{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:04:18Z","timestamp":1743095058759,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953836"},{"type":"electronic","value":"9783030953843"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95384-3_11","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:20:55Z","timestamp":1645518055000},"page":"162-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["TSAEns: Ensemble Learning for KPI Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Chengyu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jinhua","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tongqing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhiping","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Xu, H., et al.: Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. In: Proceedings of the 2018 World Wide Web Conference, pp. 187\u2013196 (2018)","DOI":"10.1145\/3178876.3185996"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Yu, G., Cai, Z., Wang, S., Chen, H., Liu, F., Liu, A.: Unsupervised online anomaly detection with parameter adaptation for kpi abrupt changes. IEEE Trans. Network Serv. Manage., 1 (2019)","DOI":"10.1109\/TNSM.2019.2962701"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Ren, H., et al.: Time-series anomaly detection service at microsoft. In: Proceedings of the 25th ACM SIGKDD, pp. 3009\u20133017 (2019)","DOI":"10.1145\/3292500.3330680"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Choffnes, D.R., Bustamante, F.E., Ge, Z.: Crowdsourcing service-level network event monitoring. In: Proceedings of the 2010 ACM SIGCOMM, pp. 387\u2013398 (2010)","DOI":"10.1145\/1851275.1851228"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Siffer, A., Fouque, P.-A., Termier, A., Largouet, C.: Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1067\u20131075 (2017)","DOI":"10.1145\/3097983.3098144"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Yaacob, A.H., Tan, I.K.T., Chien, S.F., Tan, H.K.: Arima based network anomaly detection. In: Second International Conference on Communication Software and Networks 2010, pp. 205\u2013209 (2010)","DOI":"10.1109\/ICCSN.2010.55"},{"key":"11_CR7","unstructured":"Zhang, X., et al.: Cross-dataset time series anomaly detection for cloud systems. In: 2019 USENIX Annual Technical Conference (2019)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Audibert, J., Michiardi, P., Guyard, F., Marti, S., Zuluaga, M.A.: Usad: unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD, pp. 3395\u20133404 (2020)","DOI":"10.1145\/3394486.3403392"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD (2018)","DOI":"10.1145\/3219819.3219845"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Lin, S., Clark, R., Birke, R., Sch\u00f6nborn, S., Trigoni, N., Roberts, S.: Anomaly detection for time series using vae-lstm hybrid model. In: IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 4322\u20134326. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Wu, K., Zhou, T., Yu, G., Cai, Z.: Tsagen: synthetic time series generation for kpi anomaly detection. IEEE Trans. Network Serv. Manage. (2021)","DOI":"10.1109\/TNSM.2021.3098784"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Liu, D.: Opprentice: towards practical and automatic anomaly detection through machine learning. In: Proceedings of the 2015 Internet Measurement Conference, pp. 211\u2013224 (2015)","DOI":"10.1145\/2815675.2815679"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, N., Zhu, J., Liu, R., Liu, D., Zhang, M., Pei, D.: Label-less: a semi-automatic labelling tool for kpi anomalies. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 1882\u20131890 (2019)","DOI":"10.1109\/INFOCOM.2019.8737429"},{"key":"11_CR14","unstructured":"Ying, Y., Duan, J., Wang, C., Wang, Y., Xu, B.: Automated model selection for time-series anomaly detection (2020)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Laptev, N., Amizadeh, S., Flint, I.: Generic and scalable framework for automated time-series anomaly detection. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1939\u20131947 (2015)","DOI":"10.1145\/2783258.2788611"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation forest. In: Eighth IEEE International Conference on Data Mining 2008, pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"11_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discovery Data 6(1), 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discovery Data"},{"key":"11_CR18","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes (2014)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Chen, P., Wang, Y.: Optimized kd tree application in instance-based learning. In: 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 2, pp. 187\u2013191 (2008)","DOI":"10.1109\/FSKD.2008.41"},{"key":"11_CR20","unstructured":"Aiops challenge (2018). http:\/\/iops.ai\/dataset_list\/"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Lavin, A., Ahmad, S.: Evaluating real-time anomaly detection algorithms - the numenta anomaly benchmark. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), pp. 38\u201344 (2015)","DOI":"10.1109\/ICMLA.2015.141"},{"key":"11_CR22","unstructured":"Wen, T., Keyes, R.: Time series anomaly detection using convolutional neural networks and transfer learning, arXiv preprint arXiv:1905.13628 (2019)"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), July 2009. doi: 10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95384-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T08:22:17Z","timestamp":1645518137000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95384-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953836","9783030953843"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95384-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}