{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:38:34Z","timestamp":1770500314816,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:00:00Z","timestamp":1750291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172378"],"award-info":[{"award-number":["62172378"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572448"],"award-info":[{"award-number":["61572448"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61827810"],"award-info":[{"award-number":["61827810"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2020YFB1707701"],"award-info":[{"award-number":["2020YFB1707701"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s10489-025-06684-y","type":"journal-article","created":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T08:59:44Z","timestamp":1750323584000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Res2coder: A two-stage residual autoencoder for unsupervised time series anomaly detection"],"prefix":"10.1007","volume":"55","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yingjian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haoyu","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Xiangyun","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zonghai","family":"Zha","sequence":"additional","affiliation":[]},{"given":"Minghuan","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Zhongwen","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,19]]},"reference":[{"key":"6684_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed CM, Palleti VR, Mathur AP (2017) Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd international workshop on cyber-physical systems for smart water networks. Association for Computing Machinery, New York, NY, USA, CySWATER \u201917, pp 25\u201328. https:\/\/doi.org\/10.1145\/3055366.3055375","DOI":"10.1145\/3055366.3055375"},{"key":"6684_CR2","doi-asserted-by":"publisher","unstructured":"Aidini A, Tsagkatakis G, Tsakalides P (2019) Compression of high-dimensional multispectral image time series using tensor decomposition learning. In: 2019 27th European Signal Processing Conference (EUSIPCO), pp 1\u20135. https:\/\/doi.org\/10.23919\/EUSIPCO.2019.8902838","DOI":"10.23919\/EUSIPCO.2019.8902838"},{"key":"6684_CR3","doi-asserted-by":"publisher","unstructured":"Audibert J, Michiardi P, Guyard F et\u00a0al (2020) Usad: Unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining. Association for Computing Machinery, New York, NY, USA, KDD \u201920, pp 3395\u20133404. https:\/\/doi.org\/10.1145\/3394486.3403392","DOI":"10.1145\/3394486.3403392"},{"issue":"1","key":"6684_CR4","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1111\/j.1539-6924.1989.tb01224.x","volume":"9","author":"CC Brown","year":"1989","unstructured":"Brown CC, Chu KC (1989) Additive and multiplicative models and multistage carcinogenesis theory. Risk Anal 9(1):99\u2013105","journal-title":"Risk Anal"},{"key":"6684_CR5","doi-asserted-by":"publisher","unstructured":"Chan KP, Fu AWC (1999) Efficient time series matching by wavelets. In: Proceedings 15th international conference on data engineering, pp 126\u2013133. https:\/\/doi.org\/10.1109\/ICDE.1999.754915","DOI":"10.1109\/ICDE.1999.754915"},{"key":"6684_CR6","doi-asserted-by":"publisher","first-page":"103581","DOI":"10.1016\/j.cose.2023.103581","volume":"137","author":"H Chen","year":"2024","unstructured":"Chen H, Li X, Liu W (2024) Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and convlstm forecasting model. Comput Secur 137:103581. https:\/\/doi.org\/10.1016\/j.cose.2023.103581","journal-title":"Comput Secur"},{"key":"6684_CR7","doi-asserted-by":"publisher","unstructured":"Chen X, Deng L, Zhao Y et\u00a0al (2023) Adversarial autoencoder for unsupervised time series anomaly detection and interpretation. In: Proceedings of the sixteenth ACM international conference on web search and data mining. Association for Computing Machinery, New York, NY, USA, WSDM \u201923, pp 267\u2013275. https:\/\/doi.org\/10.1145\/3539597.3570371","DOI":"10.1145\/3539597.3570371"},{"key":"6684_CR8","doi-asserted-by":"publisher","unstructured":"Cho K, van Merrienboer B, Gulcehre C et\u00a0al (2014) Learning phrase representations using rnn encoder-decoder for statistical machine translation. In: Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), pp 1724\u20131734. https:\/\/doi.org\/10.3115\/v1\/D14-1179","DOI":"10.3115\/v1\/D14-1179"},{"key":"6684_CR9","doi-asserted-by":"publisher","first-page":"120043","DOI":"10.1109\/ACCESS.2021.3107975","volume":"9","author":"K Choi","year":"2021","unstructured":"Choi K, Yi J, Park C et al (2021) Deep learning for anomaly detection in time-series data: review, analysis, and guidelines. IEEE Access 9:120043\u2013120065. https:\/\/doi.org\/10.1109\/ACCESS.2021.3107975","journal-title":"IEEE Access"},{"issue":"1","key":"6684_CR10","first-page":"3","volume":"6","author":"RB Cleveland","year":"1990","unstructured":"Cleveland RB, Cleveland W, McRae J et al (1990) Stl: A seasonal-trend decomposition procedure based on loess. J Off Stat 6(1):3\u201373","journal-title":"J Off Stat"},{"issue":"355","key":"6684_CR11","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1080\/01621459.1976.10481532","volume":"71","author":"WP Cleveland","year":"1976","unstructured":"Cleveland WP, Tiao GC (1976) Decomposition of seasonal time series: a model for the census x\u201311 program. J Am Stat Assoc 71(355):581\u2013587","journal-title":"J Am Stat Assoc"},{"key":"6684_CR12","doi-asserted-by":"publisher","unstructured":"Deng A, Hooi B (2021) Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI conference on artificial intelligence, pp 4027\u20134035. https:\/\/doi.org\/10.1609\/aaai.v35i5.16523","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"6684_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.neunet.2023.09.018","volume":"168","author":"J Fan","year":"2023","unstructured":"Fan J, Wang Z, Wu H et al (2023) An adversarial time-frequency reconstruction network for unsupervised anomaly detection. Neural Netw 168:44\u201356. https:\/\/doi.org\/10.1016\/j.neunet.2023.09.018","journal-title":"Neural Netw"},{"issue":"6","key":"6684_CR14","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1109\/TNNLS.2021.3105827","volume":"33","author":"A Garg","year":"2022","unstructured":"Garg A, Zhang W, Samaran J et al (2022) An evaluation of anomaly detection and diagnosis in multivariate time series. IEEE Trans Neural Netw Learn Syst 33(6):2508\u20132517. https:\/\/doi.org\/10.1109\/TNNLS.2021.3105827","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"6684_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-71368-7_8","volume-title":"Critical information infrastructures security","author":"J Goh","year":"2017","unstructured":"Goh J, Adepu S, Junejo KN et al (2017) A dataset to support research in the design of secure water treatment systems. In: Havarneanu G, Setola R, Nassopoulos H et al (eds) Critical information infrastructures security. Springer International Publishing, Cham, pp 88\u201399. https:\/\/doi.org\/10.1007\/978-3-319-71368-7_8"},{"key":"6684_CR16","unstructured":"Goodfellow IJ, Pouget-Abadie J, Mirza M et\u00a0al (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems - Volume 2. MIT Press, Cambridge, MA, USA, NIPS\u201914, pp 2672\u20132680"},{"key":"6684_CR17","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s007040200003","volume":"71","author":"J Grieser","year":"2002","unstructured":"Grieser J, Tr\u00f6mel S, Sch\u00f6nwiese CD (2002) Statistical time series decomposition into significant components and application to European temperature. Theoret Appl Climatol 71:171\u2013183","journal-title":"Theoret Appl Climatol"},{"issue":"8","key":"6684_CR18","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"1","key":"6684_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2953682","volume":"29","author":"RJ Hodrick","year":"1997","unstructured":"Hodrick RJ, Prescott EC (1997) Postwar us business cycles: an empirical investigation. J Money, Credit, Bank 29(1):1\u201316","journal-title":"J Money, Credit, Bank"},{"issue":"1971","key":"6684_CR20","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1098\/rspa.1998.0193","volume":"454","author":"NE Huang","year":"1998","unstructured":"Huang NE, Shen Z, Long SR et al (1998) The empirical mode decomposition and the hilbert spectrum for nonlinear and non-stationary time series analysis. Proc R Soc Lond Ser A Math Phys Eng Sci 454(1971):903\u2013995","journal-title":"Proc R Soc Lond Ser A Math Phys Eng Sci"},{"key":"6684_CR21","doi-asserted-by":"publisher","unstructured":"Hundman K, Constantinou V, Laporte C et\u00a0al (2018) Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining. Association for Computing Machinery, New York, NY, USA, KDD \u201918, pp 387\u2013395 https:\/\/doi.org\/10.1145\/3219819.3219845","DOI":"10.1145\/3219819.3219845"},{"key":"6684_CR22","doi-asserted-by":"publisher","unstructured":"Hyndman RJ, Wang E, Laptev N (2015) Large-scale unusual time series detection. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), pp 1616\u20131619. https:\/\/doi.org\/10.1109\/ICDMW.2015.104","DOI":"10.1109\/ICDMW.2015.104"},{"key":"6684_CR23","doi-asserted-by":"publisher","unstructured":"Jang JG, Kang U (2021) Fast and memory-efficient tucker decomposition for answering diverse time range queries. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. Association for Computing Machinery, New York, NY, USA, KDD \u201921, pp 725\u2013735. https:\/\/doi.org\/10.1145\/3447548.3467290","DOI":"10.1145\/3447548.3467290"},{"key":"6684_CR24","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s101080050008","volume":"1","author":"R Kaiser","year":"1999","unstructured":"Kaiser R, Maravall A (1999) Estimation of the business cycle: a modified hodrick-prescott filter. SpanEconRev 1:175\u2013206. https:\/\/doi.org\/10.1007\/s101080050008","journal-title":"SpanEconRev"},{"key":"6684_CR25","doi-asserted-by":"publisher","first-page":"105964","DOI":"10.1016\/j.engappai.2023.105964","volume":"120","author":"J Kim","year":"2023","unstructured":"Kim J, Kang H, Kang P (2023) Time-series anomaly detection with stacked transformer representations and 1d convolutional network. Eng Appl Artif Intell 120:105964. https:\/\/doi.org\/10.1016\/j.engappai.2023.105964","journal-title":"Eng Appl Artif Intell"},{"key":"6684_CR26","doi-asserted-by":"publisher","unstructured":"Kim S, Choi K, Choi HS et\u00a0al (2022) Towards a rigorous evaluation of time-series anomaly detection. In: Proceedings of the AAAI conference on artificial intelligence, pp 7194\u20137201. https:\/\/doi.org\/10.1609\/aaai.v36i7.20680","DOI":"10.1609\/aaai.v36i7.20680"},{"key":"6684_CR27","unstructured":"Kingma DP, Ba J (2015) Adam: A method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd International conference on learning representations. San Diego, CA, USA, ICLR \u201915"},{"issue":"3","key":"6684_CR28","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1002\/bimj.4710310317","volume":"31","author":"RL Kodell","year":"1989","unstructured":"Kodell RL, Gaylor D (1989) On the additive and multiplicative models of relative risk. Biom J 31(3):359\u2013370","journal-title":"Biom J"},{"key":"6684_CR29","doi-asserted-by":"publisher","unstructured":"Lea C, Flynn MD, Vidal R et\u00a0al (2017) Temporal convolutional networks for action segmentation and detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 156\u2013165. https:\/\/doi.org\/10.1109\/CVPR.2017.113","DOI":"10.1109\/CVPR.2017.113"},{"key":"6684_CR30","doi-asserted-by":"publisher","unstructured":"Li D, Chen D, Jin B et\u00a0al (2019) Mad-gan: Multivariate anomaly detection for time series data with generative adversarial networks. In: Artificial neural networks and machine learning\u2013 ICANN 2019: text and time series: 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17\u201319, 2019, Proceedings, Part IV. Springer-Verlag, Berlin, Heidelberg, pp 703\u2013716. https:\/\/doi.org\/10.1007\/978-3-030-30490-4_56","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"6684_CR31","doi-asserted-by":"publisher","unstructured":"Mathur AP, Tippenhauer NO (2016) Swat: a water treatment testbed for research and training on ics security. In: 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), pp 31\u201336. https:\/\/doi.org\/10.1109\/CySWater.2016.7469060","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"6684_CR32","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.future.2022.12.001","volume":"141","author":"M Molan","year":"2023","unstructured":"Molan M, Borghesi A, Cesarini D et al (2023) Ruad: Unsupervised anomaly detection in hpc systems. Futur Gener Comput Syst 141:542\u2013554. https:\/\/doi.org\/10.1016\/j.future.2022.12.001","journal-title":"Futur Gener Comput Syst"},{"key":"6684_CR33","doi-asserted-by":"publisher","unstructured":"Nakamura T, Imamura M, Mercer R et\u00a0al (2020) Merlin: Parameter-free discovery of arbitrary length anomalies in massive time series archives. In: 2020 IEEE International Conference on Data Mining (ICDM), pp 1190\u20131195. https:\/\/doi.org\/10.1109\/ICDM50108.2020.00147","DOI":"10.1109\/ICDM50108.2020.00147"},{"key":"6684_CR34","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-030-44769-4_13","volume-title":"Service-oriented and cloud computing","author":"S Nedelkoski","year":"2020","unstructured":"Nedelkoski S, Bogatinovski J, Mandapati AK et al (2020) Multi-source distributed system data for ai-powered analytics. In: Brogi A, Zimmermann W, Kritikos K (eds) Service-oriented and cloud computing. Springer International Publishing, Cham, pp 161\u2013176. https:\/\/doi.org\/10.1007\/978-3-030-44769-4_13"},{"key":"6684_CR35","doi-asserted-by":"publisher","unstructured":"Park Yc, Jang JG, Kang U (2021) Fast and accurate partial fourier transform for time series data. In: Proceedings of the 27th ACM SIGKDD conference on knowledge discovery & data mining. Association for Computing Machinery, New York, NY, USA, KDD \u201921, pp 1309\u20131318. https:\/\/doi.org\/10.1145\/3447548.3467293","DOI":"10.1145\/3447548.3467293"},{"issue":"1","key":"6684_CR36","first-page":"119","volume":"3","author":"J Pickands","year":"1975","unstructured":"Pickands J (1975) Statistical inference using extreme order statistics. Ann Stat 3(1):119\u2013131","journal-title":"Ann Stat"},{"key":"6684_CR37","doi-asserted-by":"publisher","first-page":"121737","DOI":"10.1016\/j.eswa.2023.121737","volume":"238","author":"Y Qiu","year":"2024","unstructured":"Qiu Y, He Z, Zhang W et al (2024) Msgcn-istl: A multi-scaled self-attention-enhanced graph convolutional network with improved stl decomposition for probabilistic load forecasting. Expert Syst Appl 238:121737. https:\/\/doi.org\/10.1016\/j.eswa.2023.121737","journal-title":"Expert Syst Appl"},{"issue":"6088","key":"6684_CR38","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323(6088):533\u2013536","journal-title":"Nature"},{"key":"6684_CR39","doi-asserted-by":"publisher","first-page":"110725","DOI":"10.1016\/j.knosys.2023.110725","volume":"275","author":"Y Shi","year":"2023","unstructured":"Shi Y, Wang B, Yu Y et al (2023) Robust anomaly detection for multivariate time series through temporal gcns and attention-based vae. Knowl-Based Syst 275:110725. https:\/\/doi.org\/10.1016\/j.knosys.2023.110725","journal-title":"Knowl-Based Syst"},{"key":"6684_CR40","doi-asserted-by":"publisher","unstructured":"Siffer A, Fouque PA, Termier A et\u00a0al (2017) Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. Association for Computing Machinery, New York, NY, USA, KDD \u201917, pp 1067\u20131075. https:\/\/doi.org\/10.1145\/3097983.3098144","DOI":"10.1145\/3097983.3098144"},{"key":"6684_CR41","doi-asserted-by":"publisher","unstructured":"Su Y, Zhao Y, Niu C et\u00a0al (2019) Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. Association for Computing Machinery, New York, NY, USA, KDD \u201919, pp 2828\u20132837. https:\/\/doi.org\/10.1145\/3292500.3330672","DOI":"10.1145\/3292500.3330672"},{"issue":"6","key":"6684_CR42","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.14778\/3514061.3514067","volume":"15","author":"S Tuli","year":"2022","unstructured":"Tuli S, Casale G, Jennings NR (2022) Tranad: deep transformer networks for anomaly detection in multivariate time series data. Proc VLDB Endow 15(6):1201\u20131214. https:\/\/doi.org\/10.14778\/3514061.3514067","journal-title":"Proc VLDB Endow"},{"key":"6684_CR43","doi-asserted-by":"publisher","unstructured":"Vaswani A, Shazeer N, Parmar N et\u00a0al (2017) Attention is all you need. In: Guyon I, Luxburg UV, Bengio S et\u00a0al (eds) Advances in neural information processing systems, pp 5998\u20136008. https:\/\/doi.org\/10.48550\/arXiv.1706.03762","DOI":"10.48550\/arXiv.1706.03762"},{"issue":"5","key":"6684_CR44","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1093\/oxfordjournals.aje.a112629","volume":"108","author":"S Walter","year":"1978","unstructured":"Walter S, Holford T (1978) Additive, multiplicative, and other models for disease risks. Am J Epidemiol 108(5):341\u2013346","journal-title":"Am J Epidemiol"},{"key":"6684_CR45","doi-asserted-by":"publisher","unstructured":"Wen Q, Gao J, Song X et\u00a0al (2019) Robuststl: A robust seasonal-trend decomposition algorithm for long time series. In: Proceedings of the AAAI conference on artificial intelligence, pp 5409\u20135416. https:\/\/doi.org\/10.1609\/aaai.v33i01.33015409","DOI":"10.1609\/aaai.v33i01.33015409"},{"key":"6684_CR46","doi-asserted-by":"publisher","first-page":"22419","DOI":"10.48550\/arXiv.2106.13008","volume":"34","author":"H Wu","year":"2021","unstructured":"Wu H, Xu J, Wang J et al (2021) Autoformer: decomposition transformers with auto-correlation for long-term series forecasting. Adv Neural Inf Process Syst 34:22419\u201322430. https:\/\/doi.org\/10.48550\/arXiv.2106.13008","journal-title":"Adv Neural Inf Process Syst"},{"key":"6684_CR47","doi-asserted-by":"publisher","unstructured":"Xu H, Chen W, Zhao N et\u00a0al (2018) Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. In: Proceedings of the 2018 world wide web conference. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, WWW \u201918, pp 187\u2013196. https:\/\/doi.org\/10.1145\/3178876.3185996","DOI":"10.1145\/3178876.3185996"},{"issue":"7","key":"6684_CR48","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1016\/j.jmoneco.2005.03.015","volume":"53","author":"V Zarnowitz","year":"2006","unstructured":"Zarnowitz V, Ozyildirim A (2006) Time series decomposition and measurement of business cycles, trends and growth cycles. J Monet Econ 53(7):1717\u20131739. https:\/\/doi.org\/10.1016\/j.jmoneco.2005.03.015","journal-title":"J Monet Econ"},{"key":"6684_CR49","doi-asserted-by":"publisher","unstructured":"Zhang C, Zhou T, Wen Q et\u00a0al (2022) Tfad: A decomposition time series anomaly detection architecture with time-frequency analysis. In: Proceedings of the 31st ACM International Conference on Information & Knowledge Management. Association for Computing Machinery, New York, NY, USA, CIKM \u201922, pp 2497\u20132507. https:\/\/doi.org\/10.1145\/3511808.3557470","DOI":"10.1145\/3511808.3557470"},{"key":"6684_CR50","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1016\/j.asoc.2018.01.017","volume":"65","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang J (2018) A novel decomposition-ensemble model for forecasting short-term load-time series with multiple seasonal patterns. Appl Soft Comput 65:478\u2013494. https:\/\/doi.org\/10.1016\/j.asoc.2018.01.017","journal-title":"Appl Soft Comput"},{"issue":"2","key":"6684_CR51","doi-asserted-by":"publisher","first-page":"2118","DOI":"10.1109\/TKDE.2021.3102110","volume":"35","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Chen Y, Wang J et al (2023) Unsupervised deep anomaly detection for multi-sensor time-series signals. IEEE Trans Knowl Data Eng 35(2):2118\u20132132. https:\/\/doi.org\/10.1109\/TKDE.2021.3102110","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"6684_CR52","doi-asserted-by":"publisher","unstructured":"Zhang Z, Li W, Ding W et al (2023) Stad-gan: Unsupervised anomaly detection on multivariate time series with self-training generative adversarial networks. ACM Trans Knowl Discov Data 17(5). https:\/\/doi.org\/10.1109\/TKDE.2021.3102110","DOI":"10.1109\/TKDE.2021.3102110"},{"key":"6684_CR53","doi-asserted-by":"publisher","unstructured":"Zhou T, Ma Z, Wen Q et\u00a0al (2022a) Fedformer: Frequency enhanced decomposed transformer for long-term series forecasting. In: International conference on machine learning. PMLR, pp 27268\u201327286. https:\/\/doi.org\/10.48550\/arXiv.2201.12740","DOI":"10.48550\/arXiv.2201.12740"},{"key":"6684_CR54","doi-asserted-by":"publisher","first-page":"108155","DOI":"10.1016\/j.ymssp.2021.108155","volume":"163","author":"W Zhou","year":"2022","unstructured":"Zhou W, Feng Z, Xu Y et al (2022) Empirical fourier decomposition: an accurate signal decomposition method for nonlinear and non-stationary time series analysis. Mech Syst Signal Process 163:108155. https:\/\/doi.org\/10.1016\/j.ymssp.2021.108155","journal-title":"Mech Syst Signal Process"},{"key":"6684_CR55","unstructured":"Zong B, Song Q, Min MR et\u00a0al (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: International conference on learning representations, pp 1\u201319"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06684-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06684-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06684-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T13:38:44Z","timestamp":1758289124000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06684-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,19]]},"references-count":55,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["6684"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06684-y","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,19]]},"assertion":[{"value":"31 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"804"}}