization={IEEE}
}
@article{gornitz2013toward,
  title={Toward supervised anomaly detection},
  author={G{\"o}rnitz, Nico and Kloft, Marius and Rieck, Konrad and Brefeld, Ulf},
  journal={Journal of Artificial Intelligence Research},
  volume={46},
  pages={235--262},
  year={2013}
}

@article{kingma2014adam,
  title={Adam: A method for stochastic optimization},
  author={Kingma, Diederik P and Ba, Jimmy},
  journal={arXiv preprint arXiv:1412.6980},
  year={2014}
}

@article{clevert2015fast,
  title={Fast and accurate deep network learning by exponential linear units (elus)},
  author={Clevert, Djork-Arn{\'e} and Unterthiner, Thomas and Hochreiter, Sepp},
  journal={arXiv preprint arXiv:1511.07289},
  year={2015}
}

@inproceedings{ioffe2015batch,
  title={Batch normalization: Accelerating deep network training by reducing internal covariate shift},
  author={Ioffe, Sergey and Szegedy, Christian},
  booktitle={International conference on machine learning},
  pages={448--456},
  year={2015}
}

@article{li2017cifar10,
  title={CIFAR10-DVS: An Event-Stream Dataset for Object Classification},
  author={Li, Hongmin and Liu, Hanchao and Ji, Xiangyang and Li, Guoqi and Shi, Luping},
  journal={Frontiers in neuroscience},
  volume={11},
  pages={309},
  year={2017},
  publisher={Frontiers}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}


@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}

@inproceedings{chen2017outlier,
  title={Outlier detection with autoencoder ensembles},
  author={Chen, Jinghui and Sathe, Saket and Aggarwal, Charu and Turaga, Deepak},
  booktitle={Proceedings of the 2017 SIAM International Conference on Data Mining},
  pages={90--98},
  year={2017},
  organization={SIAM}
}

@article{marchi2017deep,
  title={Deep Recurrent Neural Network-Based Autoencoders for Acoustic Novelty Detection},
  author={Marchi, Erik and Vesperini, Fabio and Squartini, Stefano and Schuller, Bj{\"o}rn},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{chong2017abnormal,
  title={Abnormal event detection in videos using spatiotemporal autoencoder},
  author={Chong, Yong Shean and Tay, Yong Haur},
  booktitle={International Symposium on Neural Networks},
  pages={189--196},
  year={2017},
  organization={Springer}
}

@article{chatfield2014return,
  title={Return of the devil in the details: Delving deep into convolutional nets},
  author={Chatfield, Ken and Simonyan, Karen and Vedaldi, Andrea and Zisserman, Andrew},
  journal={arXiv preprint arXiv:1405.3531},
  year={2014}
}


@article{neumann2005combined,
  title={Combined SVM-based feature selection and classification},
  author={Neumann, Julia and Schn{\"o}rr, Christoph and Steidl, Gabriele},
  journal={Machine learning},
  volume={61},
  number={1-3},
  pages={129--150},
  year={2005},
  publisher={Springer}
}

@article{cao2003comparison,
  title={A comparison of PCA, KPCA and ICA for dimensionality reduction in support vector machine},
  author={Cao, LJ and Chua, Kok Seng and Chong, WK and Lee, HP and Gu, QM},
  journal={Neurocomputing},
  volume={55},
  number={1-2},
  pages={321--336},
  year={2003},
  publisher={Elsevier}
}


@article{russakovsky2015imagenet,
  title={Imagenet large scale visual recognition challenge},
  author={Russakovsky, Olga and Deng, Jia and Su, Hao and Krause, Jonathan and Satheesh, Sanjeev and Ma, Sean and Huang, Zhiheng and Karpathy, Andrej and Khosla, Aditya and Bernstein, Michael and others},
  journal={International Journal of Computer Vision},
  volume={115},
  number={3},
  pages={211--252},
  year={2015},
  publisher={Springer}
}


@inproceedings{lodhi2017power,
  title={Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models},
  author={Lodhi, Faiq Khalid and Hasan, Syed Rafay and Hasan, Osman and Awwadl, Falah},
  booktitle={Proceedings of the Conference on Design, Automation \& Test in Europe},
  pages={294--297},
  year={2017},
  organization={European Design and Automation Association}
}

@inproceedings{mudassar2018unsupervised,
  title={An Unsupervised Anomalous Event Detection Framework with Class Aware Source Separation},
  author={Mudassar, Burhan A and Ko, Jong Hwan and Mukhopadhyay, Saibal},
  booktitle={2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
  pages={2671--2675},
  year={2018},
  organization={IEEE}
}
@article{zhang2018lstm,
  title={LSTM-Based Analysis of Industrial IoT Equipment},
  author={Zhang, Weishan and Guo, Wuwu and Liu, Xin and Liu, Yan and Zhou, Jiehan and Li, Bo and Lu, Qinghua and Yang, Su},
  journal={IEEE Access},
  volume={6},
  pages={23551--23560},
  year={2018},
  publisher={IEEE}
}

@inproceedings{kakanakova2017outlier,
  title={Outlier Detection via Deep Learning Architecture},
  author={Kakanakova, Irina and Stoyanov, Stefan},
  booktitle={Proceedings of the 18th International Conference on Computer Systems and Technologies},
  pages={73--79},
  year={2017},
  organization={ACM}
}

@article{mohammadi2018neural,
  title={Neural Network Cognitive Engine for Autonomous and Distributed Underlay Dynamic Spectrum Access},
  author={Mohammadi, Fatemeh Shah and Kwasinski, Andres},
  journal={arXiv preprint arXiv:1806.11038},
  year={2018}
}

@inproceedings{luo2018distributed,
  title={Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT},
  author={Luo, Tie and Nagarajany, Sai G},
  booktitle={2018 IEEE International Conference on Communications (ICC)},
  pages={1--6},
  year={2018},
  organization={IEEE}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}

@article{arora2016understanding,
  title={Understanding deep neural networks with rectified linear units},
  author={Arora, Raman and Basu, Amitabh and Mianjy, Poorya and Mukherjee, Anirbit},
  journal={arXiv preprint arXiv:1611.01491},
  year={2016}
}

@article{asgari2015continuous,
  title={Continuous distributed representation of biological sequences for deep proteomics and genomics},
  author={Asgari, Ehsaneddin and Mofrad, Mohammad RK},
  journal={PloS one},
  volume={10},
  number={11},
  pages={e0141287},
  year={2015},
  publisher={Public Library of Science}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@inproceedings{liu2008isolation,
  title={Isolation forest},
  author={Liu, Fei Tony and Ting, Kai Ming and Zhou, Zhi-Hua},
  booktitle={Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on},
  pages={413--422},
  year={2008},
  organization={IEEE}
}


@article{xu2015learning,
  title={Learning deep representations of appearance and motion for anomalous event detection},
  author={Xu, Dan and Ricci, Elisa and Yan, Yan and Song, Jingkuan and Sebe, Nicu},
  journal={arXiv preprint arXiv:1510.01553},
  year={2015}
}


@inproceedings{kolosnjaji2016deep,
  title={Deep learning for classification of malware system call sequences},
  author={Kolosnjaji, Bojan and Zarras, Apostolis and Webster, George and Eckert, Claudia},
  booktitle={Australasian Joint Conference on Artificial Intelligence},
  pages={137--149},
  year={2016},
  organization={Springer}
}


@article{nonlinear-PCAHybrid,
author = {Chong Su and Yue Gao and Yuxiao Xie and Yong Xue and Lijun Ge and Hongguang Li},
title = {A hybrid classifier based on nonlinear-PCA and deep belief networks with applications in dysphagia diagnosis},
journal = {Computer Assisted Surgery},
volume = {22},
number = {sup1},
pages = {135-147},
year  = {2017},
publisher = {Taylor & Francis},
doi = {10.1080/24699322.2017.1389391},
    note ={PMID: 29095063},
URL = {
        https://doi.org/10.1080/24699322.2017.1389391
},
eprint = {
        https://doi.org/10.1080/24699322.2017.1389391
}
}


@article{sohaib2017hybrid,
  title={A Hybrid Feature Model and Deep-Learning-Based Bearing Fault Diagnosis},
  author={Sohaib, Muhammad and Kim, Cheol-Hong and Kim, Jong-Myon},
  journal={Sensors},
  volume={17},
  number={12},
  pages={2876},
  year={2017},
  publisher={Multidisciplinary Digital Publishing Institute}
}


@article{chouiekh2018convnets,
  title={ConvNets for Fraud Detection analysis},
  author={Chouiekh, Alae and Haj, EL Hassane Ibn EL},
  journal={Procedia Computer Science},
  volume={127},
  pages={133--138},
  year={2018},
  publisher={Elsevier}
}

@article{sorournejad2016survey,
  title={A survey of credit card fraud detection techniques: data and technique oriented perspective},
  author={Sorournejad, Samaneh and Zojaji, Zahra and Atani, Reza Ebrahimi and Monadjemi, Amir Hassan},
  journal={CoRR abs/1611.06439},
  year={2016}
}

@article{dorronsoro1997neural,
  title={Neural fraud detection in credit card operations},
  author={Dorronsoro, Jose R and Ginel, Francisco and S{\'a}nchez, Carmen R and Santa Cruz, Carlos},
  journal={IEEE transactions on neural networks},
  year={1997},
  publisher={Institute of Electrical and Electronics Engineers}
}

@inproceedings{alowais2012credit,
  title={Credit card fraud detection: Personalized or aggregated model},
  author={Alowais, Mohammed Ibrahim and Soon, Lay-Ki},
  booktitle={Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on},
  pages={114--119},
  year={2012},
  organization={IEEE}
}

@inproceedings{amarasinghe2018critical,
  title={Critical Analysis of Machine Learning Based Approaches for Fraud Detection in Financial Transactions},
  author={Amarasinghe, Thushara and Aponso, Achala and Krishnarajah, Naomi},
  booktitle={Proceedings of the 2018 International Conference on Machine Learning Technologies},
  pages={12--17},
  year={2018},
  organization={ACM}
}

@article{abroyan2017neural,
  title={Neural Networks for Financial Market Risk Classification},
  author={Abroyan, Narek},
  year={2017}
}

@inproceedings{lp2018transaction,
  title={Transaction Fraud Detection Using GRU-centered Sandwich-structured Model},
  author={Lp, Xurui and Yu, Wei and Luwang, Tianyu and Zheng, Jianbin and Qiu, Xuetao and Zhao, Jintao and Xia, Lei and Li, Yujiao},
  booktitle={2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD))},
  pages={467--472},
  year={2018},
  organization={IEEE}
}

@article{choi2018generative,
  title={Generative Ensembles for Robust Anomaly Detection},
  author={Choi, Hyunsun and Jang, Eric},
  journal={arXiv preprint arXiv:1810.01392},
  year={2018}
}


@article{viaene2005auto,
  title={Auto claim fraud detection using Bayesian learning neural networks},
  author={Viaene, Stijn and Dedene, Guido and Derrig, Richard A},
  journal={Expert Systems with Applications},
  volume={29},
  number={3},
  pages={653--666},
  year={2005},
  publisher={Elsevier}
}

@article{wang2018leveraging,
  title={Leveraging deep learning with LDA-based text analytics to detect automobile insurance fraud},
  author={Wang, Yibo and Xu, Wei},
  journal={Decision Support Systems},
  volume={105},
  pages={87--95},
  year={2018},
  publisher={Elsevier}
}


@inproceedings{roy2017detecting,
  title={Detecting insurance claims fraud using machine learning techniques},
  author={Roy, Riya and George, K Thomas},
  booktitle={Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on},
  pages={1--6},
  year={2017},
  organization={IEEE}
}

@phdthesis{da2018evaluation,
  title={An Evaluation of Unsupervised Machine Learning Algorithms for Detecting Fraud and Abuse in the US Medicare Insurance Program},
  author={da Rosa, Raquel C},
  year={2018},
  school={Florida Atlantic University}
}

@inproceedings{bauder2018identifying,
  title={Identifying Medicare Provider Fraud with Unsupervised Machine Learning},
  author={Bauder, Richard and da Rosa, Raquel and Khoshgoftaar, Taghi},
  booktitle={2018 IEEE International Conference on Information Reuse and Integration (IRI)},
  pages={285--292},
  year={2018},
  organization={IEEE}
}

@inproceedings{lasaga2018deep,
  title={Deep Learning to Detect Medical Treatment Fraud},
  author={Lasaga, Daniel and Santhana, Prakash},
  booktitle={KDD 2017 Workshop on Anomaly Detection in Finance},
  pages={114--120},
  year={2018}
}

@article{joudaki2015using,
  title={Using data mining to detect health care fraud and abuse: a review of literature},
  author={Joudaki, Hossein and Rashidian, Arash and Minaei-Bidgoli, Behrouz and Mahmoodi, Mahmood and Geraili, Bijan and Nasiri, Mahdi and Arab, Mohammad},
  journal={Global journal of health science},
  volume={7},
  number={1},
  pages={194},
  year={2015},
  publisher={Canadian Center of Science and Education}
}

@inproceedings{yuan2017spectrum,
  title={Spectrum-based deep neural networks for fraud detection},
  author={Yuan, Shuhan and Wu, Xintao and Li, Jun and Lu, Aidong},
  booktitle={Proceedings of the 2017 ACM on Conference on Information and Knowledge Management},
  pages={2419--2422},
  year={2017},
  organization={ACM}
}


@article{zhang2018deep,
  title={Deep generative model for multi-class imbalanced learning},
  author={Zhang, Yazhou},
  year={2018}
}

@misc{keung2009neural,
  title={Neural networks for insurance fraud detection},
  author={Keung, Phillip and Karel, Joycelin and Bright, Curtis},
  year={2009}
}

@misc{zhao2013fraud,
  title={Fraud detection system},
  author={Zhao, Lucy Ma},
  year={2013},
  month=dec # "~12",
  publisher={Google Patents},
  note={US Patent App. 13/494,741}
}
@article{finlayson2018adversarial,
  title={Adversarial Attacks Against Medical Deep Learning Systems},
  author={Finlayson, Samuel G and Kohane, Isaac S and Beam, Andrew L},
  journal={arXiv preprint arXiv:1804.05296},
  year={2018}
}

@article{zhang2018model,
  title={A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection},
  author={Zhang, Zhaohui and Zhou, Xinxin and Zhang, Xiaobo and Wang, Lizhi and Wang, Pengwei},
  journal={Security and Communication Networks},
  volume={2018},
  year={2018},
  publisher={Hindawi}
}
@inproceedings{bauder2017medicare,
  title={Medicare Fraud Detection Using Machine Learning Methods},
  author={Bauder, Richard A and Khoshgoftaar, Taghi M},
  booktitle={Machine Learning and Applications (ICMLA), 2017 16th IEEE International Conference on},
  pages={858--865},
  year={2017},
  organization={IEEE}
}


@inproceedings{roy2017detecting,
  title={Detecting insurance claims fraud using machine learning techniques},
  author={Roy, Riya and George, K Thomas},
  booktitle={Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on},
  pages={1--6},
  year={2017},
  organization={IEEE}
}
% Malware detection
@inproceedings{cakir2018malware,
  title={Malware classification using deep learning methods},
  author={Cakir, Bugra and Dogdu, Erdogan},
  booktitle={Proceedings of the ACMSE 2018 Conference},
  pages={10},
  year={2018},
  organization={ACM}
}

@article{kolosnjaji2018adversarial,
  title={Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables},
  author={Kolosnjaji, Bojan and Demontis, Ambra and Biggio, Battista and Maiorca, Davide and Giacinto, Giorgio and Eckert, Claudia and Roli, Fabio},
  journal={arXiv preprint arXiv:1803.04173},
  year={2018}
}

@article{suciu2018exploring,
  title={Exploring Adversarial Examples in Malware Detection},
  author={Suciu, Octavian and Coull, Scott E and Johns, Jeffrey},
  journal={arXiv preprint arXiv:1810.08280},
  year={2018}
}


@article{srisakaokul2018muldef,
  title={MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks},
  author={Srisakaokul, Siwakorn and Zhong, Zexuan and Zhang, Yuhao and Yang, Wei and Xie, Tao},
  journal={arXiv preprint arXiv:1809.00065},
  year={2018}
}

@article{king2018artificial,
  title={Artificial Intelligence Crime: An Interdisciplinary Analysis of Foreseeable Threats and Solutions},
  author={King, Thomas and Aggarwal, Nikita and Taddeo, Mariarosaria and Floridi, Luciano},
  year={2018}
}

@inproceedings{hardy2016dl4md,
  title={DL4MD: A deep learning framework for intelligent malware detection},
  author={Hardy, William and Chen, Lingwei and Hou, Shifu and Ye, Yanfang and Li, Xin},
  booktitle={Proceedings of the International Conference on Data Mining (DMIN)},
  pages={61},
  year={2016},
  organization={The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)}
}

@article{ye2017survey,
  title={A survey on malware detection using data mining techniques},
  author={Ye, Yanfang and Li, Tao and Adjeroh, Donald and Iyengar, S Sitharama},
  journal={ACM Computing Surveys (CSUR)},
  volume={50},
  number={3},
  pages={41},
  year={2017},
  publisher={ACM}
}



@article{huang2017r2,
  title={R2-D2: color-inspired convolutional neural network (cnn)-based android malware detections},
  author={Huang, TonTon Hsien-De and Kao, Hung-Yu},
  journal={arXiv preprint arXiv:1705.04448},
  year={2017}
}

@article{rosenberg2018end,
  title={End-to-End Deep Neural Networks and Transfer Learning for Automatic Analysis of Nation-State Malware},
  author={Rosenberg, Ishai and Sicard, Guillaume and David, Eli Omid},
  journal={Entropy},
  volume={20},
  number={5},
  pages={390},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{david2015deepsign,
  title={Deepsign: Deep learning for automatic malware signature generation and classification},
  author={David, Omid E and Netanyahu, Nathan S},
  booktitle={Neural Networks (IJCNN), 2015 International Joint Conference on},
  pages={1--8},
  year={2015},
  organization={IEEE}
}


@inproceedings{tobiyama2016malware,
  title={Malware detection with deep neural network using process behavior},
  author={Tobiyama, Shun and Yamaguchi, Yukiko and Shimada, Hajime and Ikuse, Tomonori and Yagi, Takeshi},
  booktitle={Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual},
  volume={2},
  pages={577--582},
  year={2016},
  organization={IEEE}
}

@article{hu2017black,
  title={Black-box attacks against RNN based malware detection algorithms},
  author={Hu, Weiwei and Tan, Ying},
  journal={arXiv preprint arXiv:1705.08131},
  year={2017}
}

@inproceedings{yousefi2017autoencoder,
  title={Autoencoder-based feature learning for cyber security applications},
  author={Yousefi-Azar, Mahmood and Varadharajan, Vijay and Hamey, Len and Tupakula, Uday},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={3854--3861},
  year={2017},
  organization={IEEE}
}

@inproceedings{albasir2018using,
  title={Using Deep Learning to Classify Power Consumption Signals of Wireless Devices: An Application to Cybersecurity},
  author={Albasir, A and James, R Soundar Raja and Naik, K and Nayak, A},
  booktitle={2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)},
  pages={2032--2036},
  year={2018},
  organization={IEEE}
}
@inproceedings{kolosnjaji2017empowering,
  title={Empowering convolutional networks for malware classification and analysis},
  author={Kolosnjaji, Bojan and Eraisha, Ghadir and Webster, George and Zarras, Apostolis and Eckert, Claudia},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={3838--3845},
  year={2017},
  organization={IEEE}
}

@inproceedings{hou2017deep,
  title={Deep neural networks for automatic android malware detection},
  author={Hou, Shifu and Saas, Aaron and Chen, Lingwei and Ye, Yanfang and Bourlai, Thirimachos},
  booktitle={Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017},
  pages={803--810},
  year={2017},
  organization={ACM}
}

@article{yuxin2017malware,
  title={Malware detection based on deep learning algorithm},
  author={Yuxin, Ding and Siyi, Zhu},
  journal={Neural Computing and Applications},
  pages={1--12},
  year={2017},
  publisher={Springer}
}

@article{selvaganapathy2018deep,
  title={Deep belief network based detection and categorization of malicious URLs},
  author={Selvaganapathy, ShymalaGowri and Nivaashini, Mathappan and Natarajan, HemaPriya},
  journal={Information Security Journal: A Global Perspective},
  volume={27},
  number={3},
  pages={145--161},
  year={2018},
  publisher={Taylor \& Francis}
}

@article{passalislong,
  title={Long-term temporal averaging for stochastic optimization of deep neural networks},
  author={Passalis, Nikolaos and Tefas, Anastasios},
  journal={Neural Computing and Applications},
  pages={1--13},
  publisher={Springer}
}

@article{gibert2018using,
  title={Using convolutional neural networks for classification of malware represented as images},
  author={Gibert, Daniel and Mateu, Carles and Planes, Jordi and Vicens, Ramon},
  journal={Journal of Computer Virology and Hacking Techniques},
  pages={1--14},
  year={2018},
  publisher={Springer}
}

@article{haddadpajouh2018deep,
  title={A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting},
  author={HaddadPajouh, Hamed and Dehghantanha, Ali and Khayami, Raouf and Choo, Kim-Kwang Raymond},
  journal={Future Generation Computer Systems},
  volume={85},
  pages={88--96},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{ding2016application,
  title={Application of Deep Belief Networks for opcode based malware detection},
  author={Ding, Yuxin and Chen, Sheng and Xu, Jun},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={3901--3908},
  year={2016},
  organization={IEEE}
}
@article{yuxin2017malware,
  title={Malware detection based on deep learning algorithm},
  author={Yuxin, Ding and Siyi, Zhu},
  journal={Neural Computing and Applications},
  pages={1--12},
  year={2017},
  publisher={Springer}
}
@inproceedings{mclaughlin2017deep,
  title={Deep android malware detection},
  author={McLaughlin, Niall and Martinez del Rincon, Jesus and Kang, BooJoong and Yerima, Suleiman and Miller, Paul and Sezer, Sakir and Safaei, Yeganeh and Trickel, Erik and Zhao, Ziming and Doupe, Adam and others},
  booktitle={Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy},
  pages={301--308},
  year={2017},
  organization={ACM}
}
@article{yang2016application,
  title={APPLICATION OF DEEP BELIEF NETWORKS FOR ANDROID MALWARE DETECTION},
  author={YANG, JIA and ZHANG, HUIXIANG and MAO, BAOLEI and CHEN, CHUNLEI},
  journal={ICIC express letters. Part B, Applications: an international journal of research and surveys},
  volume={7},
  number={7},
  pages={1505--1510},
  year={2016},
  publisher={ICIC International}
}
@inproceedings{silva2018improving,
  title={Improving Malware Detection Accuracy by Extracting Icon Information},
  author={Silva, Pedro and Akhavan-Masouleh, Sepehr and Li, Li},
  booktitle={2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR)},
  pages={408--411},
  year={2018},
  organization={IEEE}
}


@article{martinelli2017evaluating,
  title={Evaluating convolutional neural network for effective mobile malware detection},
  author={Martinelli, Fabio and Marulli, Fiammetta and Mercaldo, Francesco},
  journal={Procedia Computer Science},
  volume={112},
  pages={2372--2381},
  year={2017},
  publisher={Elsevier}
}

@article{karbab2018maldozer,
  title={MalDozer: Automatic framework for android malware detection using deep learning},
  author={Karbab, ElMouatez Billah and Debbabi, Mourad and Derhab, Abdelouahid and Mouheb, Djedjiga},
  journal={Digital Investigation},
  volume={24},
  pages={S48--S59},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{wang2017adversary,
  title={Adversary resistant deep neural networks with an application to malware detection},
  author={Wang, Qinglong and Guo, Wenbo and Zhang, Kaixuan and Ororbia II, Alexander G and Xing, Xinyu and Liu, Xue and Giles, C Lee},
  booktitle={Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  pages={1145--1153},
  year={2017},
  organization={ACM}
}

@inproceedings{david2015deepsign,
  title={Deepsign: Deep learning for automatic malware signature generation and classification},
  author={David, Omid E and Netanyahu, Nathan S},
  booktitle={Neural Networks (IJCNN), 2015 International Joint Conference on},
  pages={1--8},
  year={2015},
  organization={IEEE}
}

@inproceedings{guo2017malware,
  title={Malware Detection with Convolutional Neural Network Using Hardware Events},
  author={Guo, Wei and Wang, Tenghai and Wei, Jizeng},
  booktitle={CCF National Conference on Compujter Engineering and Technology},
  pages={104--115},
  year={2017},
  organization={Springer}
}
@article{li2015hybrid,
  title={A hybrid malicious code detection method based on deep learning},
  author={Li, Yuancheng and Ma, Rong and Jiao, Runhai},
  journal={methods},
  volume={9},
  number={5},
  year={2015}
}
@inproceedings{de2018malware,
  title={Malware detection through low-level features and stacked denoising autoencoders},
  author={De Paola, Alessandra and Favaloro, Salvatore and Gaglio, Salvatore and Lo Re, G and Morana, Marco},
  booktitle={2nd Italian Conference on Cyber Security, ITASEC 2018},
  volume={2058},
  year={2018},
  organization={CEUR-WS}
}

@article{wang2018effective,
  title={Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network},
  author={Wang, Wei and Zhao, Mengxue and Wang, Jigang},
  journal={Journal of Ambient Intelligence and Humanized Computing},
  pages={1--9},
  year={2018},
  publisher={Springer}
}

@inproceedings{kebede2017classification,
  title={Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset},
  author={Kebede, Temesguen Messay and Djaneye-Boundjou, Ouboti and Narayanan, Barath Narayanan and Ralescu, Anca and Kapp, David},
  booktitle={Aerospace and Electronics Conference (NAECON), 2017 IEEE National},
  pages={70--75},
  year={2017},
  organization={IEEE}
}
@article{kim2018zero,
  title={Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders},
  author={Kim, Jin-Young and Bu, Seok-Jun and Cho, Sung-Bae},
  journal={Information Sciences},
  volume={460},
  pages={83--102},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{kebede2017classification,
  title={Classification of Malware programs using autoencoders based deep learning architecture and its application to the microsoft malware Classification challenge (BIG 2015) dataset},
  author={Kebede, Temesguen Messay and Djaneye-Boundjou, Ouboti and Narayanan, Barath Narayanan and Ralescu, Anca and Kapp, David},
  booktitle={Aerospace and Electronics Conference (NAECON), 2017 IEEE National},
  pages={70--75},
  year={2017},
  organization={IEEE}
}

@inproceedings{sewak2018investigation,
  title={An investigation of a deep learning based malware detection system},
  author={Sewak, Mohit and Sahay, Sanjay K and Rathore, Hemant},
  booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security},
  pages={26},
  year={2018},
  organization={ACM}
}

@inproceedings{de2018malware,
  title={Malware detection through low-level features and stacked denoising autoencoders},
  author={De Paola, Alessandra and Favaloro, Salvatore and Gaglio, Salvatore and Lo Re, G and Morana, Marco},
  booktitle={2nd Italian Conference on Cyber Security, ITASEC 2018},
  volume={2058},
  year={2018},
  organization={CEUR-WS}
}

@article{raff2017malware,
  title={Malware detection by eating a whole exe},
  author={Raff, Edward and Barker, Jon and Sylvester, Jared and Brandon, Robert and Catanzaro, Bryan and Nicholas, Charles},
  journal={arXiv preprint arXiv:1710.09435},
  year={2017}
}

@inproceedings{abdelsalam2018malware,
  title={Malware Detection in Cloud Infrastructures using Convolutional Neural Networks},
  author={Abdelsalam, Mahmoud and Krishnan, Ram and Huang, Yufei and Sandhu, Ravi},
  booktitle={2018 IEEE 11th International Conference on Cloud Computing (CLOUD)},
  pages={162--169},
  year={2018},
  organization={IEEE}
}
@inproceedings{tobiyama2018method,
  title={A method for estimating process maliciousness with Seq2Seq model},
  author={Tobiyama, Shun and Yamaguchi, Yukiko and Hasegawa, Hirokazu and Shimada, Hajime and Akiyama, Mitsuaki and Yagi, Takeshi},
  booktitle={2018 International Conference on Information Networking (ICOIN)},
  pages={255--260},
  year={2018},
  organization={IEEE}
}
@article{le2018deep,
  title={Deep learning at the shallow end: Malware classification for non-domain experts},
  author={Le, Quan and Boydell, Ois{\'\i}n and Mac Namee, Brian and Scanlon, Mark},
  journal={Digital Investigation},
  volume={26},
  pages={S118--S126},
  year={2018},
  publisher={Elsevier}
}


% Malware detection





% Medical records
@inproceedings{ghasedi2018semi,
  title={Semi-Supervised Generative Adversarial Network for Gene Expression Inference},
  author={Ghasedi Dizaji, Kamran and Wang, Xiaoqian and Huang, Heng},
  booktitle={Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery \& Data Mining},
  pages={1435--1444},
  year={2018},
  organization={ACM}
}

@article{yang2018toward,
  title={Toward Sustainable Virtualized Healthcare: Extracting Medical Entities from Chinese Online Health Consultations Using Deep Neural Networks},
  author={Yang, Hangzhou and Gao, Huiying},
  journal={Sustainability},
  volume={10},
  number={9},
  pages={3292},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{schlegl2017unsupervised,
  title={Unsupervised anomaly detection with generative adversarial networks to guide marker discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@article{schmidt2018artificial,
  title={Artificial intelligence in retina},
  author={Schmidt-Erfurth, Ursula and Sadeghipour, Amir and Gerendas, Bianca S and Waldstein, Sebastian M and Bogunovi{\'c}, Hrvoje},
  journal={Progress in retinal and eye research},
  year={2018},
  publisher={Elsevier}
}

@article{esteva2017dermatologist,
  title={Dermatologist-level classification of skin cancer with deep neural networks},
  author={Esteva, Andre and Kuprel, Brett and Novoa, Roberto A and Ko, Justin and Swetter, Susan M and Blau, Helen M and Thrun, Sebastian},
  journal={Nature},
  volume={542},
  number={7639},
  pages={115},
  year={2017},
  publisher={Nature Publishing Group}
}


@article{wang2016research,
  title={Research on healthy anomaly detection model based on deep learning from multiple time-series physiological signals},
  author={Wang, Kai and Zhao, Youjin and Xiong, Qingyu and Fan, Min and Sun, Guotan and Ma, Longkun and Liu, Tong},
  journal={Scientific Programming},
  volume={2016},
  year={2016},
  publisher={Hindawi}
}

@phdthesis{roa2017ransomware,
  title={Ransomware Attacks on the Healthcare Industry},
  author={Roa, Rafael E Escoto},
  year={2017},
  school={Utica College}
}


@article{cowton2018combined,
  title={A Combined Deep Learning GRU-Autoencoder for the Early Detection of Respiratory Disease in Pigs Using Multiple Environmental Sensors},
  author={Cowton, Jake and Kyriazakis, Ilias and Pl{\"o}tz, Thomas and Bacardit, Jaume},
  journal={Sensors},
  volume={18},
  number={8},
  pages={2521},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{xu2018unsupervised,
  title={Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications},
  author={Xu, Haowen and Chen, Wenxiao and Zhao, Nengwen and Li, Zeyan and Bu, Jiahao and Li, Zhihan and Liu, Ying and Zhao, Youjian and Pei, Dan and Feng, Yang and others},
  booktitle={Proceedings of the 2018 World Wide Web Conference on World Wide Web},
  pages={187--196},
  year={2018},
  organization={International World Wide Web Conferences Steering Committee}
}
@article{chen2018unsupervised,
  title={Unsupervised Detection of Lesions in Brain MRI using constrained adversarial auto-encoders},
  author={Chen, Xiaoran and Konukoglu, Ender},
  journal={arXiv preprint arXiv:1806.04972},
  year={2018}
}

@inproceedings{sato2018primitive,
  title={A primitive study on unsupervised anomaly detection with an autoencoder in emergency head CT volumes},
  author={Sato, Daisuke and Hanaoka, Shouhei and Nomura, Yukihiro and Takenaga, Tomomi and Miki, Soichiro and Yoshikawa, Takeharu and Hayashi, Naoto and Abe, Osamu},
  booktitle={Medical Imaging 2018: Computer-Aided Diagnosis},
  volume={10575},
  pages={105751P},
  year={2018},
  organization={International Society for Optics and Photonics}
}



@article{lu2018anomaly,
  title={Anomaly Detection for Skin Disease Images Using Variational Autoencoder},
  author={Lu, Yuchen and Xu, Peng},
  journal={arXiv preprint arXiv:1807.01349},
  year={2018}
}


@article{song2017hybrid,
  title={A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data},
  author={Song, Hongchao and Jiang, Zhuqing and Men, Aidong and Yang, Bo},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{turner2014deep,
  title={Deep belief networks used on high resolution multichannel electroencephalography data for seizure detection},
  author={Turner, JT and Page, Adam and Mohsenin, Tinoosh and Oates, Tim},
  booktitle={2014 AAAI Spring Symposium Series},
  year={2014}
}

@article{min2017deep,
  title={Deep learning in bioinformatics},
  author={Min, Seonwoo and Lee, Byunghan and Yoon, Sungroh},
  journal={Briefings in bioinformatics},
  volume={18},
  number={5},
  pages={851--869},
  year={2017},
  publisher={Oxford University Press}
}

@inproceedings{sharma2016abnormality,
  title={Abnormality Detecting Deep Belief Network},
  author={Sharma, Manoj Kumar and Sheet, Debdoot and Biswas, Prabir Kumar},
  booktitle={Proceedings of the International Conference on Advances in Information Communication Technology \& Computing},
  pages={11},
  year={2016},
  organization={ACM}
}

@inproceedings{wulsin2010semi,
  title={Semi-supervised anomaly detection for EEG waveforms using deep belief nets},
  author={Wulsin, Drausin and Blanco, Justin and Mani, Ram and Litt, Brian},
  booktitle={Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on},
  pages={436--441},
  year={2010},
  organization={IEEE}
}

@article{ma2018unsupervised,
  title={An Unsupervised Deep Hyperspectral Anomaly Detector},
  author={Ma, Ning and Peng, Yu and Wang, Shaojun and Leong, Philip HW},
  journal={Sensors},
  volume={18},
  number={3},
  pages={693},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{zhang2016automatic,
  title={Automatic sleep stage classification based on sparse deep belief net and combination of multiple classifiers},
  author={Zhang, Junming and Wu, Yan and Bai, Jing and Chen, Fuqiang},
  journal={Transactions of the Institute of Measurement and Control},
  volume={38},
  number={4},
  pages={435--451},
  year={2016},
  publisher={SAGE Publications Sage UK: London, England}
}


@article{cao2018deep,
  title={Deep learning and its applications in biomedicine},
  author={Cao, Chensi and Liu, Feng and Tan, Hai and Song, Deshou and Shu, Wenjie and Li, Weizhong and Zhou, Yiming and Bo, Xiaochen and Xie, Zhi},
  journal={Genomics, proteomics \& bioinformatics},
  year={2018},
  publisher={Elsevier}
}

@article{wulsin2011modeling,
  title={Modeling electroencephalography waveforms with semi-supervised deep belief nets: fast classification and anomaly measurement},
  author={Wulsin, DF and Gupta, JR and Mani, R and Blanco, JA and Litt, B},
  journal={Journal of neural engineering},
  volume={8},
  number={3},
  pages={036015},
  year={2011},
  publisher={IOP Publishing}
}

@article{iakovidis2018detecting,
  title={Detecting and Locating Gastrointestinal Anomalies Using Deep Learning and Iterative Cluster Unification},
  author={Iakovidis, Dimitris K and Georgakopoulos, Spiros V and Vasilakakis, Michael and Koulaouzidis, Anastasios and Plagianakos, Vassilis P},
  journal={IEEE Transactions on Medical Imaging},
  year={2018},
  publisher={IEEE}
}

@article{latif2018phonocardiographic,
  title={Phonocardiographic Sensing Using Deep Learning for Abnormal Heartbeat Detection},
  author={Latif, Siddique and Usman, Muhammad and Rana, Rajib and Qadir, Junaid},
  journal={IEEE Sensors Journal},
  volume={18},
  number={22},
  pages={9393--9400},
  year={2018},
  publisher={IEEE}
}

@inproceedings{chauhan2015anomaly,
  title={Anomaly detection in ECG time signals via deep long short-term memory networks},
  author={Chauhan, Sucheta and Vig, Lovekesh},
  booktitle={Data Science and Advanced Analytics (DSAA), 2015. 36678 2015. IEEE International Conference on},
  pages={1--7},
  year={2015},
  organization={IEEE}
}
@inproceedings{zhang2018time,
  title={Time Series Prediction and Anomaly Detection of Light Curve Using LSTM Neural Network},
  author={Zhang, Runtian and Zou, Qian},
  booktitle={Journal of Physics: Conference Series},
  volume={1061},
  number={1},
  pages={012012},
  year={2018},
  organization={IOP Publishing}
}

@article{o2016recurrent,
  title={Recurrent neural radio anomaly detection},
  author={O'Shea, Timothy J and Clancy, T Charles and McGwier, Robert W},
  journal={arXiv preprint arXiv:1611.00301},
  year={2016}
}

@phdthesis{choi2018doctor,
  title={Doctor AI: Interpretable Deep Learning for Modeling Electronic Health Records},
  author={Choi, Edward},
  year={2018},
  school={Georgia Institute of Technology}
}
@inproceedings{amarasinghe2018toward,
  title={Toward Explainable Deep Neural Network Based Anomaly Detection},
  author={Amarasinghe, Kasun and Kenney, Kevin and Manic, Milos},
  booktitle={2018 11th International Conference on Human System Interaction (HSI)},
  pages={311--317},
  year={2018},
  organization={IEEE}
}

@inproceedings{jagannatha2016bidirectional,
  title={Bidirectional RNN for medical event detection in electronic health records},
  author={Jagannatha, Abhyuday N and Yu, Hong},
  booktitle={Proceedings of the conference. Association for Computational Linguistics. North American Chapter. Meeting},
  volume={2016},
  pages={473},
  year={2016},
  organization={NIH Public Access}
}


@article{brown2018recurrent,
  title={Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection},
  author={Brown, Andy and Tuor, Aaron and Hutchinson, Brian and Nichols, Nicole},
  journal={arXiv preprint arXiv:1803.04967},
  year={2018}
}

@article{gugulothusparse,
  title={Sparse Neural Networks for Anomaly Detection in High-Dimensional Time Series},
  author={Gugulothu, Narendhar and Malhotra, Pankaj and Vig, Lovekesh and Shroff, Gautam}
}

% Medical records


%

@article{brown2018recurrent,
  title={Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection},
  author={Brown, Andy and Tuor, Aaron and Hutchinson, Brian and Nichols, Nicole},
  journal={arXiv preprint arXiv:1803.04967},
  year={2018}
}





@article{fajardo2018vos,
  title={VOS: a Method for Variational Oversampling of Imbalanced Data},
  author={Fajardo, Val Andrei and Findlay, David and Houmanfar, Roshanak and Jaiswal, Charu and Liang, Jiaxi and Xie, Honglei},
  journal={arXiv preprint arXiv:1809.02596},
  year={2018}
}
@inproceedings{aygun2017network,
  title={Network anomaly detection with stochastically improved autoencoder based models},
  author={Aygun, R Can and Yavuz, A Gokhan},
  booktitle={Cyber Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on},
  pages={193--198},
  year={2017},
  organization={IEEE}
}

@inproceedings{nicolau2016hybrid,
  title={A hybrid autoencoder and density estimation model for anomaly detection},
  author={Nicolau, Miguel and McDermott, James and others},
  booktitle={International Conference on Parallel Problem Solving from Nature},
  pages={717--726},
  year={2016},
  organization={Springer}
}


@article{fiore2017using,
  title={Using generative adversarial networks for improving classification effectiveness in credit card fraud detection},
  author={Fiore, Ugo and De Santis, Alfredo and Perla, Francesca and Zanetti, Paolo and Palmieri, Francesco},
  journal={Information Sciences},
  year={2017},
  publisher={Elsevier}
}

@article{pumsirirat2018credit,
  title={Credit Card Fraud Detection using Deep Learning based on Auto-Encoder and Restricted Boltzmann Machine},
  author={Pumsirirat, Apapan and Yan, Liu},
  journal={INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS},
  volume={9},
  number={1},
  pages={18--25},
  year={2018},
  publisher={SCIENCE \& INFORMATION SAI ORGANIZATION LTD 19 BOLLING RD, BRADFORD, WEST YORKSHIRE, 00000, ENGLAND}
}

@article{zheng2018one,
  title={One-Class Adversarial Nets for Fraud Detection},
  author={Zheng, Panpan and Yuan, Shuhan and Wu, Xintao and Li, Jun and Lu, Aidong},
  journal={arXiv preprint arXiv:1803.01798},
  year={2018}
}

@inproceedings{kazemi2017using,
  title={Using deep networks for fraud detection in the credit card transactions},
  author={Kazemi, Zahra and Zarrabi, Houman},
  booktitle={Knowledge-Based Engineering and Innovation (KBEI), 2017 IEEE 4th International Conference on},
  pages={0630--0633},
  year={2017},
  organization={IEEE}
}

@misc{renstrom2018fraud,
  title={Fraud Detection on Unlabeled Data with Unsupervised Machine Learning},
  author={Renstr{\"o}m, Martin and Holmsten, Timothy},
  year={2018}
}

@article{suganya2015survey,
  title={A survey on credit card fraud detection},
  author={Suganya, S and Kamalraj, N},
  journal={International Journal of Computer Science and Mobile Computing},
  volume={4},
  pages={241--244},
  year={2015}
}

@article{sweers2018autoencoding,
  title={Autoencoding Credit Card Fraud},
  author={Sweers, Tom and Heskes, Tom and Krijthe, Jesse},
  year={2018}
}

@article{seeja2014fraudminer,
  title={FraudMiner: A novel credit card fraud detection model based on frequent itemset mining},
  author={Seeja, KR and Zareapoor, Masoumeh},
  journal={The Scientific World Journal},
  volume={2014},
  year={2014},
  publisher={Hindawi}
}


@inproceedings{zhou2018state,
  title={A state of the art survey of data mining-based fraud detection and credit scoring},
  author={Zhou, Xun and Cheng, Sicong and Zhu, Meng and Guo, Chengkun and Zhou, Sida and Xu, Peng and Xue, Zhenghua and Zhang, Weishi},
  booktitle={MATEC Web of Conferences},
  volume={189},
  pages={03002},
  year={2018},
  organization={EDP Sciences}
}

@article{zhang2018model,
  title={A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection},
  author={Zhang, Zhaohui and Zhou, Xinxin and Zhang, Xiaobo and Wang, Lizhi and Wang, Pengwei},
  journal={Security and Communication Networks},
  volume={2018},
  year={2018},
  publisher={Hindawi}
}

@misc{lu2017deep,
  title={Deep neural networks and fraud detection},
  author={Lu, Yifei},
  year={2017}
}

@article{abroyan2017neural,
  title={Neural Networks for Financial Market Risk Classification},
  author={Abroyan, Narek},
  year={2017}
}

@article{zheng2018generative,
  title={Generative adversarial network based telecom fraud detection at the receiving bank},
  author={Zheng, Yu-Jun and Zhou, Xiao-Han and Sheng, Wei-Guo and Xue, Yu and Chen, Sheng-Yong},
  journal={Neural Networks},
  volume={102},
  pages={78--86},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{wang2018credit,
  title={Credit Card Fraud Detection Based on Whale Algorithm Optimized BP Neural Network},
  author={Wang, Chunzhi and Wang, Yichao and Ye, Zhiwei and Yan, Lingyu and Cai, Wencheng and Pan, Shang},
  booktitle={2018 13th International Conference on Computer Science \& Education (ICCSE)},
  pages={1--4},
  year={2018},
  organization={IEEE}
}

@inproceedings{fu2016credit,
  title={Credit card fraud detection using convolutional neural networks},
  author={Fu, Kang and Cheng, Dawei and Tu, Yi and Zhang, Liqing},
  booktitle={International Conference on Neural Information Processing},
  pages={483--490},
  year={2016},
  organization={Springer}
}

@inproceedings{abroyan2017convolutional,
  title={Convolutional and recurrent neural networks for real-time data classification},
  author={Abroyan, Narek},
  booktitle={Innovative Computing Technology (INTECH), 2017 Seventh International Conference on},
  pages={42--45},
  year={2017},
  organization={IEEE}
}


@incollection{wiese2009credit,
  title={Credit card transactions, fraud detection, and machine learning: Modelling time with LSTM recurrent neural networks},
  author={Wiese, B{\'e}nard and Omlin, Christian},
  booktitle={Innovations in neural information paradigms and applications},
  pages={231--268},
  year={2009},
  publisher={Springer}
}

@inproceedings{wang2017session,
  title={Session-Based Fraud Detection in Online E-Commerce Transactions Using Recurrent Neural Networks},
  author={Wang, Shuhao and Liu, Cancheng and Gao, Xiang and Qu, Hongtao and Xu, Wei},
  booktitle={Joint European Conference on Machine Learning and Knowledge Discovery in Databases},
  pages={241--252},
  year={2017},
  organization={Springer}
}

@article{ando2016detecting,
  title={Detecting Fraudulent Behavior Using Recurrent Neural Networks},
  author={Ando, Yoshihiro and Gomi, Hidehito and Tanaka, Hidehiko},
  year={2016}
}

@article{chouiekh2018convnets,
  title={ConvNets for Fraud Detection analysis},
  author={Chouiekh, Alae and Haj, EL Hassane Ibn EL},
  journal={Procedia Computer Science},
  volume={127},
  pages={133--138},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{heryadi2017learning,
  title={Learning temporal representation of transaction amount for fraudulent transaction recognition using CNN, Stacked LSTM, and CNN-LSTM},
  author={Heryadi, Yaya and Warnars, Harco Leslie Hendric Spits},
  booktitle={Cybernetics and Computational Intelligence (CyberneticsCom), 2017 IEEE International Conference on},
  pages={84--89},
  year={2017},
  organization={IEEE}
}


@article{jurgovsky2018sequence,
  title={Sequence classification for credit-card fraud detection},
  author={Jurgovsky, Johannes and Granitzer, Michael and Ziegler, Konstantin and Calabretto, Sylvie and Portier, Pierre-Edouard and He-Guelton, Liyun and Caelen, Olivier},
  journal={Expert Systems with Applications},
  volume={100},
  pages={234--245},
  year={2018},
  publisher={Elsevier}
}

@inproceedings{shen2007application,
  title={Application of classification models on credit card fraud detection},
  author={Shen, Aihua and Tong, Rencheng and Deng, Yaochen},
  booktitle={Service Systems and Service Management, 2007 International Conference on},
  pages={1--4},
  year={2007},
  organization={IEEE}
}

@incollection{wiese2009credit,
  title={Credit card transactions, fraud detection, and machine learning: Modelling time with LSTM recurrent neural networks},
  author={Wiese, B{\'e}nard and Omlin, Christian},
  booktitle={Innovations in neural information paradigms and applications},
  pages={231--268},
  year={2009},
  publisher={Springer}
}

@incollection{wiese2009credit,
  title={Credit card transactions, fraud detection, and machine learning: Modelling time with LSTM recurrent neural networks},
  author={Wiese, B{\'e}nard and Omlin, Christian},
  booktitle={Innovations in neural information paradigms and applications},
  pages={231--268},
  year={2009},
  publisher={Springer}
}

@article{gomez2018end,
  title={End-to-end neural network architecture for fraud scoring in card payments},
  author={G{\'o}mez, Jon Ander and Ar{\'e}valo, Juan and Paredes, Roberto and Nin, Jordi},
  journal={Pattern Recognition Letters},
  volume={105},
  pages={175--181},
  year={2018},
  publisher={Elsevier}
}

@article{pumsirirat2018credit,
  title={Credit Card Fraud Detection using Deep Learning based on Auto-Encoder and Restricted Boltzmann Machine},
  author={Pumsirirat, Apapan and Yan, Liu},
  journal={INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS},
  volume={9},
  number={1},
  pages={18--25},
  year={2018},
  publisher={SCIENCE \& INFORMATION SAI ORGANIZATION LTD 19 BOLLING RD, BRADFORD, WEST YORKSHIRE, 00000, ENGLAND}
}

@inproceedings{huang2018deep,
  title={A Deep Learning-Based Method for Sleep Stage Classification Using Physiological Signal},
  author={Huang, Guanjie and Chu, Chao-Hsien and Wu, Xiaodan},
  booktitle={International Conference on Smart Health},
  pages={249--260},
  year={2018},
  organization={Springer}
}


@article{namatevs2017deep,
  title={Deep convolutional neural networks: Structure, feature extraction and training},
  author={Namat{\=e}vs, Ivars},
  journal={Information Technology and Management Science},
  volume={20},
  number={1},
  pages={40--47},
  year={2017},
  publisher={De Gruyter Open}
}

@article{wang2016research,
  title={Research on healthy anomaly detection model based on deep learning from multiple time-series physiological signals},
  author={Wang, Kai and Zhao, Youjin and Xiong, Qingyu and Fan, Min and Sun, Guotan and Ma, Longkun and Liu, Tong},
  journal={Scientific Programming},
  volume={2016},
  year={2016},
  publisher={Hindawi}
}


@article{jain2017perspective,
  title={Perspective analysis of telecommunication fraud detection using data stream analytics and neural network classification based data mining},
  author={Jain, Vanita},
  journal={International Journal of Information Technology},
  volume={9},
  number={3},
  pages={303--310},
  year={2017},
  publisher={Springer}
}


@article{abdallah2016fraud,
  title={Fraud detection system: A survey},
  author={Abdallah, Aisha and Maarof, Mohd Aizaini and Zainal, Anazida},
  journal={Journal of Network and Computer Applications},
  volume={68},
  pages={90--113},
  year={2016},
  publisher={Elsevier}
}

@article{akhter2012detecting,
  title={Detecting telecommunication fraud using neural networks through data mining},
  author={Akhter, Mohammad Iquebal and Ahamad, Mohammad Gulam},
  journal={International Journal of Scientific and Engineering Research},
  volume={3},
  number={3},
  pages={601--6},
  year={2012}
}

@article{badhe2017click,
  title={Click fraud detection in mobile ads served in programmatic inventory},
  author={Badhe, Anup},
  journal={Neural Networks \& Machine Learning},
  volume={1},
  number={1},
  pages={1--1},
  year={2017}
}

@article{alsheikh2016mobile,
  title={Mobile big data analytics using deep learning and apache spark},
  author={Alsheikh, Mohammad Abu and Niyato, Dusit and Lin, Shaowei and Tan, Hwee-Pink and Han, Zhu},
  journal={IEEE network},
  volume={30},
  number={3},
  pages={22--29},
  year={2016},
  publisher={IEEE}
}

@article{wedge2017solving,
  title={Solving the" false positives" problem in fraud prediction},
  author={Wedge, Roy and Kanter, James Max and Rubio, Santiago Moral and Perez, Sergio Iglesias and Veeramachaneni, Kalyan},
  journal={arXiv preprint arXiv:1710.07709},
  year={2017}
}

@article{you2017hybrid,
  title={A hybrid technique based on convolutional neural network and support vector regression for intelligent diagnosis of rotating machinery},
  author={You, Wei and Shen, Changqing and Guo, Xiaojie and Jiang, Xingxing and Shi, Juanjuan and Zhu, Zhongkui},
  journal={Advances in Mechanical Engineering},
  volume={9},
  number={6},
  pages={1687814017704146},
  year={2017},
  publisher={SAGE Publications Sage UK: London, England}
}

@inproceedings{krawczyk2016hybrid,
  title={Hybrid One-Class Ensemble for High-Dimensional Data Classification},
  author={Krawczyk, Bartosz},
  booktitle={Asian Conference on Intelligent Information and Database Systems},
  pages={136--144},
  year={2016},
  organization={Springer}
}


@article{song2017hybrid,
  title={A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data},
  author={Song, Hongchao and Jiang, Zhuqing and Men, Aidong and Yang, Bo},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{schlegl2017unsupervised,
  title={Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@inproceedings{jiulong2017detecting,
  title={Detecting Chinese calligraphy style consistency by deep learning and one-class SVM},
  author={Jiulong, Zhang and Luming, Guo and Su, Yang and Xudong, Sun and Xiaoshan, Li},
  booktitle={Image, Vision and Computing (ICIVC), 2017 2nd International Conference on},
  pages={83--86},
  year={2017},
  organization={IEEE}
}

@article{athiwaratkun2015feature,
  title={Feature representation in convolutional neural networks},
  author={Athiwaratkun, Ben and Kang, Keegan},
  journal={arXiv preprint arXiv:1507.02313},
  year={2015}
}
@inproceedings{dosovitskiy2014discriminative,
  title={Discriminative unsupervised feature learning with convolutional neural networks},
  author={Dosovitskiy, Alexey and Springenberg, Jost Tobias and Riedmiller, Martin and Brox, Thomas},
  booktitle={Advances in Neural Information Processing Systems},
  pages={766--774},
  year={2014}
}

@article{ahmed2008training,
  title={Training hierarchical feed-forward visual recognition models using transfer learning from pseudo-tasks},
  author={Ahmed, Amr and Yu, Kai and Xu, Wei and Gong, Yihong and Xing, Eric},
  journal={Computer Vision--ECCV 2008},
  pages={69--82},
  year={2008},
  publisher={Springer}
}

@article{pan2010survey,
  title={A survey on transfer learning},
  author={Pan, Sinno Jialin and Yang, Qiang},
  journal={IEEE Transactions on knowledge and data engineering},
  volume={22},
  number={10},
  pages={1345--1359},
  year={2010},
  publisher={IEEE}
}

@article{cao2003comparison,
  title={A comparison of PCA, KPCA and ICA for dimensionality reduction in support vector machine},
  author={Cao, LJ and Chua, Kok Seng and Chong, WK and Lee, HP and Gu, QM},
  journal={Neurocomputing},
  volume={55},
  number={1},
  pages={321--336},
  year={2003},
  publisher={Elsevier}
}

@article{widodo2007combination,
  title={Combination of independent component analysis and support vector machines for intelligent faults diagnosis of induction motors},
  author={Widodo, Achmad and Yang, Bo-Suk and Han, Tian},
  journal={Expert systems with applications},
  volume={32},
  number={2},
  pages={299--312},
  year={2007},
  publisher={Elsevier}
}

@article{shen2008feature,
  title={Feature selection via sensitivity analysis of SVM probabilistic outputs},
  author={Shen, Kai-Quan and Ong, Chong-Jin and Li, Xiao-Ping and Wilder-Smith, Einar PV},
  journal={Machine Learning},
  volume={70},
  number={1},
  pages={1--20},
  year={2008},
  publisher={Springer}
}
@article{neumann2005combined,
  title={Combined SVM-based feature selection and classification},
  author={Neumann, Julia and Schn{\"o}rr, Christoph and Steidl, Gabriele},
  journal={Machine learning},
  volume={61},
  number={1},
  pages={129--150},
  year={2005},
  publisher={Springer}
}


@article{hinton2010practical,
  title={A practical guide to training restricted Boltzmann machines},
  author={Hinton, Geoffrey},
  journal={Momentum},
  volume={9},
  number={1},
  pages={926},
  year={2010}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}

@inproceedings{yosinski2014transferable,
  title={How transferable are features in deep neural networks?},
  author={Yosinski, Jason and Clune, Jeff and Bengio, Yoshua and Lipson, Hod},
  booktitle={Advances in neural information processing systems},
  pages={3320--3328},
  year={2014}
}

@article{bengio2007scaling,
  title={Scaling learning algorithms towards AI},
  author={Bengio, Yoshua and LeCun, Yann and others},
  journal={Large-scale kernel machines},
  volume={34},
  number={5},
  pages={1--41},
  year={2007}
}


@inproceedings{vishwanathan2003simplesvm,
  title={SimpleSVM},
  author={Vishwanathan, SVN and Smola, Alexander J and Murty, M Narasimha},
  booktitle={Proceedings of the Twentieth International Conference on International Conference on Machine Learning},
  pages={760--767},
  year={2003},
  organization={AAAI press}
}



@book{vapnik1998statistical,
  title={Statistical learning theory},
  author={Vapnik, Vladimir Naumovich and Vapnik, Vlamimir},
  volume={1},
  year={1998},
  publisher={Wiley New York}
}


@article{scholkopf2001estimating,
  title={Estimating the support of a high-dimensional distribution},
  author={Sch{\"o}lkopf, Bernhard and Platt, John C and Shawe-Taylor, John and Smola, Alex J and Williamson, Robert C},
  journal={Neural computation},
  volume={13},
  number={7},
  pages={1443--1471},
  year={2001},
  publisher={MIT Press}
}

@article{scholkopf2002support,
  title={Support vector machines, regularization, optimization, and beyond},
  author={Sch{\"o}lkopf, Bernhard and Smola, Alexander J},
  journal={MIT Press},
  volume={656},
  pages={657},
  year={2002}
}

@article{tax2004support,
  title={Support vector data description},
  author={Tax, David MJ and Duin, Robert PW},
  journal={Machine learning},
  volume={54},
  number={1},
  pages={45--66},
  year={2004},
  publisher={Springer}
}

@article{wang2006structured,
  title={Structured one-class classification},
  author={Wang, Defeng and Yeung, Daniel S and Tsang, Eric CC},
  journal={IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)},
  volume={36},
  number={6},
  pages={1283--1295},
  year={2006},
  publisher={IEEE}
}


@article{lecun2010mnist,
  title={MNIST handwritten digit database},
  author={LeCun, Yann and Cortes, Corinna and Burges, Christopher JC},
  journal={AT\&T Labs [Online]. Available: http://yann. lecun. com/exdb/mnist},
  volume={2},
  year={2010}
}

@article{finn2016pfam,
  title={The Pfam protein families database: towards a more sustainable future},
  author={Finn, Robert D and Coggill, Penelope and Eberhardt, Ruth Y and Eddy, Sean R and Mistry, Jaina and Mitchell, Alex L and Potter, Simon C and Punta, Marco and Qureshi, Matloob and Sangrador-Vegas, Amaia and others},
  journal={Nucleic acids research},
  volume={44},
  number={D1},
  pages={D279--D285},
  year={2016},
  publisher={Oxford University Press}
}

@inproceedings{bingham2001random,
  title={Random projection in dimensionality reduction: applications to image and text data},
  author={Bingham, Ella and Mannila, Heikki},
  booktitle={Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining},
  pages={245--250},
  year={2001},
  organization={ACM}
}

  @Article{tSNEVisualize2008,
    title = {Visualizing High-Dimensional Data Using t-SNE},
    volume = {9},
    pages = {2579-2605},
    year = {2008},
    author = {L.J.P. {van der Maaten} and G.E. Hinton},
    journal = {Journal of Machine Learning Research},
  }

@inproceedings{xu2010robust,
  title={Robust PCA via outlier pursuit},
  author={Xu, Huan and Caramanis, Constantine and Sanghavi, Sujay},
  booktitle={Advances in Neural Information Processing Systems},
  pages={2496--2504},
  year={2010}
}

@article{rathore2017ensemble,
  title={Ensemble fuzzy clustering using cumulative aggregation on random projections},
  author={Rathore, Punit and Bezdek, James C and Erfani, Sarah M and Rajasegarar, Sutharshan and Palaniswami, Marimuthu},
  journal={IEEE Transactions on Fuzzy Systems},
  year={2017},
  publisher={IEEE}
}

@article{erfani2015r1svm,
  title={R1SVM: a randomised nonlinear approach to large-scale anomaly detection},
  author={Erfani, Sarah and Baktashmotlagh, Mahsa and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Chris},
  year={2015}
}







@misc{chollet2015keras,
  title={Keras},
  author={Chollet, Fran\c{c}ois and others},
  year={2015},
  publisher={GitHub},
  howpublished={\url{https://github.com/keras-team/keras}},
}

@book{boyd2004convex,
  title={Convex optimization},
  author={Boyd, Stephen and Vandenberghe, Lieven},
  year={2004},
  publisher={Cambridge university press}
}

@article{chalapathy2017robust,
  title={Robust, Deep and Inductive Anomaly Detection},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1704.06743},
  year={2017}
}

@article{scikit-learn,
 title={Scikit-learn: Machine Learning in {P}ython},
 author={Pedregosa, F. and Varoquaux, G. and Gramfort, A. and Michel, V.
         and Thirion, B. and Grisel, O. and Blondel, M. and Prettenhofer, P.
         and Weiss, R. and Dubourg, V. and Vanderplas, J. and Passos, A. and
         Cournapeau, D. and Brucher, M. and Perrot, M. and Duchesnay, E.},
 journal={Journal of Machine Learning Research},
 volume={12},
 pages={2825--2830},
 year={2011}
}
@inproceedings{zhou2017anomaly,
  title={Anomaly detection with robust deep autoencoders},
  author={Zhou, Chong and Paffenroth, Randy C},
  booktitle={Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  pages={665--674},
  year={2017},
  organization={ACM}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}

@inproceedings{Sedhain:2015,
  author    = {Suvash Sedhain and
               Aditya Krishna Menon and
               Scott Sanner and
               Lexing Xie},
  title     = {AutoRec: Autoencoders Meet Collaborative Filtering},
  booktitle = {International Conference on World Wide Web (WWW)},
  year      = {2015}
}

@inproceedings{Williams:2002,
 author = {Williams, Graham and Baxter, Rohan and He, Hongxing and Hawkins, Simon and Gu, Lifang},
 title = {A Comparative Study of RNN for Outlier Detection in Data Mining},
 booktitle = {International Conference on Data Mining (ICDM)},
 year = {2002}
}

@inproceedings{Zhai:2016,
 author = {Zhai, Shuangfei and Cheng, Yu and Lu, Weining and Zhang, Zhongfei},
 title = {Deep Structured Energy Based Models for Anomaly Detection},
 booktitle = {International Conference on Machine Learning ({ICML}) },
 year = {2016}
}

@inproceedings{Lawrence:2009,
 author = {Lawrence, Neil D. and Urtasun, Raquel},
 title = {Non-linear Matrix Factorization with Gaussian Processes},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2009},
 numpages = {8},
}

@inproceedings{Davis:2006,
 author = {Davis, Jesse and Goadrich, Mark},
 title = {The Relationship Between Precision-Recall and ROC Curves},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2006},
 numpages = {8},
}

@inproceedings{Nguyen:2009,
  Author = {Minh H. Nguyen and Fernando Torre},
  Booktitle = {Advances in Neural Information Processing Systems (NIPS)},
  Title = {Robust Kernel Principal Component Analysis},
  Year = {2009}
}

@ARTICLE{Sprechmann:2015,
author={P. Sprechmann and A. M. Bronstein and G. Sapiro},
journal={IEEE Transactions on Pattern Analysis and Machine Intelligence},
title={Learning Efficient Sparse and Low Rank Models},
year={2015},
volume={37},
number={9},
pages={1821-1833},
month={Sept}
}

@article{Huang:2010,
author = "Huang, Junzhou and Zhang, Tong",
doi = "10.1214/09-AOS778",
fjournal = "The Annals of Statistics",
journal = "Ann. Statist.",
month = "08",
number = "4",
pages = "1978--2004",
publisher = "The Institute of Mathematical Statistics",
title = "The benefit of group sparsity",
volume = "38",
year = "2010"
}

@incollection{Jain:2008,
    Author = {Viren Jain and Sebastian Seung},
    Booktitle = {Advances in Neural Information Processing Systems 21},
    Title = {Natural Image Denoising with Convolutional Networks},
    Year = {2008},
    Pages = {769--776}
   }

@Book{Bishop:2006,
  author =   "Christopher M. Bishop",
  title =    "Pattern Recognition and Machine Learning",
  publisher =    "Springer",
  year =   "2006",
}

@article{Ghoting:2008,
  Author = {Ghoting, Amol and Parthasarathy, Srinivasan and Otey, Matthew and Ghoting, Amol and Parthasarathy, Srinivasan and Otey, Matthew E.},
  Journal = {Data Mining and Knowledge Discovery},
  Number = {3},
  Pages = {349--364},
  Publisher = {Springer Netherlands},
  Title = {{Fast mining of distance-based outliers in high-dimensional datasets}},
  Volume = {16},
  Year = {2008}}

@book{Goodfellow-et-al-2016,
    title={Deep Learning},
    author={Ian Goodfellow and Yoshua Bengio and Aaron Courville},
    publisher={MIT Press},
    note={\url{http://www.deeplearningbook.org}},
    year={2016}
}

@article{Hotelling:1933,
  Author = {Hotelling, H.},
  Journal = {J. Educ. Psych.},
  Title = {{Analysis of a complex of statistical variables into principal components}},
  Volume = {24},
  Year = {1933}}

@incollection{Bach:2011,
  Author = {Bach, Francis and Jenatton, Rodolphe and Mairal, Julien and Obozinski, Guillaume},
  Booktitle = {Optimization for Machine Learning, MIT Press},
  Title = {{Convex Optimization with Sparsity-Inducing Norms}},
  Year = {2011},
}

@article{chandola2007outlier,
  title={Outlier detection: A survey},
  author={Chandola, Varun and Banerjee, Arindam and Kumar, Vipin},
  journal={ACM Computing Surveys},
  year={2007}
}

@article{vincent2010stacked,
  title={Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion},
  author={Vincent, Pascal and Larochelle, Hugo and Lajoie, Isabelle and Bengio, Yoshua and Manzagol, Pierre-Antoine},
  journal={JMLR},
  volume={11},
  pages={3371--3408},
  year={2010},
  publisher={JMLR. org}
}
@inproceedings{breunig2000lof,
  title={LOF: identifying density-based local outliers},
  author={Breunig, Markus M and Kriegel, Hans-Peter and Ng, Raymond T and Sander, J{\"o}rg},
  booktitle={ACM sigmod record},
  volume={29},
  number={2},
  pages={93--104},
  year={2000},
  organization={ACM}
}
@inproceedings{knorr1997unified,
  title={A Unified Notion of Outliers: Properties and Computation.},
  author={Knorr, Edwin M and Ng, Raymond T},
  booktitle={KDD},
  pages={219--222},
  year={1997}
}

@book{charubook,
  title={Outlier Analysis},
  edition = {2nd},
  publisher = {Springer},
  author={Aggarwal, Charu C},
  year={2016}
}

@inproceedings{Zhao:2009,
  author    = {Manqi Zhao and
               Venkatesh Saligrama},
  title     = {Anomaly Detection with Score functions based on Nearest Neighbor Graphs},
  booktitle = {Advances in Neural Information Processing Systems (NIPS)},
  pages     = {2250--2258},
  year      = {2009},
}

@article{Scholkopf:2001,
place={Cambridge, MA, USA}, title={Estimating the Support of a High-Dimensional Distribution}, volume={13}, number={7}, journal={Neural Computation}, publisher={MIT Press}, author={Schölkopf, Bernhard and Platt, John C and Shawe-Taylor, John C and Smola, Alex J and Williamson, Robert C}, year={2001}, month={Jul}, pages={1443–1471}}

@inproceedings{candes2010robust,
  title={Robust principal component analysis?: Recovering low-rank matrices from sparse errors},
  author={Cand{\'e}s, Emmanuel and Li, Xiaodong and Ma, Yi and Wright, John},
  booktitle={Sensor Array and Multichannel Signal Processing Workshop (SAM), 2010 IEEE},
  pages={201--204},
  year={2010},
  organization={IEEE}
}

@techreport{krizhevsky2009learning,
  title={Learning multiple layers of features from tiny images},
  author={Krizhevsky, Alex and Hinton, Geoffrey},
  year={2009},
  Institute={University of Toronto}
}

@article{abadi2016tensorflow,
  title={Tensorflow: Large-scale machine learning on heterogeneous distributed systems},
  author={Abadi, Mart{\'\i}n and Agarwal, Ashish and Barham, Paul and Brevdo, Eugene and Chen, Zhifeng and Citro, Craig and Corrado, Greg S and Davis, Andy and Dean, Jeffrey and Devin, Matthieu and others},
  journal={arXiv preprint arXiv:1603.04467},
  year={2016}
}

@inproceedings{xiong2011direct,
  title={Direct robust matrix factorizatoin for anomaly detection},
  author={Xiong, Liang and Chen, Xi and Schneider, Jeff},
  booktitle={International Conference on Data Mining (ICDM)},
  year={2011},
  organization={IEEE}
}

@article{becker2011templates,
  title={Templates for convex cone problems with applications to sparse signal recovery},
  author={Becker, Stephen R and Cand{\`e}s, Emmanuel J and Grant, Michael C},
  journal={Mathematical programming computation},
  volume={3},
  number={3},
  pages={165--218},
  year={2011},
  publisher={Springer}
}

@article{pedregosa2011scikit,
  title={Scikit-learn: Machine learning in Python},
  author={Pedregosa, Fabian and Varoquaux, Ga{\"e}l and Gramfort, Alexandre and Michel, Vincent and Thirion, Bertrand and Grisel, Olivier and Blondel, Mathieu and Prettenhofer, Peter and Weiss, Ron and Dubourg, Vincent and others},
  journal={JMLR},
  volume={12},
  number={Oct},
  pages={2825--2830},
  year={2011}
}

@article{bengio2009learning,
  title={Learning deep architectures for AI},
  author={Bengio, Yoshua and others},
  journal={Foundations and trends{\textregistered} in Machine Learning},
  volume={2},
  number={1},
  pages={1--127},
  year={2009},
  publisher={Now Publishers, Inc.}
}

@article{hull1994database,
  title={A database for handwritten text recognition research},
  author={Hull, Jonathan J.},
  journal={IEEE Transactions on pattern analysis and machine intelligence},
  volume={16},
  number={5},
  pages={550--554},
  year={1994},
  publisher={IEEE}
}

@inproceedings{xu2010robust,
  title={Robust {PCA} via outlier pursuit},
  author={Xu, Huan and Caramanis, Constantine and Sanghavi, Sujay},
  booktitle={Advances in Neural Information Processing Systems},
  pages={2496--2504},
  year={2010}
}

@article{ioffe2015batch,
  title={Batch normalization: Accelerating deep network training by reducing internal covariate shift},
  author={Ioffe, Sergey and Szegedy, Christian},
  journal={arXiv preprint arXiv:1502.03167},
  year={2015}
}

@article{clevert2015fast,
  title={Fast and accurate deep network learning by exponential linear units (elus)},
  author={Clevert, Djork-Arn{\'e} and Unterthiner, Thomas and Hochreiter, Sepp},
  journal={arXiv preprint arXiv:1511.07289},
  year={2015}
}



@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}
@article{abati2018and,
  title={AND: Autoregressive Novelty Detectors},
  author={Abati, Davide and Porrello, Angelo and Calderara, Simone and Cucchiara, Rita},
  journal={arXiv preprint arXiv:1807.01653},
  year={2018}
}

@article{perera2018learning,
  title={Learning Deep Features for One-Class Classification},
  author={Perera, Pramuditha and Patel, Vishal M},
  journal={arXiv preprint arXiv:1801.05365},
  year={2018}
}
@article{wu2018semi,
  title={Semi-supervised deep learning using pseudo labels for hyperspectral image classification},
  author={Wu, Hao and Prasad, Saurabh},
  journal={IEEE Transactions on Image Processing},
  volume={27},
  number={3},
  pages={1259--1270},
  year={2018},
  publisher={IEEE}
}

@mastersthesis{lu2009fundamental,
  title={Fundamental limitations of semi-supervised learning},
  author={Lu, Tyler Tian},
  year={2009},
  school={University of Waterloo}
}
@article{you2017hybrid,
  title={A hybrid technique based on convolutional neural network and support vector regression for intelligent diagnosis of rotating machinery},
  author={You, Wei and Shen, Changqing and Guo, Xiaojie and Jiang, Xingxing and Shi, Juanjuan and Zhu, Zhongkui},
  journal={Advances in Mechanical Engineering},
  volume={9},
  number={6},
  pages={1687814017704146},
  year={2017},
  publisher={SAGE Publications Sage UK: London, England}
}
@inproceedings{zhu2018hybrid,
  title={A hybrid deep learning model for consumer credit scoring},
  author={Zhu, Bing and Yang, Wenchuan and Wang, Huaxuan and Yuan, Yuan},
  booktitle={2018 International Conference on Artificial Intelligence and Big Data (ICAIBD)},
  pages={205--208},
  year={2018},
  organization={IEEE}
}

@misc{shi2017semi,
  title={Semi-supervised Random Forest for Intrusion Detection Network},
  author={Shi, Ningxin and Yuan, Xiaohong and Nick, William},
  year={2017},
  publisher={MAICS}
}
@phdthesis{dimokranitou2017adversarial,
  title={Adversarial autoencoders for anomalous event detection in images},
  author={Dimokranitou, Asimenia},
  year={2017}
}

@article{estiri2018semi,
  title={Semi-supervised Encoding for Outlier Detection in Clinical Observation Data},
  author={Estiri, Hossein and Murphy, Shawn},
  journal={bioRxiv},
  pages={334771},
  year={2018},
  publisher={Cold Spring Harbor Laboratory}
}
@inproceedings{racah2017extremeweather,
  title={ExtremeWeather: A large-scale climate dataset for semi-supervised detection, localization, and understanding of extreme weather events},
  author={Racah, Evan and Beckham, Christopher and Maharaj, Tegan and Kahou, Samira Ebrahimi and Prabhat, Mr and Pal, Chris},
  booktitle={Advances in Neural Information Processing Systems},
  pages={3402--3413},
  year={2017}
}

@article{wulsin2011modeling,
  title={Modeling electroencephalography waveforms with semi-supervised deep belief nets: fast classification and anomaly measurement},
  author={Wulsin, DF and Gupta, JR and Mani, R and Blanco, JA and Litt, B},
  journal={Journal of neural engineering},
  volume={8},
  number={3},
  pages={036015},
  year={2011},
  publisher={IOP Publishing}
}

@inproceedings{min2018ids,
  title={SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection},
  author={Min, Erxue and Long, Jun and Liu, Qiang and Cui, Jianjing and Cai, Zhiping and Ma, Junbo},
  booktitle={International Conference on Cloud Computing and Security},
  pages={322--334},
  year={2018},
  organization={Springer}
}

@article{edmunds2017deep,
  title={Deep Semi-Supervised Embeddings for Dynamic Targeted Anomaly Detection},
  author={Edmunds, Riley and Feinstein, Efraim},
  year={2017}
}

@inproceedings{jia2014novel,
  title={A novel semi-supervised deep learning framework for affective state recognition on eeg signals},
  author={Jia, Xiaowei and Li, Kang and Li, Xiaoyi and Zhang, Aidong},
  booktitle={Bioinformatics and Bioengineering (BIBE), 2014 IEEE International Conference on},
  pages={30--37},
  year={2014},
  organization={IEEE}
}

@article{akcay2018ganomaly,
  title={GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training},
  author={Akcay, Samet and Atapour-Abarghouei, Amir and Breckon, Toby P},
  journal={arXiv preprint arXiv:1805.06725},
  year={2018}
}
@article{kiran2018overview,
  title={An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos},
  author={Kiran, B Ravi and Thomas, Dilip Mathew and Parakkal, Ranjith},
  journal={arXiv preprint arXiv:1801.03149},
  year={2018}
}

@article{ball2017comprehensive,
  title={Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community},
  author={Ball, John E and Anderson, Derek T and Chan, Chee Seng},
  journal={Journal of Applied Remote Sensing},
  volume={11},
  number={4},
  pages={042609},
  year={2017},
  publisher={International Society for Optics and Photonics}
}

@article{kwon2017survey,
  title={A survey of deep learning-based network anomaly detection},
  author={Kwon, Donghwoon and Kim, Hyunjoo and Kim, Jinoh and Suh, Sang C and Kim, Ikkyun and Kim, Kuinam J},
  journal={Cluster Computing},
  pages={1--13},
  year={2017},
  publisher={Springer}
}

@article{adewumi2017survey,
  title={A survey of machine-learning and nature-inspired based credit card fraud detection techniques},
  author={Adewumi, Aderemi O and Akinyelu, Andronicus A},
  journal={International Journal of System Assurance Engineering and Management},
  volume={8},
  number={2},
  pages={937--953},
  year={2017},
  publisher={Springer}
}

@article{litjens2017survey,
  title={A survey on deep learning in medical image analysis},
  author={Litjens, Geert and Kooi, Thijs and Bejnordi, Babak Ehteshami and Setio, Arnaud Arindra Adiyoso and Ciompi, Francesco and Ghafoorian, Mohsen and van der Laak, Jeroen AWM and van Ginneken, Bram and S{\'a}nchez, Clara I},
  journal={Medical image analysis},
  volume={42},
  pages={60--88},
  year={2017},
  publisher={Elsevier}
}

@article{mohammadi2017deep,
  title={Deep Learning for IoT Big Data and Streaming Analytics: A Survey},
  author={Mohammadi, Mehdi and Al-Fuqaha, Ala and Sorour, Sameh and Guizani, Mohsen},
  journal={arXiv preprint arXiv:1712.04301},
  year={2017}
}
@article{kingma2014adam,
  title={Adam: A method for stochastic optimization},
  author={Kingma, Diederik and Ba, Jimmy},
  journal={arXiv preprint arXiv:1412.6980},
  year={2014}
}

@inproceedings{sunc04,
  author    = {Pei Sun and
               Sanjay Chawla},
  title     = {On Local Spatial Outliers},
  booktitle = {Proceedings of the Fourth IEEE International Conference on Data Mining (ICDM'04),
               Brighton, UK},
  year      = {2004},
  pages     = {209-216},
}

@inproceedings{sunc06-1,
  author    = {Pei Sun and
               Sanjay Chawla and
               Bavani Arunasalam},
  title     = {Mining for Outliers in Sequential Databases},
  booktitle = {Proceedings of the Sixth SIAM International Conference on Data Mining,
               Bethesda, Maryland, USA},
  year      = {2006},
  pages     = {},
}

@article{sunc06-2,
  author    = {Sanjay Chawla and
               Pei Sun },
  title     = {SLOM: A new measure for local spatial outliers},
  journal   = {Knowledge and Information Systems},
  volume    = {9},
  number    = {4},
  year      = {2006},
  pages     = {412-429}
}

@inproceedings{arunasalam04,
  author    = {Bavani Arunasalam and
               Sanjay Chawla and
               Pei Sun and
               Robert Munro},
  title     = {Mining Complex Relationships in the SDSS SkyServer Spatial Database},
  booktitle = {Proceedings of the 28th International Computer Software and Applications Conference
               (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based
               Systems, Hong Kong, China},
  year      = {2004},
  pages     = {142-145},
}

@inproceedings{Arunasalam05,
  author    = {Bavani Arunasalam and
               Sanjay Chawla and
               Pei Sun},
  title     = {Striking Two Birds With One Stone: Simultaneous Mining of
               Positive and Negative Spatial Patterns},
  booktitle = {Proceedings of the Fifth SIAM International Conference on Data Mining,
               CA, USA},
  year      = {2005},
  pages     = {},
}

@inproceedings{Munro03,
  author    = {Robert Munro and
               Sanjay Chawla and
               Pei Sun},
  title     = {Complex Spatial Relationships.},
  booktitle = {Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03),
               Melbourne, Florida, USA},
  year      = {2003},
  pages     = {227-234}
}




@inproceedings{ zaki00,
  author    = {Mohammed Javeed Zaki},
  title     = {Sequence Mining in Categorical Domains: Incorporating Constraints},
  booktitle = {CIKM},
  pages     = {422-429},
  year      = {2000},
  url       = {citeseer.ist.psu.edu/zaki00sequence.html}
}

@inproceedings{guralnik01,
  author    = {Valerie Guralnik and
               Nivea Garg and
               George Karypis},
  title     = {Parallel Tree Projection Algorithm for Sequence Mining},
  booktitle = {Parallel Processing, 7th International Euro-Par
               Conference Manchester, UK },
  year      = {2001},
  pages     = {310-320}
}

@inproceedings{king00,
  author    ={Ross D. King and
              Andreas Karwath and
              Amanda J. Clare and
              Luc Dehaspe},
  title     ={Genome scale prediction of protein functional class from sequence using data mining},
  Booktitle ={The Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  publisher ={The Association for Computing Machinery},
  address   ={New York, USA},
  pages     ={384--389},
  year      ={2000}
}

@article{malde03,
  author    = {Ketil Malde and
               Eivind Coward and
               Inge Jonassen},
  title     = {Fast Sequence Clustering Using A Suffix Array Algorithm},
  journal   = {Bioinformatics},
  volume    = {19},
  number    = {10},
  year      = {2003},
  pages     = {1221-1226},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}
@article{kiran2018overview,
  title={An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos},
  author={Kiran, B Ravi and Thomas, Dilip Mathew and Parakkal, Ranjith},
  journal={arXiv preprint arXiv:1801.03149},
  year={2018}
}

@article{ball2017comprehensive,
  title={Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community},
  author={Ball, John E and Anderson, Derek T and Chan, Chee Seng},
  journal={Journal of Applied Remote Sensing},
  volume={11},
  number={4},
  pages={042609},
  year={2017},
  publisher={International Society for Optics and Photonics}
}

@article{kwon2017survey,
  title={A survey of deep learning-based network anomaly detection},
  author={Kwon, Donghwoon and Kim, Hyunjoo and Kim, Jinoh and Suh, Sang C and Kim, Ikkyun and Kim, Kuinam J},
  journal={Cluster Computing},
  pages={1--13},
  year={2017},
  publisher={Springer}
}

@article{adewumi2017survey,
  title={A survey of machine-learning and nature-inspired based credit card fraud detection techniques},
  author={Adewumi, Aderemi O and Akinyelu, Andronicus A},
  journal={International Journal of System Assurance Engineering and Management},
  volume={8},
  number={2},
  pages={937--953},
  year={2017},
  publisher={Springer}
}

@article{litjens2017survey,
  title={A survey on deep learning in medical image analysis},
  author={Litjens, Geert and Kooi, Thijs and Bejnordi, Babak Ehteshami and Setio, Arnaud Arindra Adiyoso and Ciompi, Francesco and Ghafoorian, Mohsen and van der Laak, Jeroen AWM and van Ginneken, Bram and S{\'a}nchez, Clara I},
  journal={Medical image analysis},
  volume={42},
  pages={60--88},
  year={2017},
  publisher={Elsevier}
}

@article{mohammadi2017deep,
  title={Deep Learning for IoT Big Data and Streaming Analytics: A Survey},
  author={Mohammadi, Mehdi and Al-Fuqaha, Ala and Sorour, Sameh and Guizani, Mohsen},
  journal={arXiv preprint arXiv:1712.04301},
  year={2017}
}

@inproceedings{kou04,
  author    = {Yufeng Kou and
               Chang-Tien Lu and
               Sirirat Sirwongwattana and
               Yo-Ping Huang},
  title     = {Survey of Fraud Detection Techniques},
  booktitle = {Proceedings of the 2004 IEEE International Conference on
               Networking, Sensing & Control, Taipei, Taiwan},
  year      = {2004},
}


@inproceedings{lazarevic03,
  author    = {Aleksandar Lazarevic and
               Levent Ert{\"o}z and
               Vipin Kumar and
               Aysel Ozgur and
               Jaideep Srivastava},
  title     = {A Comparative Study of Anomaly Detection Schemes in Network
               Intrusion Detection},
  booktitle = {SDM},
  year      = {2003},
  ee        = {http://www.siam.org/meetings/sdm03/proceedings/sdm03_03.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@phdthesis{Bejeranothesis,
    author    = {Gill Bejerano},
    title     = {Automata Learning and Stochastic Modeling for Biosequence Analysis},
    school    = {Hebrew University},
    year      = {2003}
}

@book{ash90,
    author    = {Robert Ash},
    title     = {Information Theory},
    publisher = {Dover Publications },
    year      = {1990}
}

@inproceedings{kahveci01,
  author    = {Tamer Kahveci and
               Ambuj K. Singh},
  title     = {Efficient Index Structures for String Databases},
  booktitle = {Proceedings of the 27th International Conference on Very Large Data Bases},
  year      = {2001},
  pages     = {351-360},
  ee        = {http://www.vldb.org/conf/2001/P351.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{apostolico00,
  author    = {Alberto Apostolico and
               Gill Bejerano},
  title     = {Optimal amnesic probabilistic automata or how to learn and
               classify proteins in linear time and space},
  booktitle = {Proceedings of the fourth annual international conference on Computational molecular biology},
  year      = {2000},
  pages     = {25-32},
  location = {Tokyo, Japan},
  ee        = {http://doi.acm.org/10.1145/332306.332321},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{suns04,
  author    = {Zhaohui Sun and
               Jitender S. Deogun},
  title     = {Local Prediction Approach for Protein Classification using
               Probabilistic Suffix Trees},
  booktitle = {Proceedings of the second conference on Asia-Pacific bioinformatics},
  year      = {2004},
  pages     = {357-362},
  location  = {Dunedin, New Zealand},
  ee        = {http://crpit.com/confpapers/CRPITV29Sun.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{yang03,
  author    = {Jiong Yang and
               Wei Wang},
  title     = {CLUSEQ: Efficient and Effective Sequence Clustering.},
  booktitle = {Proceedings of the 19th International Conference on Data Engineering},
  year      = {2003},
  pages     = {101-112},
  ee        = {http://csdl.computer.org/comp/proceedings/icde/2003/2071/00/20710101abs.htm},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{yang02,
  author    = {Jiong Yang and
               Wei Wang},
  title     = {Towards Automatic Clustering of Protein Sequences},
  booktitle = {Proceedings of the IEEE Computer Society Conference on Bioinformatics},
  year      = {2002},
  pages     = {175-186},
  ee        = {http://csdl.computer.org/comp/proceedings/csb/2002/1653/00/16530175abs.htm},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{ron96,
  author    = {Dana Ron and
               Yoram Singer and
               Naftali Tishby},
  title     = {The Power of Amnesia: Learning Probabilistic Automata with
               Variable Memory Length},
  journal   = {Machine Learning},
  volume    = {25},
  number    = {2-3},
  year      = {1996},
  pages     = {117-149},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{bejerano01,
  author    = {Gill Bejerano and
               Golan Yona},
  title     = {Variations on probabilistic suffix trees: statistical modeling
               and prediction of protein families},
  journal   = {Bioinformatics},
  volume    = {17},
  number    = {1},
  year      = {2001},
  pages     = {23-43},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{bejerano99,
  author    = {Gill Bejerano and
               Golan Yona},
  title     = {Modeling protein families using probabilistic suffix trees},
  booktitle = {Proceedings of the third annual international conference on Computational molecular biology},
  year      = {1999},
  pages     = {15-24},
  location = {Lyon, France},
  ee        = {http://doi.acm.org/10.1145/299432.299445},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{ guralnik01,
  author    = {Valerie Guralnik and
               George Karypis},
  title     = {A Scalable Algorithm for Clustering Sequential Data},
  booktitle = {Proceedings of the 2001 IEEE International Conference on Data Mining},
  pages     = {179-186},
  year      = {2001},
  url       = {citeseer.csail.mit.edu/guralnik01scalable.html}
}

@article{ukkonen95,
  author    = {Esko Ukkonen},
  title     = {On-Line Construction of Suffix Trees},
  journal   = {Algorithmica},
  volume    = {14},
  number    = {3},
  year      = {1995},
  pages     = {249-260},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{ukkonen92,
  author    = {Esko Ukkonen},
  title     = {Constructing Suffix Trees On-Line in Linear Time},
  booktitle = {Proceedings of the IFIP 12th World Computer Congress on Algorithms, Software,
               Architecture - Information Processing '92, Volume 1},
  year      = {1992},
  pages     = {484-492},
  crossref  = {DBLP:conf/ifip/1992-1},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{ aggarwal01,
    author    = {Charu C. Aggarwal and
                         Philip S. Yu},
    title     = {Outlier Detection for High Dimensional Data},
    booktitle = {Proceedings of the 2000 ACM SIGMOD International Conference on
                 Management of Data, Santa Barbara, California, USA},
    year      = {2001}
}

@inproceedings{bay03,
  author    = {Stephen D. Bay and
               Mark Schwabacher},
  title     = {Mining distance-based outliers in near linear time with
               randomization and a simple pruning rule},
  booktitle = {International Conference
               on Knowledge Discovery and Data Mining (KDD)},
  year      = {2003}
}

@inproceedings{breunig00,
        author    = {Markus M. Breunig and
                 Hans-Peter Kriegel and
                 Raymond T. Ng and
                 J{\"o}rg Sander},
        title     = {LOF: Identifying Density-Based Local Outliers},
        booktitle = {Proceedings of the 2000 ACM SIGMOD International Conference on
                     Management of Data, Dallas, Texas, USA},
        publisher = {ACM},
        year      = {2000},
        isbn      = {1-58113-218-2},
        pages     = {93-104},
        ee    = {db/conf/sigmod/BreunigKNS00.html}
}

@inproceedings{ fabrizio02,
        author    = {Fabrizio Angiulli and
                     Clara Pizzuti},
        title     = {Fast Outlier Detection in High Dimensional Spaces},
        booktitle = {Proceedings of the 6th European Conference on Principles and Practice
                     of Knowledge Discovery in Databases (PKDD)},
        year      = {2002}
}

@inproceedings{knorr97,
        author    = {Edwin M. Knorr and
                     Raymond T. Ng},
        title     = {A Unified Notion of Outliers: Properties and Computation},
        booktitle = {Proceedings of the Third International Conference on Knowledge Discovery
               and Data Mining},
        publisher = {AAAI Press},
        year      = {1997},
        isbn      = {1-57735-027-8},
        pages     = {219-222}
}

@inproceedings{knorr98,
  author    = {Edwin M. Knorr and
               Raymond T. Ng},
  title     = {Algorithms for Mining Distance-Based Outliers in Large Datasets},
  booktitle = {Proceedings of the 24rd International Conference on Very Large Data Bases},
  year      = {1998},
  pages     = {392-403},
  ee        = {db/conf/vldb/KnorrN98.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{knorr99,
        author    = {Edwin M. Knorr and
                     Raymond T. Ng},
        title     = {Finding Intensional Knowledge of Distance-Based Outliers},
        booktitle = {Proceedings of 25th International Conference on Very
                     Large Data Bases},
        publisher = {Morgan Kaufmann},
        year      = {1999},
        isbn      = {1-55860-615-7},
        pages     = {211-222},
}

@inproceedings{mettu02cluster,
        author    = {Mettu, R. R. and
                           Plaxton, C. G.},
        title     = {Optimal Time Bounds for Approximate Clustering},
        booktitle = {Proceedings of the 18th Conference on Uncertainty in
                           Artificial Intelligence},
        year      = {2002},
        month     = {August},
        pages     = {344--351},
}

@inproceedings{papadimitriou,
        author    = {Spiros Papadimitriou and
              Hiroyuki Kitagawa and
              Phillip B. Gibbons and
              Christos Faloutsos},
        title     = {LOCI: Fast Outlier Detection Using the Local Correlation Integral},
        booktitle = {Proceedings of the 19th International Conference on Data Engineering},
        year      = {2003},
        month     = {March},
        pages     = {315-328},
}

@inproceedings{ramaswamy00,
  author    = {Sridhar Ramaswamy and
               Rajeev Rastogi and
               Kyuseok Shim},
  title     = {Efficient Algorithms for Mining Outliers from Large Data
               Sets},
  booktitle = {Proceedings of the 2000 ACM SIGMOD international conference on Management of data},
  year      = {2000},
  pages     = {427-438},
  location = {Dallas, Texas, United States},
  ee        = {db/conf/sigmod/RamaswamyRS00.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{ beyer99,
  author    = {Kevin Beyer and
               Jonathan Goldstein and
               Raghu Ramakrishnan and
               Uri Shaft},
  title     = {When Is ``Nearest Neighbor'' Meaningful?},
  booktitle = {Proceedings of 7th International Conference on Database Theory (ICDT'99)},
  pages = "217--235",
  year = "1999"
}



@inproceedings{changtien03-icdm,
        author    = {Chang-Tien Lu and
                          Dechang Chen and
                          Yufeng Kou},
        title     = {Algorithms for Spatial Outlier Detection},
        booktitle = {Proceedings of the 3rd IEEE International Conference on Data
               Mining (ICDM 2003), Melbourne, Florida,
               USA},
        publisher = {IEEE Computer Society},
        year      = {2003},
        isbn      = {0-7695-1978-4},
        pages     = {597-600}
}

@inproceedings{changtien03-ictai,
        author    = {Chang-Tien Lu and
                          Dechang Chen and
                          Yufeng Kou},
        title     = {Detecting Spatial Outliers with Multiple Attributes},
        booktitle = {Proceedings of 15th IEEE International Conference on Tools with Artificial Intelligence
                          (ICTAI 2003), Sacramento, California, USA},
        publisher = {IEEE Computer Society},
        year      = {2003},
        isbn      = {0-7695-2038-3},
        pages     = {122-128}
}


@inproceedings{shekhar01,
        author    = {Shashi Shekhar and
                           Chang-Tien Lu and
                           Pusheng Zhang},
        title     = {Detecting graph-based spatial outliers: algorithms and applications (a summary of results)},
        booktitle = {Proceedings of the Seventh ACM SIGKDD International Conference
               on Knowledge Discovery and Data Mining,
               San Francisco, CA, USA. ACM, 2001 },
        publisher = {},
        year      = {2001},
        isbn      = {},
        pages     = {371-376}
}

@inproceedings{guttman84,
        author    = {Antonin Guttman},
        title     = {R-Trees: A Dynamic Index Structure for Spatial Searching},
        booktitle = {Proceedings of Annual Meeting, Boston, Massachusetts},
        publisher = {ACM Press},
        year      = {1984},
        pages     = {47-57},
}

@inproceedings{berchtold96,
        author    = {Stefan Berchtold and
               Daniel A. Keim and
               Hans-Peter Kriegel},
        title     = {The X-tree : An Index Structure for High-Dimensional Data},
        booktitle = {Proceedings of 22th International Conference on Very
               Large Data Bases, Mumbai (Bombay), India},
        publisher = {Morgan Kaufmann},
        year      = {1996},
        isbn      = {1-55860-382-4},
        pages     = {28-39},
        ee    = {db/conf/vldb/BerchtoldKK96.html},
        bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{tukey75,
    author    = {John W. Tukey},
    title     = {Mathematics and the picturing of data},
    booktitle = {Proceedings of the International Congress of Mathematicians, Vancouver, vol 2},
    year      = {1975},
    pages     = {523-531}
}

@InProceedings{leon04,
  author       = {Elizabeth Leon and
                  Olfa Nasraoui and
                  Jonatan Gomez},
  title        = {Anomaly Detection based on Unsupervised Niche Clustering with Application
                  to Network Intrusion Detection},
  booktitle    = {Proceedings of the Congress of Evolutionary Computation (CEC)},
  year         = {2004}
}

@article{aggarwal05,
  author    = {Charu C. Aggarwal and
               Philip S. Yu},
  title     = {An effective and efficient algorithm for high-dimensional
               outlier detection.},
  journal   = {VLDB J.},
  volume    = {14},
  number    = {2},
  year      = {2005},
  pages     = {211-221}
}



@article{knorr00,
        author    = {Edwin M. Knorr and
               Raymond T. Ng and
               Vladimir Tucakov},
        title     = {Distance-Based Outliers: Algorithms and Applications},
        journal   = {VLDB Journal},
        volume    = {8},
        number    = {3-4},
        year      = {2000},
        pages     = {237-253}
}

@article{ kollios02,
        author    = {George Kollios and
                            Dimitrios Gunopulos and
                            Nick Koudas and
                            Stefan Berchtold},
        title     = {Efficient Biased Sampling for Approximate Clustering and Outlier Detection
                        in Large Datasets},
        journal   = {IEEE Transactions on Knowledge and Data Engineering},
        year      = {2003}
}


@article{stolfo,
        author    = {S. Stolfo and
                            W. Lee and
                            P. Chan and
                            F. Fan and
                            E. Eskin},
        title     = {Data Mining-based Instrusion Detectors: An Overview of
                            Columbia IDS Projects},
        journal   = {SIGMOD Record},
        year      = {2001},
        volume    = {30},
        number    = {4},
        pages     = {5-14},
}

@article{shekhar03,
        author    = {Shashi Shekhar and
                            Chang-Tien Lu and
                            Pusheng Zhang},
        title     = {A Unified Approach to Detecting Spatial Outliers},
        journal   = {GeoInformatica},
        year      = {2003},
        volume    = {7},
        number    = {2},
        pages     = {139-166}
}

@article{bentley75,
        author    = {Jon Louis Bentley},
        title     = {Multidimensional Binary Search Trees Used for Associative Searching},
        journal   = {Commun. ACM},
        volume    = {18},
        number    = {9},
        year      = {1975},
        pages     = {509-517},
        ee    = {db/journals/cacm/Bentley75.html},
        bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{cheng06,
 author  = {Cheng, Tao and Li, Zhilin },
 title   = {A Multiscale Approach for Spatio-Temporal Outlier Detection},
 journal = {Transactions in GIS},
 volume  = {10 (2)},
 year    = {2006},
 pages   = {253-263}
 }


@article{rousseeuw96,
 author  = {Peter J. Rousseeuw and Ida Ruts},
 title   = {Bivariate Location Depth},
 journal = {Applied Statistics},
 volume  = {45},
 year    = {1996},
 pages   = {516--526}
 }

@article{rousseeuw99,
 author  = {Peter J. Rousseeuw and K Van Driessen},
 title   = {A fast algorithm for the minimum covariance deteriminant
 estimator},
 journal = {Technometrics},
 volume  = {41},
 year    = {1999},
 pages   = {212-223}
 }


@book{tan05,
        author    = {Pang-Ning Tan and Michael Steinbach and Vipin Kumar },
        title     = {Introduction to Data Mining},
        publisher = {Addison-Wesley},
        isbn      = {},
        year      = {2005}
}

@book{Shekhar,
        author    = {Shashi Shekhar and
                     Sanjay Chawla},
        title     = {Spatial Databases: A Tour},
        publisher = {Prentice Hall},
        isbn      = {0-13-017480-7},
        year      = {2003}
}

@book{ barnett,
    author    = {Vic Barnett and
               Toby Lewis},
    title     = {Outliers in Statistical Data},
    publisher = {John Wiley {\&} Sons},
    year      = {1994}
}

@book{ Rousseeuw,
    author    = {Peter J. Rousseeuw and
                 Annick M. Leroy},
    title     = {Robust Regression and Outlier Detection},
    publisher = {John Wiley {\&} Sons},
    year      = {2003}
}

@book{tukey77,
    author    = {John W. Tukey},
    title     = {Exploratory Data Analysis},
    publisher = {Addison-Wesley},
    year      = {1977}
}

@book{Scott,
    author    = {David W. Scott},
    title     = {Multivariate Density Estimation : Theory, Practice, and Visualization},
    publisher = {Wiley Interscience},
    year      = {1992}
}

@book{Bellman,
    author    = {Richard Ernest Bellman},
    title     = {Adaptive Control Processes: A Guided Tour},
    publisher = {Princeton University Press},
    year      = {1961}
}

@book{hawkins,
    author    = {D. Hawkins},
    title     = {Identification of Outliers},
    publisher = {Chapman and Hall, London},
    year      = {1980}
}

@book{wilcox,
    author    = {R. Wilcox},
    title     = {Applying Contemporary Statistical Techniques},
    publisher = {Elseiver Science},
    year      = {2003}
}

@book{taylor05,
    author    = {John Shawne-Taylor and Nello Cristianini},
    title     = {Kernel Mofoethods for Pattern Analysis},
    publisher = {Cambridge},
    year      = {2005}
}

@phdthesis{ramgopal,
    author    = {Ramgopal R. Mettu},
    title     = {Approximation Algorithm for NP-hard Clustering Problem},
    school    = {The University of Texas},
    year      = {2002}
}

@misc{ucikdd99,
    author    = {Hettich, S. and Bay, S. D.},
    title     = {The UCI KDD Archive [http://kdd.ics.uci.edu]. Irvine, CA: University
                             of California, Department of Information and Computer Science},
    year      = {1999}
}

@misc{ portnoy01,
    author    = {Leonid Portnoy and
                 Eleazar Eskin
                 and Sal Stolfo },
    title     =  {Intrusion detection with unlabeled data using clustering},
    howpublished = {ACM Workshop on Data Mining Applied to Security},
    year = {2001}
}



@inproceedings{mcphadden,
author = "McPhadden, M.",
title = "El Nino and La Nina: Causes and Global Consequences",
booktitle = "Encyclopedia of Global Environmental Change",
year = "2002",
pages = "353-370",
}
@book{barnett,
    author    = {Barnett, V. and Lewis, T.},
    title     = {Outliers in Statistical Data},
    publisher = {John Wiley and Sons},
    year      = {1994}
}


}
@inproceedings{lakhina,
 author = {Lakhina, Anukool and Crovella, Mark and Diot, Christophe},
 title = {Diagnosing network-wide traffic anomalies},
 booktitle = {SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications},
 year = {2004},
 isbn = {1-58113-862-8},
 pages = {219--230},
 location = {Portland, Oregon, USA},
 doi = {http://doi.acm.org/10.1145/1015467.1015492},
 publisher = {ACM},
 address = {New York, NY, USA},
 }
 @inproceedings{lazarevic,
  author    = {Aleksandar Lazarevic and
               Levent Ert{\"o}z and
               Vipin Kumar and
               Aysel Ozgur and
               Jaideep Srivastava},
  title     = {A Comparative Study of Anomaly Detection Schemes in Network
               Intrusion Detection},
  booktitle = {SDM},
  year      = {2003},
  ee        = {http://www.siam.org/meetings/sdm03/proceedings/sdm03_03.pdf},
}
@book{chung1997,
   Author = {Chung, F.},
   Title = {Spectral Graph Theory. CBMS Regional Conference Series},
   Publisher = {Conference Board of the Mathematical Sciences, Washington},
   number = {92},
   Year = {1997} }

@article{fouss2007,
   Author = {Fouss, Francois and Renders, Jean-Michel},
   Title = {Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation},
   Journal = {IEEE Transaction on Knowledge and Data Engineering},
   Volume = {19},
   Number = {3},
   Pages = {355-369},
      Year = {2007} }
@book{marchette,
Author={Marchette, D.J},
Title={Computer Network Intrusion Detection and Network Monitoring. A Statistical Viewpoint},
Publisher={Springer},
Year={2001}
}
@inproceedings{oberheide,
  author    = {Jon Oberheide and
               Evan Cooke and
               Farnam Jahanian},
  title     = {CloudAV: N-Version Antivirus in the Network Cloud},
  booktitle = {USENIX Security Symposium},
  year      = {2008},
  pages     = {91-106},
  ee        = {http://www.usenix.org/events/sec08/tech/full_papers/oberheide/oberheide.pdf},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{lims,
 author = {Lim, Shu Yun and Jones, Andy},
 title = {Network Anomaly Detection System: The State of Art of Network Behaviour Analysis},
 booktitle = {ICHIT '08: Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology},
 year = {2008},
 isbn = {978-0-7695-3328-5},
 pages = {459--465},
 doi = {http://dx.doi.org/10.1109/ICHIT.2008.249},
 publisher = {IEEE Computer Society},
 address = {Washington, DC, USA},
 }
@inproceedings{deVries1,
author={de Vries, Timothy and Chawla, Sanjay and Houle, Michael},
title={Finding Local Anomalies in Very High Dimensional Space},
booktitle={In Proceedings of the 10th IEEE International Conference on
Data Mining (ICDM)(Best Paper Award)},
year={2010},
address={Sydney, Australia},
pages={128-137}
}
@inproceedings{khoanetwork,
  author    = {Nguyen Lu Dang Khoa and
               Tahereh Babaie and
               Sanjay Chawla and
               Zainab Zaidi},
  title     = {Network Anomaly Detection Using a Commute Distance Based
               Approach},
  booktitle = {ICDM Workshops},
  year      = {2010},
  pages     = {943-950},
  ee        = {http://dx.doi.org/10.1109/ICDMW.2010.90},
  crossref  = {DBLP:conf/icdm/2010w},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{khoacommute,
  author    = {Nguyen Lu Dang Khoa and
               Sanjay Chawla},
  title     = {Robust Outlier Detection Using Commute Time and Eigenspace
               Embedding},
  booktitle = {PAKDD (2)},
  year      = {2010},
  pages     = {422-434},
  ee        = {http://dx.doi.org/10.1007/978-3-642-13672-6_41},
  crossref  = {DBLP:conf/pakdd/2010-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@inproceedings{DBLP:conf/icdm/KhoaBCZ10,
  author    = {Nguyen Lu Dang Khoa and
               Tahereh Babaie and
               Sanjay Chawla and
               Zainab Zaidi},
  title     = {Network Anomaly Detection Using a Commute Distance Based
               Approach},
  booktitle = {ICDM Workshops},
  year      = {2010},
  pages     = {943-950},
  ee        = {http://dx.doi.org/10.1109/ICDMW.2010.90},
  crossref  = {DBLP:conf/icdm/2010w},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
@techreport{idc,
author ={J. Gantz and D. Reinsel and C. Chute and W. Schilichting and J. McArthur and S. Minton and I. Xheneti and A. Toncheva and A. Manfrediz},
title={The Expanding Digital Universe},
year={2007},
institution={EMC}
}

@inproceedings{nguyen,
  author    = {Nguyen Lu Dang Khoa and
               Sanjay Chawla},
  title     = {Robust Outlier Detection Using Commute Time and Eigenspace
               Embedding},
  booktitle = {PAKDD (2)},
  year      = {2010},
  pages     = {422-434},
  ee        = {http://dx.doi.org/10.1007/978-3-642-13672-6_41},
  crossref  = {DBLP:conf/pakdd/2010-2},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{deVries,
  author    = {Timothy de Vries and
               Sanjay Chawla and
               Michael E. Houle},
  title     = {Finding Local Anomalies in Very High Dimensional Space},
  booktitle = {Proceedings of IEEE International Conference on Data Mining (ICDM)},
  year      = {2010 (Best Paper Award)},
  pages     = {128-137},
  ee        = {http://dx.doi.org/10.1109/ICDM.2010.151},
  crossref  = {DBLP:conf/icdm/2010},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{kumardipole,
  author    = {Jaya Kawale and
         Michael Steinbach and
               Vipin Kumar },
  title     = {Discovering Dynamic Dipoles in Climate Data},
  booktitle = {SDM},
  year      = {2011},
  pages ={107-118}
}


@article{peng2015multi,
  title={Multi-scale compositionality: identifying the compositional structures of social dynamics using deep learning},
  author={Peng, Huan-Kai and Marculescu, Radu},
  journal={PloS one},
  volume={10},
  number={4},
  pages={e0118309},
  year={2015},
  publisher={Public Library of Science}
}

@article{yu2016survey,
  title={A survey on social media anomaly detection},
  author={Yu, Rose and Qiu, Huida and Wen, Zhen and Lin, ChingYung and Liu, Yan},
  journal={ACM SIGKDD Explorations Newsletter},
  volume={18},
  number={1},
  pages={1--14},
  year={2016},
  publisher={ACM}
}

@inproceedings{du2017deeplog,
  title={DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning},
  author={Du, Min and Li, Feifei and Zheng, Guineng and Srikumar, Vivek},
  booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
  pages={1285--1298},
  year={2017},
  organization={ACM}
}
@article{recht2010guaranteed,
  title={Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization},
  author={Recht, Benjamin and Fazel, Maryam and Parrilo, Pablo A},
  journal={SIAM review},
  volume={52},
  number={3},
  pages={471--501},
  year={2010},
  publisher={SIAM}
}

@inproceedings{Lopez-Paz:2014,
 author = {Lopez-Paz, David and Sra, Suvrit and Smola, Alexander J. and Ghahramani, Zoubin and Sch\"{o}lkopf, Bernhard},
 title = {Randomized Nonlinear Component Analysis},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2014}
}

@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}

@article{kingma2014adam,
  title={Adam: A method for stochastic optimization},
  author={Kingma, Diederik P and Ba, Jimmy},
  journal={arXiv preprint arXiv:1412.6980},
  year={2014}
}

@article{clevert2015fast,
  title={Fast and accurate deep network learning by exponential linear units (elus)},
  author={Clevert, Djork-Arn{\'e} and Unterthiner, Thomas and Hochreiter, Sepp},
  journal={arXiv preprint arXiv:1511.07289},
  year={2015}
}

@inproceedings{ioffe2015batch,
  title={Batch normalization: Accelerating deep network training by reducing internal covariate shift},
  author={Ioffe, Sergey and Szegedy, Christian},
  booktitle={International conference on machine learning},
  pages={448--456},
  year={2015}
}

@article{li2017cifar10,
  title={CIFAR10-DVS: An Event-Stream Dataset for Object Classification},
  author={Li, Hongmin and Liu, Hanchao and Ji, Xiangyang and Li, Guoqi and Shi, Luping},
  journal={Frontiers in neuroscience},
  volume={11},
  pages={309},
  year={2017},
  publisher={Frontiers}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}


@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}

@inproceedings{chen2017outlier,
  title={Outlier detection with autoencoder ensembles},
  author={Chen, Jinghui and Sathe, Saket and Aggarwal, Charu and Turaga, Deepak},
  booktitle={Proceedings of the 2017 SIAM International Conference on Data Mining},
  pages={90--98},
  year={2017},
  organization={SIAM}
}

@article{marchi2017deep,
  title={Deep Recurrent Neural Network-Based Autoencoders for Acoustic Novelty Detection},
  author={Marchi, Erik and Vesperini, Fabio and Squartini, Stefano and Schuller, Bj{\"o}rn},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{chong2017abnormal,
  title={Abnormal event detection in videos using spatiotemporal autoencoder},
  author={Chong, Yong Shean and Tay, Yong Haur},
  booktitle={International Symposium on Neural Networks},
  pages={189--196},
  year={2017},
  organization={Springer}
}

@article{chatfield2014return,
  title={Return of the devil in the details: Delving deep into convolutional nets},
  author={Chatfield, Ken and Simonyan, Karen and Vedaldi, Andrea and Zisserman, Andrew},
  journal={arXiv preprint arXiv:1405.3531},
  year={2014}
}


@article{neumann2005combined,
  title={Combined SVM-based feature selection and classification},
  author={Neumann, Julia and Schn{\"o}rr, Christoph and Steidl, Gabriele},
  journal={Machine learning},
  volume={61},
  number={1-3},
  pages={129--150},
  year={2005},
  publisher={Springer}
}

@article{cao2003comparison,
  title={A comparison of PCA, KPCA and ICA for dimensionality reduction in support vector machine},
  author={Cao, LJ and Chua, Kok Seng and Chong, WK and Lee, HP and Gu, QM},
  journal={Neurocomputing},
  volume={55},
  number={1-2},
  pages={321--336},
  year={2003},
  publisher={Elsevier}
}


@article{russakovsky2015imagenet,
  title={Imagenet large scale visual recognition challenge},
  author={Russakovsky, Olga and Deng, Jia and Su, Hao and Krause, Jonathan and Satheesh, Sanjeev and Ma, Sean and Huang, Zhiheng and Karpathy, Andrej and Khosla, Aditya and Bernstein, Michael and others},
  journal={International Journal of Computer Vision},
  volume={115},
  number={3},
  pages={211--252},
  year={2015},
  publisher={Springer}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}

@article{arora2016understanding,
  title={Understanding deep neural networks with rectified linear units},
  author={Arora, Raman and Basu, Amitabh and Mianjy, Poorya and Mukherjee, Anirbit},
  journal={arXiv preprint arXiv:1611.01491},
  year={2016}
}

@article{asgari2015continuous,
  title={Continuous distributed representation of biological sequences for deep proteomics and genomics},
  author={Asgari, Ehsaneddin and Mofrad, Mohammad RK},
  journal={PloS one},
  volume={10},
  number={11},
  pages={e0141287},
  year={2015},
  publisher={Public Library of Science}
}

@inproceedings{srivastava2015unsupervised,
  title={Unsupervised learning of video representations using lstms},
  author={Srivastava, Nitish and Mansimov, Elman and Salakhudinov, Ruslan},
  booktitle={International conference on machine learning},
  pages={843--852},
  year={2015}
}

@inproceedings{liu2008isolation,
  title={Isolation forest},
  author={Liu, Fei Tony and Ting, Kai Ming and Zhou, Zhi-Hua},
  booktitle={Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on},
  pages={413--422},
  year={2008},
  organization={IEEE}
}


@article{xu2015learning,
  title={Learning deep representations of appearance and motion for anomalous event detection},
  author={Xu, Dan and Ricci, Elisa and Yan, Yan and Song, Jingkuan and Sebe, Nicu},
  journal={arXiv preprint arXiv:1510.01553},
  year={2015}
}


@inproceedings{kolosnjaji2016deep,
  title={Deep learning for classification of malware system call sequences},
  author={Kolosnjaji, Bojan and Zarras, Apostolis and Webster, George and Eckert, Claudia},
  booktitle={Australasian Joint Conference on Artificial Intelligence},
  pages={137--149},
  year={2016},
  organization={Springer}
}


@article{nonlinear-PCAHybrid,
author = {Chong Su and Yue Gao and Yuxiao Xie and Yong Xue and Lijun Ge and Hongguang Li},
title = {A hybrid classifier based on nonlinear-PCA and deep belief networks with applications in dysphagia diagnosis},
journal = {Computer Assisted Surgery},
volume = {22},
number = {sup1},
pages = {135-147},
year  = {2017},
publisher = {Taylor & Francis},
doi = {10.1080/24699322.2017.1389391},
    note ={PMID: 29095063},
URL = {
        https://doi.org/10.1080/24699322.2017.1389391
},
eprint = {
        https://doi.org/10.1080/24699322.2017.1389391
}
}


@article{sohaib2017hybrid,
  title={A Hybrid Feature Model and Deep-Learning-Based Bearing Fault Diagnosis},
  author={Sohaib, Muhammad and Kim, Cheol-Hong and Kim, Jong-Myon},
  journal={Sensors},
  volume={17},
  number={12},
  pages={2876},
  year={2017},
  publisher={Multidisciplinary Digital Publishing Institute}
}


@article{you2017hybrid,
  title={A hybrid technique based on convolutional neural network and support vector regression for intelligent diagnosis of rotating machinery},
  author={You, Wei and Shen, Changqing and Guo, Xiaojie and Jiang, Xingxing and Shi, Juanjuan and Zhu, Zhongkui},
  journal={Advances in Mechanical Engineering},
  volume={9},
  number={6},
  pages={1687814017704146},
  year={2017},
  publisher={SAGE Publications Sage UK: London, England}
}

@inproceedings{krawczyk2016hybrid,
  title={Hybrid One-Class Ensemble for High-Dimensional Data Classification},
  author={Krawczyk, Bartosz},
  booktitle={Asian Conference on Intelligent Information and Database Systems},
  pages={136--144},
  year={2016},
  organization={Springer}
}


@article{song2017hybrid,
  title={A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data},
  author={Song, Hongchao and Jiang, Zhuqing and Men, Aidong and Yang, Bo},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@inproceedings{schlegl2017unsupervised,
  title={Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@inproceedings{jiulong2017detecting,
  title={Detecting Chinese calligraphy style consistency by deep learning and one-class SVM},
  author={Jiulong, Zhang and Luming, Guo and Su, Yang and Xudong, Sun and Xiaoshan, Li},
  booktitle={Image, Vision and Computing (ICIVC), 2017 2nd International Conference on},
  pages={83--86},
  year={2017},
  organization={IEEE}
}

@article{athiwaratkun2015feature,
  title={Feature representation in convolutional neural networks},
  author={Athiwaratkun, Ben and Kang, Keegan},
  journal={arXiv preprint arXiv:1507.02313},
  year={2015}
}
@inproceedings{dosovitskiy2014discriminative,
  title={Discriminative unsupervised feature learning with convolutional neural networks},
  author={Dosovitskiy, Alexey and Springenberg, Jost Tobias and Riedmiller, Martin and Brox, Thomas},
  booktitle={Advances in Neural Information Processing Systems},
  pages={766--774},
  year={2014}
}

@article{ahmed2008training,
  title={Training hierarchical feed-forward visual recognition models using transfer learning from pseudo-tasks},
  author={Ahmed, Amr and Yu, Kai and Xu, Wei and Gong, Yihong and Xing, Eric},
  journal={Computer Vision--ECCV 2008},
  pages={69--82},
  year={2008},
  publisher={Springer}
}

@article{pan2010survey,
  title={A survey on transfer learning},
  author={Pan, Sinno Jialin and Yang, Qiang},
  journal={IEEE Transactions on knowledge and data engineering},
  volume={22},
  number={10},
  pages={1345--1359},
  year={2010},
  publisher={IEEE}
}

@article{cao2003comparison,
  title={A comparison of PCA, KPCA and ICA for dimensionality reduction in support vector machine},
  author={Cao, LJ and Chua, Kok Seng and Chong, WK and Lee, HP and Gu, QM},
  journal={Neurocomputing},
  volume={55},
  number={1},
  pages={321--336},
  year={2003},
  publisher={Elsevier}
}

@article{widodo2007combination,
  title={Combination of independent component analysis and support vector machines for intelligent faults diagnosis of induction motors},
  author={Widodo, Achmad and Yang, Bo-Suk and Han, Tian},
  journal={Expert systems with applications},
  volume={32},
  number={2},
  pages={299--312},
  year={2007},
  publisher={Elsevier}
}

@article{shen2008feature,
  title={Feature selection via sensitivity analysis of SVM probabilistic outputs},
  author={Shen, Kai-Quan and Ong, Chong-Jin and Li, Xiao-Ping and Wilder-Smith, Einar PV},
  journal={Machine Learning},
  volume={70},
  number={1},
  pages={1--20},
  year={2008},
  publisher={Springer}
}
@article{neumann2005combined,
  title={Combined SVM-based feature selection and classification},
  author={Neumann, Julia and Schn{\"o}rr, Christoph and Steidl, Gabriele},
  journal={Machine learning},
  volume={61},
  number={1},
  pages={129--150},
  year={2005},
  publisher={Springer}
}


@article{hinton2010practical,
  title={A practical guide to training restricted Boltzmann machines},
  author={Hinton, Geoffrey},
  journal={Momentum},
  volume={9},
  number={1},
  pages={926},
  year={2010}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}

@inproceedings{yosinski2014transferable,
  title={How transferable are features in deep neural networks?},
  author={Yosinski, Jason and Clune, Jeff and Bengio, Yoshua and Lipson, Hod},
  booktitle={Advances in neural information processing systems},
  pages={3320--3328},
  year={2014}
}

@article{bengio2007scaling,
  title={Scaling learning algorithms towards AI},
  author={Bengio, Yoshua and LeCun, Yann and others},
  journal={Large-scale kernel machines},
  volume={34},
  number={5},
  pages={1--41},
  year={2007}
}


@inproceedings{vishwanathan2003simplesvm,
  title={SimpleSVM},
  author={Vishwanathan, SVN and Smola, Alexander J and Murty, M Narasimha},
  booktitle={Proceedings of the Twentieth International Conference on International Conference on Machine Learning},
  pages={760--767},
  year={2003},
  organization={AAAI press}
}



@book{vapnik1998statistical,
  title={Statistical learning theory},
  author={Vapnik, Vladimir Naumovich and Vapnik, Vlamimir},
  volume={1},
  year={1998},
  publisher={Wiley New York}
}


@article{scholkopf2001estimating,
  title={Estimating the support of a high-dimensional distribution},
  author={Sch{\"o}lkopf, Bernhard and Platt, John C and Shawe-Taylor, John and Smola, Alex J and Williamson, Robert C},
  journal={Neural computation},
  volume={13},
  number={7},
  pages={1443--1471},
  year={2001},
  publisher={MIT Press}
}

@article{scholkopf2002support,
  title={Support vector machines, regularization, optimization, and beyond},
  author={Sch{\"o}lkopf, Bernhard and Smola, Alexander J},
  journal={MIT Press},
  volume={656},
  pages={657},
  year={2002}
}

@article{tax2004support,
  title={Support vector data description},
  author={Tax, David MJ and Duin, Robert PW},
  journal={Machine learning},
  volume={54},
  number={1},
  pages={45--66},
  year={2004},
  publisher={Springer}
}

@article{wang2006structured,
  title={Structured one-class classification},
  author={Wang, Defeng and Yeung, Daniel S and Tsang, Eric CC},
  journal={IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)},
  volume={36},
  number={6},
  pages={1283--1295},
  year={2006},
  publisher={IEEE}
}


@article{lecun2010mnist,
  title={MNIST handwritten digit database},
  author={LeCun, Yann and Cortes, Corinna and Burges, Christopher JC},
  journal={AT\&T Labs [Online]. Available: http://yann. lecun. com/exdb/mnist},
  volume={2},
  year={2010}
}

@article{finn2016pfam,
  title={The Pfam protein families database: towards a more sustainable future},
  author={Finn, Robert D and Coggill, Penelope and Eberhardt, Ruth Y and Eddy, Sean R and Mistry, Jaina and Mitchell, Alex L and Potter, Simon C and Punta, Marco and Qureshi, Matloob and Sangrador-Vegas, Amaia and others},
  journal={Nucleic acids research},
  volume={44},
  number={D1},
  pages={D279--D285},
  year={2016},
  publisher={Oxford University Press}
}

@inproceedings{bingham2001random,
  title={Random projection in dimensionality reduction: applications to image and text data},
  author={Bingham, Ella and Mannila, Heikki},
  booktitle={Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining},
  pages={245--250},
  year={2001},
  organization={ACM}
}

  @Article{tSNEVisualize2008,
    title = {Visualizing High-Dimensional Data Using t-SNE},
    volume = {9},
    pages = {2579-2605},
    year = {2008},
    author = {L.J.P. {van der Maaten} and G.E. Hinton},
    journal = {Journal of Machine Learning Research},
  }

@inproceedings{xu2010robust,
  title={Robust PCA via outlier pursuit},
  author={Xu, Huan and Caramanis, Constantine and Sanghavi, Sujay},
  booktitle={Advances in Neural Information Processing Systems},
  pages={2496--2504},
  year={2010}
}

@article{rathore2017ensemble,
  title={Ensemble fuzzy clustering using cumulative aggregation on random projections},
  author={Rathore, Punit and Bezdek, James C and Erfani, Sarah M and Rajasegarar, Sutharshan and Palaniswami, Marimuthu},
  journal={IEEE Transactions on Fuzzy Systems},
  year={2017},
  publisher={IEEE}
}

@article{erfani2015r1svm,
  title={R1SVM: a randomised nonlinear approach to large-scale anomaly detection},
  author={Erfani, Sarah and Baktashmotlagh, Mahsa and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Chris},
  year={2015}
}







@misc{chollet2015keras,
  title={Keras},
  author={Chollet, Fran\c{c}ois and others},
  year={2015},
  publisher={GitHub},
  howpublished={\url{https://github.com/keras-team/keras}},
}

@book{boyd2004convex,
  title={Convex optimization},
  author={Boyd, Stephen and Vandenberghe, Lieven},
  year={2004},
  publisher={Cambridge university press}
}

@article{chalapathy2017robust,
  title={Robust, Deep and Inductive Anomaly Detection},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1704.06743},
  year={2017}
}

@article{scikit-learn,
 title={Scikit-learn: Machine Learning in {P}ython},
 author={Pedregosa, F. and Varoquaux, G. and Gramfort, A. and Michel, V.
         and Thirion, B. and Grisel, O. and Blondel, M. and Prettenhofer, P.
         and Weiss, R. and Dubourg, V. and Vanderplas, J. and Passos, A. and
         Cournapeau, D. and Brucher, M. and Perrot, M. and Duchesnay, E.},
 journal={Journal of Machine Learning Research},
 volume={12},
 pages={2825--2830},
 year={2011}
}
@inproceedings{zhou2017anomaly,
  title={Anomaly detection with robust deep autoencoders},
  author={Zhou, Chong and Paffenroth, Randy C},
  booktitle={Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  pages={665--674},
  year={2017},
  organization={ACM}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}

@inproceedings{Sedhain:2015,
  author    = {Suvash Sedhain and
               Aditya Krishna Menon and
               Scott Sanner and
               Lexing Xie},
  title     = {AutoRec: Autoencoders Meet Collaborative Filtering},
  booktitle = {International Conference on World Wide Web (WWW)},
  year      = {2015}
}

@inproceedings{Williams:2002,
 author = {Williams, Graham and Baxter, Rohan and He, Hongxing and Hawkins, Simon and Gu, Lifang},
 title = {A Comparative Study of RNN for Outlier Detection in Data Mining},
 booktitle = {International Conference on Data Mining (ICDM)},
 year = {2002}
}

@inproceedings{Zhai:2016,
 author = {Zhai, Shuangfei and Cheng, Yu and Lu, Weining and Zhang, Zhongfei},
 title = {Deep Structured Energy Based Models for Anomaly Detection},
 booktitle = {International Conference on Machine Learning ({ICML}) },
 year = {2016}
}

@inproceedings{Lawrence:2009,
 author = {Lawrence, Neil D. and Urtasun, Raquel},
 title = {Non-linear Matrix Factorization with Gaussian Processes},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2009},
 numpages = {8},
}

@inproceedings{Davis:2006,
 author = {Davis, Jesse and Goadrich, Mark},
 title = {The Relationship Between Precision-Recall and ROC Curves},
 booktitle = {International Conference on Machine Learning (ICML)},
 year = {2006},
 numpages = {8},
}

@inproceedings{Nguyen:2009,
  Author = {Minh H. Nguyen and Fernando Torre},
  Booktitle = {Advances in Neural Information Processing Systems (NIPS)},
  Title = {Robust Kernel Principal Component Analysis},
  Year = {2009}
}

@ARTICLE{Sprechmann:2015,
author={P. Sprechmann and A. M. Bronstein and G. Sapiro},
journal={IEEE Transactions on Pattern Analysis and Machine Intelligence},
title={Learning Efficient Sparse and Low Rank Models},
year={2015},
volume={37},
number={9},
pages={1821-1833},
month={Sept}
}

@article{Huang:2010,
author = "Huang, Junzhou and Zhang, Tong",
doi = "10.1214/09-AOS778",
fjournal = "The Annals of Statistics",
journal = "Ann. Statist.",
month = "08",
number = "4",
pages = "1978--2004",
publisher = "The Institute of Mathematical Statistics",
title = "The benefit of group sparsity",
volume = "38",
year = "2010"
}

@incollection{Jain:2008,
    Author = {Viren Jain and Sebastian Seung},
    Booktitle = {Advances in Neural Information Processing Systems 21},
    Title = {Natural Image Denoising with Convolutional Networks},
    Year = {2008},
    Pages = {769--776}
   }

@Book{Bishop:2006,
  author =   "Christopher M. Bishop",
  title =    "Pattern Recognition and Machine Learning",
  publisher =    "Springer",
  year =   "2006",
}

@article{Ghoting:2008,
  Author = {Ghoting, Amol and Parthasarathy, Srinivasan and Otey, Matthew and Ghoting, Amol and Parthasarathy, Srinivasan and Otey, Matthew E.},
  Journal = {Data Mining and Knowledge Discovery},
  Number = {3},
  Pages = {349--364},
  Publisher = {Springer Netherlands},
  Title = {{Fast mining of distance-based outliers in high-dimensional datasets}},
  Volume = {16},
  Year = {2008}}

@book{Goodfellow-et-al-2016,
    title={Deep Learning},
    author={Ian Goodfellow and Yoshua Bengio and Aaron Courville},
    publisher={MIT Press},
    note={\url{http://www.deeplearningbook.org}},
    year={2016}
}

@article{Hotelling:1933,
  Author = {Hotelling, H.},
  Journal = {J. Educ. Psych.},
  Title = {{Analysis of a complex of statistical variables into principal components}},
  Volume = {24},
  Year = {1933}}

@incollection{Bach:2011,
  Author = {Bach, Francis and Jenatton, Rodolphe and Mairal, Julien and Obozinski, Guillaume},
  Booktitle = {Optimization for Machine Learning, MIT Press},
  Title = {{Convex Optimization with Sparsity-Inducing Norms}},
  Year = {2011},
}

@article{chandola2007outlier,
  title={Outlier detection: A survey},
  author={Chandola, Varun and Banerjee, Arindam and Kumar, Vipin},
  journal={ACM Computing Surveys},
  year={2007}
}

@article{vincent2010stacked,
  title={Stacked denoising autoencoders: Learning useful representations in a deep network with a local denoising criterion},
  author={Vincent, Pascal and Larochelle, Hugo and Lajoie, Isabelle and Bengio, Yoshua and Manzagol, Pierre-Antoine},
  journal={JMLR},
  volume={11},
  pages={3371--3408},
  year={2010},
  publisher={JMLR. org}
}
@inproceedings{breunig2000lof,
  title={LOF: identifying density-based local outliers},
  author={Breunig, Markus M and Kriegel, Hans-Peter and Ng, Raymond T and Sander, J{\"o}rg},
  booktitle={ACM sigmod record},
  volume={29},
  number={2},
  pages={93--104},
  year={2000},
  organization={ACM}
}
@inproceedings{knorr1997unified,
  title={A Unified Notion of Outliers: Properties and Computation.},
  author={Knorr, Edwin M and Ng, Raymond T},
  booktitle={KDD},
  pages={219--222},
  year={1997}
}

@book{charubook,
  title={Outlier Analysis},
  edition = {2nd},
  publisher = {Springer},
  author={Aggarwal, Charu C},
  year={2016}
}

@inproceedings{Zhao:2009,
  author    = {Manqi Zhao and
               Venkatesh Saligrama},
  title     = {Anomaly Detection with Score functions based on Nearest Neighbor Graphs},
  booktitle = {Advances in Neural Information Processing Systems (NIPS)},
  pages     = {2250--2258},
  year      = {2009},
}

@article{Scholkopf:2001,
place={Cambridge, MA, USA}, title={Estimating the Support of a High-Dimensional Distribution}, volume={13}, number={7}, journal={Neural Computation}, publisher={MIT Press}, author={Schölkopf, Bernhard and Platt, John C and Shawe-Taylor, John C and Smola, Alex J and Williamson, Robert C}, year={2001}, month={Jul}, pages={1443–1471}}

@inproceedings{candes2010robust,
  title={Robust principal component analysis?: Recovering low-rank matrices from sparse errors},
  author={Cand{\'e}s, Emmanuel and Li, Xiaodong and Ma, Yi and Wright, John},
  booktitle={Sensor Array and Multichannel Signal Processing Workshop (SAM), 2010 IEEE},
  pages={201--204},
  year={2010},
  organization={IEEE}
}

@techreport{krizhevsky2009learning,
  title={Learning multiple layers of features from tiny images},
  author={Krizhevsky, Alex and Hinton, Geoffrey},
  year={2009},
  Institute={University of Toronto}
}

@article{abadi2016tensorflow,
  title={Tensorflow: Large-scale machine learning on heterogeneous distributed systems},
  author={Abadi, Mart{\'\i}n and Agarwal, Ashish and Barham, Paul and Brevdo, Eugene and Chen, Zhifeng and Citro, Craig and Corrado, Greg S and Davis, Andy and Dean, Jeffrey and Devin, Matthieu and others},
  journal={arXiv preprint arXiv:1603.04467},
  year={2016}
}

@inproceedings{xiong2011direct,
  title={Direct robust matrix factorizatoin for anomaly detection},
  author={Xiong, Liang and Chen, Xi and Schneider, Jeff},
  booktitle={International Conference on Data Mining (ICDM)},
  year={2011},
  organization={IEEE}
}

@article{becker2011templates,
  title={Templates for convex cone problems with applications to sparse signal recovery},
  author={Becker, Stephen R and Cand{\`e}s, Emmanuel J and Grant, Michael C},
  journal={Mathematical programming computation},
  volume={3},
  number={3},
  pages={165--218},
  year={2011},
  publisher={Springer}
}

@article{pedregosa2011scikit,
  title={Scikit-learn: Machine learning in Python},
  author={Pedregosa, Fabian and Varoquaux, Ga{\"e}l and Gramfort, Alexandre and Michel, Vincent and Thirion, Bertrand and Grisel, Olivier and Blondel, Mathieu and Prettenhofer, Peter and Weiss, Ron and Dubourg, Vincent and others},
  journal={JMLR},
  volume={12},
  number={Oct},
  pages={2825--2830},
  year={2011}
}

@article{bengio2009learning,
  title={Learning deep architectures for AI},
  author={Bengio, Yoshua and others},
  journal={Foundations and trends{\textregistered} in Machine Learning},
  volume={2},
  number={1},
  pages={1--127},
  year={2009},
  publisher={Now Publishers, Inc.}
}

@article{hull1994database,
  title={A database for handwritten text recognition research},
  author={Hull, Jonathan J.},
  journal={IEEE Transactions on pattern analysis and machine intelligence},
  volume={16},
  number={5},
  pages={550--554},
  year={1994},
  publisher={IEEE}
}

@inproceedings{xu2010robust,
  title={Robust {PCA} via outlier pursuit},
  author={Xu, Huan and Caramanis, Constantine and Sanghavi, Sujay},
  booktitle={Advances in Neural Information Processing Systems},
  pages={2496--2504},
  year={2010}
}

@article{ioffe2015batch,
  title={Batch normalization: Accelerating deep network training by reducing internal covariate shift},
  author={Ioffe, Sergey and Szegedy, Christian},
  journal={arXiv preprint arXiv:1502.03167},
  year={2015}
}

@article{clevert2015fast,
  title={Fast and accurate deep network learning by exponential linear units (elus)},
  author={Clevert, Djork-Arn{\'e} and Unterthiner, Thomas and Hochreiter, Sepp},
  journal={arXiv preprint arXiv:1511.07289},
  year={2015}
}


@inproceedings{javaid2016deep,
  title={A deep learning approach for network intrusion detection system},
  author={Javaid, Ahmad and Niyaz, Quamar and Sun, Weiqing and Alam, Mansoor},
  booktitle={Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)},
  pages={21--26},
  year={2016},
  organization={ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}
}

@inproceedings{schlegl2017unsupervised,
  title={Unsupervised anomaly detection with generative adversarial networks to guide marker discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@inproceedings{xie2017real,
  title={Real-Time Illegal Parking Detection System Based on Deep Learning},
  author={Xie, Xuemei and Wang, Chenye and Chen, Shu and Shi, Guangming and Zhao, Zhifu},
  booktitle={Proceedings of the 2017 International Conference on Deep Learning Technologies},
  pages={23--27},
  year={2017},
  organization={ACM}
}

@incollection{aggarwal2013introduction,
  title={An introduction to outlier analysis},
  author={Aggarwal, Charu C},
  booktitle={Outlier analysis},
  pages={1--40},
  year={2013},
  publisher={Springer}
}
@inproceedings{miljkovic2010review,
  title={Review of novelty detection methods},
  author={Miljkovi{\'c}, Dubravko},
  booktitle={MIPRO, 2010 proceedings of the 33rd international convention},
  pages={593--598},
  year={2010},
  organization={IEEE}
}

@article{chalapathy2018anomaly,
  title={Anomaly Detection using One-Class Neural Networks},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1802.06360},
  year={2018}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}

@misc{tankumar,
  title={e Kumar, V.(2005) Introduction to Data Mining},
  author={Tan, PN and Steinbach, M},
  publisher={Addison-Wesley Longman Publishing Co. Inc. Boston, MA, USA}
}

@article{lecun2015deep,
  title={Deep learning},
  author={LeCun, Yann and Bengio, Yoshua and Hinton, Geoffrey},
  journal={nature},
  volume={521},
  number={7553},
  pages={436},
  year={2015},
  publisher={Nature Publishing Group}
}

@article{song2007conditional,
  title={Conditional anomaly detection},
  author={Song, Xiuyao and Wu, Mingxi and Jermaine, Christopher and Ranka, Sanjay},
  journal={IEEE Transactions on Knowledge and Data Engineering},
  volume={19},
  number={5},
  pages={631--645},
  year={2007},
  publisher={IEEE}
}

@inproceedings{chapelle2005semi,
  title={Semi-Supervised Classification by Low Density Separation.},
  author={Chapelle, Olivier and Zien, Alexander},
  booktitle={AISTATS},
  pages={57--64},
  year={2005},
  organization={Citeseer}
}

@article{chapelle2009semi,
  title={Semi-supervised learning (chapelle, o. et al., eds.; 2006)[book reviews]},
  author={Chapelle, Olivier and Scholkopf, Bernhard and Zien, Alexander},
  journal={IEEE Transactions on Neural Networks},
  volume={20},
  number={3},
  pages={542--542},
  year={2009},
  publisher={IEEE}
}
@article{pan2010survey,
  title={A survey on transfer learning},
  author={Pan, Sinno Jialin and Yang, Qiang},
  journal={IEEE Transactions on knowledge and data engineering},
  volume={22},
  number={10},
  pages={1345--1359},
  year={2010},
  publisher={IEEE}
}
@article{tuor2017deep,
  title={Deep learning for unsupervised insider threat detection in structured cybersecurity data streams},
  author={Tuor, Aaron and Kaplan, Samuel and Hutchinson, Brian and Nichols, Nicole and Robinson, Sean},
  journal={arXiv preprint arXiv:1710.00811},
  year={2017}
}

@article{chalapathy2018group,
  title={Group Anomaly Detection using Deep Generative Models},
  author={Chalapathy, Raghavendra and Toth, Edward and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1804.04876},
  year={2018}
}

@book{patterson2017deep,
  title={Deep Learning: A Practitioner's Approach},
  author={Patterson, Josh and Gibson, Adam},
  year={2017},
  publisher={" O'Reilly Media, Inc."}
}

@article{ergen2017unsupervised,
  title={Unsupervised and Semi-supervised Anomaly Detection with LSTM Neural Networks},
  author={Ergen, Tolga and Mirza, Ali Hassan and Kozat, Suleyman Serdar},
  journal={arXiv preprint arXiv:1710.09207},
  year={2017}
}

@inproceedings{ruff2018deep,
  title={Deep one-class classification},
  author={Ruff, Lukas and G{\"o}rnitz, Nico and Deecke, Lucas and Siddiqui, Shoaib Ahmed and Vandermeulen, Robert and Binder, Alexander and M{\"u}ller, Emmanuel and Kloft, Marius},
  booktitle={International Conference on Machine Learning},
  pages={4390--4399},
  year={2018}
}


@book{vapnik1998statistical,
  title={Statistical learning theory. 1998},
  author={Vapnik, Vladimir},
  year={1998},
  publisher={Wiley, New York}
}

@inproceedings{joachims1999transductive,
  title={Transductive inference for text classification using support vector machines},
  author={Joachims, Thorsten},
  booktitle={ICML},
  volume={99},
  pages={200--209},
  year={1999}
}
@inproceedings{chapelle2005semi,
  title={Semi-Supervised Classification by Low Density Separation.},
  author={Chapelle, Olivier and Zien, Alexander},
  booktitle={AISTATS},
  pages={57--64},
  year={2005},
  organization={Citeseer}
}

@inproceedings{wulsin2010semi,
  title={Semi-supervised anomaly detection for eeg waveforms using deep belief nets},
  author={Wulsin, Drausin and Blanco, Justin and Mani, Ram and Litt, Brian},
  booktitle={Machine Learning and Applications (ICMLA), 2010 Ninth International Conference on},
  pages={436--441},
  year={2010},
  organization={IEEE}
}

@article{nadeem2016semi,
  title={Semi-Supervised Deep Neural Network for Network Intrusion Detection},
  author={Nadeem, Mutahir and Marshall, Ochaun and Singh, Sarbjit and Fang, Xing and Yuan, Xiaohong},
  year={2016}
}

@article{song2017hybrid,
  title={A Hybrid Semi-Supervised Anomaly Detection Model for High-Dimensional Data},
  author={Song, Hongchao and Jiang, Zhuqing and Men, Aidong and Yang, Bo},
  journal={Computational intelligence and neuroscience},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@article{chalapathy2016bidirectional,
  title={Bidirectional LSTM-CRF for clinical concept extraction},
  author={Chalapathy, Raghavendra and Borzeshi, Ehsan Zare and Piccardi, Massimo},
  journal={arXiv preprint arXiv:1611.08373},
  year={2016}
}

@article{chalapathy2016investigation,
  title={An Investigation of Recurrent Neural Architectures for Drug Name Recognition},
  author={Chalapathy, Raghavendra and Borzeshi, Ehsan Zare and Piccardi, Massimo},
  journal={arXiv preprint arXiv:1609.07585},
  year={2016}
}

@article{lample2016neural,
  title={Neural architectures for named entity recognition},
  author={Lample, Guillaume and Ballesteros, Miguel and Subramanian, Sandeep and Kawakami, Kazuya and Dyer, Chris},
  journal={arXiv preprint arXiv:1603.01360},
  year={2016}
}

@inproceedings{liu2008isolation,
  title={Isolation forest},
  author={Liu, Fei Tony and Ting, Kai Ming and Zhou, Zhi-Hua},
  booktitle={Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on},
  pages={413--422},
  year={2008},
  organization={IEEE}
}

@article{wold1987principal,
  title={Principal component analysis},
  author={Wold, Svante and Esbensen, Kim and Geladi, Paul},
  journal={Chemometrics and intelligent laboratory systems},
  volume={2},
  number={1-3},
  pages={37--52},
  year={1987},
  publisher={Elsevier}
}

@article{cortes1995support,
  title={Support-vector networks},
  author={Cortes, Corinna and Vapnik, Vladimir},
  journal={Machine learning},
  volume={20},
  number={3},
  pages={273--297},
  year={1995},
  publisher={Springer}
}

@inproceedings{sutskever2009recurrent,
  title={The recurrent temporal restricted boltzmann machine},
  author={Sutskever, Ilya and Hinton, Geoffrey E and Taylor, Graham W},
  booktitle={Advances in Neural Information Processing Systems},
  pages={1601--1608},
  year={2009}
}

@article{chalapathy2018anomaly,
  title={Anomaly Detection using One-Class Neural Networks},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1802.06360},
  year={2018}
}

@inproceedings{salakhutdinov2010efficient,
  title={Efficient learning of deep Boltzmann machines},
  author={Salakhutdinov, Ruslan and Larochelle, Hugo},
  booktitle={Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics},
  pages={693--700},
  year={2010}
}

@inproceedings{vincent2008extracting,
  title={Extracting and composing robust features with denoising autoencoders},
  author={Vincent, Pascal and Larochelle, Hugo and Bengio, Yoshua and Manzagol, Pierre-Antoine},
  booktitle={Proceedings of the 25th international conference on Machine learning},
  pages={1096--1103},
  year={2008},
  organization={ACM}
}

@article{rodriguez1999recurrent,
  title={A recurrent neural network that learns to count},
  author={Rodriguez, Paul and Wiles, Janet and Elman, Jeffrey L},
  journal={Connection Science},
  volume={11},
  number={1},
  pages={5--40},
  year={1999},
  publisher={Taylor \& Francis}
}


@inproceedings{faghih2016deep,
  title={Deep convolutional neural networks for detection of rail surface defects},
  author={Faghih-Roohi, Shahrzad and Hajizadeh, Siamak and N{\'u}{\~n}ez, Alfredo and Babuska, Robert and De Schutter, Bart},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={2584--2589},
  year={2016},
  organization={IEEE}
}
@inproceedings{luo2017gas,
  title={Gas turbine engine gas path anomaly detection using deep learning with Gaussian distribution},
  author={Luo, Hui and Zhong, Shisheng},
  booktitle={Prognostics and System Health Management Conference (PHM-Harbin), 2017},
  pages={1--6},
  year={2017},
  organization={IEEE}
}

@article{marti2015anomaly,
  title={Anomaly detection based on sensor data in petroleum industry applications},
  author={Mart{\'\i}, Luis and Sanchez-Pi, Nayat and Molina, Jos{\'e} Manuel and Garcia, Ana Cristina Bicharra},
  journal={Sensors},
  volume={15},
  number={2},
  pages={2774--2797},
  year={2015},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{wang2018residential,
  title={Residential roof condition assessment system using deep learning},
  author={Wang, Fan and Kerekes, John P and Xu, Zhuoyi and Wang, Yandong},
  journal={Journal of Applied Remote Sensing},
  volume={12},
  number={1},
  pages={016040},
  year={2018},
  publisher={International Society for Optics and Photonics}
}

@article{de2018automatic,
  title={Automatic Car Damage Recognition using Convolutional Neural Networks},
  author={de Deijn, Jeffrey},
  year={2018}
}

@article{atha2018evaluation,
  title={Evaluation of deep learning approaches based on convolutional neural networks for corrosion detection},
  author={Atha, Deegan J and Jahanshahi, Mohammad R},
  journal={Structural Health Monitoring},
  volume={17},
  number={5},
  pages={1110--1128},
  year={2018},
  publisher={SAGE Publications Sage UK: London, England}
}

@article{ramotsoela2018survey,
  title={A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study},
  author={Ramotsoela, Daniel and Abu-Mahfouz, Adnan and Hancke, Gerhard},
  journal={Sensors},
  volume={18},
  number={8},
  pages={2491},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}
@article{chang2018review,
  title={A Review of Artificial Intelligence Algorithms Used for Smart Machine Tools},
  author={Chang, Chih-Wen and Lee, Hau-Wei and Liu, Chein-Hung},
  journal={Inventions},
  volume={3},
  number={3},
  pages={41},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{park2018lired,
  title={LiReD: A Light-Weight Real-Time Fault Detection System for Edge Computing Using LSTM Recurrent Neural Networks},
  author={Park, Donghyun and Kim, Seulgi and An, Yelin and Jung, Jae-Yoon},
  journal={Sensors},
  volume={18},
  number={7},
  pages={2110},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{medel2016anomaly,
  title={Anomaly detection in video using predictive convolutional long short-term memory networks},
  author={Medel, Jefferson Ryan and Savakis, Andreas},
  journal={arXiv preprint arXiv:1612.00390},
  year={2016}
}


@article{shipmon2017time,
  title={Time Series Anomaly Detection; Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data},
  author={Shipmon, Dominique T and Gurevitch, Jason M and Piselli, Paolo M and Edwards, Stephen T},
  journal={arXiv preprint arXiv:1708.03665},
  year={2017}
}

@article{hundman2018detecting,
  title={Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding},
  author={Hundman, Kyle and Constantinou, Valentino and Laporte, Christopher and Colwell, Ian and Soderstrom, Tom},
  journal={arXiv preprint arXiv:1802.04431},
  year={2018}
}

@inproceedings{taylor2016anomaly,
  title={Anomaly detection in automobile control network data with long short-term memory networks},
  author={Taylor, Adrian and Leblanc, Sylvain and Japkowicz, Nathalie},
  booktitle={Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on},
  pages={130--139},
  year={2016},
  organization={IEEE}
}
@article{filonov2016multivariate,
  title={Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model},
  author={Filonov, Pavel and Lavrentyev, Andrey and Vorontsov, Artem},
  journal={arXiv preprint arXiv:1612.06676},
  year={2016}
}
@article{napoletano2018anomaly,
  title={Anomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity},
  author={Napoletano, Paolo and Piccoli, Flavio and Schettini, Raimondo},
  journal={Sensors},
  volume={18},
  number={1},
  pages={209},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}
@article{ebrahimzadehmulti,
  title={Multi-Scale Change Point Detection in Multivariate Time Series},
  author={Ebrahimzadeh, Zahra and Kleinberg, Samantha}
}
@article{fawaz2018deep,
  title={Deep learning for time series classification: a review},
  author={Fawaz, Hassan Ismail and Forestier, Germain and Weber, Jonathan and Idoumghar, Lhassane and Muller, Pierre-Alain},
  journal={arXiv preprint arXiv:1809.04356},
  year={2018}
}

@article{shanmugam2018jiffy,
  title={Jiffy: A Convolutional Approach to Learning Time Series Similarity},
  author={Shanmugam, Divya and Blalock, Davis and Guttag, John},
  year={2018}
}
@article{oh2018residual,
  title={Residual Error Based Anomaly Detection Using Auto-Encoder in SMD Machine Sound},
  author={Oh, Dong Yul and Yun, Il Dong},
  journal={Sensors (Basel, Switzerland)},
  volume={18},
  number={5},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute (MDPI)}
}
@article{lim2018doping,
  title={DOPING: Generative Data Augmentation for Unsupervised Anomaly Detection with GAN},
  author={Lim, Swee Kiat and Loo, Yi and Tran, Ngoc-Trung and Cheung, Ngai-Man and Roig, Gemma and Elovici, Yuval},
  journal={arXiv preprint arXiv:1808.07632},
  year={2018}
}
@article{kim2018web,
  title={Web traffic anomaly detection using C-LSTM neural networks},
  author={Kim, Tae-Young and Cho, Sung-Bae},
  journal={Expert Systems with Applications},
  volume={106},
  pages={66--76},
  year={2018},
  publisher={Elsevier}
}
@article{laptevanogen,
  title={AnoGen: Deep Anomaly Generator},
  author={Laptev, Nikolay}
}
@article{zenati2018efficient,
  title={Efficient GAN-based anomaly detection},
  author={Zenati, Houssam and Foo, Chuan Sheng and Lecouat, Bruno and Manek, Gaurav and Chandrasekhar, Vijay Ramaseshan},
  journal={arXiv preprint arXiv:1802.06222},
  year={2018}
}
@article{li2018anomaly,
  title={Anomaly Detection with Generative Adversarial Networks for Multivariate Time Series},
  author={Li, Dan and Chen, Dacheng and Goh, Jonathan and Ng, See-kiong},
  journal={arXiv preprint arXiv:1809.04758},
  year={2018}
}
@inproceedings{sugimoto2018deep,
  title={Deep Learning-based Detection of Periodic Abnormal Waves in ECG Data},
  author={Sugimoto, Kaiji and Lee, Saerom and Okada, Yoshifumi},
  booktitle={Proceedings of the International MultiConference of Engineers and Computer Scientists},
  volume={1},
  year={2018}
}
@inproceedings{buda2018deepad,
  title={DeepAD: A Generic Framework Based on Deep Learning for Time Series Anomaly Detection},
  author={Buda, Teodora Sandra and Caglayan, Bora and Assem, Haytham},
  booktitle={Pacific-Asia Conference on Knowledge Discovery and Data Mining},
  pages={577--588},
  year={2018},
  organization={Springer}
}
@article{malhotra2016lstm,
  title={LSTM-based encoder-decoder for multi-sensor anomaly detection},
  author={Malhotra, Pankaj and Ramakrishnan, Anusha and Anand, Gaurangi and Vig, Lovekesh and Agarwal, Puneet and Shroff, Gautam},
  journal={arXiv preprint arXiv:1607.00148},
  year={2016}
}
@inproceedings{chauhan2015anomaly,
  title={Anomaly detection in ECG time signals via deep long short-term memory networks},
  author={Chauhan, Sucheta and Vig, Lovekesh},
  booktitle={Data Science and Advanced Analytics (DSAA), 2015. 36678 2015. IEEE International Conference on},
  pages={1--7},
  year={2015},
  organization={IEEE}
}
@inproceedings{guo2016robust,
  title={Robust online time series prediction with recurrent neural networks},
  author={Guo, Tian and Xu, Zhao and Yao, Xin and Chen, Haifeng and Aberer, Karl and Funaya, Koichi},
  booktitle={Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on},
  pages={816--825},
  year={2016},
  organization={Ieee}
}
@inproceedings{gorokhov2017convolutional,
  title={Convolutional Neural Networks for Unsupervised Anomaly Detection in Text Data},
  author={Gorokhov, Oleg and Petrovskiy, Mikhail and Mashechkin, Igor},
  booktitle={International Conference on Intelligent Data Engineering and Automated Learning},
  pages={500--507},
  year={2017},
  organization={Springer}
}
@article{dumodeling,
  title={Modeling approaches for time series forecasting and anomaly detection},
  author={Du, Shuyang and Pandey, Madhulima and Xing, Cuiqun}
}

@inproceedings{loganathan2018sequence,
  title={Sequence to Sequence Pattern Learning Algorithm for Real-Time Anomaly Detection in Network Traffic},
  author={Loganathan, Gobinath and Samarabandu, Jagath and Wang, Xianbin},
  booktitle={2018 IEEE Canadian Conference on Electrical \& Computer Engineering (CCECE)},
  pages={1--4},
  year={2018},
  organization={IEEE}
}

@inproceedings{amarasinghe2018toward,
  title={Toward Explainable Deep Neural Network Based Anomaly Detection},
  author={Amarasinghe, Kasun and Kenney, Kevin and Manic, Milos},
  booktitle={2018 11th International Conference on Human System Interaction (HSI)},
  pages={311--317},
  year={2018},
  organization={IEEE}
}

@article{park2018multimodal,
  title={A multimodal anomaly detector for robot-assisted feeding using an lstm-based variational autoencoder},
  author={Park, Daehyung and Hoshi, Yuuna and Kemp, Charles C},
  journal={IEEE Robotics and Automation Letters},
  volume={3},
  number={3},
  pages={1544--1551},
  year={2018},
  publisher={IEEE}
}

@inproceedings{chauhan2015anomaly,
  title={Anomaly detection in ECG time signals via deep long short-term memory networks},
  author={Chauhan, Sucheta and Vig, Lovekesh},
  booktitle={Data Science and Advanced Analytics (DSAA), 2015. 36678 2015. IEEE International Conference on},
  pages={1--7},
  year={2015},
  organization={IEEE}
}

@inproceedings{cheng2016ms,
  title={MS-LSTM: A multi-scale LSTM model for BGP anomaly detection},
  author={Cheng, Min and Xu, Qian and Lv, Jianming and Liu, Wenyin and Li, Qing and Wang, Jianping and others},
  booktitle={2016 IEEE 24th International Conference on Network Protocols (ICNP)},
  pages={1--6},
  year={2016},
  organization={IEEE}
}

@article{malhotra2016multi,
  title={Multi-sensor prognostics using an unsupervised health index based on lstm encoder-decoder},
  author={Malhotra, Pankaj and TV, Vishnu and Ramakrishnan, Anusha and Anand, Gaurangi and Vig, Lovekesh and Agarwal, Puneet and Shroff, Gautam},
  journal={arXiv preprint arXiv:1608.06154},
  year={2016}
}

@article{wielgosz2018model,
  title={The model of an anomaly detector for HiLumi LHC magnets based on Recurrent Neural Networks and adaptive quantization},
  author={Wielgosz, Maciej and Mertik, Matej and Skocze{\'n}, Andrzej and De Matteis, Ernesto},
  journal={Engineering Applications of Artificial Intelligence},
  volume={74},
  pages={166--185},
  year={2018},
  publisher={Elsevier}
}


@inproceedings{bontemps2016collective,
  title={Collective anomaly detection based on long short-term memory recurrent neural networks},
  author={Bontemps, Lo{\"\i}c and McDermott, James and Le-Khac, Nhien-An and others},
  booktitle={International Conference on Future Data and Security Engineering},
  pages={141--152},
  year={2016},
  organization={Springer}
}

@article{malhotra2016lstm,
  title={LSTM-based encoder-decoder for multi-sensor anomaly detection},
  author={Malhotra, Pankaj and Ramakrishnan, Anusha and Anand, Gaurangi and Vig, Lovekesh and Agarwal, Puneet and Shroff, Gautam},
  journal={arXiv preprint arXiv:1607.00148},
  year={2016}
}

@inproceedings{malhotra2015long,
  title={Long short term memory networks for anomaly detection in time series},
  author={Malhotra, Pankaj and Vig, Lovekesh and Shroff, Gautam and Agarwal, Puneet},
  booktitle={Proceedings},
  pages={89},
  year={2015},
  organization={Presses universitaires de Louvain}
}
@inproceedings{saurav2018online,
  title={Online anomaly detection with concept drift adaptation using recurrent neural networks},
  author={Saurav, Sakti and Malhotra, Pankaj and TV, Vishnu and Gugulothu, Narendhar and Vig, Lovekesh and Agarwal, Puneet and Shroff, Gautam},
  booktitle={Proceedings of the ACM India Joint International Conference on Data Science and Management of Data},
  pages={78--87},
  year={2018},
  organization={ACM}
}

@article{cowton2018combined,
  title={A Combined Deep Learning GRU-Autoencoder for the Early Detection of Respiratory Disease in Pigs Using Multiple Environmental Sensors},
  author={Cowton, Jake and Kyriazakis, Ilias and Pl{\"o}tz, Thomas and Bacardit, Jaume},
  journal={Sensors},
  volume={18},
  number={8},
  pages={2521},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}


@phdthesis{assendorp2017deep,
  title={Deep learning for anomaly detection in multivariate time series data},
  author={Assendorp, Jan Paul},
  year={2017},
  school={Hochschule f{\"u}r Angewandte Wissenschaften Hamburg}
}

@article{ahmad2017unsupervised,
  title={Unsupervised real-time anomaly detection for streaming data},
  author={Ahmad, Subutai and Lavin, Alexander and Purdy, Scott and Agha, Zuha},
  journal={Neurocomputing},
  volume={262},
  pages={134--147},
  year={2017},
  publisher={Elsevier}
}

@inproceedings{buda2018deepad,
  title={DeepAD: A Generic Framework Based on Deep Learning for Time Series Anomaly Detection},
  author={Buda, Teodora Sandra and Caglayan, Bora and Assem, Haytham},
  booktitle={Pacific-Asia Conference on Knowledge Discovery and Data Mining},
  pages={577--588},
  year={2018},
  organization={Springer}
}

@inproceedings{kieu2018outlier,
  title={Outlier Detection for Multidimensional Time Series Using Deep Neural Networks},
  author={Kieu, Tung and Yang, Bin and Jensen, Christian S},
  booktitle={2018 19th IEEE International Conference on Mobile Data Management (MDM)},
  pages={125--134},
  year={2018},
  organization={IEEE}
}

@techreport{Dominique,
title = {Time Series Anomaly Detection: Detection of Anomalous Drops with Limited Features and Sparse Examples in Noisy Periodic Data},
author  = {Dominique Shipmon and Jason Gurevitch and Paolo M Piselli and Steve Edwards},
year  = {2017},
URL = {https://arxiv.org/abs/1708.03665},
institution = {Google Inc.}
}
@inproceedings{zhu2017deep,
  title={Deep and confident prediction for time series at uber},
  author={Zhu, Lingxue and Laptev, Nikolay},
  booktitle={Data Mining Workshops (ICDMW), 2017 IEEE International Conference on},
  pages={103--110},
  year={2017},
  organization={IEEE}
}

@article{langkvist2014review,
  title={A review of unsupervised feature learning and deep learning for time-series modeling},
  author={L{\"a}ngkvist, Martin and Karlsson, Lars and Loutfi, Amy},
  journal={Pattern Recognition Letters},
  volume={42},
  pages={11--24},
  year={2014},
  publisher={Elsevier}
}

@article{hundman2018detecting,
  title={Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding},
  author={Hundman, Kyle and Constantinou, Valentino and Laporte, Christopher and Colwell, Ian and Soderstrom, Tom},
  journal={arXiv preprint arXiv:1802.04431},
  year={2018}
}


@article{kanarachos2017detecting,
  title={Detecting anomalies in time series data via a deep learning algorithm combining wavelets, neural networks and Hilbert transform},
  author={Kanarachos, Stratis and Christopoulos, Stavros-Richard G and Chroneos, Alexander and Fitzpatrick, Michael E},
  journal={Expert Systems with Applications},
  volume={85},
  pages={292--304},
  year={2017},
  publisher={Elsevier}
}

@article{chong2015modeling,
  title={Modeling representation of videos for anomaly detection using deep learning: A review},
  author={Chong, Yong Shean and Tay, Yong Haur},
  journal={arXiv preprint arXiv:1505.00523},
  year={2015}
}

@inproceedings{khaleghi2018improved,
  title={Improved anomaly detection in surveillance videos based on a deep learning method},
  author={Khaleghi, Ali and Moin, Mohammad Shahram},
  booktitle={2018 8th Conference of AI \& Robotics and 10th RoboCup Iranopen International Symposium (IRANOPEN)},
  pages={73--81},
  year={2018},
  organization={IEEE}
}
@phdthesis{cinelli2017anomaly,
  title={ANOMALY DETECTION IN SURVEILLANCE VIDEOS USING DEEP RESIDUAL NETWORKS},
  author={Cinelli, Lucas Pinheiro},
  year={2017},
  school={Universidade Federal do Rio de Janeiro}
}

@article{chong2015modeling,
  title={Modeling representation of videos for anomaly detection using deep learning: A review},
  author={Chong, Yong Shean and Tay, Yong Haur},
  journal={arXiv preprint arXiv:1505.00523},
  year={2015}
}

@article{chong2015modeling,
  title={Modeling representation of videos for anomaly detection using deep learning: A review},
  author={Chong, Yong Shean and Tay, Yong Haur},
  journal={arXiv preprint arXiv:1505.00523},
  year={2015}
}

@article{hu2016video,
  title={Video anomaly detection using deep incremental slow feature analysis network},
  author={Hu, Xing and Hu, Shiqiang and Huang, Yingping and Zhang, Huanlong and Wu, Hanbing},
  journal={IET Computer Vision},
  volume={10},
  number={4},
  pages={258--265},
  year={2016},
  publisher={IET}
}

@inproceedings{zhou2015abnormal,
  title={Abnormal Event Detection Using Recurrent Neural Network},
  author={Zhou, Xu-Gang and Zhang, Li-Qing},
  booktitle={Computer Science and Applications (CSA), 2015 International Conference on},
  pages={222--226},
  year={2015},
  organization={IEEE}
}
@article{luo2017revisit,
  title={A revisit of sparse coding based anomaly detection in stacked rnn framework},
  author={Luo, Weixin and Liu, Wen and Gao, Shenghua},
  journal={ICCV, Oct},
  volume={1},
  number={2},
  pages={3},
  year={2017}
}

@article{medel2016anomaly,
  title={Anomaly detection in video using predictive convolutional long short-term memory networks},
  author={Medel, Jefferson Ryan and Savakis, Andreas},
  journal={arXiv preprint arXiv:1612.00390},
  year={2016}
}
@misc{singh2017anomaly,
  title={Anomaly Detection for Temporal Data using Long Short-Term Memory (LSTM)},
  author={Singh, Akash},
  year={2017}
}
@article{ben2018attentioned,
  title={Attentioned Convolutional LSTM InpaintingNetwork for Anomaly Detection in Videos},
  author={Ben-Ari, Itamar and Shwartz-Ziv, Ravid},
  journal={arXiv preprint arXiv:1811.10228},
  year={2018}
}

@inproceedings{luo2017remembering,
  title={Remembering history with convolutional lstm for anomaly detection},
  author={Luo, Weixin and Liu, Wen and Gao, Shenghua},
  booktitle={Multimedia and Expo (ICME), 2017 IEEE International Conference on},
  pages={439--444},
  year={2017},
  organization={IEEE}
}

@article{d2017autoencoder,
  title={Autoencoder with recurrent neural networks for video forgery detection},
  author={D'Avino, Dario and Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa},
  journal={Electronic Imaging},
  volume={2017},
  number={7},
  pages={92--99},
  year={2017},
  publisher={Society for Imaging Science and Technology}
}
@inproceedings{dotti2017unsupervised,
  title={Unsupervised Discovery of Normal and Abnormal Activity Patterns in Indoor and Outdoor Environments.},
  author={Dotti, Dario and Popa, Mirela and Asteriadis, Stylianos},
  booktitle={VISIGRAPP (5: VISAPP)},
  pages={210--217},
  year={2017}
}

@inproceedings{yang2015unsupervised,
  title={Unsupervised extraction of video highlights via robust recurrent auto-encoders},
  author={Yang, Huan and Wang, Baoyuan and Lin, Stephen and Wipf, David and Guo, Minyi and Guo, Baining},
  booktitle={Proceedings of the IEEE international conference on computer vision},
  pages={4633--4641},
  year={2015}
}

@article{li2017transferred,
  title={Transferred Deep Learning for Anomaly Detection in Hyperspectral Imagery.},
  author={Li, Wei and Wu, Guodong and Du, Qian},
  journal={IEEE Geosci. Remote Sensing Lett.},
  volume={14},
  number={5},
  pages={597--601},
  year={2017}
}

@inproceedings{munawar2017spatio,
  title={Spatio-temporal anomaly detection for industrial robots through prediction in unsupervised feature space},
  author={Munawar, Asim and Vinayavekhin, Phongtharin and De Magistris, Giovanni},
  booktitle={Applications of Computer Vision (WACV), 2017 IEEE Winter Conference on},
  pages={1017--1025},
  year={2017},
  organization={IEEE}
}

@inproceedings{hasan2016learning,
  title={Learning temporal regularity in video sequences},
  author={Hasan, Mahmudul and Choi, Jonghyun and Neumann, Jan and Roy-Chowdhury, Amit K and Davis, Larry S},
  booktitle={Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition},
  pages={733--742},
  year={2016}
}

@inproceedings{chen2015detecting,
  title={Detecting abnormal behaviors in surveillance videos based on fuzzy clustering and multiple Auto-Encoders},
  author={Chen, Zhengying and Tian, Yonghong and Zeng, Wei and Huang, Tiejun},
  booktitle={Multimedia and Expo (ICME), 2015 IEEE International Conference on},
  pages={1--6},
  year={2015},
  organization={IEEE}
}

@article{christiansen2016deepanomaly,
  title={DeepAnomaly: Combining background subtraction and deep learning for detecting obstacles and anomalies in an agricultural field},
  author={Christiansen, Peter and Nielsen, Lars N and Steen, Kim A and J{\o}rgensen, Rasmus N and Karstoft, Henrik},
  journal={Sensors},
  volume={16},
  number={11},
  pages={1904},
  year={2016},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{tran2017anomaly,
  title={Anomaly detection using a convolutional winner-take-all Autoencoder},
  author={Tran, Hanh TM and Hogg, DC},
  booktitle={Proceedings of the British Machine Vision Conference 2017},
  year={2017},
  organization={Leeds}
}

@article{nogas2018deepfall,
  title={DeepFall--Non-invasive Fall Detection with Deep Spatio-Temporal Convolutional Autoencoders},
  author={Nogas, Jacob and Khan, Shehroz S and Mihailidis, Alex},
  journal={arXiv preprint arXiv:1809.00977},
  year={2018}
}


@article{tripathi2018convolutional,
  title={Convolutional neural networks for crowd behaviour analysis: a survey},
  author={Tripathi, Gaurav and Singh, Kuldeep and Vishwakarma, Dinesh Kumar},
  journal={The Visual Computer},
  pages={1--24},
  year={2018},
  publisher={Springer}
}


@inproceedings{gutoski2017detection,
  title={Detection of video anomalies using convolutional autoencoders and one-class support vector machines},
  author={Gutoski, Matheus and Aquino, Nelson Marcelo Romero and Ribeiro, Manass{\'e}s and Lazzaretti, Andr{\'e} Eng{\^e}nio and Lopes, Heitor Silv{\'e}rio},
  booktitle={Proc. XIII Brazilian Congress on Computational Intelligence},
  year={2017}
}

@inproceedings{inoue2017anomaly,
  title={Anomaly detection for a water treatment system using unsupervised machine learning},
  author={Inoue, Jun and Yamagata, Yoriyuki and Chen, Yuqi and Poskitt, Christopher M and Sun, Jun},
  booktitle={Data Mining Workshops (ICDMW), 2017 IEEE International Conference on},
  pages={1058--1065},
  year={2017},
  organization={IEEE}
}

@article{boghossian2005challenges,
  title={The challenges of robust 24/7 video surveillance systems},
  author={Boghossian, B and Black, J},
  year={2005},
  publisher={IET}
}

@article{kiran2018overview,
  title={An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos},
  author={Kiran, B Ravi and Thomas, Dilip Mathew and Parakkal, Ranjith},
  journal={Journal of Imaging},
  volume={4},
  number={2},
  pages={36},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{qiao2017abnormal,
  title={Abnormal event detection based on deep autoencoder fusing optical flow},
  author={Qiao, Meina and Wang, Tian and Li, Jiakun and Li, Ce and Lin, Zhiwei and Snoussi, Hichem},
  booktitle={Control Conference (CCC), 2017 36th Chinese},
  pages={11098--11103},
  year={2017},
  organization={IEEE}
}



@article{huang2018deep,
  title={A deep cnn-lstm model for particulate matter (Pm2. 5) forecasting in smart cities},
  author={Huang, Chiou-Jye and Kuo, Ping-Huan},
  journal={Sensors},
  volume={18},
  number={7},
  pages={2220},
  year={2018},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@inproceedings{kravchik2018detecting,
  title={Detecting Cyber Attacks in Industrial Control Systems Using Convolutional Neural Networks},
  author={Kravchik, Moshe and Shabtai, Asaf},
  booktitle={Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy},
  pages={72--83},
  year={2018},
  organization={ACM}
}

@incollection{thi2017one,
  title={One-Class Collective Anomaly Detection Based on LSTM-RNNs},
  author={Thi, Nga Nguyen and Le-Khac, Nhien-An and others},
  booktitle={Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI},
  pages={73--85},
  year={2017},
  publisher={Springer}
}

@article{bhattad2018detecting,
  title={Detecting Anomalous Faces with'No Peeking'Autoencoders},
  author={Bhattad, Anand and Rock, Jason and Forsyth, David},
  journal={arXiv preprint arXiv:1802.05798},
  year={2018}
}

@inproceedings{sakurada2014anomaly,
  title={Anomaly detection using autoencoders with nonlinear dimensionality reduction},
  author={Sakurada, Mayu and Yairi, Takehisa},
  booktitle={Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis},
  pages={4},
  year={2014},
  organization={ACM}
}

@article{qu2017detection,
  title={Detection of pitting in gears using a deep sparse autoencoder},
  author={Qu, Yongzhi and He, Miao and Deutsch, Jason and He, David},
  journal={Applied Sciences},
  volume={7},
  number={5},
  pages={515},
  year={2017},
  publisher={Multidisciplinary Digital Publishing Institute}
}


@article{fuentes2017robust,
  title={A robust deep-learning-based detector for real-time tomato plant diseases and pests recognition},
  author={Fuentes, Alvaro and Yoon, Sook and Kim, Sang Cheol and Park, Dong Sun},
  journal={Sensors},
  volume={17},
  number={9},
  pages={2022},
  year={2017},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{araya2017ensemble,
  title={An ensemble learning framework for anomaly detection in building energy consumption},
  author={Araya, Daniel B and Grolinger, Katarina and ElYamany, Hany F and Capretz, Miriam AM and Bitsuamlak, Girma},
  journal={Energy and Buildings},
  volume={144},
  pages={191--206},
  year={2017},
  publisher={Elsevier}
}

@inproceedings{nanduri2016anomaly,
  title={Anomaly detection in aircraft data using Recurrent Neural Networks (RNN)},
  author={Nanduri, Anvardh and Sherry, Lance},
  booktitle={Integrated Communications Navigation and Surveillance (ICNS), 2016},
  pages={5C2--1},
  year={2016},
  organization={IEEE}
}


@inproceedings{dong2016camera,
  title={Camera anomaly detection based on morphological analysis and deep learning},
  author={Dong, Lingping and Zhang, Yongliang and Wen, Conglin and Wu, Hongtao},
  booktitle={Digital Signal Processing (DSP), 2016 IEEE International Conference on},
  pages={266--270},
  year={2016},
  organization={IEEE}
}

@article{dai2017cleaning,
  title={Cleaning method for status monitoring data of power equipment based on stacked denoising autoencoders},
  author={Dai, Jiejie and Song, Hui and Sheng, Gehao and Jiang, Xiuchen},
  journal={IEEE Access},
  volume={5},
  pages={22863--22870},
  year={2017},
  publisher={IEEE}
}


@inproceedings{faghih2016deep,
  title={Deep convolutional neural networks for detection of rail surface defects.},
  author={Faghih-Roohi, Shahrzad and Hajizadeh, Siamak and N{\'u}{\~n}ez, Alfredo and Babuska, Robert and De Schutter, Bart},
  booktitle={IJCNN},
  pages={2584--2589},
  year={2016}
}


@article{mohammadi2018deep,
  title={Deep Learning for IoT Big Data and Streaming Analytics: A Survey},
  author={Mohammadi, Mehdi and Al-Fuqaha, Ala and Sorour, Sameh and Guizani, Mohsen},
  journal={IEEE Communications Surveys \& Tutorials},
  year={2018},
  publisher={IEEE}
}

@inproceedings{lee2016convolutional,
  title={Convolutional neural net and bearing fault analysis},
  author={Lee, Dean and Siu, Vincent and Cruz, Rick and Yetman, Charles},
  booktitle={Proceedings of the International Conference on Data Mining series (ICDM) Barcelona},
  pages={194--200},
  year={2016}
}

@article{khan2018review,
  title={A review on the application of deep learning in system health management},
  author={Khan, Samir and Yairi, Takehisa},
  journal={Mechanical Systems and Signal Processing},
  volume={107},
  pages={241--265},
  year={2018},
  publisher={Elsevier}
}

@article{zhao2016deep,
  title={Deep learning and its applications to machine health monitoring: A survey},
  author={Zhao, Rui and Yan, Ruqiang and Chen, Zhenghua and Mao, Kezhi and Wang, Peng and Gao, Robert X},
  journal={arXiv preprint arXiv:1612.07640},
  year={2016}
}

@article{liao2016enhanced,
  title={Enhanced restricted Boltzmann machine with prognosability regularization for prognostics and health assessment},
  author={Liao, Linxia and Jin, Wenjing and Pavel, Radu},
  journal={IEEE Transactions on Industrial Electronics},
  volume={63},
  number={11},
  pages={7076--7083},
  year={2016},
  publisher={IEEE}
}

@inproceedings{yan2015accurate,
  title={On accurate and reliable anomaly detection for gas turbine combustors: A deep learning approach},
  author={Yan, Weizhong and Yu, Lijie},
  booktitle={Proceedings of the annual conference of the prognostics and health management society},
  year={2015}
}

@inproceedings{dong2016camera,
  title={Camera anomaly detection based on morphological analysis and deep learning},
  author={Dong, Lingping and Zhang, Yongliang and Wen, Conglin and Wu, Hongtao},
  booktitle={Digital Signal Processing (DSP), 2016 IEEE International Conference on},
  pages={266--270},
  year={2016},
  organization={IEEE}
}

@inproceedings{luo2017gas,
  title={Gas turbine engine gas path anomaly detection using deep learning with Gaussian distribution},
  author={Luo, Hui and Zhong, Shisheng},
  booktitle={Prognostics and System Health Management Conference (PHM-Harbin), 2017},
  pages={1--6},
  year={2017},
  organization={IEEE}
}


@inproceedings{chong2017abnormal,
  title={Abnormal event detection in videos using spatiotemporal autoencoder},
  author={Chong, Yong Shean and Tay, Yong Haur},
  booktitle={International Symposium on Neural Networks},
  pages={189--196},
  year={2017},
  organization={Springer}
}

@article{andrewsaanomaly,
  title={Anomaly Detection for Security Imaging},
  author={Andrewsa, JTA and Jaccarda, N and Rogersa, TW and Tanaya, T and Griffina, LD}
}

@inproceedings{qiao2017abnormal,
  title={Abnormal event detection based on deep autoencoder fusing optical flow},
  author={Qiao, Meina and Wang, Tian and Li, Jiakun and Li, Ce and Lin, Zhiwei and Snoussi, Hichem},
  booktitle={Control Conference (CCC), 2017 36th Chinese},
  pages={11098--11103},
  year={2017},
  organization={IEEE}
}

@inproceedings{tran2017anomaly,
  title={Anomaly Detection using a Convolutional Winner-Take-All Autoencoder},
  author={Tran, Hanh TM and Hogg, DC},
  booktitle={Proceedings of the British Machine Vision Conference 2017},
  year={2017},
  organization={Leeds}
}

@article{sabokrou2016fully,
  title={Fully convolutional neural network for fast anomaly detection in crowded scenes},
  author={Sabokrou, Mohammad and Fayyaz, Mohsen and Fathy, Mahmood and others},
  journal={arXiv preprint arXiv:1609.00866},
  year={2016}
}

@article{adam2008robust,
  title={Robust real-time unusual event detection using multiple fixed-location monitors},
  author={Adam, Amit and Rivlin, Ehud and Shimshoni, Ilan and Reinitz, Daviv},
  journal={IEEE transactions on pattern analysis and machine intelligence},
  volume={30},
  number={3},
  pages={555--560},
  year={2008},
  publisher={IEEE}
}

@article{ucsdAnomalyDetect2017,
  title={ Ucsd anomaly detection dataset},
  year={2017}
  url={http://www.svcl.ucsd.edu/ projects/anomaly/dataset.htm}
}


@inproceedings{yuan2015distributed,
  title={A distributed anomaly detection method of operation energy consumption using smart meter data},
  author={Yuan, Ye and Jia, Kebin},
  booktitle={Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2015 International Conference on},
  pages={310--313},
  year={2015},
  organization={IEEE}
}

@article{yu2017network,
  title={Network Intrusion Detection through Stacking Dilated Convolutional Autoencoders},
  author={Yu, Yang and Long, Jun and Cai, Zhiping},
  journal={Security and Communication Networks},
  volume={2017},
  year={2017},
  publisher={Hindawi}
}

@article{yin2017deep,
  title={A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks},
  author={Yin, Chuanlong and Zhu, Yuefei and Fei, Jinlong and He, Xinzheng},
  journal={IEEE Access},
  volume={5},
  pages={21954--21961},
  year={2017},
  publisher={IEEE}
}

@inproceedings{zhang2017detecting,
  title={Detecting rumors on Online Social Networks using multi-layer autoencoder},
  author={Zhang, Yan and Chen, Weiling and Yeo, Chai Kiat and Lau, Chiew Tong and Lee, Bu Sung},
  booktitle={Technology \& Engineering Management Conference (TEMSCON), 2017 IEEE},
  pages={437--441},
  year={2017},
  organization={IEEE}
}


@article{xian2017zero,
  title={Zero-shot learning-A comprehensive evaluation of the good, the bad and the ugly},
  author={Xian, Yongqin and Lampert, Christoph H and Schiele, Bernt and Akata, Zeynep},
  journal={arXiv preprint arXiv:1707.00600},
  year={2017}
}

@inproceedings{socher2013zero,
  title={Zero-shot learning through cross-modal transfer},
  author={Socher, Richard and Ganjoo, Milind and Manning, Christopher D and Ng, Andrew},
  booktitle={Advances in neural information processing systems},
  pages={935--943},
  year={2013}
}

@article{pan2010survey,
  title={A survey on transfer learning},
  author={Pan, Sinno Jialin and Yang, Qiang},
  journal={IEEE Transactions on knowledge and data engineering},
  volume={22},
  number={10},
  pages={1345--1359},
  year={2010},
  publisher={IEEE}
}

@article{kodirov2017semantic,
  title={Semantic autoencoder for zero-shot learning},
  author={Kodirov, Elyor and Xiang, Tao and Gong, Shaogang},
  journal={arXiv preprint arXiv:1704.08345},
  year={2017}
}

@article{gutoskidetection,
  title={Detection of Video Anomalies Using Convolutional Autoencoders and One-Class Support Vector Machines},
  author={Gutoski, Matheus and Aquino, Nelson Marcelo Romero and Ribeiro, Manass{\'e}s and Lazzaretti, Andr{\'e} Eng{\^e}nio and Lopes, Heitor Silv{\'e}rio}
}

@article{inoue2017anomaly,
  title={Anomaly detection for a water treatment system using unsupervised machine learning},
  author={Inoue, Jun and Yamagata, Yoriyuki and Chen, Yuqi and Poskitt, Christopher M and Sun, Jun},
  journal={arXiv preprint arXiv:1709.05342},
  year={2017}
}

@article{d2017autoencoder,
  title={Autoencoder with recurrent neural networks for video forgery detection},
  author={D'Avino, Dario and Cozzolino, Davide and Poggi, Giovanni and Verdoliva, Luisa},
  journal={Electronic Imaging},
  volume={2017},
  number={7},
  pages={92--99},
  year={2017},
  publisher={Society for Imaging Science and Technology}
}

@inproceedings{dotti2017unsupervised,
  title={Unsupervised Discovery of Normal and Abnormal Activity Patterns in Indoor and Outdoor Environments.},
  author={Dotti, Dario and Popa, Mirela and Asteriadis, Stylianos},
  booktitle={VISIGRAPP (5: VISAPP)},
  pages={210--217},
  year={2017}
}

@article{yang2015unsupervised,
  title={Unsupervised extraction of video highlights via robust recurrent auto-encoders},
  author={Yang, Huan and Wang, Baoyuan and Lin, Stephen and Wipf, David and Guo, Minyi and Guo, Baining},
  journal={arXiv preprint arXiv:1510.01442},
  year={2015}
}


@inproceedings{chen2015detecting,
  title={Detecting abnormal behaviors in surveillance videos based on fuzzy clustering and multiple Auto-Encoders},
  author={Chen, Zhengying and Tian, Yonghong and Zeng, Wei and Huang, Tiejun},
  booktitle={Multimedia and Expo (ICME), 2015 IEEE International Conference on},
  pages={1--6},
  year={2015},
  organization={IEEE}
}

@article{schreyer2017detection,
  title={Detection of Anomalies in Large Scale Accounting Data using Deep Autoencoder Networks},
  author={Schreyer, Marco and Sattarov, Timur and Borth, Damian and Dengel, Andreas and Reimer, Bernd},
  journal={arXiv preprint arXiv:1709.05254},
  year={2017}
}

@article{jovanoskianalyzing,
  title={Analyzing raw log files to find execution anomalies},
  author={Jovanoski, Viktor and Rupnik, Jan and Karlovcec, Mario and Fortuna, Bla{\v{z}}}
}

@inproceedings{du2017deeplog,
  title={DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning},
  author={Du, Min and Li, Feifei and Zheng, Guineng and Srikumar, Vivek},
  booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
  pages={1285--1298},
  year={2017},
  organization={ACM}
}
@article{hochreiter1997long,
  title={Long short-term memory},
  author={Hochreiter, Sepp and Schmidhuber, J{\"u}rgen},
  journal={Neural computation},
  volume={9},
  number={8},
  pages={1735--1780},
  year={1997},
  publisher={MIT Press}
}
@inproceedings{xu2009detecting,
  title={Detecting large-scale system problems by mining console logs},
  author={Xu, Wei and Huang, Ling and Fox, Armando and Patterson, David and Jordan, Michael I},
  booktitle={Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles},
  pages={117--132},
  year={2009},
  organization={ACM}
}


@inproceedings{thing2017ieee,
  title={IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach},
  author={Thing, Vrizlynn LL},
  booktitle={Wireless Communications and Networking Conference (WCNC), 2017 IEEE},
  pages={1--6},
  year={2017},
  organization={IEEE}
}

@article{hodo2017shallow,
  title={Shallow and deep networks intrusion detection system: A taxonomy and survey},
  author={Hodo, Elike and Bellekens, Xavier and Hamilton, Andrew and Tachtatzis, Christos and Atkinson, Robert},
  journal={arXiv preprint arXiv:1701.02145},
  year={2017}
}

@inproceedings{alrawashdeh2016toward,
  title={Toward an online anomaly intrusion detection system based on deep learning},
  author={Alrawashdeh, Khaled and Purdy, Carla},
  booktitle={Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on},
  pages={195--200},
  year={2016},
  organization={IEEE}
}


@inproceedings{javaid2016deep,
  title={A deep learning approach for network intrusion detection system},
  author={Javaid, Ahmad and Niyaz, Quamar and Sun, Weiqing and Alam, Mansoor},
  booktitle={Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)},
  pages={21--26},
  year={2016},
  organization={ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)}
}

@inproceedings{pascanu2015malware,
  title={Malware classification with recurrent networks},
  author={Pascanu, Razvan and Stokes, Jack W and Sanossian, Hermineh and Marinescu, Mady and Thomas, Anil},
  booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2015 IEEE International Conference on},
  pages={1916--1920},
  year={2015},
  organization={IEEE}
}

@inproceedings{paula2016deep,
  title={Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering},
  author={Paula, Ebberth L and Ladeira, Marcelo and Carvalho, Rommel N and Marzag{\~a}o, Thiago},
  booktitle={Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on},
  pages={954--960},
  year={2016},
  organization={IEEE}
}

@inproceedings{tang2016deep,
  title={Deep learning approach for network intrusion detection in software defined networking},
  author={Tang, Tuan A and Mhamdi, Lotfi and McLernon, Des and Zaidi, Syed Ali Raza and Ghogho, Mounir},
  booktitle={Wireless Networks and Mobile Communications (WINCOM), 2016 International Conference on},
  pages={258--263},
  year={2016},
  organization={IEEE}
}

@article{tuor2017deep,
  title={Deep learning for unsupervised insider threat detection in structured cybersecurity data streams},
  author={Tuor, Aaron and Kaplan, Samuel and Hutchinson, Brian and Nichols, Nicole and Robinson, Sean},
  journal={arXiv preprint arXiv:1710.00811},
  year={2017}
}

@inproceedings{van2017anomaly,
  title={An anomaly-based network intrusion detection system using Deep learning},
  author={Van, Nguyen Thanh and Thinh, Tran Ngoc and Sach, Le Thanh},
  booktitle={System Science and Engineering (ICSSE), 2017 International Conference on},
  pages={210--214},
  year={2017},
  organization={IEEE}
}

@inproceedings{yousefi2017autoencoder,
  title={Autoencoder-based feature learning for cyber security applications},
  author={Yousefi-Azar, Mahmood and Varadharajan, Vijay and Hamey, Len and Tupakula, Uday},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={3854--3861},
  year={2017},
  organization={IEEE}
}

@inproceedings{cordero2016analyzing,
  title={Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks},
  author={Cordero, Carlos Garc{\'\i}a and Hauke, Sascha and M{\"u}hlh{\"a}user, Max and Fischer, Mathias},
  booktitle={Privacy, Security and Trust (PST), 2016 14th Annual Conference on},
  pages={317--324},
  year={2016},
  organization={IEEE}
}

@inproceedings{zolotukhin2016increasing,
  title={Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic},
  author={Zolotukhin, Mikhail and H{\"a}m{\"a}l{\"a}inen, Timo and Kokkonen, Tero and Siltanen, Jarmo},
  booktitle={Telecommunications (ICT), 2016 23rd International Conference on},
  pages={1--6},
  year={2016},
  organization={IEEE}
}

@inproceedings{yan2015accurate,
  title={On accurate and reliable anomaly detection for gas turbine combustors: A deep learning approach},
  author={Yan, Weizhong and Yu, Lijie},
  booktitle={Proceedings of the annual conference of the prognostics and health management society},
  year={2015}
}

@article{banjanovic2017neural,
  title={Neural network-based data-driven modelling of anomaly detection in thermal power plant},
  author={Banjanovic-Mehmedovic, Lejla and Hajdarevic, Amel and Kantardzic, Mehmed and Mehmedovic, Fahrudin and Dzananovic, Izet},
  journal={Automatika},
  volume={58},
  number={1},
  pages={69--79},
  year={2017},
  publisher={Taylor \& Francis}
}

@article{wielgosz2017recurrent,
  title={Recurrent Neural Networks for anomaly detection in the Post-Mortem time series of LHC superconducting magnets},
  author={Wielgosz, Maciej and Skocze{\'n}, Andrzej and Mertik, Matej},
  journal={arXiv preprint arXiv:1702.00833},
  year={2017}
}



@inproceedings{thing2017ieee,
  title={IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach},
  author={Thing, Vrizlynn LL},
  booktitle={Wireless Communications and Networking Conference (WCNC), 2017 IEEE},
  pages={1--6},
  year={2017},
  organization={IEEE}
}


@article{mohammadi2017new,
  title={A New Deep Learning Approach for Anomaly Base IDS using Memetic Classifier.},
  author={Mohammadi, Shahriar and Namadchian, Amin},
  journal={International Journal of Computers, Communications \& Control},
  volume={12},
  number={5},
  year={2017}
}

@article{christiansen2016deepanomaly,
  title={DeepAnomaly: combining background subtraction and deep learning for detecting obstacles and anomalies in an agricultural field},
  author={Christiansen, Peter and Nielsen, Lars N and Steen, Kim A and J{\o}rgensen, Rasmus N and Karstoft, Henrik},
  journal={Sensors},
  volume={16},
  number={11},
  pages={1904},
  year={2016},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}


@inproceedings{castellini2017fake,
  title={Fake Twitter followers detection by denoising autoencoder},
  author={Castellini, Jacopo and Poggioni, Valentina and Sorbi, Giulia},
  booktitle={Proceedings of the International Conference on Web Intelligence},
  pages={195--202},
  year={2017},
  organization={ACM}
}


@article{yi2017grouped,
  title={Grouped Convolutional Neural Networks for Multivariate Time Series},
  author={Yi, Subin and Ju, Janghoon and Yoon, Man-Ki and Choi, Jaesik},
  journal={arXiv preprint arXiv:1703.09938},
  year={2017}
}



@inproceedings{jiang2015human,
  title={Human activity recognition using wearable sensors by deep convolutional neural networks},
  author={Jiang, Wenchao and Yin, Zhaozheng},
  booktitle={Proceedings of the 23rd ACM international conference on Multimedia},
  pages={1307--1310},
  year={2015},
  organization={ACM}
}

@article{mittelman2015time,
  title={Time-series modeling with undecimated fully convolutional neural networks},
  author={Mittelman, Roni},
  journal={arXiv preprint arXiv:1508.00317},
  year={2015}
}


@inproceedings{malhotra2015long,
  title={Long short term memory networks for anomaly detection in time series},
  author={Malhotra, Pankaj and Vig, Lovekesh and Shroff, Gautam and Agarwal, Puneet},
  booktitle={Proceedings},
  pages={89},
  year={2015},
  organization={Presses universitaires de Louvain}
}


@misc{singh2017anomaly,
  title={Anomaly Detection for Temporal Data using Long Short-Term Memory (LSTM)},
  author={Singh, Akash},
  year={2017}
}


@inproceedings{dasigi2014modeling,
  title={Modeling newswire events using neural networks for anomaly detection},
  author={Dasigi, Pradeep and Hovy, Eduard},
  booktitle={Proceedings of COLING 2014, the 25th International Conference on Computational Linguistics: Technical Papers},
  pages={1414--1422},
  year={2014}
}


@inproceedings{lawson2017finding,
  title={Finding Anomalies with Generative Adversarial Networks for a Patrolbot},
  author={Lawson, Wallace and Bekele, Esube and Sullivan, Keith},
  booktitle={Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops},
  pages={12--13},
  year={2017}
}

@article{leveau2017adversarial,
  title={Adversarial autoencoders for novelty detection},
  author={Leveau, Valentin and Joly, Alexis},
  year={2017}
}


@inproceedings{schlegl2017unsupervised,
  title={Unsupervised anomaly detection with generative adversarial networks to guide marker discovery},
  author={Schlegl, Thomas and Seeb{\"o}ck, Philipp and Waldstein, Sebastian M and Schmidt-Erfurth, Ursula and Langs, Georg},
  booktitle={International Conference on Information Processing in Medical Imaging},
  pages={146--157},
  year={2017},
  organization={Springer}
}

@article{sabokrou2017deep,
  title={Deep-cascade: cascading 3d deep neural networks for fast anomaly detection and localization in crowded scenes},
  author={Sabokrou, Mohammad and Fayyaz, Mohsen and Fathy, Mahmood and Klette, Reinhard},
  journal={IEEE Transactions on Image Processing},
  volume={26},
  number={4},
  pages={1992--2004},
  year={2017},
  publisher={IEEE}
}
@article{sabokrou2016video,
  title={Video anomaly detection and localisation based on the sparsity and reconstruction error of auto-encoder},
  author={Sabokrou, M and Fathy, M and Hoseini, M},
  journal={Electronics Letters},
  volume={52},
  number={13},
  pages={1122--1124},
  year={2016},
  publisher={IET}
}

@inproceedings{munawar2017spatio,
  title={Spatio-temporal anomaly detection for industrial robots through prediction in unsupervised feature space},
  author={Munawar, Asim and Vinayavekhin, Phongtharin and De Magistris, Giovanni},
  booktitle={Applications of Computer Vision (WACV), 2017 IEEE Winter Conference on},
  pages={1017--1025},
  year={2017},
  organization={IEEE}
}

@article{lopez2017conditional,
  title={Conditional Variational Autoencoder for Prediction and Feature Recovery Applied to Intrusion Detection in IoT},
  author={Lopez-Martin, Manuel and Carro, Belen and Sanchez-Esguevillas, Antonio and Lloret, Jaime},
  journal={Sensors},
  volume={17},
  number={9},
  pages={1967},
  year={2017},
  publisher={Multidisciplinary Digital Publishing Institute}
}

@article{li2017transferred,
  title={Transferred deep learning for anomaly detection in hyperspectral imagery},
  author={Li, Wei and Wu, Guodong and Du, Qian},
  journal={IEEE Geoscience and Remote Sensing Letters},
  volume={14},
  number={5},
  pages={597--601},
  year={2017},
  publisher={IEEE}
}




@inproceedings{chianucci2016unsupervised,
  title={Unsupervised change detection using Spatial Transformer Networks},
  author={Chianucci, Dan and Savakis, Andreas},
  booktitle={Signal Processing Workshop (WNYISPW), 2016 IEEE Western New York Image and},
  pages={1--5},
  year={2016},
  organization={IEEE}
}

@inproceedings{chen2017outlier,
  title={Outlier detection with autoencoder ensembles},
  author={Chen, Jinghui and Sathe, Saket and Aggarwal, Charu and Turaga, Deepak},
  booktitle={Proceedings of the 2017 SIAM International Conference on Data Mining},
  pages={90--98},
  year={2017},
  organization={SIAM}
}

@inproceedings{zhou2017anomaly,
  title={Anomaly detection with robust deep autoencoders},
  author={Zhou, Chong and Paffenroth, Randy C},
  booktitle={Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining},
  pages={665--674},
  year={2017},
  organization={ACM}
}

@inproceedings{sakurada2014anomaly,
  title={Anomaly detection using autoencoders with nonlinear dimensionality reduction},
  author={Sakurada, Mayu and Yairi, Takehisa},
  booktitle={Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis},
  pages={4},
  year={2014},
  organization={ACM}
}

@article{lu2017unsupervised,
  title={Unsupervised Sequential Outlier Detection With Deep Architectures},
  author={Lu, Weining and Cheng, Yu and Xiao, Cao and Chang, Shiyu and Huang, Shuai and Liang, Bin and Huang, Thomas},
  journal={IEEE Transactions on Image Processing},
  volume={26},
  number={9},
  pages={4321--4330},
  year={2017},
  publisher={IEEE}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}

@techreport{lyudchik2016outlier,
  title={Outlier detection using autoencoders},
  author={Lyudchik, Olga},
  year={2016}
}

@article{zhai2016deep,
  title={Deep structured energy based models for anomaly detection},
  author={Zhai, Shuangfei and Cheng, Yu and Lu, Weining and Zhang, Zhongfei},
  journal={arXiv preprint arXiv:1605.07717},
  year={2016}
}


@inproceedings{chen2017outlier,
  title={Outlier detection with autoencoder ensembles},
  author={Chen, Jinghui and Sathe, Saket and Aggarwal, Charu and Turaga, Deepak},
  booktitle={Proceedings of the 2017 SIAM International Conference on Data Mining},
  pages={90--98},
  year={2017},
  organization={SIAM}
}


@inproceedings{chalapathy2017robust,
  title={Robust, deep and inductive anomaly detection},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  booktitle={Joint European Conference on Machine Learning and Knowledge Discovery in Databases},
  pages={36--51},
  year={2017},
  organization={Springer}
}

@inproceedings{xia2015learning,
  title={Learning discriminative reconstructions for unsupervised outlier removal},
  author={Xia, Yan and Cao, Xudong and Wen, Fang and Hua, Gang and Sun, Jian},
  booktitle={Proceedings of the IEEE International Conference on Computer Vision},
  pages={1511--1519},
  year={2015}
}

@inproceedings{dau2014anomaly,
  title={Anomaly detection using replicator neural networks trained on examples of one class},
  author={Dau, Hoang Anh and Ciesielski, Vic and Song, Andy},
  booktitle={Asia-Pacific Conference on Simulated Evolution and Learning},
  pages={311--322},
  year={2014},
  organization={Springer}
}


@inproceedings{qi2014robust,
  title={Robust feature learning by stacked autoencoder with maximum correntropy criterion},
  author={Qi, Yu and Wang, Yueming and Zheng, Xiaoxiang and Wu, Zhaohui},
  booktitle={Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on},
  pages={6716--6720},
  year={2014},
  organization={IEEE}
}


@inproceedings{hawkins2002outlier,
  title={Outlier detection using replicator neural networks},
  author={Hawkins, Simon and He, Hongxing and Williams, Graham and Baxter, Rohan},
  booktitle={International Conference on Data Warehousing and Knowledge Discovery},
  pages={170--180},
  year={2002},
  organization={Springer}
}


@article{xu2015learning,
  title={Learning deep representations of appearance and motion for anomalous event detection},
  author={Xu, Dan and Ricci, Elisa and Yan, Yan and Song, Jingkuan and Sebe, Nicu},
  journal={arXiv preprint arXiv:1510.01553},
  year={2015}
}


@inproceedings{wu2015adaptive,
  title={Adaptive anomalies detection with deep network},
  author={Wu, C and Guo, Y and Ma, Y},
  booktitle={Proceeding of the Seventh International Conference on Adaptive and Self-Adaptive Systems and Applications},
  year={2015}
}


@inproceedings{zhao2015robust,
  title={Robust feature learning by improved auto-encoder from non-Gaussian noised images},
  author={Zhao, Dan and Guo, Baolong and Wu, Jinfu and Ning, Weikang and Yan, Yunyi},
  booktitle={Imaging Systems and Techniques (IST), 2015 IEEE International Conference on},
  pages={1--5},
  year={2015},
  organization={IEEE}
}


@article{yang2015unsupervised,
  title={Unsupervised extraction of video highlights via robust recurrent auto-encoders},
  author={Yang, Huan and Wang, Baoyuan and Lin, Stephen and Wipf, David and Guo, Minyi and Guo, Baining},
  journal={arXiv preprint arXiv:1510.01442},
  year={2015}
}

@inproceedings{saxe2011random,
  title={On Random Weights and Unsupervised Feature Learning.},
  author={Saxe, Andrew M and Koh, Pang Wei and Chen, Zhenghao and Bhand, Maneesh and Suresh, Bipin and Ng, Andrew Y},
  booktitle={ICML},
  pages={1089--1096},
  year={2011}
}

@inproceedings{ruff2018deep,
  title={Deep one-class classification},
  author={Ruff, Lukas and G{\"o}rnitz, Nico and Deecke, Lucas and Siddiqui, Shoaib Ahmed and Vandermeulen, Robert and Binder, Alexander and M{\"u}ller, Emmanuel and Kloft, Marius},
  booktitle={International Conference on Machine Learning},
  pages={4390--4399},
  year={2018}
}

@article{chalapathy2018anomaly,
  title={Anomaly Detection using One-Class Neural Networks},
  author={Chalapathy, Raghavendra and Menon, Aditya Krishna and Chawla, Sanjay},
  journal={arXiv preprint arXiv:1802.06360},
  year={2018}
}

@inproceedings{andrews2016transfer,
  title={Transfer representation-learning for anomaly detection},
  author={Andrews, Jerone TA and Tanay, Thomas and Morton, Edward J and Griffin, Lewis D},
  year={2016},
  organization={ICML}
}

@inproceedings{tagawa2015structured,
  title={Structured denoising autoencoder for fault detection and analysis},
  author={Tagawa, Takaaki and Tadokoro, Yukihiro and Yairi, Takehisa},
  booktitle={Asian Conference on Machine Learning},
  pages={96--111},
  year={2015}
}

@article{urbanowicz2018relief,
  title={Relief-based feature selection: introduction and review},
  author={Urbanowicz, Ryan J and Meeker, Melissa and La Cava, William and Olson, Randal S and Moore, Jason H},
  journal={Journal of biomedical informatics},
  year={2018},
  publisher={Elsevier}
}

@article{andrews2016detecting,
  title={Detecting anomalous data using auto-encoders},
  author={Andrews, Jerone TA and Morton, Edward J and Griffin, Lewis D},
  journal={International Journal of Machine Learning and Computing},
  volume={6},
  number={1},
  pages={21},
  year={2016},
  publisher={IACSIT Press}
}

@article{muandet2013one,
  title={One-class support measure machines for group anomaly detection},
  author={Muandet, Krikamol and Sch{\"o}lkopf, Bernhard},
  journal={arXiv preprint arXiv:1303.0309},
  year={2013}
}

@inproceedings{bontemps2016collective,
  title={Collective anomaly detection based on long short-term memory recurrent neural networks},
  author={Bontemps, Lo{\"\i}c and McDermott, James and Le-Khac, Nhien-An and others},
  booktitle={International Conference on Future Data and Security Engineering},
  pages={141--152},
  year={2016},
  organization={Springer}
}


@inproceedings{araya2016collective,
  title={Collective contextual anomaly detection framework for smart buildings},
  author={Araya, Daniel B and Grolinger, Katarina and ElYamany, Hany F and Capretz, Miriam AM and Bitsuamlak, G},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={511--518},
  year={2016},
  organization={IEEE}
}


@article{yu2015glad,
  title={Glad: group anomaly detection in social media analysis},
  author={Yu, Rose and He, Xinran and Liu, Yan},
  journal={ACM Transactions on Knowledge Discovery from Data (TKDD)},
  volume={10},
  number={2},
  pages={18},
  year={2015},
  publisher={ACM}
}


@inproceedings{ruchansky2017csi,
  title={CSI: A Hybrid Deep Model for Fake News Detection},
  author={Ruchansky, Natali and Seo, Sungyong and Liu, Yan},
  booktitle={Proceedings of the 2017 ACM on Conference on Information and Knowledge Management},
  pages={797--806},
  year={2017},
  organization={ACM}
}

@inproceedings{wu2015harvesting,
  title={Harvesting discriminative meta objects with deep CNN features for scene classification},
  author={Wu, Ruobing and Wang, Baoyuan and Wang, Wenping and Yu, Yizhou},
  booktitle={Computer Vision (ICCV), 2015 IEEE International Conference on},
  pages={1287--1295},
  year={2015},
  organization={IEEE}
}

@article{erfani2016high,
  title={High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning},
  author={Erfani, Sarah M and Rajasegarar, Sutharshan and Karunasekera, Shanika and Leckie, Christopher},
  journal={Pattern Recognition},
  volume={58},
  pages={121--134},
  year={2016},
  publisher={Elsevier}
}


@article{kim2015deep,
  title={Deep learning with support vector data description},
  author={Kim, Sangwook and Choi, Yonghwa and Lee, Minho},
  journal={Neurocomputing},
  volume={165},
  pages={111--117},
  year={2015},
  publisher={Elsevier}
}


@article{kim2015deepSVMwithOutputNetworks,
  title={Deep learning of support vector machines with class probability output networks},
  author={Kim, Sangwook and Yu, Zhibin and Kil, Rhee Man and Lee, Minho},
  journal={Neural Networks},
  volume={64},
  pages={19--28},
  year={2015},
  publisher={Elsevier}
}

@inproceedings{de2017learning,
  title={Learning of binocular fixations using anomaly detection with deep reinforcement learning},
  author={de La Bourdonnaye, Fran{\c{c}}ois and Teuli{\`e}re, C{\'e}line and Chateau, Thierry and Triesch, Jochen},
  booktitle={Neural Networks (IJCNN), 2017 International Joint Conference on},
  pages={760--767},
  year={2017},
  organization={IEEE}
}


@article{an2015variational,
  title={Variational autoencoder based anomaly detection using reconstruction probability},
  author={An, Jinwon and Cho, Sungzoon},
  journal={SNU Data Mining Center, Tech. Rep.},
  year={2015}
}

@inproceedings{wu2015adaptive,
  title={Adaptive anomalies detection with deep network},
  author={Wu, C and Guo, Y and Ma, Y},
  booktitle={Proceeding of the Seventh International Conference on Adaptive and Self-Adaptive Systems and Applications},
  year={2015}
}

@article{solch2016variational,
  title={Variational inference for on-line anomaly detection in high-dimensional time series},
  author={S{\"o}lch, Maximilian and Bayer, Justin and Ludersdorfer, Marvin and van der Smagt, Patrick},
  journal={arXiv preprint arXiv:1602.07109},
  year={2016}
}

@inproceedings{suh2016echo,
  title={Echo-state conditional Variational Autoencoder for anomaly detection},
  author={Suh, Suwon and Chae, Daniel H and Kang, Hyon-Goo and Choi, Seungjin},
  booktitle={Neural Networks (IJCNN), 2016 International Joint Conference on},
  pages={1015--1022},
  year={2016},
  organization={IEEE}
}
