{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:59Z","timestamp":1740123839561,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T00:00:00Z","timestamp":1677110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the project of 2021 Guangdong Province Science and Technology Special Funds Competitive Distribution","award":["2021A05237"],"award-info":[{"award-number":["2021A05237"]}]},{"name":"the project Enhancing School with Innovation of Guangdong Ocean University\u2019s","award":["230420023","080507112201"],"award-info":[{"award-number":["230420023","080507112201"]}]},{"name":"the program for scientific research start-up funds of Guangdong Ocean University","award":["R20065"],"award-info":[{"award-number":["R20065"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11276-023-03270-3","type":"journal-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T09:03:56Z","timestamp":1677143036000},"page":"3027-3037","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A target behavior pattern mining and abnormal behavior monitoring based on multidimensional similarity metric"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2485-1339","authenticated-orcid":false,"given":"Chang","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhuo","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yonghao","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8931-1977","authenticated-orcid":false,"given":"Ruslan","family":"Antypenko","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,2,23]]},"reference":[{"issue":"13","key":"3270_CR1","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1016\/j.comnet.2006.05.001","volume":"50","author":"IF Akyildiz","year":"2006","unstructured":"Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation\/dynamic spectrum access\/cognitive radio wireless networks: a survey. Computer Networks, 50(13), 2127\u20132159. https:\/\/doi.org\/10.1016\/j.comnet.2006.05.001","journal-title":"Computer Networks"},{"issue":"1","key":"3270_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.engappai.2010.09.007","volume":"24","author":"TC Fu","year":"2011","unstructured":"Fu, T. C. (2011). A review on time series data mining. Engineering Applications of Artificial Intelligence, 24(1), 164\u2013181. https:\/\/doi.org\/10.1016\/j.engappai.2010.09.007","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"10","key":"3270_CR3","doi-asserted-by":"publisher","first-page":"2144","DOI":"10.1109\/LCOMM.2018.2861008","volume":"22","author":"H Eltom","year":"2018","unstructured":"Eltom, H., Kandeepan, S., & Liang, Y.-C. (2018). Cooperative soft fusion for hmm-based spectrum occupancy prediction. IEEE Communications Letters, 22(10), 2144\u20132147. https:\/\/doi.org\/10.1109\/LCOMM.2018.2861008","journal-title":"IEEE Communications Letters"},{"key":"3270_CR4","doi-asserted-by":"publisher","unstructured":"Wang, Z. & Salous, S. (2008). Time series arima model of spectrum occupancy for cognitive radio. Cognitive Radio and Software Defined Radios: Technologies and Techniques, 2008 IET Seminar on. IET. https:\/\/doi.org\/10.1049\/ic:20080405","DOI":"10.1049\/ic:20080405"},{"key":"3270_CR5","doi-asserted-by":"publisher","unstructured":"Melian-Gutierrez, L., Zazo, S., Blanco-Murillo, J. L., Perez-Alvarez, I., Garcia-Rodriguez, A. & Perez-Diaz, B. (2013). Hf spectrum activity prediction model based on hmm for cognitive radio applications. Physical Communication, 9(DEC.), 199\u2013211. https:\/\/doi.org\/10.1016\/j.phycom.2012.09.004","DOI":"10.1016\/j.phycom.2012.09.004"},{"key":"3270_CR6","doi-asserted-by":"publisher","unstructured":"Huang, P., Liu, C. J., Xiao, L. & Chen, J. (2012). Wireless spectrum occupancy prediction based on partial periodic pattern mining. In: IEEE International Symposium on Modeling, 51\u201358. https:\/\/doi.org\/10.1109\/TPDS.2013.283","DOI":"10.1109\/TPDS.2013.283"},{"key":"3270_CR7","doi-asserted-by":"publisher","unstructured":"Yu, C. J., He, Y. Y. & Quan, T. F. (2008). Frequency spectrum prediction method based on EMD and SVR. In: Eighth International Conference on Intelligent Systems Design & Applications. IEEE Computer Society. 39\u201344. https:\/\/doi.org\/10.1109\/ISDA.2008.287","DOI":"10.1109\/ISDA.2008.287"},{"issue":"19","key":"3270_CR8","doi-asserted-by":"publisher","first-page":"5805","DOI":"10.1007\/s00500-016-2158-2","volume":"21","author":"S Saba","year":"2017","unstructured":"Saba, S., Ahsan, F., & Mohsin, S. (2017). BAT-ANN based earthquake prediction for Pakistan region. Soft Computing, 21(19), 5805\u20135813. https:\/\/doi.org\/10.1007\/s00500-016-2158-2","journal-title":"Soft Computing"},{"issue":"9","key":"3270_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cja.2021.08.016","volume":"35","author":"A Yt","year":"2022","unstructured":"Yt, A., Yun, L. A., Hz, A., Ju, Z. B., Yu, W. C., Guan, G. C., et al. (2022). Large-scale real-world radio signal recognition with deep learning. Chinese Journal of Aeronautics, 35(9), 35\u201348. https:\/\/doi.org\/10.1016\/j.cja.2021.08.016","journal-title":"Chinese Journal of Aeronautics"},{"key":"3270_CR10","doi-asserted-by":"publisher","unstructured":"Lin, Y., Tu, Y., Dou, Z., Chen, L. & Mao, S. (2020). Contour stella image and deep learning for signal recognition in the physical layer. In: IEEE Transactions on Cognitive Communications and Networking, PP(99), 1\u20131. https:\/\/doi.org\/10.1109\/TCCN.2020.3024610","DOI":"10.1109\/TCCN.2020.3024610"},{"issue":"4","key":"3270_CR11","first-page":"1","volume":"16","author":"MA Arjomand","year":"2016","unstructured":"Arjomand, M. A., Mahmoudi, J., Rezaei, M., & Mohammadi, M. H. (2016). The earthquake magnitude prediction using multilayer perceptron neural network. Modares Civil Engineering journal, 16(4), 1\u20138.","journal-title":"Modares Civil Engineering journal"},{"key":"3270_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2016.7531576","author":"L Cao","year":"2016","unstructured":"Cao, L., & Liu, X. (2016). An improved PSO-BP neural network and its application to earthquake prediction. Control & Decision Conference. https:\/\/doi.org\/10.1109\/CCDC.2016.7531576","journal-title":"Control & Decision Conference"},{"issue":"11","key":"3270_CR13","doi-asserted-by":"publisher","first-page":"9012","DOI":"10.1109\/JIOT.2021.3120197","volume":"9","author":"Z Bao","year":"2021","unstructured":"Bao, Z., Lin, Y., Zhang, S., Li, Z., & Mao, S. (2021). Threat of adversarial attacks on DL-based IoT device identification. IEEE Internet of Things Journal, 9(11), 9012\u20139024. https:\/\/doi.org\/10.1109\/JIOT.2021.3120197","journal-title":"IEEE Internet of Things Journal"},{"key":"3270_CR14","doi-asserted-by":"publisher","first-page":"2316","DOI":"10.1109\/TSP.2021.3070186","volume":"69","author":"Y Dong","year":"2021","unstructured":"Dong, Y., Jiang, X., Zhou, H., Lin, Y., & Shi, Q. (2021). Sr2cnn: Zero-shot learning for signal recognition. IEEE Transactions on Signal Processing, 69, 2316\u20132329. https:\/\/doi.org\/10.1109\/TSP.2021.3070186","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"3270_CR15","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1111\/j.1467-8667.2009.00595.x","volume":"24","author":"A Panakkat","year":"2010","unstructured":"Panakkat, A., & Adeli, H. (2010). Recurrent neural network for approximate earthquake time and location prediction using multiple seismicity indicators. Computer-Aided Civil and Infrastructure Engineering, 24(4), 280\u2013292. https:\/\/doi.org\/10.1111\/j.1467-8667.2009.00595.x","journal-title":"Computer-Aided Civil and Infrastructure Engineering"},{"issue":"10","key":"3270_CR16","doi-asserted-by":"publisher","first-page":"7128","DOI":"10.1109\/JIOT.2021.3077600","volume":"9","author":"S Wang","year":"2021","unstructured":"Wang, S., Liu, X., Liu, S., Muhammad, K., Heidari, A. A., Del Ser, J., & de Albuquerque, V. H. C. (2021). Human short long-term cognitive memory mechanism for visual monitoring in IoT-assisted smart cities. IEEE Internet of Things Journal, 9(10), 7128\u20137139. https:\/\/doi.org\/10.1109\/JIOT.2021.3077600","journal-title":"IEEE Internet of Things Journal"},{"issue":"8B","key":"3270_CR17","doi-asserted-by":"publisher","first-page":"6179","DOI":"10.1016\/j.jksuci.2021.07.014","volume":"34","author":"X Liu","year":"2021","unstructured":"Liu, X., Chen, S., Song, L., Woniak, M., & Liu, S. (2021). Self-attention negative feedback network for real-time image super-resolution. Journal of King Saud University Computer and Information Sciences, 34(8B), 6179\u20136186. https:\/\/doi.org\/10.1016\/j.jksuci.2021.07.014","journal-title":"Journal of King Saud University Computer and Information Sciences"},{"key":"3270_CR18","doi-asserted-by":"publisher","unstructured":"Tan, W., Fang, X., Zhao, L., & Tang, A. (2018). Anomaly detection algorithm based on cluster of entropy. In: CCF Conference on Computer Supported Cooperative Work and Social Computing (pp. 359\u2013370). Springer, Singapore. https:\/\/doi.org\/10.1007\/978-981-13-3044-5_2","DOI":"10.1007\/978-981-13-3044-5_2"},{"key":"3270_CR19","doi-asserted-by":"publisher","unstructured":"Liu, X. , Shi, R. , Hee, B. , & Chen, M. . (2019). Detection on abnormal usage of spectrum by electromagnetic data mining. In: 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA). IEEE, 182\u2013187. https:\/\/doi.org\/10.1109\/ICBDA.2019.8713186","DOI":"10.1109\/ICBDA.2019.8713186"},{"issue":"7","key":"3270_CR20","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1109\/LWC.2021.3074135","volume":"10","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Xiong, J., Zhang, X., Liu, X., & Wei, J. (2021). A radio anomaly detection algorithm based on modified generative adversarial network. IEEE Wireless Communications Letters, 10(7), 1552\u20131556. https:\/\/doi.org\/10.1109\/LWC.2021.3074135","journal-title":"IEEE Wireless Communications Letters"},{"key":"3270_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3167107","author":"C Hou","year":"2022","unstructured":"Hou, C., Liu, G., Tian, Q., Zhou, Z., Hua, L., & Lin, Y. (2022). Multi-signal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2022.3167107","journal-title":"IEEE Internet of Things Journal"},{"issue":"11","key":"3270_CR22","doi-asserted-by":"publisher","first-page":"1770","DOI":"10.3390\/electronics11111770","volume":"11","author":"C Peng","year":"2022","unstructured":"Peng, C., Hu, W., & Wang, L. (2022). Spectrum anomaly detection based on spatio-temporal network prediction. Electronics, 11(11), 1770. https:\/\/doi.org\/10.3390\/electronics11111770","journal-title":"Electronics"},{"key":"3270_CR23","doi-asserted-by":"publisher","unstructured":"Li, K., Liu, Z., He, S. & Chen, J. (2019). TF2AN: A temporal-frequency fusion attention network for spectrum energy level prediction. In: 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). IEEE. 1\u20139. 4. 22. https:\/\/doi\/https:\/\/doi.org\/10.1109\/SAHCN.2019.8824794","DOI":"10.1109\/SAHCN.2019.8824794"},{"key":"3270_CR24","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ymssp.2015.04.017","volume":"76","author":"L Montechiesi","year":"2016","unstructured":"Montechiesi, L., Cocconcelli, M., & Rubini, R. (2016). Artificial immune system via euclidean distance minimization for anomaly detection in bearings. Mechanical Systems & Signal Processing, 76, 380\u2013393. https:\/\/doi.org\/10.1016\/j.ymssp.2015.04.017","journal-title":"Mechanical Systems & Signal Processing"},{"issue":"1","key":"3270_CR25","first-page":"1929","volume":"15","author":"N Srivastava","year":"2014","unstructured":"Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R. (2014). Dropout: A simple way to prevent neural networks from overfitting. Journal of Machine Learning Research, 15(1), 1929\u20131958.","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"3270_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Computing Surveys"},{"key":"3270_CR27","doi-asserted-by":"publisher","unstructured":"Rajendran, S., Meert, W., Lenders, V. & Pollin, S. (2018). SAIFE: Unsupervised wireless spectrum anomaly detection with interpretable features.In: IEEE, https:\/\/doi.org\/10.1109\/DySPAN.2018.8610471.","DOI":"10.1109\/DySPAN.2018.8610471"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03270-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03270-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03270-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T12:13:47Z","timestamp":1695298427000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03270-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,23]]},"references-count":27,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["3270"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03270-3","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2023,2,23]]},"assertion":[{"value":"30 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}