{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:13:55Z","timestamp":1743066835199,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":48,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608393"},{"type":"electronic","value":"9789819608409"}],"license":[{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T00:00:00Z","timestamp":1734048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0840-9_28","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T17:25:58Z","timestamp":1734024358000},"page":"401-416","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Plug-and-Play Framework for\u00a0Time Series Anomaly Detection with\u00a0Temporal Drift"],"prefix":"10.1007","author":[{"given":"Chao","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Chen","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Zhaoyang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Junxiu","family":"Ran","sequence":"additional","affiliation":[]},{"given":"Shikuan","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Tongkun","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,13]]},"reference":[{"issue":"3","key":"28_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"28_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.jnca.2015.11.016","volume":"60","author":"M Ahmed","year":"2016","unstructured":"Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19\u201331 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"28_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3444690","volume":"54","author":"A Bl\u00e1zquez-Garc\u00eda","year":"2021","unstructured":"Bl\u00e1zquez-Garc\u00eda, A., Conde, A., Mori, U., Lozano, J.A.: A review on outlier\/anomaly detection in time series data. ACM Computing Surveys (CSUR) 54(3), 1\u201333 (2021)","journal-title":"ACM Computing Surveys (CSUR)"},{"issue":"14","key":"28_CR4","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.3390\/electronics11142146","volume":"11","author":"DH Tran","year":"2022","unstructured":"Tran, D.H., Nguyen, V.L., Nguyen, H., et al.: Self-supervised learning for time-series anomaly detection in Industrial Internet of Things. Electronics 11(14), 2146 (2022)","journal-title":"Electronics"},{"issue":"10","key":"28_CR5","doi-asserted-by":"crossref","first-page":"9523","DOI":"10.1016\/j.jksuci.2021.11.006","volume":"4","author":"S Agrahari","year":"2022","unstructured":"Agrahari, S., Singh, A.K.: Concept drift detection in data stream mining: A literature review. Journal of King Saud University-Computer and Information Sciences 4(10), 9523\u20139540 (2022)","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"28_CR6","unstructured":"Braei M, Wagner S., Anomaly detection in univariate time-series: A survey on the state-of-the-art, In Proceedings of the 29th ACM International Conference on Information & Knowledge Management, 3477-3484, 2020"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Audibert J, Michiardi P, Guyard F, Marti S, Zuluaga M A, USAD: UnSupervised Anomaly Detection on multivariate time series, In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 3395-3404, 2020","DOI":"10.1145\/3394486.3403392"},{"issue":"9","key":"28_CR8","doi-asserted-by":"crossref","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., Aggarwal, C.C., Han, J.: Outlier detection for temporal data: A survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250\u20132267 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"28_CR9","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123200","volume":"246","author":"M Wadinger","year":"2024","unstructured":"Wadinger, M., Kvasnica, M.: Adaptable and Interpretable Framework for Anomaly Detection in SCADA-based industrial systems. Expert Syst. Appl. 246, 123200 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"7","key":"28_CR10","doi-asserted-by":"crossref","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","volume":"7","author":"AA Cook","year":"2019","unstructured":"Cook, A.A., M\u00ecs\u00ecrl\u00ec, G., Fan, Z.: Anomaly detection for IoT time-series data: A survey. IEEE Internet Things J. 7(7), 6481\u20136494 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"28_CR11","doi-asserted-by":"crossref","first-page":"239","DOI":"10.3390\/fi16070239","volume":"16","author":"R Gupta","year":"2024","unstructured":"Gupta, R., Tian, B., Wang, Y., et al.: TWIN-ADAPT: Continuous Learning for Digital Twin-Enabled Online Anomaly Classification in IoT-Driven Smart Labs. Future Internet 16(7), 239 (2024)","journal-title":"Future Internet"},{"issue":"9","key":"28_CR12","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1016\/j.envsoft.2009.08.010","volume":"25","author":"DJ Hill","year":"2010","unstructured":"Hill, D.J., Minsker, B.S.: Anomaly detection in streaming environmental sensor data: A data-driven modeling approach. Environmental Modelling & Software 25(9), 1014\u20131022 (2010)","journal-title":"Environmental Modelling & Software"},{"issue":"12","key":"28_CR13","first-page":"2346","volume":"31","author":"J Lu","year":"2018","unstructured":"Lu, J., Liu, A., Dong, F., et al.: Learning under concept drift: A review. IEEE Trans. Knowl. Data Eng. 31(12), 2346\u20132363 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Su Y, Zhao Y, Niu C, et al, Robust anomaly detection for multivariate time series through stochastic recurrent neural network, Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, 2828-2837, 2019","DOI":"10.1145\/3292500.3330672"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Xu H, Chen W, Zhao N, et al, Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications, Proceedings of the 2018 world wide web conference, 187-196, 2018","DOI":"10.1145\/3178876.3185996"},{"key":"28_CR16","first-page":"2024","volume":"3096\u20133105","author":"Z Wang","year":"2024","unstructured":"Wang, Z., Pei, C., Ma, M., et al.: Revisiting VAE for Unsupervised Time Series Anomaly Detection: A Frequency Perspective. Proceedings of the ACM on Web Conference 3096\u20133105, 2024 (2024)","journal-title":"Proceedings of the ACM on Web Conference"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Yaacob A H, Tan I K, Chien S F, et al, ARIMA Based Network Anomaly Detection, 2nd International Conference on Communication Software and Networks, 205-209, 2010","DOI":"10.1109\/ICCSN.2010.55"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Ren H, Xu B, Wang Y, et al, Time-Series Anomaly Detection Service at Microsoft, Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, 3009-3017, 2019","DOI":"10.1145\/3292500.3330680"},{"issue":"1","key":"28_CR19","first-page":"3","volume":"6","author":"RB Cleveland","year":"1990","unstructured":"Cleveland, R.B., Cleveland, W.S., McRae, J.E., et al.: STL: A Seasonal-Trend Decomposition. Journal of Official Statistics 6(1), 3\u201373 (1990)","journal-title":"Journal of Official Statistics"},{"key":"28_CR20","first-page":"582","volume":"12","author":"B Sch\u00f6lkopf","year":"1999","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A., et al.: Support Vector Method for Novelty Detection. Adv. Neural. Inf. Process. Syst. 12, 582\u2013588 (1999)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"1","key":"28_CR21","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DRP TaxDM","year":"2004","unstructured":"TaxDM, D.R.P., Description, S.V.D.: Mach. Learn. 54(1), 45\u201366 (2004)","journal-title":"Mach. Learn."},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Breunig M M, Kriegel H, Ng R T, et al, LOF: Identifying Density-Based Local Outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, USA, 93-104, 2000","DOI":"10.1145\/342009.335388"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Liu F T, Ting K M, Zhou Z, Isolation Forest, Proceedings of the 8th IEEE International Conference on Data Mining, Pisa, Italy, 413-422, 2008","DOI":"10.1109\/ICDM.2008.17"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Liu D, Zhao Y, Xu H, et al, Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning, Proceedings of the 2015 ACM Internet Measurement Conference, Tokyo, Japan, 211-224, 2015","DOI":"10.1145\/2815675.2815679"},{"key":"28_CR25","volume-title":"RobustTAD: Robust Time Series Anomaly Detection via Decomposition and Convolutional Neural Networks, In MileTS\u2019 20: 6th KDD Workshop on Mining and Learning from Time Series","author":"J Gao","year":"2020","unstructured":"Gao, J., Song, X., Wen, Q., et al.: RobustTAD: Robust Time Series Anomaly Detection via Decomposition and Convolutional Neural Networks, In MileTS\u2019 20: 6th KDD Workshop on Mining and Learning from Time Series. San Diego, California, USA (2020)"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Li D, Chen D, Jin B, et al, MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks, Proceedings of the 28th International Conference on Artificial Neural Networks, Munich, Germany, 703-716, 2019","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Deng A, Hooi B, Graph Neural Network-Based Anomaly Detection in Multivariate Time Series, Proceedings of the AAAI Conference on Artificial Intelligence, Virtual Event, 4027-4035, 2021","DOI":"10.1609\/aaai.v35i5.16523"},{"issue":"6","key":"28_CR28","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1109\/TSMCA.2007.897589","volume":"37","author":"WA Chaovalitwongse","year":"2007","unstructured":"Chaovalitwongse, W.A., Fan, Y., Sachdeo, R.: On the Time Series K-Nearest Neighbor Classification of Abnormal Brain Activity. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans 37(6), 1005\u20131016 (2007)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans"},{"key":"28_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.dsp.2016.03.006","volume":"54","author":"Y Rajabzadeh","year":"2016","unstructured":"Rajabzadeh, Y., Rezaie, A.H., Amindavar, H.: A dynamic modeling approach for anomaly detection using stochastic differential equations. Digital Signal Processing 54, 1\u201311 (2016)","journal-title":"Digital Signal Processing"},{"issue":"8","key":"28_CR30","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Zhou B, Liu S, Hooi B, et al, BeatGAN: Anomalous Rhythm Detection using Adversarially Generated Time Series, Proceedings of the 28th International Joint Conference on Artificial Intelligence, Macao, China, 4433-4439, 2019","DOI":"10.24963\/ijcai.2019\/616"},{"issue":"5","key":"28_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3572780","volume":"17","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Li, W., Ding, W., et al.: STAD-GAN: unsupervised anomaly detection on multivariate time series with self-training generative adversarial networks. ACM Trans. Knowl. Discov. Data 17(5), 1\u201318 (2023)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"28_CR33","unstructured":"Wu T, Ortiz , Rlad: Time series anomaly detection through reinforcement learning and active learning, arXiv preprint arXiv:2104.00543, 2021"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Dissem M, Amayri M, Bouguila N, Neural Architecture Search for Anomaly Detection in Time Series Data of Smart Buildings: A Reinforcement Learning Approach for Optimal Autoencoder Design, IEEE Internet of Things Journal, 2024","DOI":"10.1109\/JIOT.2024.3360882"},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Lin S, Clark R, Birke R, et al, Anomaly detection for time series using vae-lstm hybrid model, ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 4322-4326, 2020","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"28_CR36","unstructured":"Zong B, Song Q, Min M R, et al, Deep autoencoding gaussian mixture model for unsupervised anomaly detection, International conference on learning representations, 2018"},{"issue":"6","key":"28_CR37","first-page":"6058","volume":"35","author":"L Li","year":"2022","unstructured":"Li, L., Yan, J., Wen, Q., et al.: Learning robust deep state space for unsupervised anomaly detection in contaminated time-series. IEEE Trans. Knowl. Data Eng. 35(6), 6058\u20136072 (2022)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"28_CR38","doi-asserted-by":"crossref","unstructured":"Angiulli F, Fassetti F, Detecting distance-based outliers in streams of data, Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, 811-820, 2007","DOI":"10.1145\/1321440.1321552"},{"key":"28_CR39","doi-asserted-by":"crossref","unstructured":"Na G S, Kim D, Yu H, Dilof: Effective and memory efficient local outlier detection in data streams, Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining, 1993-2002, 2018","DOI":"10.1145\/3219819.3220022"},{"key":"28_CR40","doi-asserted-by":"crossref","unstructured":"Street W N, Kim Y S, A streaming ensemble algorithm (SEA) for large-scale classification, Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, 377-382, 2001","DOI":"10.1145\/502512.502568"},{"key":"28_CR41","first-page":"2022","volume":"610\u2013621","author":"S Bhatia","year":"2022","unstructured":"Bhatia, S., Jain, A., Srivastava, S., et al.: Memstream: Memory-based streaming anomaly detection. Proceedings of the ACM Web Conference 610\u2013621, 2022 (2022)","journal-title":"Proceedings of the ACM Web Conference"},{"key":"28_CR42","doi-asserted-by":"crossref","unstructured":"Andresini G, Pendlebury F, Pierazzi F, et al, Insomnia: Towards concept-drift robustness in network intrusion detection, Proceedings of the 14th ACM workshop on artificial intelligence and security, 111-122, 2021","DOI":"10.1145\/3474369.3486864"},{"key":"28_CR43","doi-asserted-by":"crossref","unstructured":"Yang Y, Zhou D W, Zhan D C, et al, Adaptive deep models for incremental learning: Considering capacity scalability and sustainability Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, 74-82, 2019","DOI":"10.1145\/3292500.3330865"},{"issue":"5","key":"28_CR44","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1002\/tee.22626","volume":"13","author":"H Ren","year":"2018","unstructured":"Ren, H., Liu, M., Liao, X., et al.: Anomaly detection in time series based on interval sets. IEEJ Trans. Electr. Electron. Eng. 13(5), 757\u2013762 (2018)","journal-title":"IEEJ Trans. Electr. Electron. Eng."},{"key":"28_CR45","unstructured":"Hinton G E, Zemel R, Autoencoders, minimum description length and Helmholtz free energy, Advances in neural information processing systems, 6, 1993"},{"key":"28_CR46","unstructured":"Kingma D P, Welling M, Auto-encoding variational bayes, arXiv preprint arXiv:1312.6114, 2013"},{"key":"28_CR47","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein S M, et al, Unsupervised anomaly detection with generative adversarial networks to guide marker discovery, International conference on information processing in medical imaging. Cham: Springer International Publishing, 146-157, 2017","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"28_CR48","doi-asserted-by":"crossref","unstructured":"Wang R, Liu C, Mou X, et al, Deep contrastive one-class time series anomaly detection Proceedings of the 2023 SIAM International Conference on Data Mining (SDM). Society for Industrial and Applied Mathematics, 694-702, 2023","DOI":"10.1137\/1.9781611977653.ch78"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0840-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T18:09:58Z","timestamp":1734026998000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0840-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,13]]},"ISBN":["9789819608393","9789819608409"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0840-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,13]]},"assertion":[{"value":"13 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}