{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:45:33Z","timestamp":1774021533159,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031714665","type":"print"},{"value":"9783031714672","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T00:00:00Z","timestamp":1731542400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71467-2_34","type":"book-chapter","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T08:02:43Z","timestamp":1731484963000},"page":"426-438","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and\u00a0Adaption"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6317-3475","authenticated-orcid":false,"given":"Mengying","family":"Pan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0308-9587","authenticated-orcid":false,"given":"Wenyi","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7504-4847","authenticated-orcid":false,"given":"Zaobo","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0927-2592","authenticated-orcid":false,"given":"Bingyu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,14]]},"reference":[{"issue":"5","key":"34_CR1","doi-asserted-by":"publisher","first-page":"3962","DOI":"10.1109\/JIOT.2021.3102056","volume":"9","author":"M Al-Hawawreh","year":"2022","unstructured":"Al-Hawawreh, M., Sitnikova, E., et al.: X-iiotid: a connectivity-agnostic and device-agnostic intrusion data set for industrial internet of things. IEEE Internet Things J. 9(5), 3962\u20133977 (2022)","journal-title":"IEEE Internet Things J."},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Andresini, G., Pendlebury, F., et\u00a0al.: Insomnia: towards concept-drift robustness in network intrusion detection. In: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, pp. 111\u2013122 (2021)","DOI":"10.1145\/3474369.3486864"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Cai, Z., He, Z.: Trading private range counting over big iot data. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), pp. 144\u2013153 (2019)","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Cai, Z., Zheng, X., et\u00a0al.: Private data trading towards range counting queries in internet of things. IEEE Trans. Mob. Comput. (2022)","DOI":"10.1109\/TMC.2022.3164325"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Du, M., Chen, Z., et\u00a0al.: Lifelong anomaly detection through unlearning. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security pp. 1283\u20131297 (2019)","DOI":"10.1145\/3319535.3363226"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Fisher, R.A.: Statistical methods for research workers. In: Breakthroughs in Statistics: Methodology and Distribution, pp. 66\u201370. Springer (1970)","DOI":"10.1007\/978-1-4612-4380-9_6"},{"key":"34_CR7","doi-asserted-by":"crossref","unstructured":"Han, D., Wang, Z., et\u00a0al.: Anomaly detection in the open world: normality shift detection, explanation, and adaptation. In: 30th Annual Network and Distributed System Security Symposium (NDSS) (2023)","DOI":"10.14722\/ndss.2023.24830"},{"key":"34_CR8","unstructured":"Jordaney, R., Sharad, K., et\u00a0al.: Transcend: detecting concept drift in malware classification models. In: Proceedings of the 26th USENIX Conference on Security Symposium, pp. 625\u2013642 (2017)"},{"issue":"12","key":"34_CR9","first-page":"2346","volume":"31","author":"J Lu","year":"2019","unstructured":"Lu, J., Liu, A., et al.: Learning under concept drift: a review. IEEE Trans. Knowl. Data Eng. 31(12), 2346\u20132363 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"34_CR10","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/TNSM.2021.3055425","volume":"18","author":"W Meng","year":"2021","unstructured":"Meng, W., Liu, Y., et al.: Logclass: anomalous log identification and classification with partial labels. IEEE Trans. Netw. Serv. Manage. 18(2), 1870\u20131884 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Ramesh, R., Thangaraj, S.J.J.: Analyzing and detecting botnet attacks using anomaly detection with machine learning. In: 2023 5th International Conference on Inventive Research in Computing Applications (ICIRCA), pp. 911\u2013915 (2023)","DOI":"10.1109\/ICIRCA57980.2023.10220903"},{"key":"34_CR12","unstructured":"Rusu, A.A., Rabinowitz, N.C., et\u00a0al.: Progressive neural networks. arXiv preprint arXiv:1606.04671 (2016)"},{"key":"34_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102603","volume":"121","author":"DK Sharma","year":"2021","unstructured":"Sharma, D.K., Dhankhar, T., et al.: Anomaly detection framework to prevent ddos attack in fog empowered iot networks. Ad Hoc Netw. 121, 102603 (2021)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"34_CR14","first-page":"3","volume":"2","author":"NV Smirnov","year":"1939","unstructured":"Smirnov, N.V.: On the estimation of the discrepancy between empirical curves of distribution for two independent samples. Bull. Math. Univ. Moscou 2(2), 3\u201314 (1939)","journal-title":"Bull. Math. Univ. Moscou"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Sommer, R., Paxson, V.: Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 305\u2013316 (2010)","DOI":"10.1109\/SP.2010.25"},{"key":"34_CR16","doi-asserted-by":"crossref","unstructured":"Song, J., Takakura, H., et\u00a0al.: Statistical analysis of honeypot data and building of kyoto 2006+ dataset for nids evaluation. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 29\u201336 (2011)","DOI":"10.1145\/1978672.1978676"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Upadhyay, S.: Nature-Inspired Malware and Anomaly Detection in Android-Based Systems, pp. 85\u2013108. Springer (2022)","DOI":"10.1007\/978-3-030-90708-2_5"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Yang, L., Zou, Y., et\u00a0al.: Distributed consensus for blockchains in internet-of-things networks. Tsinghua Science and Technology (2022)","DOI":"10.26599\/TST.2021.9010065"},{"key":"34_CR19","unstructured":"Yang, L., Guo, W., et\u00a0al.: CADE: Detecting and explaining concept drift samples for security applications. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 2327\u20132344 (2021)"},{"issue":"5","key":"34_CR20","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Wu, L., et al.: A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"20","key":"34_CR21","doi-asserted-by":"publisher","first-page":"15160","DOI":"10.1109\/JIOT.2020.3038595","volume":"8","author":"D Yu","year":"2020","unstructured":"Yu, D., Zou, Y., et al.: Competitive age of information in dynamic iot networks. IEEE Internet Things J. 8(20), 15160\u201315169 (2020)","journal-title":"IEEE Internet Things J."},{"key":"34_CR22","doi-asserted-by":"crossref","unstructured":"Zahan, H., Al Azad, M.W., et al.: Iot-ad: a framework to detect anomalies among interconnected iot devices. IEEE Internet Things J. 11(1), 478\u2013489 (2024)","DOI":"10.1109\/JIOT.2023.3285714"},{"issue":"5","key":"34_CR23","doi-asserted-by":"publisher","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","volume":"38","author":"X Zheng","year":"2020","unstructured":"Zheng, X., Cai, Z.: Preserved data sharing towards multiple parties in industrial iots. IEEE J. Sel. Areas Commun. 38(5), 968\u2013979 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, X., Liang, W., et\u00a0al.: Adaptive segmentation enhanced asynchronous federated learning for sustainable intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. (2024)","DOI":"10.1109\/TITS.2024.3362058"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, X., Wu, J., et\u00a0al.: Reconstructed graph neural network with knowledge distillation for lightweight anomaly detection. IEEE Trans. Neural Networks Learn. Syst. (2024)","DOI":"10.1109\/TNNLS.2024.3389714"},{"issue":"9","key":"34_CR26","doi-asserted-by":"publisher","first-page":"8111","DOI":"10.1109\/JIOT.2020.2999723","volume":"7","author":"Y Zou","year":"2020","unstructured":"Zou, Y., Xu, M., et al.: Crowd density computation and diffusion via internet of things. IEEE Internet Things J. 7(9), 8111\u20138121 (2020)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71467-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T08:08:11Z","timestamp":1731485291000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71467-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,14]]},"ISBN":["9783031714665","9783031714672"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71467-2_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,14]]},"assertion":[{"value":"14 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}