{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:03:02Z","timestamp":1743022982459,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031505799"},{"type":"electronic","value":"9783031505805"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-50580-5_31","type":"book-chapter","created":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:02:40Z","timestamp":1708412560000},"page":"358-368","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Trend and\u00a0Problems of\u00a0IoT Data Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Shuai","family":"Li","sequence":"first","affiliation":[]},{"given":"Lejie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kaining","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jiafeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Siying","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,21]]},"reference":[{"issue":"4","key":"31_CR1","doi-asserted-by":"publisher","first-page":"e2","DOI":"10.4108\/eetpht.v8i4.274","volume":"8","author":"B Sun","year":"2022","unstructured":"Sun, B., Geng, R., Xu, Y., Shen, T.: Prediction of emergency mobility under diverse IoT availability. EAI Endorsed Trans. Pervasive Health Technol. 8(4), e2 (2022)","journal-title":"EAI Endorsed Trans. Pervasive Health Technol."},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Sun, B., Geng, R., Shen, T., Xu, Y., Bi, S.: Dynamic emergency transit forecasting with IoT sequential data. Mobile Networks Appl. 1\u201315 (2022)","DOI":"10.1007\/s11036-022-02027-0"},{"issue":"5","key":"31_CR3","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1049\/itr2.12052","volume":"15","author":"H Liu","year":"2021","unstructured":"Liu, H., Teng, K., Rai, L., Zhang, Y., Wang, S.: A two-step abnormal data analysis and processing method for millimetre-wave radar in traffic flow detection applications. IET Intel. Transport Syst. 15(5), 671\u2013682 (2021)","journal-title":"IET Intel. Transport Syst."},{"issue":"5","key":"31_CR4","first-page":"1597","volume":"24","author":"B Sun","year":"2017","unstructured":"Sun, B., Cheng, W., Bai, G., Goswami, P.: Correcting and complementing freeway traffic accident data using Mahalanobis distance based outlier detection. Tech. Gazette 24(5), 1597\u20131607 (2017)","journal-title":"Tech. Gazette"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., Kim, H.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Aleksieva, Y., Valchanov, H., Aleksieva, V.: An approach for host based botnet detection system. In: 2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/ELMA.2019.8771644"},{"issue":"1","key":"31_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-022-02193-5","volume":"2022","author":"B Sun","year":"2022","unstructured":"Sun, B., Geng, R., Zhang, L., Li, S., Shen, T., Ma, L.: Securing 6G-enabled IoT\/IoV networks by machine learning and data fusion. EURASIP J. Wirel. Commun. Netw. 2022(1), 1\u201317 (2022)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Ayg\u00fcn, R.C., Yavuz, A.G.: A stochastic data discrimination based autoencoder approach for network anomaly detection. In: 2017 25th Signal Processing and Communications Applications Conference (SIU), pp. 1\u20134. IEEE (2017)","DOI":"10.1109\/SIU.2017.7960410"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Ferriyan, A., Thamrin, A.H., Takeda, K., Murai, J.: Feature selection using genetic algorithm to improve classification in network intrusion detection system. In: 2017 International Electronics Symposium on Knowledge Creation and Intelligent Computing (IES-KCIC), pp. 46\u201349. IEEE (2017)","DOI":"10.1109\/KCIC.2017.8228458"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"102441","DOI":"10.1016\/j.rcim.2022.102441","volume":"79","author":"S Yan","year":"2023","unstructured":"Yan, S., Shao, H., Xiao, Y., Liu, B., Wan, J.: Hybrid robust convolutional autoencoder for unsupervised anomaly detection of machine tools under noises. Robot. Comput.-Integr. Manuf. 79, 102441 (2023)","journal-title":"Robot. Comput.-Integr. Manuf."},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Sun, B., Ma, L., Shen, T., Geng, R., Zhou, Y., Tian, Y.: A robust data-driven method for multiseasonality and heteroscedasticity in time series preprocessing. Wirel. Commun. Mob. Comput. 2021, 6692390:1\u20136692390:11 (2021)","DOI":"10.1155\/2021\/6692390"},{"key":"31_CR12","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1109\/TR.2022.3215243","volume":"72","author":"M Chen","year":"2022","unstructured":"Chen, M., Shao, H., Dou, H., Li, W., Liu, B.: Data augmentation and intelligent fault diagnosis of planetary gearbox using ILoFGAN under extremely limited samples. IEEE Trans. Reliab. 72, 1029\u20131037 (2022)","journal-title":"IEEE Trans. Reliab."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Multimedia Technology and Enhanced Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-50580-5_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:34:08Z","timestamp":1708414448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-50580-5_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031505799","9783031505805"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-50580-5_31","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICMTEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Multimedia Technology and Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Leicester","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icmtel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icmtel.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy Plus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"285","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"121","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}