{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:40:03Z","timestamp":1775666403809,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819722419","type":"print"},{"value":"9789819722426","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-2242-6_1","type":"book-chapter","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T09:02:31Z","timestamp":1713949351000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Spatial-Temporal Transformer with\u00a0Error-Restricted Variance Estimation for\u00a0Time Series Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Yuye","family":"Feng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haiming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Weihao","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,25]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abdulaal, A., Liu, Z., Lancewicki, T.: Practical approach to asynchronous multivariate time series anomaly detection and localization, pp. 2485\u20132494. Association for Computing Machinery (2021)","DOI":"10.1145\/3447548.3467174"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ahmed, C.M., Palleti, V.R., Mathur, A.P.: Wadi: a water distribution testbed for research in the design of secure cyber physical systems, pp. 25\u201328. Association for Computing Machinery (2017)","DOI":"10.1145\/3055366.3055375"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Audibert, J., Michiardi, P., Guyard, F., Marti, S., Zuluaga, M.A.: Usad: unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 3395\u20133404 (2020)","DOI":"10.1145\/3394486.3403392"},{"key":"1_CR4","unstructured":"Bai, S., Kolter, J.Z., Koltun, V.: An empirical evaluation of generic convolutional and recurrent networks for sequence modeling (2018)"},{"issue":"3","key":"1_CR5","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1137\/S0895479801395458","volume":"24","author":"ZZ Bai","year":"2003","unstructured":"Bai, Z.Z., Golub, G.H., Ng, M.K.: Hermitian and skew-hermitian splitting methods for non-hermitian positive definite linear systems. SIAM J. Matrix Anal. Appl. 24(3), 603\u2013626 (2003)","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"1_CR6","unstructured":"Dai, E., Chen, J.: Graph-augmented normalizing flows for anomaly detection of multiple time series. In: Proceedings of the 10th International Conference on Learning Representations (2022)"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Deng, A., Hooi, B.: Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 4027\u20134035 (2021)","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Feng, C., Tian, P.: Time series anomaly detection for cyber-physical systems via neural system identification and bayesian filtering. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 2858\u20132867 (2021)","DOI":"10.1145\/3447548.3467137"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Goh, J., Adepu, S., Tan, M., Lee, Z.S.: Anomaly detection in cyber physical systems using recurrent neural networks. In: Proceedings of the 18th International Symposium on High Assurance Systems Engineering (HASE), pp. 140\u2013145 (2017)","DOI":"10.1109\/HASE.2017.36"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding, pp. 387\u2013395. Association for Computing Machinery (2018)","DOI":"10.1145\/3219819.3219845"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Kim, S., Choi, K., Choi, H.S., Lee, B., Yoon, S.: Towards a rigorous evaluation of time-series anomaly detection (2022)","DOI":"10.1609\/aaai.v36i7.20680"},{"key":"1_CR12","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization (2014)"},{"key":"1_CR13","unstructured":"Kingma, D.P., Welling, M.: Auto-encoding variational bayes (2013)"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","volume":"3","author":"J Lee","year":"2015","unstructured":"Lee, J., Bagheri, B., Kao, H.A.: A cyber-physical systems architecture for industry 4.0-based manufacturing systems. Manufact. Lett. 3, 18\u201323 (2015)","journal-title":"Manufact. Lett."},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Li, Z., et al.: Multivariate time series anomaly detection and interpretation using hierarchical inter-metric and temporal embedding. In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 3220\u20133230. Association for Computing Machinery (2021)","DOI":"10.1145\/3447548.3467075"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: Proceedings of the Eighth IEEE International Conference on Data Mining (ICDM)m pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Mathur, A.P., Tippenhauer, N.O.: SWaT: a water treatment testbed for research and training on ics security. In: Proceedings of 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, pp. 31\u201336 (2016)","DOI":"10.1109\/CySWater.2016.7469060"},{"issue":"2","key":"1_CR18","first-page":"33","volume":"79","author":"S Omar","year":"2013","unstructured":"Omar, S., Ngadi, A., Jebur, H.H.: Article: machine learning techniques for anomaly detection: an overview. Inter. J. Comput. Appli. 79(2), 33\u201341 (2013)","journal-title":"Inter. J. Comput. Appli."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review, vol. 54(2) (mar 2021)","DOI":"10.1145\/3439950"},{"issue":"3","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1109\/LRA.2018.2801475","volume":"3","author":"D Park","year":"2018","unstructured":"Park, D., Hoshi, Y., Kemp, C.C.: A multimodal anomaly detector for robot-assisted feeding using an lstm-based variational autoencoder. IEEE Robot. Automat. Lett. 3(3), 1544\u20131551 (2018)","journal-title":"IEEE Robot. Automat. Lett."},{"key":"1_CR21","unstructured":"Rezende, D., Mohamed, S.: Variational inference with normalizing flows. In: Proceedings of the 32nd International Conference on Machine Learning, pp. 1530\u20131538. PMLR, Lille, France (2015)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Shen, L., Yu, Z., Ma, Q., Kwok, J.T.: Time series anomaly detection with multiresolution ensemble decoding. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 9567\u20139575 (2021)","DOI":"10.1609\/aaai.v35i11.17152"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Su, Y., Zhao, Y., Niu, C., Liu, R., Sun, W., Pei, D.: Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, pp. 2828\u20132837 (2019)","DOI":"10.1145\/3292500.3330672"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Tax, D.M.J., Duin, R.P.W.: Support vector data description, vol. 54, pp. 45\u201366 (2004)","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Tuli, S., Casale, G., Jennings, N.R.: TranAD: deep transformer networks for anomaly detection in multivariate time series data. In: Proceedings of Very Large Data Bases, vol. 15, pp. 1201\u20131214 (2022)","DOI":"10.14778\/3514061.3514067"},{"key":"1_CR26","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Proceedings of the 31st International Conference on Neural Information Processing Systems, vol. 30, pp. 6000\u20136010. Curran Associates, Inc. (2017)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, B., Liu, S.H., Hooi, B., Cheng, X., Ye, J.: BeatGAN: anomalous rhythm detection using adversarially generated time series. In: International Joint Conference on Artificial Intelligence (2019)","DOI":"10.24963\/ijcai.2019\/616"},{"key":"1_CR28","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International Conference on Learning Representations (2018)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-2242-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T23:07:45Z","timestamp":1714000065000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-2242-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819722419","9789819722426"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-2242-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"25 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2024.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}