{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:GPJZSLFEUG6POEUFIJUSWU3SSQ","short_pith_number":"pith:GPJZSLFE","schema_version":"1.0","canonical_sha256":"33d3992ca4a1bcf7128542692b53729403005b4abdca201ed490cbdd0239fec4","source":{"kind":"arxiv","id":"1810.05221","version":1},"attestation_state":"computed","paper":{"title":"MDGAN: Boosting Anomaly Detection Using \\\\Multi-Discriminator Generative Adversarial Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["stat.ML"],"primary_cat":"cs.LG","authors_text":"Asaf Shabtai, Gilad Katz, Yotam Intrator","submitted_at":"2018-10-11T19:45:30Z","abstract_excerpt":"Anomaly detection is often considered a challenging field of machine learning due to the difficulty of obtaining anomalous samples for training and the need to obtain a sufficient amount of training data. In recent years, autoencoders have been shown to be effective anomaly detectors that train only on \"normal\" data. Generative adversarial networks (GANs) have been used to generate additional training samples for classifiers, thus making them more accurate and robust. However, in anomaly detection GANs are only used to reconstruct existing samples rather than to generate additional ones. This "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1810.05221","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2018-10-11T19:45:30Z","cross_cats_sorted":["stat.ML"],"title_canon_sha256":"dd40826da1071f61d88354d144388974850bd7079a4e3d7e988a4778aee6d4ec","abstract_canon_sha256":"daf47f4547d3b61a689b6f81217ff1e6a7bb156b326f1c53052385030ce3d377"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:03:31.301018Z","signature_b64":"8AI4yuJ9ia3bU4XHswYNqvqikNekGD6K9hbsKqG4klctbB2ylTZNPnO7cNXGpqfBPA4JUcoFru1EnqRt9ik4BQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"33d3992ca4a1bcf7128542692b53729403005b4abdca201ed490cbdd0239fec4","last_reissued_at":"2026-05-18T00:03:31.300363Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:03:31.300363Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"MDGAN: Boosting Anomaly Detection Using \\\\Multi-Discriminator Generative Adversarial Networks","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["stat.ML"],"primary_cat":"cs.LG","authors_text":"Asaf Shabtai, Gilad Katz, Yotam Intrator","submitted_at":"2018-10-11T19:45:30Z","abstract_excerpt":"Anomaly detection is often considered a challenging field of machine learning due to the difficulty of obtaining anomalous samples for training and the need to obtain a sufficient amount of training data. In recent years, autoencoders have been shown to be effective anomaly detectors that train only on \"normal\" data. Generative adversarial networks (GANs) have been used to generate additional training samples for classifiers, thus making them more accurate and robust. However, in anomaly detection GANs are only used to reconstruct existing samples rather than to generate additional ones. This "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1810.05221","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1810.05221","created_at":"2026-05-18T00:03:31.300473+00:00"},{"alias_kind":"arxiv_version","alias_value":"1810.05221v1","created_at":"2026-05-18T00:03:31.300473+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1810.05221","created_at":"2026-05-18T00:03:31.300473+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":1,"internal_anchor_count":0,"sample":[{"citing_arxiv_id":"2605.07724","citing_title":"Curated Synthetic Data Doesn't Have to Collapse: A Theoretical Study of Generative Retraining with Pluralistic Preferences","ref_index":32,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ","json":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ.json","graph_json":"https://pith.science/api/pith-number/GPJZSLFEUG6POEUFIJUSWU3SSQ/graph.json","events_json":"https://pith.science/api/pith-number/GPJZSLFEUG6POEUFIJUSWU3SSQ/events.json","paper":"https://pith.science/paper/GPJZSLFE"},"agent_actions":{"view_html":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ","download_json":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ.json","view_paper":"https://pith.science/paper/GPJZSLFE","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1810.05221&json=true","fetch_graph":"https://pith.science/api/pith-number/GPJZSLFEUG6POEUFIJUSWU3SSQ/graph.json","fetch_events":"https://pith.science/api/pith-number/GPJZSLFEUG6POEUFIJUSWU3SSQ/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ/action/timestamp_anchor","attest_storage":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ/action/storage_attestation","attest_author":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ/action/author_attestation","sign_citation":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ/action/citation_signature","submit_replication":"https://pith.science/pith/GPJZSLFEUG6POEUFIJUSWU3SSQ/action/replication_record"}},"created_at":"2026-05-18T00:03:31.300473+00:00","updated_at":"2026-05-18T00:03:31.300473+00:00"}