{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:56Z","timestamp":1742913656161,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_18","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"248-261","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Semi-supervised Learning Enabled Fault Analysis Method for Power Distribution Network Based on LSTM Autoencoder and Attention Mechanism"],"prefix":"10.1007","author":[{"given":"Haining","family":"Xie","sequence":"first","affiliation":[]},{"given":"Liming","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"3","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"issue":"7","key":"18_CR2","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","volume":"7","author":"A Cook","year":"2019","unstructured":"Cook, A., Misirli, G., Fan, Z.: Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J. 7(7), 6481\u20136494 (2019)","journal-title":"IEEE Internet Things J."},{"key":"18_CR3","unstructured":"Ian, G., Yoshua, B., Aaron, C.: Deep Learning. The MIT Press (2016)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Kim, J., Kim, J., Thu, H.L.T., et al.: Long short term memory recurrent neural network classifier for intrusion detection. In: 2016 International Conference on Platform Technology and Service (PlatCon), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/PlatCon.2016.7456805"},{"key":"18_CR5","unstructured":"Malhotra, P., Vig, L., Shroff, G., et al.: Long short term memory networks for anomaly detection in time series. In: Proceedings, vol. 89, pp. 89-94. Presses universitaires de Louvain (2015)"},{"issue":"3","key":"18_CR6","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1111\/j.2517-6161.1972.tb00912.x","volume":"34","author":"AJ Fox","year":"1972","unstructured":"Fox, A.J.: Outliers in time series. J. Roy. Stat. Soc.: Ser. B (Methodol.) 34(3), 350\u2013363 (1972)","journal-title":"J. Roy. Stat. Soc.: Ser. B (Methodol.)"},{"key":"18_CR7","unstructured":"Burman, J P., Otto, M.C.: Census bureau research project: Outliers in time series. Bureau of the Census, SRD Res. Rep. CENSUS\/SRD\/RR-88114 (1988)"},{"key":"18_CR8","unstructured":"Vallis, O., Hochenbaum, J., Kejariwal, A.: A novel technique for long-term anomaly detection in the cloud. 6th {USENIX} workshop on hot topics in cloud computing (HotCloud 14) (2014)"},{"key":"18_CR9","unstructured":"Wold, H.: A Study in the Analysis of Stationary Time Series. Almqvist & Wiksell (1938)"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"2102","DOI":"10.1016\/j.neucom.2015.10.009","volume":"173","author":"F Kadri","year":"2016","unstructured":"Kadri, F., Harrou, F., Chaabane, S., et al.: Seasonal ARMA-based SPC charts for anomaly detection: application to emergency department systems. Neurocomputing 173, 2102\u20132114 (2016)","journal-title":"Neurocomputing"},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.ejor.2003.08.037","volume":"160","author":"GP Zhang","year":"2005","unstructured":"Zhang, G.P., Qi, M.: Neural network forecasting for seasonal and trend time series. Eur. J. Oper. Res. 160(2), 501\u2013514 (2005)","journal-title":"Eur. J. Oper. Res."},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.rser.2014.01.088","volume":"33","author":"JS Chou","year":"2014","unstructured":"Chou, J.S., Telaga, A.S.: Real-time detection of anomalous power consumption. Renew. Sustain. Energy Rev. 33, 400\u2013411 (2014)","journal-title":"Renew. Sustain. Energy Rev."},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Fu, R., Zhang, Z., Li, L.: Using LSTM and GRU neural network methods for traffic flow prediction. In: 2016 31st Youth Academic Annual Conference of Chinese Association of Automation (YAC), pp. 324\u2013328. IEEE (2016)","DOI":"10.1109\/YAC.2016.7804912"},{"key":"18_CR14","unstructured":"Shipmon, D.T., Gurevitch, J.M., Piselli, P.M., et al.: Time series anomaly detection; detection of anomalous drops with limited features and sparse examples in noisy highly periodic data. arXiv preprint arXiv:1708.03665 (2017)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Saurav, S., et al.: Online anomaly detection with concept drift adaptation using recurrent neural networks. In: Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, pp. 78\u201387 (2018)","DOI":"10.1145\/3152494.3152501"},{"key":"18_CR16","unstructured":"Xie, X., Wu, D., Liu, S., et al.: IoT data analytics using deep learning. arXiv preprint arXiv:1708.03854 (2017)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Bontemps, L., McDermott, J., Le-Khac, N.A.: Collective anomaly detection based on long short-term memory recurrent neural networks. In: International Conference on Future Data and Security Engineering, pp. 141-152. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., et al.: Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 387\u2013395 (2018)","DOI":"10.1145\/3219819.3219845"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in wsn for iot. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422402"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, M., Wang, J., et al.: End-to-end encrypted traffic classification with one-dimensional convolution neural networks. In: 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 43\u201348. IEEE (2017)","DOI":"10.1109\/ISI.2017.8004872"},{"issue":"6","key":"18_CR21","doi-asserted-by":"publisher","first-page":"4788","DOI":"10.1109\/TIE.2018.2864702","volume":"66","author":"CL Liu","year":"2018","unstructured":"Liu, C.L., Hsaio, W.H., Tu, Y.C.: Time series classification with multivariate convolutional neural network. IEEE Trans. Industr. Electron. 66(6), 4788\u20134797 (2018)","journal-title":"IEEE Trans. Industr. Electron."},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.eswa.2018.04.004","volume":"106","author":"TY Kim","year":"2018","unstructured":"Kim, T.Y., Cho, S.B.: Web traffic anomaly detection using C-LSTM neural networks. Expert Syst. Appl. 106, 66\u201376 (2018)","journal-title":"Expert Syst. Appl."}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T13:47:42Z","timestamp":1729518462000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}