{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:59:01Z","timestamp":1761649141005,"version":"3.27.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T00:00:00Z","timestamp":1679529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Fuzzy Syst."],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s40815-023-01496-z","type":"journal-article","created":{"date-parts":[[2023,3,23]],"date-time":"2023-03-23T02:02:27Z","timestamp":1679536947000},"page":"2187-2202","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Rule-Based Outlier Detection with a Modified Variational AutoEncoder for Enhancing Data Accuracy in Wireless Sensor Networks"],"prefix":"10.1007","volume":"25","author":[{"given":"S.","family":"Arul Jothi","sequence":"first","affiliation":[]},{"given":"R.","family":"Venkatesan","sequence":"additional","affiliation":[]},{"given":"V.","family":"Santhi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,23]]},"reference":[{"issue":"2","key":"1496_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.eij.2013.06.001","volume":"14","author":"A Fawzy","year":"2013","unstructured":"Fawzy, A., Mokhtar, H.M., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inform. J. 14(2), 157\u2013164 (2013). https:\/\/doi.org\/10.1016\/j.eij.2013.06.001","journal-title":"Egypt. Inform. J."},{"issue":"80","key":"1496_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-021-00469-z","volume":"8","author":"A Ur Rehman","year":"2021","unstructured":"Ur Rehman, A., Belhaouari, S.B.: Unsupervised outlier detection in multidimensional data. J. Big Data 8(80), 1\u201327 (2021). https:\/\/doi.org\/10.1186\/s40537-021-00469-z","journal-title":"J. Big Data"},{"issue":"8","key":"1496_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2017.080850","volume":"8","author":"T Zhang","year":"2017","unstructured":"Zhang, T., Zhao, Q., Shin, Y., Nakamoto, Y.: An unsupervised local outlier detection method for wireless sensor networks. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 8(8), 1\u20138 (2017). https:\/\/doi.org\/10.14569\/IJACSA.2017.080850","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"issue":"2","key":"1496_CR4","first-page":"172","volume":"10","author":"NM Zamry","year":"2018","unstructured":"Zamry, N.M., Zainal, A., Rassam, M.A.: Unsupervised anomaly detection for unlabelled wireless sensor networks data. Int. J. Adv. Soft Comput. Its Appl. 10(2), 172\u2013191 (2018)","journal-title":"Int. J. Adv. Soft Comput. Its Appl."},{"issue":"2","key":"1496_CR5","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.32604\/iasc.2022.020461","volume":"31","author":"AAA Alkhatib","year":"2022","unstructured":"Alkhatib, A.A.A., Abed-Al, Q.: Multivariate outlier detection for forest fire data aggregation accuracy. Intell. Autom. Soft Comput. 31(2), 1071\u20131087 (2022)","journal-title":"Intell. Autom. Soft Comput."},{"key":"1496_CR6","doi-asserted-by":"publisher","unstructured":"Luo, T., Nagarajan, S.G.: Distributed anomaly detection using autoencoder neural networks in WSN for IoT. In: 2018 IEEE international conference on communications (ICC), Kansas City, MO, USA, pp. 1\u20136. (2018). https:\/\/doi.org\/10.1109\/ICC.2018.8422402","DOI":"10.1109\/ICC.2018.8422402"},{"key":"1496_CR7","doi-asserted-by":"crossref","unstructured":"Chander, B., Kumaravelan: Outlier detection in wireless sensor networks with denoising autoencoder. In: Conference proceedings of 5th international conference on IoT & connected technologies, book chapter in advances in intelligent system & computing, Indian Institute of Technology (IIT), Patna, pp. 379\u2013388. (2020)","DOI":"10.1007\/978-3-030-76736-5_35"},{"key":"1496_CR8","unstructured":"Makhzani, A., Frey, B.: K sparse Autoencoders. arXiv, vol. 1312.5663. (2014)"},{"issue":"9","key":"1496_CR9","doi-asserted-by":"publisher","first-page":"4321","DOI":"10.1109\/TIP.2017.2713048","volume":"26","author":"W Lu","year":"2017","unstructured":"Lu, W., Cheng, Y., Xiao, C., Chang, S., Huang, S., Liang, B., Huang, T.: Unsupervised sequential outlier detection with deep architectures. IEEE Trans. Image Process. 26(9), 4321\u20134330 (2017)","journal-title":"IEEE Trans. Image Process."},{"key":"1496_CR10","doi-asserted-by":"crossref","unstructured":"Liao, W., Guo, Y., Chen, X., Li, P.: A unified unsupervised Gaussian mixture variational autoencoder for high dimensional outlier detection. In: IEEE conference on big data, pp. 1208\u20131217. (2018)","DOI":"10.1109\/BigData.2018.8622120"},{"key":"1496_CR11","doi-asserted-by":"publisher","first-page":"105187","DOI":"10.1016\/j.knosys.2019.105187","volume":"190","author":"X Wang","year":"2020","unstructured":"Wang, X., Du, Y., Lin, S., Cui, P., Shen, Y., Yang, Y.: adVAE: a self-adversarial VAE with Gaussian anomaly prior knowledge for anomaly detection. Knowl.-Based Syst. 190, 105187 (2020). https:\/\/doi.org\/10.1016\/j.knosys.2019.105187","journal-title":"Knowl.-Based Syst."},{"key":"1496_CR12","doi-asserted-by":"crossref","unstructured":"Pol, A.A., Berger, V., Germain, C., Cerminara, G., Pierini, M.: Anomaly detection with conditional variational autoencoders. In: 18th IEEE international conference on machine learning and applications (ICMLA), Florida, USA, pp. 1651\u20131657. (2019)","DOI":"10.1109\/ICMLA.2019.00270"},{"key":"1496_CR13","doi-asserted-by":"publisher","unstructured":"Zhang, C., Li, S., Zhang, H., Chen, Y.: VELC: a new variational autoencoder based model for time series anomaly detection (2019). arXiv. https:\/\/doi.org\/10.48550\/arxiv.1907.01702","DOI":"10.48550\/arxiv.1907.01702"},{"key":"1496_CR14","doi-asserted-by":"crossref","unstructured":"Ibrahim, B.I., Nicolae, D.C., Khan, A., Ali, S.I., Khattak, A.: VAE-GAN based zero-shot outlier detection. In: Proceedings of 2020 4th international symposium on computer science & intelligent control ACM, Newcastle University, UK, no. 4, pp. 1\u20135. (2020)","DOI":"10.1145\/3440084.3441180"},{"key":"1496_CR15","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1155\/2021\/7389943","volume":"2021","author":"C Zhang","year":"2021","unstructured":"Zhang, C., Liu, J., Chen, W., Shi, J., Yao, M., Yan, X., Xu, N., Chen, D.: Unsupervised anomaly detection based on deep autoencoding and clustering. Secur. Commun. Netw. 2021, 8 (2021). https:\/\/doi.org\/10.1155\/2021\/7389943","journal-title":"Secur. Commun. Netw."},{"key":"1496_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/s22176617","author":"W Gouda","year":"2022","unstructured":"Gouda, W., Tahir, S., Alanazi, S., Almufareh, M., Alwakid, G.: Unsupervised outlier detection in IOT using deep VAE. Sensors (2022). https:\/\/doi.org\/10.3390\/s22176617","journal-title":"Sensors"},{"key":"1496_CR17","doi-asserted-by":"publisher","first-page":"6679","DOI":"10.3390\/s21196679","volume":"19","author":"IT Nicholaus","year":"2021","unstructured":"Nicholaus, I.T., Park, J.R., Jung, K., Lee, J.S., Kang, D.K.: Anomaly detection of water level using deep autoencoder. Sensors 19, 6679 (2021). https:\/\/doi.org\/10.3390\/s21196679","journal-title":"Sensors"},{"issue":"6","key":"1496_CR18","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1016\/j.jpdc.2013.02.004","volume":"73","author":"H Kumarage","year":"2013","unstructured":"Kumarage, H., Khalil, I., Tari, Z., Zomaya, A.: Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modeling. J. Parallel Distrib. Comput. 73(6), 790\u2013806 (2013). https:\/\/doi.org\/10.1016\/j.jpdc.2013.02.004","journal-title":"J. Parallel Distrib. Comput."},{"key":"1496_CR19","first-page":"3515","volume":"9","author":"U Barakkath Nisha","year":"2015","unstructured":"Barakkath Nisha, U., Uma Maheswari, N., Venkatesh, R., Yasir Abdullah, R.: Improving data accuracy using proactive correlated fuzzy system in wireless sensor networks. KSII Trans. Internet Inf. Syst. 9, 3515\u20133538 (2015)","journal-title":"KSII Trans. Internet Inf. Syst."},{"issue":"2","key":"1496_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Van Den Hengel, A.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2021). https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput. Surv."},{"key":"1496_CR21","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436\u2013444 (2015)","journal-title":"Nature"},{"key":"1496_CR22","doi-asserted-by":"crossref","unstructured":"Zenati, H., Romain, M., Foo, C., Lecouat, B., Chandrasekhar, V.: Adversarially learned anomaly detection. In: Proceedings of the IEEE international conference on data mining, pp. 727\u2013736. (2018)","DOI":"10.1109\/ICDM.2018.00088"},{"key":"1496_CR23","unstructured":"Pidhorskyi, S., Almohsen, R., Doretto, G.: Generative probabilistic novelty detection with adversarial autoencoders. In: Advances in neural information processing systems, Curran Associates Inc., Red Hook, NY, USA, pp. 6823\u20136834. (2018)"},{"key":"1496_CR24","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2014a new baseline. In: Proceedings of the 2018 IEEE conference on computer vision and pattern recognition (CVPR 2018), Salt Lake City, UT, USA, pp. 6536\u20136545. (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"1496_CR25","doi-asserted-by":"crossref","unstructured":"Abati, D., Porrello, A., Calderara, S., Cucchiara, R.: Latent space autoregression for novelty detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR 2019), Long Beach, CA, USA, pp. 481\u2013490. (2019)","DOI":"10.1109\/CVPR.2019.00057"},{"key":"1496_CR26","doi-asserted-by":"crossref","unstructured":"Ye, M., Peng, X., Gan, W., Wu, W., Qiao, Y.: AnoPCN: video anomaly detection via deep predictive coding network. In: Proceedings of the 27th ACM international conference on multimedia (MM 2019), ACM: New York, NY, USA, pp. 1805\u20131813. (2019)","DOI":"10.1145\/3343031.3350899"},{"key":"1496_CR27","unstructured":"Golan, I., El-Yaniv, R.: Deep anomaly detection using geometric transformations. In: Proceedings of the annual conference on neural information processing systems (NeurIPS 2018), Curran Associates Inc.: Red Hook, NY, USA, pp. 9781\u20139791. (2019)"},{"key":"1496_CR28","unstructured":"Wang, S., Zeng, Y., Liu, X., Zhu, E., Yin, J. et al.: Effective end-to-end unsupervised outlier detection via inlier priority of discriminative network. In: Advances in neural information processing systems (NeurIPS 2019), Curran Associates Inc.: Red Hook, NY, USA, pp. 5960\u20135973. (2019)"},{"key":"1496_CR29","doi-asserted-by":"crossref","unstructured":"Yao, R., Liu, C., Zhang, L., Peng, P.: Unsupervised anomaly detection using variational auto-encoder based feature extraction. In: IEEE international conference on prognostics and health management (ICPHM), pp. 1\u20137. (2019)","DOI":"10.1109\/ICPHM.2019.8819434"},{"key":"1496_CR30","doi-asserted-by":"publisher","first-page":"199440","DOI":"10.1109\/ACCESS.2020.3034828","volume":"8","author":"A Asperti","year":"2020","unstructured":"Asperti, A., Trentin, M.: Balancing reconstruction error and Kullback-Leibler divergence in variational autoencoders. IEEE Access 8, 199440\u2013199448 (2020)","journal-title":"IEEE Access"},{"key":"1496_CR31","doi-asserted-by":"crossref","unstructured":"Ishibuchi, H., Nakashima, T., Kuroda, T.: A hybrid fuzzy GBML algorithm for designing compact fuzzy rule-based classification systems. In: Proceedings of IEEE international conference on fuzzy systems, San Antonio, TX, USA, pp. 706\u2013711. (2000)","DOI":"10.1109\/FUZZY.2000.839118"},{"issue":"3","key":"1496_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/72.846746","volume":"11","author":"S Mitra","year":"2000","unstructured":"Mitra, S., Hayashi, Y.: Neuro-fuzzy rule generation: survey in soft computing framework. IEEE Trans. Neural Networks 11(3), 1\u201320 (2000)","journal-title":"IEEE Trans. Neural Networks"},{"issue":"18","key":"1496_CR33","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.3390\/w13182507","volume":"13","author":"S Hajji","year":"2021","unstructured":"Hajji, S., Yahyaoui, N., Bousnina, S., Ben Brahim, F., Allouche, N., Faiedh, H., Bouri, S., Hachicha, W., Aljuaid, A.M.: Using a mamdani fuzzy inference system model (MFISM) for ranking groundwater quality in an agri-environmental context: case of the hammamet-nabeul shallow aquifer (Tunisia). Water 13(18), 2507 (2021)","journal-title":"Water"},{"key":"1496_CR34","unstructured":"IBRL dataset. http:\/\/db.csail.mit.edu\/labdata\/labdata.html. Accessed 30 May 2022"},{"key":"1496_CR35","doi-asserted-by":"crossref","unstructured":"Suthaharan, S., Alzahrani, M., Rajasegarar, S., Leckie, C., Palaniswami, M.: Labelled data collection for anomaly detection in wireless sensor networks. In: Intelligent sensors, sensor networks and information processing (ISSNIP), 2010 sixth international conference on. IEEE, Yantai, Shandong, China, pp. 269\u2013274. (2010)","DOI":"10.1109\/ISSNIP.2010.5706782"},{"key":"1496_CR36","unstructured":"SensorScope dataset: http:\/\/lcav.epfl.ch\/page-86035-en.html. Accessed 20 May 2022"},{"key":"1496_CR37","doi-asserted-by":"publisher","unstructured":"Torres, A., Adriano Filho, J., Rocha, A.R.D., Gondim, R.S. and Souza, J.N.D.: Outlier detection methods and sensor data fusion for precision agriculture. In: Anais do IX Simp\u00f3sio Brasileiro de Computa\u00e7\u00e3o Ub\u00edqua e Pervasiva, julho 06, S\u00e3o Paulo, Brasil, pp. 1\u201310. (2017). https:\/\/doi.org\/10.5753\/sbcup.2017.3316","DOI":"10.5753\/sbcup.2017.3316"},{"key":"1496_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_569","volume-title":"Encyclopedia of database systems","author":"PN Tan","year":"2009","unstructured":"Tan, P.N.: Receiver operating characteristic. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of database systems. Springer, Boston (2009). https:\/\/doi.org\/10.1007\/978-0-387-39940-9_569"},{"issue":"1","key":"1496_CR39","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10115-005-0233-6","volume":"11","author":"J Tang","year":"2006","unstructured":"Tang, J., Chen, Z., Fu, A.W., Cheung, D.W.: Capabilities of outlier detection schemes in large datasets, framework and methodologies. Knowl. Inf. Syst. 11(1), 45\u201384 (2006)","journal-title":"Knowl. Inf. Syst."},{"key":"1496_CR40","unstructured":"Huang, H., Mehrotra, K., Mohan, C.K.: Rank-based outlier detection. Electrical engineering and computer science\u2014technical reports, p. 47. (2011)"}],"container-title":["International Journal of Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-023-01496-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40815-023-01496-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40815-023-01496-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T21:34:39Z","timestamp":1729114479000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40815-023-01496-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,23]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1496"],"URL":"https:\/\/doi.org\/10.1007\/s40815-023-01496-z","relation":{},"ISSN":["1562-2479","2199-3211"],"issn-type":[{"type":"print","value":"1562-2479"},{"type":"electronic","value":"2199-3211"}],"subject":[],"published":{"date-parts":[[2023,3,23]]},"assertion":[{"value":"27 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2023","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Author's biography of the author \"S. Arul Jothi\" was published incorrectly and corrected in this version.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}