{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:59:18Z","timestamp":1743076758198,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030522452"},{"type":"electronic","value":"9783030522469"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52246-9_16","type":"book-chapter","created":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T11:03:49Z","timestamp":1593774229000},"page":"232-244","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DeepConAD: Deep and Confidence Prediction for Unsupervised Anomaly Detection in Time Series"],"prefix":"10.1007","author":[{"given":"Ahmad Idris","family":"Tambuwal","sequence":"first","affiliation":[]},{"given":"Aliyu Muhammad","family":"Bello","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,4]]},"reference":[{"issue":"15","key":"16_CR1","first-page":"2862","volume":"16","author":"J Wang","year":"2014","unstructured":"Wang, J.: Outlier detection in big data. J. Clean. Prod. 16(15), 2862 (2014)","journal-title":"J. Clean. Prod."},{"issue":"3","key":"16_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s41060-019-00191-3","volume":"9","author":"N Reunanen","year":"2019","unstructured":"Reunanen, N., R\u00e4ty, T., Jokinen, J.J., Hoyt, T., Culler, D.: Unsupervised online detection and prediction of outliers in streams of sensor data. Int. J. Data Sci. Anal. 9(3), 285\u2013314 (2019)","journal-title":"Int. J. Data Sci. Anal."},{"issue":"4","key":"16_CR3","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu, L., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"16_CR4","unstructured":"Teng, M.: Anomaly detection on time series. In: International Conference on Progress in Informatics and Computing, vol. 1, pp. 603\u2013608 (2010)"},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1198\/016214505000001131","volume":"101","author":"P Galeano","year":"2006","unstructured":"Galeano, P., Pena, D., Tsay, R.S.: Outlier detection in multivariate time series by projection pursuit. J. Am. Stat. Assoc. 101, 654\u2013669 (2006)","journal-title":"J. Am. Stat. Assoc."},{"issue":"9","key":"16_CR6","doi-asserted-by":"publisher","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250\u20132267 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR7","unstructured":"Theissler, A., Dear, I.: An anomaly detection approach to detect unexpected faults in recordings from test drives. In: Proceedings of the WASET International Conference on Vehicular Electronics and Safety 2013, vol. 7, no. 7, pp. 195\u2013198 (2013)"},{"issue":"8","key":"16_CR8","doi-asserted-by":"crossref","first-page":"13","DOI":"10.4314\/ijest.v3i8.2","volume":"3","author":"MS Sangha","year":"2011","unstructured":"Sangha, M.S., Yu, D.L., Gomm, J.B.: Sensor fault diagnosis for automotive engines with real data evaluation. Multicr. Int. J. Eng. Sci. Technol. 3(8), 13\u201325 (2011)","journal-title":"Multicr. Int. J. Eng. Sci. Technol."},{"issue":"3","key":"16_CR9","first-page":"1","volume":"41","author":"R Kandhari","year":"2009","unstructured":"Kandhari, R., Chandola, V., Banerjee, A., Kumar, V., Kandhari, R.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u20136 (2009)","journal-title":"ACM Comput. Surv."},{"key":"16_CR10","unstructured":"Malhotra, P.A.P Vig, L., Shroff, G., Rinard, M.: Long short term memory networks for anomaly detection in time series. In: Proceedings, European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, Bruges (Belgium), 22\u201324 April 2015, (2015)"},{"key":"16_CR11","unstructured":"Aldosari, M.S.: Unsupervised anomaly detection in sequences using long short term memory recurrent neural networks. PhD Diss. Georg. Mason Univ., p. 98 (2016)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Saurav, S., Malhotra, P., Vishnu, T.V., Gugulothu, N., Vig, L., Agarwal, P., Shroff, G.: Online anomaly detection with concept drift adaptation using recurrent neural networks. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data - CoDS-COMAD 2018, pp. 78\u201387 (2018)","DOI":"10.1145\/3152494.3152501"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/ACCESS.2018.2886457","volume":"7","author":"M Munir","year":"2019","unstructured":"Munir, M., Siddiqui, S.A., Dengel, A., Ahmed, S.: DeepAnT: a deep learning approach for unsupervised anomaly detection in time series. IEEE Access 7, 1991\u20132005 (2019)","journal-title":"IEEE Access"},{"key":"16_CR14","unstructured":"Gugulothu, N., Vishnu, T.V., Malhotra, P., Vig, L., Agarwal, P., Shroo, G.: Predicting remaining useful life using time series embeddings based on recurrent neural networks. In: 2nd ML PHM Work. SIGKDD 2017, vol. 10 (2017)"},{"key":"16_CR15","unstructured":"Malhotra, P., Ramakrishnan, A., Anand, G., Vig, L., Agarwal, P., Shroff, G.: LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv.org, July 2016"},{"key":"16_CR16","unstructured":"Schreyer, M., Sattarov, T., Borth, D., Dengel, A., Reimer, B.: Detection of anomalies in large scale accounting data using deep autoencoder networks arXiv:1709.05254 , September 2017"},{"issue":"9","key":"16_CR17","doi-asserted-by":"publisher","first-page":"1468","DOI":"10.3390\/app8091468","volume":"8","author":"T Amarbayasgalan","year":"2018","unstructured":"Amarbayasgalan, T., Jargalsaikhan, B., Ryu, K.: Unsupervised novelty detection using deep autoencoders with density based clustering. Appl. Sci. 8(9), 1468 (2018)","journal-title":"Appl. Sci."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, L., Laptev, N.: Deep and confident prediction for time series at Uber. In: IEEE International Conference on Data Mining Workshops, ICDMW, vol. 2017\u2013November, pp. 103\u2013110 (2017)","DOI":"10.1109\/ICDMW.2017.19"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Hyndman, R.J., Wang, E., Laptev, N.: Large-scale unusual time series detection. In: Proceedings - 15th IEEE International Conference on Data Mining Workshop, ICDMW 2015, pp. 1616\u20131619 (2016)","DOI":"10.1109\/ICDMW.2015.104"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Keogh, E., Lonardi, S., Chiu, B.Y.: Finding surprising patterns in a time series database in linear time and space. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD 2002, p. 550 (2002)","DOI":"10.1145\/775047.775128"},{"key":"16_CR21","unstructured":"Keogh, E., Lin, J., Fu, A.: HOT SAX: efficiently finding the most unusual time series subsequence. In: Proceedings - IEEE International Conference on Data Mining, ICDM, pp. 226\u2013233 (2005)"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Bontemps, L., Cao, V.L., McDermott, J., Le-Khac, N.A.: Collective anomaly detection based on long short-term memory recurrent neural networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol. 10018, pp. 141\u2013152 (2016)","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Chauhan, S., Vig, L.: Anomaly detection in ECG time signals via deep long short-term memory networks. In: Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, DSAA 2015 (2015)","DOI":"10.1109\/DSAA.2015.7344872"},{"issue":"8","key":"16_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/neco.1997.9.1.1","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.J.: Long short-term memory. Neural Comput. 9(8), 1\u201332 (1997)","journal-title":"Neural Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52246-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,31]],"date-time":"2022-10-31T23:49:51Z","timestamp":1667260191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52246-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030522452","9783030522469"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52246-9_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}