<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Unsupervised Anomaly Detection in ECG Signals Using Denoising Autoencoders: A Comparative Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Samuele Russo</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pasquale Silvestri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Imad Eddine Tibermacine</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Neuroimaging Laboratory, IRCCS Santa Lucia Foundation</institution>
          ,
          <addr-line>Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Anomaly detection is essential in various domains, including healthcare, where early identification of irregular patterns in data can significantly impact patient outcomes. This paper presents a novel approach to unsupervised anomaly detection using the ECG5000 dataset, focusing on electrocardiogram (ECG) data. We introduce multiple autoencoder architectures-linear, convolutional, and LSTM-based-reframing the traditionally supervised classification task as an unsupervised anomaly detection problem. By disregarding original labels, we emphasize the models' ability to generalize across diferent ECG abnormalities. Our extensive experiments reveal that a denoising linear autoencoder outperforms more complex architectures, achieving an accuracy of 97.73%, within 0.7% of the current state-of-the-art. Furthermore, we conduct a comprehensive analysis of the latent space representations, providing insights into the models' feature extraction capabilities. These findings suggest that our approach not only reduces model complexity but also maintains high accuracy, ofering a viable solution for real-time anomaly detection in medical settings.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;ECG</kwd>
        <kwd>Anomaly Detection</kwd>
        <kwd>Autoencoders</kwd>
        <kwd>Deep Learning</kwd>
        <kwd>Signal Processing</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        k-NN) have shown improved eficacy but tend to be
computationally intensive and less scalable for large
Anomaly detection is a crucial task in data science and datasets[
        <xref ref-type="bibr" rid="ref14 ref15 ref16">26, 27, 28</xref>
        ].
machine learning[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], involving the identification of pat- In contrast, deep learning methods, particularly
auterns in data that do not conform to expected behavior[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. toencoders, ofer significant advantages by learning
comIts applications span a wide range of fields, including pressed representations that capture the underlying
strucifnance, cybersecurity, healthcare [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], and manufactur- ture of high-dimensional data[
        <xref ref-type="bibr" rid="ref17 ref18 ref19">29, 30, 31</xref>
        ]. Variants such
ing, where the detection of anomalies can prevent catas- as denoising, contractive, and variational autoencoders
trophic failures[
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], secure systems against breaches, have been explored extensively for their robustness
and identify early signs of disease[
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6, 7, 8</xref>
        ]. In health- across diverse anomaly types[
        <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">32, 33, 34, 35</xref>
        ]. Building
care, particularly in cardiology, the timely detection of on these developments, our work applies autoencoder
anomalies[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] in electrocardiogram (ECG) is vital for di- architectures to the ECG5000 dataset, a benchmark in
agnosing potentially life-threatening conditions such as ECG analysis, reframing the anomaly detection task as
arrhythmias[
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13">10, 11, 12, 13</xref>
        ]. Traditional methods for ECG an unsupervised learning problem to enhance model
genanalysis rely heavily on labeled data for supervised learn- eralizability across various ECG abnormalities without
ing; however, obtaining labeled data can be challenging relying on labeled data[
        <xref ref-type="bibr" rid="ref10">10, 36, 37</xref>
        ].
and expensive[14, 15]. This limitation has driven the need This study addresses this need by reframing the
for efective unsupervised anomaly detection methods ECG5000 dataset[38, 39], typically used for classification,
that can operate reliably without labeled data[16, 17]. as a benchmark for unsupervised anomaly detection. We
      </p>
      <p>Recent advancements in anomaly detection within explore a variety of autoencoder architectures—linear,
healthcare have progressed from traditional statisti- convolutional, and LSTM-based—to evaluate their
efeccal methods, such as Z-Score and Interquartile Range tiveness in identifying anomalies without the guidance of
(IQR)[18], to more sophisticated machine learning and labels[40]. The research focuses on two main variations
deep learning approaches[19, 20], capable of handling of autoencoders: denoising and contractive. Our
objeccomplex, high-dimensional data like ECG signals[21, tive is to identify an architecture that balances model
22, 23, 24]. Traditional methods often struggle with complexity with performance, making it suitable for
realsuch intricate temporal patterns, while density-based[25] time medical applications where computational resources
(e.g., LOF, DBSCAN) and distance-based techniques (e.g., may be limited.</p>
      <p>Through rigorous experimentation, we demonstrate
that a denoising linear autoencoder achieves near
stateof-the-art performance with significantly reduced
complexity. Additionally, we perform an in-depth analysis of
els, ofering insights into how these architectures capture
essential features for anomaly detection in ECG data.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>In this section, we outline the methodologies employed
to explore the efectiveness of various autoencoder
architectures for unsupervised anomaly detection in ECG
data. The methodology encompasses the design and
testing of multiple autoencoder variants, the evaluation of
their performance, and the analysis of the latent space
representations.
• Denoising Autoencoders: Here, Gaussian noise
is added to the input data during training. The
model is trained to reconstruct the clean input
from the noisy version, enhancing its ability to
iflter out noise and focus on the underlying signal
structure.
• Mixed Models: Combining both contractive and
denoising strategies, these models aim to leverage
the strengths of both approaches, though they
require careful tuning of hyperparameters to avoid
over-regularization.</p>
      <sec id="sec-2-1">
        <title>2.3. Training Pipeline</title>
      </sec>
      <sec id="sec-2-2">
        <title>2.1. Autoencoder Architectures</title>
        <p>We investigated three diferent autoencoder
architectures: Linear, Convolutional, and LSTM-based
autoencoders[41]. These architectures were selected
based on their ability to capture diferent characteristics
of the ECG data—spatial hierarchies in the case of
convolutional layers and temporal dependencies for LSTM
layers.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.2. Model Variants</title>
        <p>Each of the aforementioned architectures was further
developed into diferent variants to assess their robustness
and efectiveness:
• Contractive Autoencoders: These models
introduce a regularization term based on the
Frobenius norm of the Jacobian matrix, which
encourages the model to learn stable latent
representations that are less sensitive to small input
perturbations.</p>
        <p>A key aspect of our methodology was the analysis of
the latent space produced by the autoencoders.
Principal Component Analysis (PCA) was applied to reduce
the dimensionality of the latent space and visualize the
separation between normal and abnormal samples.
Additionally, a simple logistic regression discriminator was
trained on the latent representations to assess their ability
to distinguish between normal and anomalous data.</p>
        <p>The efectiveness of the latent space was quantified
by measuring the accuracy of the discriminator, with
higher accuracy indicating a more distinct and
informative latent representation. This analysis was crucial in
understanding the models’ capacity to encode
meaningful features in the latent space, which directly impacts
the anomaly detection performance.</p>
        <sec id="sec-2-3-1">
          <title>For comparison, Figures 4 and 5 illustrate the latent space and decision boundary for the denoising LSTM model, which shows less distinct separation, leading to lower classification accuracy.</title>
          <p>Figures 6 and 7 present the latent space and decision
boundary for the contractive linear model, which also
demonstrated lower efectiveness in distinguishing
between normal and abnormal samples compared to the
denoising linear model.</p>
          <p>Further analysis was conducted on the mixed linear
model (Figures 8 and 9), and the denoising convolutional
model (Figures 10 and 11). These results highlighted the
strengths and limitations of combining contractive and
denoising approaches in the same architecture.</p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>2.5. Training</title>
        <sec id="sec-2-4-1">
          <title>The training process was repeated multiple times to</title>
          <p>optimize the hyperparameters for each model variant.
The final training was conducted over 15 epochs, with
a learning rate of 0.01 using the Adam optimizer, which
proved more stable and faster than stochastic gradient
descent (SGD). The denoising linear autoencoder achieved
the best performance, with training early-stopped at 11
epochs based on validation performance.</p>
          <p>The optimal hyperparameters included a contractive
lambda of 0.0001 and a noise level of 0.05
(representing the maximum absolute value for the Gaussian noise
added to the input). Notably, the contractive variants
took approximately 10 to 15 times longer to train than
their denoising counterparts, without yielding superior</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Experimental Setup</title>
      <sec id="sec-3-1">
        <title>In this section, we detail the experimental setup used</title>
        <p>to evaluate the performance of the various autoencoder
architectures on the ECG5000 dataset. This includes a
description of the dataset, data preprocessing steps, model
training configurations, and evaluation metrics.</p>
        <sec id="sec-3-1-1">
          <title>3.1. Dataset Description</title>
          <p>The ECG5000 dataset is a well-known benchmark for
anomaly detection tasks involving electrocardiogram
(ECG) signals. The dataset consists of 5000
onedimensional ECG recordings, each containing 140 time
steps. The dataset is divided into five classes, with one
representing normal heartbeats and the remaining four
representing various types of anomalies, including:
• Class 1: Normal beats.
• Class 2: Premature ventricular contractions.
• Class 3: Fusion beats.
• Class 4: Unclassifiable beats.</p>
          <p>• Class 5: Anomalous beats.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>For the purposes of unsupervised anomaly detection,</title>
        <p>the original labels are disregarded during training. Only
samples from the normal class (Class 1) are used to train
the autoencoders, with the goal of identifying anomalies
based on reconstruction error during testing.</p>
        <sec id="sec-3-2-1">
          <title>3.2. Data Preprocessing</title>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>The ECG signals were normalized to have zero mean and unit variance. This step ensures that the models focus on</title>
        <p>the shape of the signal rather than its absolute amplitude, 3.3. Model Training Configuration
which is crucial for the generalization of the anomaly
detection task. The models were trained using the Adam optimizer with</p>
        <p>Given the nature of the dataset, no further data aug- a learning rate of 0.01. The training process was
conmentation techniques were applied, as the goal was to ducted over 15 epochs, with early stopping applied if
evaluate the autoencoders’ performance on raw, unal- the validation loss did not improve for three consecutive
tered ECG signals. The dataset was split into training, epochs. The batch size was set to 64, which provided a
validation, and test sets with the following proportions: balance between computational eficiency and gradient
estimation accuracy.
• Training Set: 60% of the normal samples.
• Validation Set: 20% of the normal samples.
• Test Set: 20% of the normal samples, along with</p>
        <p>all abnormal samples.</p>
        <p>The validation set was used for hyperparameter tuning
and early stopping, while the test set was used for final
performance evaluation.
• Contractive Autoencoders: A contractive loss
term with a regularization coeficient (  ) of 0.0001
was added to the standard reconstruction loss.</p>
        <p>This encouraged the model to learn more stable
representations.
• Denoising Autoencoders: Gaussian noise with
a standard deviation of 0.05 was added to the
input during training. The model was trained to
reconstruct the original, clean ECG signal from
the noisy input. Table 1
• Mixed Models: Both contractive loss and denois- Accuracy of the Various Autoencoder Models
ing noise were applied. These models required
careful tuning of the regularization coeficient
and noise level to avoid over-regularization.</p>
        <p>Linear
Convolutional</p>
        <p>LSTM</p>
        <p>Accuracy (%)
Denoising Contractive
97.73 95.69
94.94 94.51
93.60</p>
      </sec>
      <sec id="sec-3-4">
        <title>All models were implemented using PyTorch, leveraging GPU acceleration to expedite the training process. The best-performing model, based on validation performance, was selected for final testing.</title>
        <sec id="sec-3-4-1">
          <title>3.4. Threshold Selection</title>
        </sec>
      </sec>
      <sec id="sec-3-5">
        <title>The selection of the decision threshold for anomaly de</title>
        <p>tection was a critical aspect of the experimental setup.
The threshold was determined by analyzing the MSE
distribution for normal and anomalous samples. The final
threshold was set as the midpoint between one standard
deviation above the mean MSE of the normal samples
and one standard deviation below the mean MSE of the
anomalous samples.</p>
        <p>This approach ensured that the threshold was not
overly conservative, allowing the models to generalize
better to unseen data, especially in scenarios where the
separation between normal and anomalous samples was
subtle.</p>
        <sec id="sec-3-5-1">
          <title>3.5. Computational Resources</title>
        </sec>
      </sec>
      <sec id="sec-3-6">
        <title>All experiments were conducted on a high-performance</title>
        <p>computing cluster equipped with NVIDIA GPUs. The
use of GPU acceleration significantly reduced training
times, particularly for the more complex models like the
LSTM-based autoencoder and the contractive
autoencoders, which require extensive matrix computations.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Results</title>
      <sec id="sec-4-1">
        <title>In this section, we present the performance results of the</title>
        <p>diferent autoencoder models evaluated on the ECG5000
dataset. The results are organized to highlight the
efectiveness of each model in detecting anomalies based on
the various metrics discussed in the experimental setup.</p>
        <sec id="sec-4-1-1">
          <title>4.1. Model Performance</title>
        </sec>
        <sec id="sec-4-1-2">
          <title>4.2. Training and Evaluation Losses</title>
          <p>each model. The denoising linear autoencoder
demonstrated consistent and stable training, with the lowest
overall loss and a clear separation between the
reconstruction errors of normal and anomalous samples.
(b) MSE score</p>
        </sec>
        <sec id="sec-4-1-3">
          <title>4.3. Latent Space Analysis</title>
          <p>The latent space analysis revealed significant diferences
in the representation quality of each model. The
denoising linear autoencoder produced a well-separated latent
space, allowing for clear discrimination between normal
and anomalous samples. This is reflected in the high
accuracy of the discriminator applied to the latent space,
as shown in Table 2.</p>
          <p>The performance of the LSTM-based model was
notably lower, as evidenced by the near-random
discriminator accuracy and the poor separation in the latent space
(Figures 20 and 21). This suggests that the LSTM model
struggled to capture relevant features in the latent space
for efective anomaly detection.</p>
        </sec>
        <sec id="sec-4-1-4">
          <title>4.4. Summary of Results</title>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>The results demonstrate that the denoising linear autoencoder was the most efective model for anomaly detection</title>
        <p>on the ECG5000 dataset. It achieved the highest accuracy,
the most distinct latent space separation, and
outperformed the contractive and LSTM-based models. The
success of the denoising approach highlights the
importance of handling noise in ECG signals and suggests that
simpler models with well-tuned noise management can
outperform more complex architectures in this context.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Discussion</title>
      <sec id="sec-5-1">
        <title>In this section, we discuss the implications of the results obtained from the various autoencoder models tested on the ECG5000 dataset, with a particular focus on the insights gained from the latent space analysis.</title>
        <sec id="sec-5-1-1">
          <title>5.1. Model Performance</title>
          <p>The performance results indicate that the denoising
linear autoencoder outperformed other models in terms of
accuracy and robustness in anomaly detection. This
suggests that for the task of unsupervised anomaly detection
on ECG data, simpler models with well-managed noise
handling capabilities can provide superior performance
compared to more complex architectures such as LSTM
or convolutional models.</p>
          <p>The denoising approach efectively enhances the
autoencoder’s ability to learn meaningful representations
by forcing the network to reconstruct clean data from
noisy inputs. This technique seems to be particularly
well-suited for ECG data, where noise is prevalent due to
various sources of interference during signal acquisition.
The success of the denoising linear autoencoder
demonstrates that the simplicity of the architecture, combined
with an efective noise reduction strategy, can lead to
robust performance in anomaly detection tasks.</p>
        </sec>
        <sec id="sec-5-1-2">
          <title>5.2. Contractive vs. Denoising</title>
        </sec>
        <sec id="sec-5-1-3">
          <title>Autoencoders</title>
          <p>The comparison between contractive and denoising
autoencoders highlights distinct diferences in how these
architectures manage latent space representations. While
contractive autoencoders aim to enforce robustness by
minimizing the sensitivity of the latent space to small
perturbations in the input, they tend to be more
computationally expensive and, in this study, did not outperform
the denoising models. This suggests that, at least in the
context of ECG anomaly detection, denoising strategies
are more efective in maintaining the balance between
reconstruction accuracy and computational eficiency.</p>
          <p>One notable observation is the performance of the
contractive convolutional autoencoder, which sufered
from latent space collapse—where all inputs were mapped
to nearly identical latent representations. This outcome
highlights the potential risks of over-regularization in
contractive models, particularly when the regularization
strength is not carefully tuned.</p>
        </sec>
        <sec id="sec-5-1-4">
          <title>5.3. Latent Space Analysis</title>
        </sec>
      </sec>
      <sec id="sec-5-2">
        <title>The latent space analysis provided valuable insights into</title>
        <p>the internal workings of the diferent autoencoder
models. The use of Principal Component Analysis (PCA)
and a simple discriminator allowed us to visualize and
quantify the quality of the latent space representations.</p>
        <p>The denoising linear autoencoder produced a
wellseparated latent space, as evidenced by the clear clusters
corresponding to normal and anomalous data. This
welldefined separation is crucial for efective anomaly
detection, as it allows for the reliable identification of outliers
based on the reconstruction error. The high discriminator detection; future work could explore semi-supervised or
accuracy (93.10%) further confirms the efectiveness of fully supervised approaches to leverage labeled data for
the latent space representation in distinguishing between enhanced performance.
normal and anomalous samples. Furthermore, the contractive autoencoders showed
po</p>
        <p>In contrast, the latent space produced by the denoising tential issues with over-regularization, which warrants
LSTM and contractive convolutional models exhibited further investigation. Future work could explore
adapsignificant overlap between normal and anomalous data, tive regularization techniques or alternative forms of
resulting in poor discriminator performance. The near- regularization to address these challenges. Similarly, the
random accuracy of the discriminator (around 50%) in exploration of more sophisticated noise models for the
dethese cases indicates that the latent space failed to cap- noising autoencoder could provide insights into further
ture the essential features needed for efective anomaly improving robustness and accuracy.
detection. This finding suggests that while LSTM-based Finally, expanding the latent space analysis to include
models are well-suited for capturing temporal dependen- other dimensionality reduction techniques or
incorpocies, they may struggle with unsupervised tasks where rating more advanced discriminative models could
prothe latent space must be highly informative for anomaly vide deeper insights into the structure and utility of the
detection. learned representations.</p>
        <p>The issues observed with the contractive convolutional
model, including the latent space collapse, underscore the
importance of balancing regularization strength to avoid 6. Conclusion
over-constraining the model. When the contractive loss
term is too strong, the model may prioritize minimizing
the latent space sensitivity to the extent that it disregards
the actual data structure, leading to poor performance.</p>
      </sec>
      <sec id="sec-5-3">
        <title>In conclusion, this study demonstrates that denoising</title>
        <p>autoencoders, particularly those with simple linear
architectures, are highly efective for unsupervised anomaly
detection in ECG signals. The ability of these models
to generate robust latent representations, coupled with
5.4. Practical Implications their computational eficiency, makes them strong
canThe findings from this study have several practical impli- didates for deployment in clinical settings where rapid
cations. First, the success of the denoising linear autoen- and accurate detection of cardiac anomalies is crucial.
coder suggests that for ECG anomaly detection, model The findings also underscore the importance of careful
simplicity combined with efective noise management selection and tuning of regularization techniques, as
inapcan yield strong performance. This insight is particularly propriate combinations can hinder rather than enhance
relevant for deployment in resource-constrained envi- model performance. Future research should continue to
ronments, where computational eficiency is paramount. explore these themes, with a focus on generalizability,</p>
        <p>Second, the latent space analysis highlights the impor- interpretability, and computational eficiency.
tance of selecting appropriate architectures and
regularization strategies to ensure that the latent space remains 7. Declaration on Generative AI
informative and well-structured. The trade-ofs between
model complexity, regularization strength, and perfor- During the preparation of this work, the authors used
mance must be carefully considered when designing au- ChatGPT, Grammarly in order to: Grammar and spelling
toencoders for anomaly detection. check, Paraphrase and reword. After using this
tool/ser</p>
        <p>Finally, the limitations observed with LSTM-based vice, the authors reviewed and edited the content as
models in this study suggest that alternative strategies, needed and take full responsibility for the publication’s
such as attention mechanisms or hybrid models, may be content.
needed to efectively capture temporal dependencies in
unsupervised anomaly detection tasks. Future research
could explore these alternatives to improve the perfor- References
mance of sequential models in this context.</p>
      </sec>
      <sec id="sec-5-4">
        <title>While the results of this study are promising, several lim</title>
        <p>itations should be noted. The models were tested on a
single dataset (ECG5000), and the findings may not
generalize to other types of ECG data or diferent domains.
Additionally, the study focused on unsupervised anomaly</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Tai</surname>
          </string-name>
          ,
          <article-title>Detection of ecg characteristic points using wavelet transforms</article-title>
          ,
          <source>IEEE Transactions on biomedical Engineering</source>
          <volume>42</volume>
          (
          <year>1995</year>
          )
          <fpage>21</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Chuah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <article-title>Ecg anomaly detection via time series analysis, in: Frontiers of High Performance Computing</article-title>
          and
          <string-name>
            <surname>Networking ISPA 2007 Workshops: ISPA 2007 International Workshops</surname>
            <given-names>SSDSN</given-names>
          </string-name>
          , UPWN, WISH, SGC, ParDMCom, HiPCoMB, and
          <article-title>IST-AWSN 5.5. Limitations and Future Work Niagara Falls</article-title>
          , Canada,
          <source>August 28-September 1</source>
          ,
          <source>2007 search and Public Health</source>
          <volume>20</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/ Proceedings 5, Springer,
          <year>2007</year>
          , pp.
          <fpage>123</fpage>
          -
          <lpage>135</lpage>
          .
          <year>ijerph20031998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Nowicki</surname>
          </string-name>
          , C. Napoli, [14]
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Guettala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          , E. Tramontana, Novel approach
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>Enhancing sentiment analtoward medical signals classifier, in: Proceedings ysis on seed-iv dataset with vision transformers: a of the International Joint Conference on Neural comparative study</article-title>
          ,
          <source>in: Proceedings of the 2023 11th Networks</source>
          , volume
          <volume>2015</volume>
          <source>-September</source>
          ,
          <year>2015</year>
          . doi:10. International Conference on Information Technol1109/IJCNN.
          <year>2015</year>
          .
          <volume>7280556</volume>
          . ogy: IoT and
          <string-name>
            <given-names>Smart</given-names>
            <surname>City</surname>
          </string-name>
          ,
          <year>2023</year>
          , pp.
          <fpage>238</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S.</given-names>
            <surname>eddine Boukredine</surname>
          </string-name>
          , E. Mehallel,
          <string-name>
            <given-names>A.</given-names>
            <surname>Boualleg</surname>
          </string-name>
          , [15]
          <string-name>
            <given-names>N.</given-names>
            <surname>Brandizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>IocO. Baitiche</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rabehi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guermoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Douara</surname>
          </string-name>
          , I. E. chi, D. Nardi,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Unsupervised pose esTibermacine, Enhanced performance of microstrip timation by means of an innovative vision transantenna arrays through concave modifications and former</article-title>
          ,
          <source>in: Lecture Notes in Computer Science cut-corner techniques, ITEGAM-JETIA</source>
          <volume>11</volume>
          (
          <year>2025</year>
          )
          <article-title>(including subseries</article-title>
          <source>Lecture Notes in Artificial In65-71. telligence and Lecture Notes in Bioinformatics)</source>
          , vol-
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Boulanger</surname>
          </string-name>
          , A survey of heart anomaly de- ume
          <source>13589 LNAI</source>
          ,
          <year>2023</year>
          , p.
          <fpage>3</fpage>
          -
          <lpage>20</lpage>
          . doi:
          <volume>10</volume>
          .1007/ tection using ambulatory
          <source>electrocardiogram (ecg)</source>
          ,
          <fpage>978</fpage>
          -3-
          <fpage>031</fpage>
          -23480-
          <issue>4</issue>
          _
          <fpage>1</fpage>
          . Sensors 20 (
          <year>2020</year>
          )
          <fpage>1461</fpage>
          . [16]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , Eye-
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Sivapalan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. K.</given-names>
            <surname>Nundy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dev</surname>
          </string-name>
          , B. Cardif,
          <article-title>tracking system with low-end hardware: developD. John, Annet: A lightweight neural network for ment and evaluation</article-title>
          ,
          <source>Information</source>
          <volume>14</volume>
          (
          <year>2023</year>
          )
          <article-title>644. ecg anomaly detection in iot edge sensors</article-title>
          , IEEE [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Puglisi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , Transactions on Biomedical Circuits and
          <string-name>
            <given-names>Systems I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          , Exploiting robots as healthcare
          <volume>16</volume>
          (
          <year>2022</year>
          )
          <fpage>24</fpage>
          -
          <lpage>35</lpage>
          .
          <article-title>resources for epidemics management</article-title>
          and support
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>TIBERMACINE</surname>
          </string-name>
          , W. GUETTALA,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>TIBERMA</surname>
          </string-name>
          <article-title>- caregivers (short paper)</article-title>
          ., in: AIRO@ AI* IA,
          <year>2023</year>
          , CINE,
          <article-title>Eficient one-stage deep learning for text pp</article-title>
          .
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          . detection in scene images.,
          <string-name>
            <surname>Electrotehnica</surname>
            , Elec- [18]
            <given-names>I.</given-names>
          </string-name>
          <string-name>
            <surname>Naidji</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Tibermacine</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Guettala</surname>
            ,
            <given-names>I. E.</given-names>
          </string-name>
          <string-name>
            <surname>Tibertronica</surname>
          </string-name>
          , Automatica
          <volume>72</volume>
          (
          <year>2024</year>
          ).
          <article-title>macine, Semi-mind controlled robots based on re-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Cliford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Azuaje</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>McSharry</surname>
          </string-name>
          , et al.,
          <article-title>Ad- inforcement learning for indoor application., in: vanced methods and tools for ECG data analysis</article-title>
          ,
          <source>ICYRIME</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>51</fpage>
          -
          <lpage>59</lpage>
          . volume
          <volume>10</volume>
          ,
          <string-name>
            <surname>Artech</surname>
          </string-name>
          house Boston,
          <year>2006</year>
          . [19]
          <string-name>
            <given-names>N.</given-names>
            <surname>Boutarfaia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. E</surname>
          </string-name>
          . Tiber-
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Nail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Djaidir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Napoli, macine, Deep learning for eeg-based motor imagery N</article-title>
          . Haidour,
          <string-name>
            <given-names>R.</given-names>
            <surname>Abdelaziz</surname>
          </string-name>
          ,
          <article-title>Gas turbine vibration classification: Towards enhanced human-machine monitoring based on real data and neuro-fuzzy sys- interaction and assistive robotics</article-title>
          ,
          <source>in: CEUR Worktem, Diagnostyka</source>
          <volume>25</volume>
          (
          <year>2024</year>
          ).
          <source>shop Proceedings</source>
          , volume
          <volume>3695</volume>
          ,
          <year>2023</year>
          , p.
          <fpage>68</fpage>
          -
          <lpage>74</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Pelella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , C. Napoli, [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Djedi</surname>
          </string-name>
          , Neat neural networks to et al.,
          <article-title>A fast and accessible neural network based control and simulate virtual creature's locomotion, eye-tracking system for real-time psychometric</article-title>
          and in: 2014 International Conference on Multimedia hci applications,
          <source>in: CEUR WORKSHOP PROCEED- Computing and Systems (ICMCS)</source>
          , IEEE,
          <year>2014</year>
          , pp.
          <source>INGS</source>
          , volume
          <volume>3870</volume>
          ,
          <string-name>
            <surname>CEUR-WS</surname>
          </string-name>
          ,
          <year>2024</year>
          , pp.
          <fpage>32</fpage>
          -
          <lpage>41</lpage>
          .
          <fpage>9</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zimatore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. R.</given-names>
            <surname>Fetoni</surname>
          </string-name>
          , G. Paludetti, M. Cav- [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Srivastava</surname>
          </string-name>
          , Statistical techniques for agnaro, M. V.
          <string-name>
            <surname>Podda</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Troiani</surname>
          </string-name>
          ,
          <article-title>Post-processing anomaly detection, Towards Data Science analysis of transient-evoked otoacoustic emissions (</article-title>
          <year>2019</year>
          ). URL: https://towardsdatascience.com
          <article-title>/ to detect 4 khz-notch hearing impairment - a pi- statistical-techniques-for-anomaly-detection-6ac89e32d17a</article-title>
          . lot study,
          <source>Medical Science Monitor</source>
          <volume>17</volume>
          (
          <year>2011</year>
          ) [22]
          <string-name>
            <given-names>S.</given-names>
            <surname>Falciglia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Betello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , C. Napoli,
          <fpage>LearnMT41</fpage>
          -
          <lpage>MT49</lpage>
          . doi:
          <volume>10</volume>
          .12659/MSM.881793.
          <article-title>ing visual stimulus-evoked eeg manifold for neural</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Tibermacine, image classification,
          <source>Neurocomputing</source>
          <volume>588</volume>
          (
          <year>2024</year>
          ). D.
          <string-name>
            <surname>Chebana</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Nahili</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Starczewscki</surname>
          </string-name>
          , C. Napoli, doi:10.1016/j.neucom.
          <year>2024</year>
          .
          <volume>127654</volume>
          .
          <article-title>Analyzing eeg patterns in young adults exposed to [23] G. Medics, Understanding an ecg, https: diferent acrophobia levels: a vr study, Frontiers //geekymedics.com/understanding-an-ecg/</article-title>
          ,
          <source>in Human Neuroscience</source>
          <volume>18</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3389/
          <year>2021</year>
          . fnhum.
          <year>2024</year>
          .
          <volume>1348154</volume>
          . [24]
          <string-name>
            <given-names>B.</given-names>
            <surname>Nail</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Atoussi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Saadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zimatore</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Serantoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Gallotta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Real-time synchronisation of multiple L</article-title>
          .
          <string-name>
            <surname>Guidetti</surname>
          </string-name>
          , G. Maulucci,
          <string-name>
            <surname>M. De Spirito</surname>
          </string-name>
          ,
          <article-title>Auto- fractional-order chaotic systems: an application matic detection of aerobic threshold through re- study in secure communication, Fractal and Fraccurrence quantification analysis of heart rate time tional 8 (</article-title>
          <year>2024</year>
          ) 104. series,
          <source>International Journal of Environmental</source>
          Re- [25]
          <string-name>
            <given-names>D.</given-names>
            <surname>Samariya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Thakkar</surname>
          </string-name>
          ,
          <article-title>A comprehensive survey of anomaly detection algorithms</article-title>
          , An- (
          <year>2024</year>
          )
          <fpage>1</fpage>
          -
          <lpage>23</lpage>
          .
          <source>nals of Data Science</source>
          <volume>10</volume>
          (
          <year>2023</year>
          )
          <fpage>829</fpage>
          -
          <lpage>850</lpage>
          . URL: [36]
          <string-name>
            <given-names>K.</given-names>
            <surname>Batzner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Heckler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>König</surname>
          </string-name>
          , Eficientad: Accuhttps://doi.org/10.1007/s40745-021-00362-9. doi:10.
          <article-title>rate visual anomaly detection at millisecond</article-title>
          <source>-level 1007/s40745-021-00362-9</source>
          . latencies,
          <year>2023</year>
          . arXiv:
          <volume>2303</volume>
          .
          <fpage>14535</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>M.</given-names>
            <surname>Celik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Dadaser-Celik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Dokuz</surname>
          </string-name>
          , Anomaly [37]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bouchelaghem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Balsi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Modetection in temperature data using dbscan al- roni, C. Napoli, Cross-domain machine learning gorithm, in: 2011 International Symposium approaches using hyperspectral imaging for plason Innovations in Intelligent Systems and Appli- tics litter detection</article-title>
          , in: 2024 IEEE Mediterranean cations,
          <year>2011</year>
          , pp.
          <fpage>91</fpage>
          -
          <lpage>95</lpage>
          . doi:
          <volume>10</volume>
          .1109/INISTA. and
          <string-name>
            <surname>Middle-East Geoscience</surname>
          </string-name>
          and
          <source>Remote Sensing</source>
          <year>2011</year>
          .
          <volume>5946052</volume>
          .
          <string-name>
            <surname>Symposium</surname>
          </string-name>
          (
          <issue>M2GARSS</issue>
          ), IEEE,
          <year>2024</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>E.</given-names>
            <surname>Iacobelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , Eye- [38]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pereira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Silveira</surname>
          </string-name>
          ,
          <article-title>Learning representations tracking system with low-end hardware: Devel- from healthcare time series data for unsupervised opment and evaluation, Information (Switzerland) anomaly detection</article-title>
          ,
          <source>in: 2019 IEEE International 14</source>
          (
          <year>2023</year>
          ).
          <source>doi:10.3390/info14120644. Conference on Big Data and Smart Computing</source>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Akrour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Khamar</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. E</surname>
          </string-name>
          . Tiber- (
          <source>BigComp)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1109/BIGCOMP. macine, A. Rabehi,
          <source>Comparative analysis of svm</source>
          <year>2019</year>
          .
          <volume>8679157</volume>
          .
          <article-title>and cnn classifiers for eeg signal</article-title>
          classification in [39]
          <string-name>
            <given-names>P. W.</given-names>
            <surname>Code</surname>
          </string-name>
          , Papers with code,
          <year>2023</year>
          .
          <article-title>response to diferent auditory stimuli</article-title>
          , in: 2024 URL: https://paperswithcode.com/sota/ International Conference on Telecommunications outlier
          <article-title>-detection-on-ecg5000, accessed on and Intelligent Systems (ICTIS)</article-title>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . June 12th,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bergmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Fauser</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Sattlegger</surname>
          </string-name>
          , C. Steger, [40]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zouai</surname>
          </string-name>
          ,
          <article-title>Mvtec ad - a comprehensive real-world dataset A. Rabehi, Eeg classification using contrastive learnfor unsupervised anomaly detection, in: 2019 ing and riemannian tangent space representations</article-title>
          ,
          <source>IEEE/CVF Conference on Computer Vision</source>
          and in: 2024
          <source>International Conference on TelecommuniPattern Recognition (CVPR)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>9584</fpage>
          -
          <lpage>9592</lpage>
          .
          <article-title>cations and Intelligent Systems (ICTIS)</article-title>
          , IEEE,
          <year>2024</year>
          , doi:10.1109/CVPR.
          <year>2019</year>
          .
          <volume>00982</volume>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tramontana</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          [41]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rifai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Vincent</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Muller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Glorot</surname>
          </string-name>
          ,
          <string-name>
            <surname>Y.</surname>
          </string-name>
          <article-title>Bengio, hybrid neuro-wavelet predictor for qos control Contractive auto-encoders: Explicit invariance durand stability</article-title>
          , Lecture Notes in Computer Sci- ing feature extraction,
          <source>in: Proceedings of the 28th ence (including subseries Lecture Notes in Arti- International Conference on International Conferifcial Intelligence and Lecture Notes in Bioinfor- ence on Machine Learning</source>
          , ICML'
          <fpage>11</fpage>
          ,
          <string-name>
            <surname>Omnipress</surname>
          </string-name>
          , matics) 8249
          <source>LNAI</source>
          (
          <year>2013</year>
          )
          <fpage>527</fpage>
          -
          <lpage>538</lpage>
          . doi:
          <volume>10</volume>
          .1007/ Madison, WI, USA,
          <year>2011</year>
          , p.
          <fpage>833</fpage>
          -
          <lpage>840</lpage>
          .
          <fpage>978</fpage>
          -3-
          <fpage>319</fpage>
          -03524-6_
          <fpage>45</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jeong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Pemula</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Dabeer</surname>
          </string-name>
          ,
          <article-title>Spot-the-diference self-supervised pre-training for anomaly detection</article-title>
          and segmentation,
          <year>2022</year>
          . arXiv:
          <volume>2207</volume>
          .
          <fpage>14315</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hyun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kim</surname>
          </string-name>
          , G. Jeon,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Bae</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. J.</given-names>
            <surname>Kang</surname>
          </string-name>
          , Reconpatch :
          <article-title>Contrastive patch representation learning for industrial anomaly detection</article-title>
          ,
          <year>2023</year>
          . arXiv:
          <volume>2305</volume>
          .
          <fpage>16713</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <article-title>Enhancing eeg signal reconstruction in cross-domain adaptation using cyclegan</article-title>
          ,
          <source>in: 2024 International Conference on Telecommunications and Intelligent Systems (ICTIS)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>R.</given-names>
            <surname>Brociek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. D.</given-names>
            <surname>Magistris</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cardia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Coppa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <article-title>Contagion prevention of covid-19 by means of touch detection for retail stores</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3092</volume>
          ,
          <year>2021</year>
          , p.
          <fpage>89</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>B.</given-names>
            <surname>Ladjal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bechouat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sedraoui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rabehi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Lalmi</surname>
          </string-name>
          ,
          <article-title>Hybrid models for direct normal irradiance forecasting: a case study of ghardaia zone (algeria</article-title>
          ),
          <source>Natural Hazards</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>