{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:07Z","timestamp":1761401767072},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2015,8,23]],"date-time":"2015-08-23T00:00:00Z","timestamp":1440288000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s00779-015-0874-8","type":"journal-article","created":{"date-parts":[[2015,8,22]],"date-time":"2015-08-22T13:24:56Z","timestamp":1440249896000},"page":"1021-1031","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A new online anomaly learning and detection for large-scale service of Internet of Thing"],"prefix":"10.1007","volume":"19","author":[{"given":"JunPing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qiuming","family":"Kuang","sequence":"additional","affiliation":[]},{"given":"ShiHui","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,23]]},"reference":[{"issue":"15","key":"874_CR1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Lera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805","journal-title":"Comput Netw"},{"issue":"7","key":"874_CR2","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) The internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497\u20131516","journal-title":"Ad Hoc Netw"},{"issue":"8","key":"874_CR3","doi-asserted-by":"crossref","first-page":"1661","DOI":"10.1109\/TPDS.2012.261","volume":"24","author":"M Xie","year":"2013","unstructured":"Xie M, Hu JK, Han S, Chen HH (2013) Scalable hypergrid k-NN-based online anomaly detection in wireless sensor networks. IEEE Trans Parallel Distrib Syst 24(8):1661\u20131670","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"874_CR4","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1016\/j.jnca.2011.03.004","volume":"34","author":"M Xie","year":"2011","unstructured":"Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302\u20131325","journal-title":"J Netw Comput Appl"},{"key":"874_CR5","unstructured":"West SR, Guo Y, Wang XR (2011) Automated fault detection and diagnosis of HVAC subsystems using statistical machine learning. In: 12th international conference of the International Building Performance Simulation Association"},{"key":"874_CR6","doi-asserted-by":"crossref","unstructured":"Warriach EU, Aiello M, Tei K (2012) A machine learning approach for identifying and classifying faults in wireless sensor networks. In: IEEE 15th international conference on computational science and engineering","DOI":"10.1109\/ICCSE.2012.90"},{"issue":"2","key":"874_CR7","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1109\/SURV.2010.021510.00088","volume":"12","author":"Y Zhang","year":"2010","unstructured":"Zhang Y, Meratnia N, Havinga PJM (2010) Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun Surv Tutor 12(2):159\u2013170","journal-title":"IEEE Commun Surv Tutor"},{"issue":"11","key":"874_CR8","doi-asserted-by":"crossref","first-page":"1059","DOI":"10.1016\/j.peva.2010.08.018","volume":"67","author":"Y Yao","year":"2010","unstructured":"Yao Y, Sharma A, Golubchik L, Govindan R (2010) Online anomaly detection for sensor systems: a simple and efficient approach. Perform Eval 67(11):1059\u20131075","journal-title":"Perform Eval"},{"issue":"15","key":"874_CR9","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1016\/j.patrec.2013.02.014","volume":"34","author":"H Sagha","year":"2013","unstructured":"Sagha H, Bayati H, Milln JR, Chavarriaga R (2013) Online anomaly detection and resilience in classifier ensembles. Pattern Recognit Lett 34(15):1916\u20131927","journal-title":"Pattern Recognit Lett"},{"key":"874_CR10","doi-asserted-by":"crossref","unstructured":"Salem O, Liu YN, Mehaoua A (2013) A lightweight anomaly detection framework for medical wireless sensor networks. In: IEEE Wireless Communications and Conference (WCNC): service and applications","DOI":"10.1109\/WCNC.2013.6555279"},{"key":"874_CR11","doi-asserted-by":"crossref","unstructured":"Ma X, Yang D, Tang S, Luo Q, Zhang D, Li S (2004) Online mining in sensor networks. In: IFIP international conference on network and parallel computing, vol 3222, pp 544\u2013550","DOI":"10.1007\/978-3-540-30141-7_81"},{"key":"874_CR12","unstructured":"Subramaniam S, Palpanas T, Papadopoulos D, Kalogerakiand V, Gunopulos D (2006) Online outlier detection in sensor data using nonparametric models. In: Very Large Data Bases, VLDB"},{"key":"874_CR13","doi-asserted-by":"crossref","unstructured":"Martincic F, Schwiebert L (2006) Distributed event detection in sensor networks. In: Proceedings of the international conference on systems and networks communication, pp 43\u201348","DOI":"10.1109\/ICSNC.2006.32"},{"issue":"1","key":"874_CR14","first-page":"41","volume":"3","author":"S Alam","year":"2011","unstructured":"Alam S, Noll J (2011) Virtualizing sensor for the enablement of semantic-aware internet of things ecosystem. Int J Des Anal Tools Circuits Syst 3(1):41\u201351","journal-title":"Int J Des Anal Tools Circuits Syst"},{"key":"874_CR15","unstructured":"Azizi E (2013) Joint learning of modular structures from multiple data types. In: NIPS workshop of frontiers of network analysis: methods, models, and applications"},{"key":"874_CR16","unstructured":"Azizi E, Airoldi E, Galagan J (2014) Learning modular structures from network data and node variables. In: International conference on machine learning"},{"issue":"1","key":"874_CR17","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/JPROC.2006.887322","volume":"95","author":"M Chiang","year":"2007","unstructured":"Chiang M, Low SH, Calderbank AR, Doyle JC (2007) Layering as optimization decomposition: a mathematical theory of network architectures. Proc IEEE 95(1):255\u2013312","journal-title":"Proc IEEE"},{"issue":"3","key":"874_CR18","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/TNET.2005.850219","volume":"13","author":"J Wang","year":"2005","unstructured":"Wang J, Li L, Low SH, Doyle JC (2005) Cross-layer optimization in TCP\/IP networks. IEEE\/ACM Trans Netw 13(3):582\u2013595","journal-title":"IEEE\/ACM Trans Netw"},{"key":"874_CR19","volume-title":"CVX: Matlab software for disciplined convex programming","author":"M Grant","year":"2008","unstructured":"Grant M, Boyd S (2008) CVX: Matlab software for disciplined convex programming. Prentice Hall, New York"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0874-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-015-0874-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0874-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0874-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T02:29:07Z","timestamp":1559096947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-015-0874-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,23]]},"references-count":19,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["874"],"URL":"https:\/\/doi.org\/10.1007\/s00779-015-0874-8","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,23]]}}}