{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T21:12:39Z","timestamp":1762377159536,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T00:00:00Z","timestamp":1650412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. Pervasive Comp. Interact."],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s42486-021-00075-1","type":"journal-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T07:02:32Z","timestamp":1650438152000},"page":"465-473","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A neural network approach for wireless spectrum anomaly\u00a0detection in 5G-unlicensed network"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9000-6198","authenticated-orcid":false,"given":"Haotian","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xiangtian","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Chengke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chenren","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Linghe","family":"Kong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,20]]},"reference":[{"key":"75_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Bajracharya R, Shrestha R, Jung H (2020) Future isunlicensed: Private 5g unlicensed network for con-necting industries of future. Sensors 20(10), https:\/\/doi.org\/10.3390\/s20102774, https:\/\/www.mdpi.com\/1424-8220\/20\/10\/2774","journal-title":"ACM Comput. Surv."},{"key":"75_CR2","doi-asserted-by":"publisher","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomalydetection: A survey. ACM Comput Surv 41. https:\/\/doi.org\/10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"},{"key":"75_CR3","unstructured":"Cheng Q, Shi Z, Nguyen DN, Dutkiewicz E (2019) Deeplearning network based spectrum sensing methods for ofdm systems. 1807.09414"},{"issue":"1","key":"75_CR4","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TCOMM.2006.887483","volume":"55","author":"FF Digham","year":"2007","unstructured":"Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. IEEE Trans. Commun. 55(1), 21\u201324 (2007). https:\/\/doi.org\/10.1109\/TCOMM.2006.887483","journal-title":"IEEE Trans. Commun."},{"key":"75_CR5","doi-asserted-by":"publisher","first-page":"3161","DOI":"10.1007\/s11227-017-2017-7","volume":"73","author":"Q Feng","year":"2017","unstructured":"Feng, Q., Zhang, Y., Li, C., Dou, Z., Wang, J.: Anomaly detection of spectrum in wireless communication via deep auto-encoders. J. Supercomput. 73, 3161\u20133178 (2017)","journal-title":"J. Supercomput."},{"key":"75_CR6","doi-asserted-by":"publisher","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","volume":"7","author":"M Hasan","year":"2019","unstructured":"Hasan, M., Islam, M.M., Zarif, M.I.I., Hashem, M.: Attack and anomaly detection in iot sensors in iot sites using machine learning approaches. Internet Things 7, 100059 (2019)","journal-title":"Internet Things"},{"issue":"3","key":"75_CR7","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TVT.2019.2891291","volume":"68","author":"W Lee","year":"2019","unstructured":"Lee, W., Kim, M., Cho, D.H.: Deep cooperative sensing: Cooperative spectrum sensing based on convolutional neural networks. IEEE Trans. Veh. Technol. 68(3), 3005\u20133009 (2019). https:\/\/doi.org\/10.1109\/TVT.2019.2891291","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"75_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/TCCN.2019.2899871","volume":"5","author":"WM Lees","year":"2019","unstructured":"Lees, W.M., Wunderlich, A., Jeavons, P.J., Hale, P.D., Souryal, M.R.: Deep learning classification of 3.5-ghz band spectrograms with applications to spectrum sensing. IEEE Trans. Cogn. Commun. Netw. 5(2), 224\u2013236 (2019). https:\/\/doi.org\/10.1109\/TCCN.2019.2899871","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"75_CR9","doi-asserted-by":"publisher","unstructured":"Li, Z., Chen, W., Pei, D.: Robust and unsupervised kpi anomaly detection based on conditional variational autoencoder. In: 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), pp. 1\u20139 (2018). https:\/\/doi.org\/10.1109\/PCCC.2018.8710885","DOI":"10.1109\/PCCC.2018.8710885"},{"key":"75_CR10","doi-asserted-by":"crossref","unstructured":"Liu, D., Zhao, Y., Xu, H., Sun, Y., Pei, D., Luo, J., Jing, X., Feng, M.: Opprentice: towards practical and automatic anomaly detection through machine learning. In: Proceedings of the 2015 Internet Measurement Conference (2015)","DOI":"10.1145\/2815675.2815679"},{"issue":"1","key":"75_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/TSP.2009.2029790","volume":"58","author":"J Lunden","year":"2010","unstructured":"Lunden, J., Kassam, S.A., Koivunen, V.: Robust nonparametric cyclic correlation-based spectrum sensing for cognitive radio. IEEE Trans. Signal Process. 58(1), 38\u201352 (2010). https:\/\/doi.org\/10.1109\/TSP.2009.2029790","journal-title":"IEEE Trans. Signal Process."},{"key":"75_CR12","doi-asserted-by":"crossref","unstructured":"Luo, Z., Wang, W., Qu, J., Jiang, T., Zhang, Q.: Shieldscatter: Improving iot security with backscatter assistance. In: Proceedings of the 16th ACM conference on embedded networked sensor systems (2018)","DOI":"10.1145\/3274783.3274841"},{"issue":"7","key":"75_CR33","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCOM.2019.1800663","volume":"57","author":"X Lu","year":"2019","unstructured":"Lu, X., Petrov, V., Moltchanov, D., Andreev, S., Mahmoodi, T., Dohler, M.: 5G-U: Conceptualizing Integrated Utilization of Licensed and Unlicensed Spectrum for Future IoT. IEEE Commun. Mag. 57(7), 92-98 (2019). https:\/\/doi.org\/10.1109\/MCOM.2019.1800663","journal-title":"IEEE Commun. Mag."},{"key":"75_CR34","doi-asserted-by":"publisher","first-page":"153027","DOI":"10.1109\/ACCESS.2020.3016036","volume":"8","author":"YL Naik","year":"2020","unstructured":"Naik, G., Park, J.M., Ashdown, J., Lehr, W.: Next Generation Wi-Fi and 5G NR-U in the 6 GHz Bands: Opportunities and Challenges. IEEE Access 8 153027\u2013153056 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3016036","journal-title":"IEEE Access"},{"key":"75_CR35","doi-asserted-by":"crossref","unstructured":"Nedelkoski, S., Cardoso, J. and Kao, O.: Anomaly detection from system tracing data using multimodal deep learning. In: 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), IEEE, pp 179\u2013186 (2019)","DOI":"10.1109\/CLOUD.2019.00038"},{"key":"75_CR13","unstructured":"O\u2019Shea, T., Clancy, T., McGwier, R.: Recurrent neural radio anomaly detection. arXiv:abs\/1611.00301 (2016)"},{"key":"75_CR14","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1088\/1674-1056\/23\/12\/128401","volume":"23","author":"Q Pei-Han","year":"2014","unstructured":"Pei-Han, Q., Zan, L., Jiang-Bo, S., Rui, G.: A robust power spectrum split cancellation-based spectrum sensing method for cognitive radio systems. Chin. Phys. B 23, 5 (2014). https:\/\/doi.org\/10.1088\/1674-1056\/23\/12\/128401","journal-title":"Chin. Phys. B"},{"key":"75_CR16","doi-asserted-by":"publisher","unstructured":"Rajendran, S., Meert, W., Lenders, V., Pollin, S.: Saife: Unsupervised wireless spectrum anomaly detection with interpretable features. In: 2018 IEEE international symposium on dynamic spectrum access networks (DySPAN), pp. 1\u20139. https:\/\/doi.org\/10.1109\/DySPAN.2018.8610471 (2018)","DOI":"10.1109\/DySPAN.2018.8610471"},{"key":"75_CR19","first-page":"291","volume":"4","author":"S Siripanadorn","year":"2010","unstructured":"Siripanadorn, S., Hattagam, W., Teaumroong, N.: Anomaly detection using self-organizing map and wavelets in wireless. Sensor Netw. 4, 291\u2013297 (2010)","journal-title":"Sensor Netw."},{"key":"75_CR500","doi-asserted-by":"publisher","unstructured":"Sun, D., Lu, S., Wang, W.: Caae: A novel wireless spectrum anomaly detection method with multiple scoring criterion. In: 2021 28th International Conference on Telecommunications (ICT), pp 1\u20135 (2021). https:\/\/doi.org\/10.1109\/ICT52184.2021.9511462","DOI":"10.1109\/ICT52184.2021.9511462"},{"key":"75_CR600","doi-asserted-by":"publisher","unstructured":"Tandiya, N., Jauhar, A., Marojevic, V., Reed, J.H.: Deep predictive coding neural network for rf anomaly detection in wireless networks. In: 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ICCW.2018.8403654","DOI":"10.1109\/ICCW.2018.8403654"},{"key":"75_CR21","doi-asserted-by":"publisher","unstructured":"Takianngam, S., Usaha, W.: Discrete wavelet transform and one-class support vector machines for anomaly detection in wireless sensor networks. In: 2011 international symposium on intelligent signal processing and communications systems (ISPACS), pp. 1\u20136. https:\/\/doi.org\/10.1109\/ISPACS.2011.6146181 (2011)","DOI":"10.1109\/ISPACS.2011.6146181"},{"key":"75_CR22","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.knosys.2017.02.023","volume":"123","author":"A Theissler","year":"2017","unstructured":"Theissler, A.: Detecting known and unknown faults in automotive systems using ensemble-based anomaly detection. Knowl.-Based Syst. 123, 163\u2013173 (2017). https:\/\/doi.org\/10.1016\/j.knosys.2017.02.023","journal-title":"Knowl.-Based Syst."},{"key":"75_CR23","doi-asserted-by":"publisher","unstructured":"Wang, Y., Wang, Z., Xie, Z., Zhao, N., Chen, J., Zhang, W., Sui, K., Pei, D.: Practical and white-box anomaly detection through unsupervised and active learning. In: 2020 29th international conference on computer communications and networks (ICCCN), pp. 1\u20139. https:\/\/doi.org\/10.1109\/ICCCN49398.2020.9209704 (2020)","DOI":"10.1109\/ICCCN49398.2020.9209704"},{"issue":"6","key":"75_CR36","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.eng.2020.07.017","volume":"7","author":"B Wang","year":"2021","unstructured":"Wang, B., Tao, F., Fang, X., Liu, C., Liu, Y., Freiheit, T.: Smart manufacturing and intelligent manufacturing: a comparative review. Engineering 7(6), 738\u2013757 (2021). https:\/\/doi.org\/10.1016\/j.eng.2020.07.017","journal-title":"Engineering"},{"key":"75_CR25","doi-asserted-by":"publisher","unstructured":"Xu, H., Chen, W., Zhao, N., Li, Z., Bu, J., Li, Z., Liu, Y., Zhao, Y., Pei, D., Feng, Y., Chen, J., Wang, Z., Qiao, H.: Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications. In: Proceedings of the 2018 World Wide Web Conference, International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, WWW \u201918, pp. 187\u2013196 (2018). https:\/\/doi.org\/10.1145\/3178876.3185996","DOI":"10.1145\/3178876.3185996"},{"key":"75_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1155\/2019\/2686378","volume":"2019","author":"X Xu","year":"2019","unstructured":"Xu, X., Liu, H., Yao, M.: Recent progress of anomaly detection. Complexity 2019, 5 (2019)","journal-title":"Complexity"},{"key":"75_CR27","doi-asserted-by":"publisher","unstructured":"Yang, P., Kong, L., Chen, G .: Spectrum sharing for 5g\/6g urllc: research frontiers and standards. In: IEEE communications standards magazine, pp. 1\u201312 (2021). https:\/\/doi.org\/10.1109\/MCOMSTD.001.2000054","DOI":"10.1109\/MCOMSTD.001.2000054"},{"issue":"3","key":"75_CR28","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TNSM.2019.2962701","volume":"17","author":"G Yu","year":"2020","unstructured":"Yu, G., Cai, Z., Wang, S., Chen, H., Liu, F., Liu, A.: Unsupervised online anomaly detection with parameter adaptation for kpi abrupt changes. IEEE Trans. Netw. Serv. Manage. 17(3), 1294\u20131308 (2020). https:\/\/doi.org\/10.1109\/TNSM.2019.2962701","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"5","key":"75_CR30","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2017.1700069","volume":"24","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Xiao, M., Wu, G., Alam, M., Liang, Y.C., Li, S.: A survey of advanced techniques for spectrum sharing in 5g networks. IEEE Wirel. Commun. 24(5), 44\u201351 (2017). https:\/\/doi.org\/10.1109\/MWC.2017.1700069","journal-title":"IEEE Wirel. Commun."},{"key":"75_CR31","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1049\/iet-com.2009.0389","volume":"4","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Zhang, Q., Wu, S.: Entropy-based robust spectrum sensing in cognitive radio. Commun. IET 4, 428\u2013436 (2010a). https:\/\/doi.org\/10.1049\/iet-com.2009.0389","journal-title":"Commun. IET"},{"issue":"6","key":"75_CR32","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/LCOMM.2010.06.091954","volume":"14","author":"YL Zhang","year":"2010","unstructured":"Zhang, Y.L., Zhang, Q.Y., Melodia, T.: A frequency-domain entropy-based detector for robust spectrum sensing in cognitive radio networks. IEEE Commun. Lett. 14(6), 533\u2013535 (2010b). https:\/\/doi.org\/10.1109\/LCOMM.2010.06.091954","journal-title":"IEEE Commun. Lett."}],"container-title":["CCF Transactions on Pervasive Computing and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-021-00075-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42486-021-00075-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42486-021-00075-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T21:28:16Z","timestamp":1671139696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42486-021-00075-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,20]]},"references-count":32,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["75"],"URL":"https:\/\/doi.org\/10.1007\/s42486-021-00075-1","relation":{},"ISSN":["2524-521X","2524-5228"],"issn-type":[{"type":"print","value":"2524-521X"},{"type":"electronic","value":"2524-5228"}],"subject":[],"published":{"date-parts":[[2022,4,20]]},"assertion":[{"value":"1 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}