{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:58:59Z","timestamp":1773269939447,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_8","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:25:35Z","timestamp":1767320735000},"page":"143-156","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAGE: Spatiotemporal Feature Fusion for\u00a0Anomaly Detection in\u00a0Multivariate Time Series"],"prefix":"10.1007","author":[{"given":"Haojie","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abdulaal, A., Liu, Z., Lancewicki, T.: Practical approach to asynchronous multivariate time series anomaly detection and localization. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 2485\u20132494 (2021)","DOI":"10.1145\/3447548.3467174"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad, S., Purdy, S.: Real-time anomaly detection for streaming analytics. arXiv preprint arXiv:1607.02480 (2016)","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.P.: Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, pp. 25\u201328 (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"8_CR4","unstructured":"Blessing, M.: Enhancing fraud detection with deep learning: an in-depth analysis (2024)"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., Lau, C.T.: Autoencoder-based network anomaly detection. In: 2018 Wireless Telecommunications Symposium (WTS), pp.\u00a01\u20135. IEEE (2018)","DOI":"10.1109\/WTS.2018.8363930"},{"key":"8_CR6","unstructured":"Dai, E., Chen, J.: Graph-augmented normalizing flows for anomaly detection of multiple time series. arXiv preprint arXiv:2202.07857 (2022)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.inffus.2022.08.011","volume":"89","author":"C Ding","year":"2023","unstructured":"Ding, C., Sun, S., Zhao, J.: MST-GAT: a multimodal spatial-temporal graph attention network for time series anomaly detection. Inf. Fusion 89, 527\u2013536 (2023)","journal-title":"Inf. Fusion"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2020.03.034","volume":"524","author":"H Fanta","year":"2020","unstructured":"Fanta, H., Shao, Z., Ma, L.: Sitgru: single-tunnelled gated recurrent unit for abnormality detection. Inf. Sci. 524, 15\u201332 (2020)","journal-title":"Inf. Sci."},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical Information Infrastructures Security","author":"J Goh","year":"2017","unstructured":"Goh, J., Adepu, S., Junejo, K.N., Mathur, A.: A dataset to support research in the design of secure water treatment systems. In: Havarneanu, G., Setola, R., Nassopoulos, H., Wolthusen, S. (eds.) CRITIS 2016. LNCS, vol. 10242, pp. 88\u201399. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8"},{"key":"8_CR10","unstructured":"Goyal, S., Raghunathan, A., Jain, M., Simhadri, H.V., Jain, P.: DROCC: deep robust one-class classification. In: International Conference on Machine Learning, pp. 3711\u20133721. PMLR (2020)"},{"issue":"6","key":"8_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.3390\/e24060759","volume":"24","author":"S Guan","year":"2022","unstructured":"Guan, S., Zhao, B., Dong, Z., Gao, M., He, Z.: GTAD: graph and temporal neural network for multivariate time series anomaly detection. Entropy 24(6), 759 (2022)","journal-title":"Entropy"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 387\u2013395 (2018)","DOI":"10.1145\/3219819.3219845"},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TII.2021.3078192","volume":"19","author":"F Kong","year":"2021","unstructured":"Kong, F., Li, J., Jiang, B., Wang, H., Song, H.: Integrated generative model for industrial anomaly detection via bidirectional LSTM and attention mechanism. IEEE Trans. Industr. Inf. 19(1), 541\u2013550 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"Li, J., Izakian, H., Pedrycz, W., Jamal, I.: Clustering-based anomaly detection in multivariate time series data. Appl. Soft Comput. 100, 106919 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.106919. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494620308577","DOI":"10.1016\/j.asoc.2020.106919"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Li, J., Pedrycz, W., Jamal, I.: Multivariate time series anomaly detection: a framework of hidden Markov models. Appl. Soft Comput. 60, 229\u2013240 (2017). https:\/\/doi.org\/10.1016\/j.asoc.2017.06.035. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494617303782","DOI":"10.1016\/j.asoc.2017.06.035"},{"key":"8_CR16","unstructured":"Liu, C., He, S., Zhou, Q., Li, S., Meng, W.: Large language model guided knowledge distillation for time series anomaly detection. arXiv preprint arXiv:2401.15123 (2024)"},{"issue":"10","key":"8_CR17","doi-asserted-by":"publisher","first-page":"2404","DOI":"10.3724\/SP.J.1146.2009.01342","volume":"32","author":"YK Qian","year":"2010","unstructured":"Qian, Y.K., Chen, M.: A multivariate online anomaly detection algorithm based on SVD updating. J. Electron. Inf. Technol. 32(10), 2404\u20132409 (2010)","journal-title":"J. Electron. Inf. Technol."},{"key":"8_CR18","unstructured":"Ruff, L., et al.: Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694 (2019)"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1007\/s12083-023-01586-7","volume":"17","author":"S Tang","year":"2024","unstructured":"Tang, S., Ding, Y., Zhao, M., Wang, H.: SAKMR: industrial control anomaly detection based on semi-supervised hybrid deep learning. Peer-to-Peer Network. Appl. 17(2), 612\u2013623 (2024)","journal-title":"Peer-to-Peer Network. Appl."},{"issue":"7","key":"8_CR20","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1162\/neco_a_01199","volume":"31","author":"Y Yu","year":"2019","unstructured":"Yu, Y., Si, X., Hu, C., Zhang, J.: A review of recurrent neural networks: LSTM cells and network architectures. Neural Comput. 31(7), 1235\u20131270 (2019)","journal-title":"Neural Comput."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Chen, J., Liu, H., He, S., Meng, W.: Detecting multivariate time series anomalies with zero known label. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 4963\u20134971 (2023)","DOI":"10.1609\/aaai.v37i4.25623"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:59Z","timestamp":1773214679000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The SWaT and WADI datasets were obtained from the iTrust Centre for Research in Cyber Security, Singapore University of Technology and Design. The PSM and MSL datasets are also publicly available.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data Availability"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}