{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T08:44:33Z","timestamp":1769589873799,"version":"3.49.0"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T00:00:00Z","timestamp":1683676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,10]],"date-time":"2023-05-10T00:00:00Z","timestamp":1683676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271499"],"award-info":[{"award-number":["62271499"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971432"],"award-info":[{"award-number":["61971432"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62022092"],"award-info":[{"award-number":["62022092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program","award":["2020-JCJQ-QT-011"],"award-info":[{"award-number":["2020-JCJQ-QT-011"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s11276-023-03353-1","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T09:32:36Z","timestamp":1683797556000},"page":"3051-3061","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Flight data outlier detection by constrained LSTM-autoencoder"],"prefix":"10.1007","volume":"29","author":[{"given":"Long","family":"Gao","sequence":"first","affiliation":[]},{"given":"Congan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fengqin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,10]]},"reference":[{"issue":"1","key":"3353_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TSMCC.2008.2007248","volume":"39","author":"S Budalakoti","year":"2009","unstructured":"Budalakoti, S., Srivastava, A. N., & Otey, M. E. (2009). Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety. IEEE Transactions on Systems Man and Cybernetics Part C, 39(1), 101\u2013113.","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part C"},{"key":"3353_CR2","doi-asserted-by":"crossref","unstructured":"Matthews, B., Srivsatava, A.N., Schade, J., Schleicher, D.R., & Kiniry, M. (2013). Discovery of abnormal flight patterns in flight track data. In: 2013 Aviation Technology, Integration, and Operations Conference.","DOI":"10.2514\/6.2013-4386"},{"issue":"9","key":"3353_CR3","first-page":"587","volume":"12","author":"L Li","year":"2015","unstructured":"Li, L., Das, S., Hansman, R. J., Palacios, R., & Srivastava, A. N. (2015). Analysis of flight data using clustering techniques for detecting abnormal operations. Journal of Aerospace Computing, Information, and Communication, 12(9), 587\u2013598.","journal-title":"Journal of Aerospace Computing, Information, and Communication"},{"key":"3353_CR4","doi-asserted-by":"crossref","unstructured":"Bay, S.D., & Schwabacher, M. (2003). Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the Ninth ACM SIGKDD international conference on knowledge discovery and data mining (KDD-2003)","DOI":"10.1145\/956750.956758"},{"key":"3353_CR5","unstructured":"Olkopf, B.S., Williamson, R., Smola, A., Shawe-Taylor, J., & Platt, J. (2000). Support vector method for novelty detection. In: Advances in Neural Information Processing Systems."},{"key":"3353_CR6","doi-asserted-by":"crossref","unstructured":"Tax, D., & Duin, R. (1999). Support vector domain description. Pattern recognition letters.","DOI":"10.1016\/S0167-8655(99)00087-2"},{"key":"3353_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"62","author":"SM Erfani","year":"2016","unstructured":"Erfani, S. M., Rajasegarar, S., Karunasekera, S., & Leckie, C. (2016). High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recognition, 62, 121\u2013134.","journal-title":"Pattern Recognition"},{"key":"3353_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ast.2017.11.043","volume":"73","author":"V Camerini","year":"2018","unstructured":"Camerini, V., Coppotelli, G., & Bendisch, S. (2018). Fault detection in operating helicopter drivetrain components based on support vector data description. Aerospace Science and Technology, 73, 48\u201360.","journal-title":"Aerospace Science and Technology"},{"key":"3353_CR9","first-page":"11053","volume":"24","author":"L Ruff","year":"2018","unstructured":"Ruff, L., Vandermeulen, R. A., G\u00f6rnitz, N., Deecke, L., & Kloft, M. (2018). Deep one-class classification. International Conference on Machine Learning, 24, 11053.","journal-title":"International Conference on Machine Learning"},{"key":"3353_CR10","first-page":"700","volume":"85","author":"G Rong-Xiao","year":"2021","unstructured":"Rong-Xiao, G. (2021). Anomaly detection method for UAV sensor data based on LSTM\u2013OCSVM. Journal of Chinese Computer Systems, 85, 700\u2013705.","journal-title":"Journal of Chinese Computer Systems"},{"issue":"9","key":"3353_CR11","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cja.2021.08.016","volume":"35","author":"Y Tu","year":"2022","unstructured":"Tu, Y., Lin, Y., Zha, H., Zhang, J., Wang, Y., Gui, G., & Mao, S. (2022). Large-scale real-world radio signal recognition with deep learning. Chinese Journal of Aeronautics, 35(9), 35\u201348.","journal-title":"Chinese Journal of Aeronautics"},{"issue":"11","key":"3353_CR12","doi-asserted-by":"publisher","first-page":"9012","DOI":"10.1109\/JIOT.2021.3120197","volume":"9","author":"Z Bao","year":"2022","unstructured":"Bao, Z., Lin, Y., Zhang, S., Li, Z., & Mao, S. (2022). Threat of adversarial attacks on dl-based IoT device identification. IEEE Internet of Things Journal, 9(11), 9012\u20139024. https:\/\/doi.org\/10.1109\/JIOT.2021.3120197","journal-title":"IEEE Internet of Things Journal"},{"key":"3353_CR13","doi-asserted-by":"publisher","first-page":"10968","DOI":"10.1002\/int.23029","volume":"37","author":"S Liu","year":"2022","unstructured":"Liu, S., Li, Y., & Fu, W. (2022). Human-centered attention-aware networks for action recognition. International Journal of Intelligent Systems, 37, 10968\u201310987.","journal-title":"International Journal of Intelligent Systems"},{"key":"3353_CR14","first-page":"15","volume":"7","author":"Q Wu","year":"2018","unstructured":"Wu, Q., Li, Y., Lin, Y., & Zhou, R. (2018). Weighted sparse image classification based on low rank representation. CMC Computer Materials Continua, 7, 15.","journal-title":"CMC Computer Materials Continua"},{"key":"3353_CR15","doi-asserted-by":"crossref","unstructured":"Luo, W., Wen, L., & Gao, S. (2017). Remembering history with convolutional LSTM for anomaly detection. In: 2017 IEEE International conference on multimedia and expo (ICME)","DOI":"10.1109\/ICME.2017.8019325"},{"key":"3353_CR16","unstructured":"Shabtai, A., & Habler, I. Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages"},{"issue":"11","key":"3353_CR17","first-page":"452","volume":"40","author":"D Jianli","year":"2019","unstructured":"Jianli, D., Yunkai, Z., Jing, W., & Huaichao, W. (2019). Ads-b anomaly data detection model based on deep learning. Acta Aeronautica et Astronautica Sinica, 40(11), 452.","journal-title":"Acta Aeronautica et Astronautica Sinica"},{"key":"3353_CR18","first-page":"71","volume":"1","author":"J Zhong","year":"2022","unstructured":"Zhong, J., Zhang, Y., Wang, J., Luo, C., & Miao, Q. (2022). Unmanned aerial vehicle flight data anomaly detection and recovery prediction based on spatio-temporal correlation. IEEE Transactions on Reliability, 1, 71.","journal-title":"IEEE Transactions on Reliability"},{"key":"3353_CR19","unstructured":"Reddy, K.K., Sarkar, S., Venugopalan, V., & Giering, M. (2016). Anomaly detection and fault disambiguation in large flight data: A multi-modal deep auto-encoder approach. In: Annual Conference of the PHM Society."},{"key":"3353_CR20","doi-asserted-by":"crossref","unstructured":"Wang, X., Du, Y., Lin, S., Cui, P., Shen, Y., Yang, Y. (2019). Self-adversarial variational autoencoder with gaussian anomaly prior distribution for anomaly detection.","DOI":"10.1016\/j.knosys.2019.105187"},{"key":"3353_CR21","unstructured":"Donahue, J., Krhenb\u00fchl, P., & Darrell, T. (2016). Adversarial feature learning."},{"key":"3353_CR22","first-page":"264","volume":"45","author":"WL Wang Fengqin","year":"2022","unstructured":"Wang Fengqin, W. L., & Long, G. (2022). UAV flight data anomaly detection algorithm based on LSTM\u2013GAN. Journal of Chinese Inertial Technology, 45, 264\u2013271.","journal-title":"Journal of Chinese Inertial Technology"},{"key":"3353_CR23","doi-asserted-by":"publisher","first-page":"106878","DOI":"10.1016\/j.knosys.2021.106878","volume":"785","author":"MEA-C Villa-Peacuterez","year":"2021","unstructured":"Villa-Peacuterez, M.E.A.-C. (2021). Semi-supervised anomaly detection algorithms: A comparative summary and future research directions. Knowledge-Based Systems, 785, 106878.","journal-title":"Knowledge-Based Systems"},{"key":"3353_CR24","doi-asserted-by":"publisher","first-page":"04022085","DOI":"10.1061\/(ASCE)AS.1943-5525.0001485","volume":"35","author":"Y Zhu","year":"2022","unstructured":"Zhu, Y., Du, C., Liu, Z., Chen, Y.-B., & Zhao, Y. (2022). A turboshaft aeroengine fault detection method based on one-class support vector machine and transfer learning. Journal of Aerospace Engineering, 35, 04022085.","journal-title":"Journal of Aerospace Engineering"},{"key":"3353_CR25","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Liu, R., Le, N., & Zheng, Y. (2019). A method for the outlier flights detection of the final approach based on foqa data. In: 2019 IEEE 1st international conference on civil aviation safety and information technology (ICCASIT).","DOI":"10.1109\/ICCASIT48058.2019.8973186"},{"key":"3353_CR26","first-page":"932","volume":"35","author":"SWJTF Zhanping","year":"2014","unstructured":"Zhanping, S. W. J. T. F. (2014). Flight data novelty detection method based on improved SVDD. Chinese Journal of Scientific Instrument, 35, 932\u2013939.","journal-title":"Chinese Journal of Scientific Instrument"},{"issue":"15","key":"3353_CR27","doi-asserted-by":"publisher","first-page":"5681","DOI":"10.3390\/s22155681","volume":"22","author":"L Kou","year":"2022","unstructured":"Kou, L., Chen, J., & Qin, Y. (2022). The robust multi-scale deep-SVDD model for anomaly online detection of rolling bearings. Sensors, 22(15), 5681.","journal-title":"Sensors"},{"key":"3353_CR28","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2021.04.089","volume":"453","author":"Y Zhou","year":"2021","unstructured":"Zhou, Y., Liang, X., Zhang, W., Zhang, L., & Song, X. (2021). VAE-based deep SVDD for anomaly detection. Neurocomputing, 453, 131.","journal-title":"Neurocomputing"},{"key":"3353_CR29","first-page":"1","volume":"99","author":"Y Ji","year":"2020","unstructured":"Ji, Y., Wang, L., Wu, W., Shao, H., & Feng, Y. (2020). A method for LSTM-based trajectory modelling and abnormal trajectory detection. IEEE Access, 99, 1\u20131.","journal-title":"IEEE Access"},{"issue":"2","key":"3353_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102405","volume":"109","author":"A Fried","year":"2021","unstructured":"Fried, A., & Last, M. (2021). Facing airborne attacks on ADS-b data with autoencoders. Computers and Security, 109(2), 102405.","journal-title":"Computers and Security"},{"key":"3353_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2022.107726","volume":"127","author":"W Zhang","year":"2022","unstructured":"Zhang, W., Hu, M., & Du, J. (2022). An end-to-end framework for flight trajectory data analysis based on deep autoencoder network. Aerospace Science and Technology, 127, 107726.","journal-title":"Aerospace Science and Technology"},{"key":"3353_CR32","doi-asserted-by":"crossref","unstructured":"Memarzadeh, M., Matthews, B., & Avrekh, I. (2020). Unsupervised anomaly detection in flight data using convolutional variational auto-encoder.","DOI":"10.3390\/aerospace7080115"},{"key":"3353_CR33","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.ins.2022.11.076","volume":"619","author":"S Liu","year":"2022","unstructured":"Liu, S., Gao, P., Li, Y., Fu, W., & Ding, W. (2022). Multi-modal fusion network with complementarity and importance for emotion recognition. Information Sciences, 619, 679\u2013694.","journal-title":"Information Sciences"},{"key":"3353_CR34","doi-asserted-by":"crossref","unstructured":"Novitasari, S., Do, Q.T., Sakti, S., Lestari, D., & Nakamura, S. (2018). Multi-modal multi-task deep learning for speaker and emotion recognition of tv-series data. In: 2018 Oriental COCOSDA\u2014international conference on speech database and assessments.","DOI":"10.1109\/ICSDA.2018.8693020"},{"key":"3353_CR35","first-page":"452","volume":"1","author":"H Xing","year":"2022","unstructured":"Xing, H., Xiao, Z., Qu, R., Zhu, Z., & Zhao, B. (2022). An efficient federated distillation learning system for multi-task time series classification. IEEE Transactions on Instrumentation and Measurement, 1, 452.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"3353_CR36","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ins.2020.12.062","volume":"555","author":"C Ling","year":"2021","unstructured":"Ling, C., Donghui, C., Fan, Y., & Jianling, S. (2021). A deep multi-task representation learning method for time series classification and retrieval. Information Sciences, 555, 17\u201332.","journal-title":"Information Sciences"},{"key":"3353_CR37","first-page":"1","volume":"12","author":"X Fu","year":"2023","unstructured":"Fu, X., Peng, Y., Liu, Y., Lin, Y., Gui, G., Gacanin, H., & Adachi, F. (2023). Semi-supervised specific emitter identification method using metric-adversarial training. IEEE Internet of Things Journal, 12, 1\u20131.","journal-title":"IEEE Internet of Things Journal"},{"key":"3353_CR38","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TSTE.2019.2897136","volume":"11","author":"Q Zhu","year":"2020","unstructured":"Zhu, Q., Chen, J., Shi, D., Zhu, L., Bai, X., Duan, X., & Liu, Y. (2020). Learning temporal and spatial correlations jointly: A unified framework for wind speed prediction. IEEE Transactions on Sustainable Energy, 11, 509\u2013523.","journal-title":"IEEE Transactions on Sustainable Energy"},{"issue":"4","key":"3353_CR39","first-page":"1","volume":"38","author":"Q Wu","year":"2019","unstructured":"Wu, Q., Li, Y., & Lin, Y. (2019). Medical image restoration method via multiple nonlocal prior constraints. Journal of Intelligent and Fuzzy Systems, 38(4), 1\u201315.","journal-title":"Journal of Intelligent and Fuzzy Systems"},{"key":"3353_CR40","doi-asserted-by":"publisher","first-page":"107548","DOI":"10.1016\/j.knosys.2021.107548","volume":"233","author":"L Zheng","year":"2021","unstructured":"Zheng, L., Hongzhi, W., Xiaoou, D., & Tianyu, M. (2021). Industrial time series determinative anomaly detection based on constraint hypergraph. Knowledge-Based Systems, 233, 107548.","journal-title":"Knowledge-Based Systems"},{"issue":"3","key":"3353_CR41","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103498","volume":"131","author":"B Lindemann","year":"2021","unstructured":"Lindemann, B., Maschler, B., Sahlab, N., & Weyrich, M. (2021). A survey on anomaly detection for technical systems using LSTM networks. Computers in Industry, 131(3), 103498.","journal-title":"Computers in Industry"},{"issue":"10","key":"3353_CR42","doi-asserted-by":"publisher","first-page":"4568","DOI":"10.1140\/epjst\/e2019-900046-x","volume":"228","author":"K Smagulova","year":"2019","unstructured":"Smagulova, K., & James, A. P. (2019). A survey on LSTM memristive neural network architectures and applications. The European Physical Journal Special Topics, 228(10), 4568.","journal-title":"The European Physical Journal Special Topics"},{"key":"3353_CR43","doi-asserted-by":"publisher","first-page":"1408","DOI":"10.3390\/e22121408","volume":"22","author":"BC Geiger","year":"2020","unstructured":"Geiger, B. C., & Kubin, G. (2020). Information bottleneck: Theory and applications in deep learning. Entropy (Basel, Switzerland), 22, 1408.","journal-title":"Entropy (Basel, Switzerland)"},{"key":"3353_CR44","unstructured":"Chollet, F. (2015). Keras. https:\/\/keras.io."},{"key":"3353_CR45","volume-title":"Tensorflow: A system for large-scale machine learning","author":"M Abadi","year":"2016","unstructured":"Abadi, M., Barham, P., Chen, J., Chen, Z., & Zhang, X. (2016). Tensorflow: A system for large-scale machine learning. USENIX Association."},{"key":"3353_CR46","unstructured":"Kingma, D.P., & Ba, J. (2014). Adam: A method for stochastic optimization. CoRR abs\/1412.6980."},{"issue":"19","key":"3353_CR47","doi-asserted-by":"publisher","first-page":"19438","DOI":"10.1109\/JIOT.2022.3167107","volume":"9","author":"C Hou","year":"2022","unstructured":"Hou, C., Liu, G., Tian, Q., Zhou, Z., Hua, L., & Lin, Y. (2022). Multisignal modulation classification using sliding window detection and complex convolutional network in frequency domain. IEEE Internet of Things Journal, 9(19), 19438\u201319449.","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03353-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-023-03353-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-023-03353-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T12:14:48Z","timestamp":1695298488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-023-03353-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,10]]},"references-count":47,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["3353"],"URL":"https:\/\/doi.org\/10.1007\/s11276-023-03353-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,10]]},"assertion":[{"value":"4 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing financial interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}