{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:38:57Z","timestamp":1768585137912,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T00:00:00Z","timestamp":1703289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T00:00:00Z","timestamp":1703289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the Natural Science Foundation of Hunan Province","doi-asserted-by":"publisher","award":["2021JJ30455"],"award-info":[{"award-number":["2021JJ30455"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Excellent Youth Funding of Hunan Provincial Education Department","award":["23B0082"],"award-info":[{"award-number":["23B0082"]}]},{"name":"the National Key Research and Development Program of China","award":["2021YFA1000600"],"award-info":[{"award-number":["2021YFA1000600"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072170"],"award-info":[{"award-number":["62072170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Science and Technology Project of Department of Communications of Hunan Provincial","award":["202101"],"award-info":[{"award-number":["202101"]}]},{"name":"the Key Research and Development Program of Hunan Province","award":["2022GK2015"],"award-info":[{"award-number":["2022GK2015"]}]},{"name":"the Hunan Provincial Natural Science Foundation of China","award":["2021JJ30141"],"award-info":[{"award-number":["2021JJ30141"]}]},{"name":"the Open Research Fund of Hunan Provincial Key Laboratory of Network Investigational Technology","award":["2020WLZC001"],"award-info":[{"award-number":["2020WLZC001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11227-023-05833-9","type":"journal-article","created":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T10:02:16Z","timestamp":1703325736000},"page":"10444-10468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection"],"prefix":"10.1007","volume":"80","author":[{"given":"Jing","family":"Long","sequence":"first","affiliation":[]},{"given":"Cuiting","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Ruxin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,23]]},"reference":[{"key":"5833_CR1","doi-asserted-by":"crossref","unstructured":"Cai J, Liang W, Li X, Li K, Gui Z, Khan MK (2023) GTxChain: a secure IoT smart blockchain architecture based on graph neural network. IEEE Internet of Things J 1\u201314","DOI":"10.1109\/JIOT.2023.3296469"},{"issue":"10","key":"5833_CR2","doi-asserted-by":"publisher","first-page":"7118","DOI":"10.1109\/TII.2021.3129631","volume":"18","author":"Z Xu","year":"2021","unstructured":"Xu Z, Liang W, Li K-C, Xu J, Zomaya AY, Zhang J (2021) A time-sensitive token-based anonymous authentication and dynamic group key agreement scheme for industry 5.0. IEEE Trans Ind Inform 18(10):7118\u20137127","journal-title":"IEEE Trans Ind Inform"},{"key":"5833_CR3","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.inffus.2020.10.001","volume":"67","author":"L Erhan","year":"2021","unstructured":"Erhan L, Ndubuaku M, Di Mauro M et al (2021) Smart anomaly detection in sensor systems: a multi-perspective review. Inf Fus 67:64\u201379","journal-title":"Inf Fus"},{"key":"5833_CR4","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.future.2018.04.053","volume":"87","author":"M Ge","year":"2018","unstructured":"Ge M, Bangui H, Buhnova B (2018) Big data for internet of things: a survey. Futur Gener Comput Syst 87:601\u2013614","journal-title":"Futur Gener Comput Syst"},{"key":"5833_CR5","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1016\/j.inffus.2022.08.011","volume":"89","author":"C Ding","year":"2023","unstructured":"Ding C, Sun S, Zhao J (2023) MST-GAT: a multimodal spatial-temporal graph attention network for time series anomaly detection. Inf Fus 89:527\u2013536","journal-title":"Inf Fus"},{"issue":"1","key":"5833_CR6","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/TII.2021.3078192","volume":"19","author":"F Kong","year":"2021","unstructured":"Kong F, Li J, Jiang B et al (2021) Integrated generative model for industrial anomaly detection via bidirectional LSTM and attention mechanism. IEEE Trans Ind Inf 19(1):541\u2013550","journal-title":"IEEE Trans Ind Inf"},{"key":"5833_CR7","doi-asserted-by":"crossref","unstructured":"Li Y, Liang W, Xie K, Zhang D, Xie S, Li K (2023) Lightnestle: quick and accurate neural sequential tensor completion via meta learning. In: IEEE Infocom","DOI":"10.1109\/INFOCOM53939.2023.10228967"},{"key":"5833_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2020.02.069","volume":"523","author":"M Fahim","year":"2020","unstructured":"Fahim M, Fraz K, Sillitti A (2020) TSI: Time series to imaging based model for detecting anomalous energy consumption in smart buildings. Inf Sci 523:1\u201313","journal-title":"Inf Sci"},{"key":"5833_CR9","unstructured":"Bertalani\u010d B, Me\u017ea M, Fortuna C (2022) Resource-aware time series imaging classification for wireless link layer anomalies. IEEE Trans Neural Netw Learn Syst 1\u201313"},{"key":"5833_CR10","doi-asserted-by":"crossref","unstructured":"Siffer A, Fouque P-A, Termier A et al (2017) Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 1067\u20131075","DOI":"10.1145\/3097983.3098144"},{"issue":"3","key":"5833_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):1\u201358","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"7","key":"5833_CR12","doi-asserted-by":"publisher","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","volume":"7","author":"A Cook","year":"2019","unstructured":"Cook A, M\u0131s\u0131rl\u0131 G, Fan Z (2019) Anomaly detection for IoT time-series data: a survey. IEEE Internet Things J 7(7):6481\u20136494","journal-title":"IEEE Internet Things J"},{"key":"5833_CR13","doi-asserted-by":"crossref","unstructured":"Audibert J, Michiardi P, Guyard F et al (2020) USAD: unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 3395\u20133404","DOI":"10.1145\/3394486.3403392"},{"key":"5833_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.patcog.2019.05.040","volume":"95","author":"J Sun","year":"2019","unstructured":"Sun J et al (2019) Univariate time series classification using information geometry. Pattern Recogn 95:24\u201335","journal-title":"Pattern Recogn"},{"key":"5833_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108606","volume":"245","author":"X Yang","year":"2022","unstructured":"Yang X, Zhang Z, Cui R (2022) TimeCLR: a self-supervised contrastive learning framework for univariate time series representation. Knowl-Based Syst 245:108606","journal-title":"Knowl-Based Syst"},{"key":"5833_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117366","volume":"203","author":"D Kim","year":"2022","unstructured":"Kim D, Baek J-G (2022) Bagging ensemble-based novel data generation method for univariate time series forecasting. Expert Syst Appl 203:117366","journal-title":"Expert Syst Appl"},{"key":"5833_CR17","unstructured":"Oreshkin BN, Carpov D, Chapados N, Bengio Y (2019) N-beats: neural basis expansion analysis for interpretable time series forecasting. In: International Conference on Learning Representations, pp 1\u201331"},{"issue":"1","key":"5833_CR18","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1504\/IJES.2021.111985","volume":"14","author":"H Wu","year":"2021","unstructured":"Wu H, Shi S (2021) Real-time anomaly detection in gas sensor streaming data. Int J Embedded Syst 14(1):81\u201388","journal-title":"Int J Embedded Syst"},{"issue":"6","key":"5833_CR19","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1061\/(ASCE)0733-947X(2003)129:6(664)","volume":"129","author":"BM Williams","year":"2003","unstructured":"Williams BM, Hoel LA (2003) Modeling and forecasting vehicular traffic flow as a seasonal arima process: theoretical basis and empirical results. J Transp Eng 129(6):664\u2013672","journal-title":"J Transp Eng"},{"key":"5833_CR20","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1007\/s10845-020-01583-0","volume":"32","author":"W Wang","year":"2021","unstructured":"Wang W, Bao J, Li T (2021) Bound smoothing based time series anomaly detection using multiple similarity measures. J Intell Manuf 32:1711\u20131727","journal-title":"J Intell Manuf"},{"key":"5833_CR21","first-page":"1","volume-title":"An introduction to outlier analysis","author":"CC Aggarwal","year":"2017","unstructured":"Aggarwal CC (2017) An introduction to outlier analysis. Springer, Berlin, pp 1\u201334"},{"key":"5833_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117892","volume":"206","author":"Z Ji","year":"2022","unstructured":"Ji Z, Wang Y, Yan K et al (2022) A space-embedding strategy for anomaly detection in multivariate time series. Expert Syst Appl 206:117892","journal-title":"Expert Syst Appl"},{"key":"5833_CR23","unstructured":"Li Y, Peng X, Zhang J et al (2021) DCT-GAN: dilated convolutional transformer-based GAN for time series anomaly detection. IEEE Trans Knowl Data Eng"},{"issue":"1","key":"5833_CR24","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/TII.2022.3170149","volume":"19","author":"X Zhou","year":"2022","unstructured":"Zhou X, Hu Y, Wu J, Liang W, Ma J, Jin Q (2022) Distribution bias aware collaborative generative adversarial network for imbalanced deep learning in industrial IoT. IEEE Trans Ind Inf 19(1):570\u2013580","journal-title":"IEEE Trans Ind Inf"},{"key":"5833_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2022.126012","volume":"263","author":"D Wang","year":"2023","unstructured":"Wang D, Gan J, Mao J et al (2023) Forecasting power demand in china with a CNN-LSTM model including multimodal information. Energy 263:126012","journal-title":"Energy"},{"key":"5833_CR26","unstructured":"Yoon J, Jarrett D, Schaar M (2019) Time-series generative adversarial networks. In: Advances in Neural Information Processing Systems, vol 32"},{"key":"5833_CR27","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.future.2023.02.023","volume":"144","author":"X Zhang","year":"2023","unstructured":"Zhang X, Gan H (2023) STF-Net: an improved depth network based on spatio-temporal data fusion for pm2.5 concentration prediction. Future Gener Comput Syst 144:37\u201349","journal-title":"Future Gener Comput Syst"},{"key":"5833_CR28","doi-asserted-by":"crossref","unstructured":"Breunig M, Kriegel H, Ng R et al (2000) LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp 93\u2013104","DOI":"10.1145\/342009.335388"},{"key":"5833_CR29","doi-asserted-by":"crossref","unstructured":"Kriegel H, Schubert M, Zimek A (2008) Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp 444\u2013452","DOI":"10.1145\/1401890.1401946"},{"issue":"9\u201310","key":"5833_CR30","doi-asserted-by":"publisher","first-page":"1641","DOI":"10.1016\/S0167-8655(03)00003-5","volume":"24","author":"Z He","year":"2003","unstructured":"He Z, Xu X, Deng S (2003) Discovering cluster-based local outliers. Pattern Recogn Lett 24(9\u201310):1641\u20131650","journal-title":"Pattern Recogn Lett"},{"key":"5833_CR31","unstructured":"Keogh E, Lin J, Fu A (2005) Hot sax: efficiently finding the most unusual time series subsequence. In: Fifth IEEE International Conference on Data Mining (ICDM\u201905), p 8"},{"key":"5833_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115744","volume":"187","author":"Y Zhou","year":"2022","unstructured":"Zhou Y, Ren H, Li Z et al (2022) Anomaly detection based on a granular Markov model. Expert Syst Appl 187:115744","journal-title":"Expert Syst Appl"},{"key":"5833_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109236","volume":"251","author":"R Kaur","year":"2022","unstructured":"Kaur R, Gabrijel\u010di\u010d D (2022) Behavior segmentation of electricity consumption patterns: a cluster analytical approach. Knowl-Based Syst 251:109236","journal-title":"Knowl-Based Syst"},{"issue":"1","key":"5833_CR34","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi A et al (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61\u201380","journal-title":"IEEE Trans Neural Netw"},{"key":"5833_CR35","doi-asserted-by":"crossref","unstructured":"Liang W, Li Y, Xie K, Zhang D, Li K-C, Souri A, Li K (2022) Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Trans Intell Transp Syst","DOI":"10.1109\/TITS.2022.3156266"},{"key":"5833_CR36","unstructured":"Li Y, Yu R, Shahabi C, Liu Y (2018) Diffusion convolutional recurrent neural network: data-driven traffic forecasting. In: Proceedings of the International Conference on Learning Representations (ICLR)"},{"issue":"1","key":"5833_CR37","doi-asserted-by":"publisher","first-page":"904","DOI":"10.1109\/TITS.2022.3140229","volume":"24","author":"C Diao","year":"2022","unstructured":"Diao C, Zhang D, Liang W, Li K-C, Hong Y, Gaudiot J-L (2022) A novel spatial-temporal multi-scale alignment graph neural network security model for vehicles prediction. IEEE Trans Intell Transp Syst 24(1):904\u2013914","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"5833_CR38","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/TNNLS.2021.3090695","volume":"34","author":"X Wei","year":"2021","unstructured":"Wei X, Zhang Y, Wei Y et al (2021) Metro passenger-flow representation via dynamic mode decomposition and its application. IEEE Trans Neural Netw Learn Syst 34:157\u2013170","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"4","key":"5833_CR39","doi-asserted-by":"publisher","first-page":"5734","DOI":"10.1093\/mnras\/stab2588","volume":"508","author":"J Mart\u00ednez-Galarza","year":"2021","unstructured":"Mart\u00ednez-Galarza J, Bianco F, Crake D et al (2021) A method for finding anomalous astronomical light curves and their analogues. Mon Not R Astron Soc 508(4):5734\u20135756","journal-title":"Mon Not R Astron Soc"},{"issue":"3","key":"5833_CR40","doi-asserted-by":"publisher","first-page":"1177","DOI":"10.1109\/TNNLS.2020.2980749","volume":"32","author":"L Li","year":"2020","unstructured":"Li L, Yan J, Wang H et al (2020) Anomaly detection of time series with smoothness-inducing sequential variational auto-encoder. IEEE Trans Neural Netw Learn Syst 32(3):1177\u20131191","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"5833_CR41","doi-asserted-by":"crossref","unstructured":"Gao X, Hu W, Guo Z (2020) Exploring structure-adaptive graph learning for robust semi-supervised classification. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp 1\u20136","DOI":"10.1109\/ICME46284.2020.9102726"},{"issue":"6","key":"5833_CR42","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1109\/JSTSP.2017.2726975","volume":"11","author":"HE Egilmez","year":"2017","unstructured":"Egilmez HE, Pavez E, Ortega A (2017) Graph learning from data under Laplacian and structural constraints. IEEE J Sel Top Signal Process 11(6):825\u2013841","journal-title":"IEEE J Sel Top Signal Process"},{"issue":"2","key":"5833_CR43","doi-asserted-by":"publisher","first-page":"1747","DOI":"10.1109\/TII.2022.3204034","volume":"19","author":"J Long","year":"2022","unstructured":"Long J, Liang W, Li K-C, Wei Y, Marino MD (2022) A regularized cross-layer ladder network for intrusion detection in industrial internet of things. IEEE Trans Ind Inf 19(2):1747\u20131755","journal-title":"IEEE Trans Ind Inf"},{"key":"5833_CR44","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2023.101949","volume":"56","author":"M Ma","year":"2023","unstructured":"Ma M, Han L, Zhou C (2023) BTAD: a binary transformer deep neural network model for anomaly detection in multivariate time series data. Adv Eng Inform 56:101949","journal-title":"Adv Eng Inform"},{"issue":"12","key":"5833_CR45","doi-asserted-by":"publisher","first-page":"9179","DOI":"10.1109\/JIOT.2021.3100509","volume":"9","author":"Z Chen","year":"2021","unstructured":"Chen Z, Chen D, Zhang X et al (2021) Learning graph structures with transformer for multivariate time-series anomaly detection in IoT. IEEE Internet Things J 9(12):9179\u20139189","journal-title":"IEEE Internet Things J"},{"key":"5833_CR46","unstructured":"Maddison C, Tarlow D, Minka T (2014) A* sampling. In: NeurIPS, pp 3086\u20133094"},{"key":"5833_CR47","unstructured":"Jang E, Gu S, Poole B (2016) Categorical reparameterization with Gumbel-Softmax. In: International Conference on Learning Representations, pp 1\u201313"},{"key":"5833_CR48","doi-asserted-by":"crossref","unstructured":"Deng A, Hooi B (2021) Graph neural network-based anomaly detection in multivariate time series. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol 35, pp 4027\u20134035","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"5833_CR49","doi-asserted-by":"crossref","unstructured":"Mathur A, Tippenhauer N (2016) Swat: a water treatment testbed for research and training on ICS security. In: 2016 International Workshop on Cyber-physical Systems for Smart Water Networks, pp 31\u201336","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"5833_CR50","doi-asserted-by":"crossref","unstructured":"Ahmed C, Palleti V, Mathur A (2017) WADI: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber Physical Systems for Smart Water Networks, pp 25\u201328","DOI":"10.1145\/3055366.3055375"},{"key":"5833_CR51","doi-asserted-by":"crossref","unstructured":"Hundman K, Constantinou V, Laporte C et al (2018) Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp 387\u2013395","DOI":"10.1145\/3219819.3219845"},{"key":"5833_CR52","doi-asserted-by":"crossref","unstructured":"Goh J, Adepu S, Junejo K et al (2017) A dataset to support research in the design of secure water treatment systems. In: 11th International Conference, CRITIS, pp 88\u201399","DOI":"10.1007\/978-3-319-71368-7_8"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05833-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05833-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05833-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,6]],"date-time":"2024-05-06T10:50:39Z","timestamp":1714992639000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05833-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,23]]},"references-count":52,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["5833"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05833-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,23]]},"assertion":[{"value":"22 November 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}