{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:47:51Z","timestamp":1757310471625,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030202569"},{"type":"electronic","value":"9783030202576"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20257-6_5","type":"book-chapter","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T02:39:49Z","timestamp":1557801589000},"page":"55-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Outlier Detection in Temporal Spatial Log Data Using Autoencoder for Industry 4.0"],"prefix":"10.1007","author":[{"given":"Lukas","family":"Kaupp","sequence":"first","affiliation":[]},{"given":"Ulrich","family":"Beez","sequence":"additional","affiliation":[]},{"given":"Jens","family":"H\u00fclsmann","sequence":"additional","affiliation":[]},{"given":"Bernhard G.","family":"Humm","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Fu, Y., Zhu, J., Gao, S.: CPS information security risk evaluation system based on Petri Net. In: DSC 2017, 2017 IEEE Second International Conference on Data Science in Cyberspace, Proceedings, 26\u201329 June 2017, Shenzhen, China, pp. 541\u2013548. IEEE, Piscataway (2017)","DOI":"10.1109\/DSC.2017.65"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Harada, Y., Yamagata, Y., Mizuno, O., Choi, E.-H.: Log-based anomaly detection of CPS using a statistical method. In: 8th IEEE International Workshop on Empirical Software Engineering in Practice, IWESEP 2017, Proceedings, 13 March 2017, Tokyo, Japan, pp. 1\u20136. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, Washington, Tokyo (2017)","DOI":"10.1109\/IWESEP.2017.12"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1049\/iet-its.2017.0051","volume":"11","author":"H Nguyen","year":"2017","unstructured":"Nguyen, H., Cai, C., Chen, F.: Automatic classification of traffic incident\u2019s severity using machine learning approaches. IET Intell. Transp. Syst. 11, 615\u2013623 (2017)","journal-title":"IET Intell. Transp. Syst."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Hasani, Z.: Robust anomaly detection algorithms for real-time big data. Comparison of algorithms. In: Stojanovi\u0107, R. (ed.) 2017 6th Mediterranean Conference on Embedded Computing (MECO). Including ECYPS 2017, Proceedings: Research Monograph, Bar, Montenegro, 11th\u201315th June 2017, pp. 1\u20136. IEEE, Piscataway (2017)","DOI":"10.1109\/MECO.2017.7977130"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1109\/TSC.2015.2474358","volume":"8","author":"X Lu","year":"2015","unstructured":"Lu, X., Nagelkerke, M., van de Wiel, D., Fahland, D.: Discovering interacting artifacts from ERP systems. IEEE Trans. Serv. Comput. 8, 861\u2013873 (2015)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"GE Hinton","year":"2006","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313, 504\u2013507 (2006)","journal-title":"Science"},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection. ACM Comput. Surv. 41, 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"5_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3","volume-title":"Outlier Analysis","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal, C.C.: Outlier Analysis. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-47578-3"},{"key":"5_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2791120","volume":"48","author":"O Ibidunmoye","year":"2015","unstructured":"Ibidunmoye, O., Hern\u00e1ndez-Rodriguez, F., Elmroth, E.: Performance anomaly detection and bottleneck identification. ACM Comput. Surv. 48, 1\u201335 (2015)","journal-title":"ACM Comput. Surv."},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67526-8","volume-title":"Anomaly Detection Principles and Algorithms","author":"KG Mehrotra","year":"2017","unstructured":"Mehrotra, K.G., Mohan, C.K., Huang, H.: Anomaly Detection Principles and Algorithms. Springer, Cham (2017). \n                    https:\/\/doi.org\/10.1007\/978-3-319-67526-8"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1137\/1.9781611974973.11","volume-title":"Proceedings of the 2017 SIAM International Conference on Data Mining","author":"Jinghui Chen","year":"2017","unstructured":"Chen, J., Sathe, S., Aggarwal, C., Turaga, D.: Outlier detection with autoencoder ensembles. In: Chawla, N., Wang, W. (eds.) Proceedings of the 2017 SIAM International Conference on Data Mining, pp. 90\u201398. Society for Industrial and Applied Mathematics, Philadelphia (2017)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.jcss.2012.09.012","volume":"79","author":"L-A Tang","year":"2013","unstructured":"Tang, L.-A., et al.: Trustworthiness analysis of sensor data in cyber-physical systems. J. Comput. Syst. Sci. 79, 383\u2013401 (2013)","journal-title":"J. Comput. Syst. Sci."},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"5891417","DOI":"10.1155\/2017\/5891417","volume":"2017","author":"E Protopapadakis","year":"2017","unstructured":"Protopapadakis, E., Voulodimos, A., Doulamis, A., Doulamis, N., Dres, D., Bimpas, M.: Stacked autoencoders for outlier detection in over-the-horizon radar signals. Comput. Intell. Neurosci. 2017, 5891417 (2017)","journal-title":"Comput. Intell. Neurosci."},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/978-3-319-46307-0_28","volume-title":"Discovery Science: 19th International Conference, DS 2016, Bari, Italy, October 19\u201321, 2016, Proceedings","author":"T Nolle","year":"2016","unstructured":"Nolle, T., Seeliger, A., M\u00fchlh\u00e4user, M.: Unsupervised anomaly detection in noisy business process event logs using denoising autoencoders. In: Calders, T., Ceci, M., Malerba, D. (eds.) Discovery Science: 19th International Conference, DS 2016, Bari, Italy, October 19\u201321, 2016, Proceedings, pp. 442\u2013456. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-46307-0_28"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/TIP.2017.2713048","volume":"26","author":"W Lu","year":"2017","unstructured":"Lu, W., et al.: Unsupervised sequential outlier detection with deep architectures. IEEE Trans. Image Process. 26, 4321\u20134330 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.cageo.2015.10.006","volume":"86","author":"Y Xiong","year":"2016","unstructured":"Xiong, Y., Zuo, R.: Recognition of geochemical anomalies using a deep autoencoder network. Comput. Geosci. 86, 75\u201382 (2016)","journal-title":"Comput. Geosci."},{"key":"5_CR17","first-page":"116","volume":"9","author":"G Sebestyen","year":"2017","unstructured":"Sebestyen, G., Hangan, A.: Anomaly detection techniques in cyber-physical systems. Acta Univ. Sapientiae Inform. 9, 116 (2017)","journal-title":"Acta Univ. Sapientiae Inform."},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3233770","volume":"37","author":"Yanru Qu","year":"2018","unstructured":"Qu, Y., et al.: Product-based neural networks for user response prediction over multi-field categorical data (2018)","journal-title":"ACM Transactions on Information Systems"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.imavis.2018.04.004","volume":"75","author":"P Rodr\u00edguez","year":"2018","unstructured":"Rodr\u00edguez, P., Bautista, M.A., Gonz\u00e0lez, J., Escalera, S.: Beyond one-hot encoding: lower dimensional target embedding. Image Vis. Comput. 75, 21\u201331 (2018)","journal-title":"Image Vis. Comput."},{"key":"5_CR20","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Proceedings of the International Conference on Artificial Intelligence and Statistics (AISTATS 2010). Society for Artificial Intelligence and Statistics (2010)"},{"key":"5_CR21","unstructured":"Nair, V., Hinton, G.E.: Rectified linear units improve restricted Boltzmann machines. In: Proceedings of the 27th International Conference on International Conference on Machine Learning, pp. 807\u2013814. Omnipress, USA (2010)"},{"key":"5_CR22","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014)"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20257-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T10:55:59Z","timestamp":1572260159000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20257-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030202569","9783030202576"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20257-6_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xersonisos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eann2019.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}