{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:11:58Z","timestamp":1773511918404,"version":"3.50.1"},"reference-count":23,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,1,28]],"date-time":"2022-01-28T00:00:00Z","timestamp":1643328000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1801751"],"award-info":[{"award-number":["1801751"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1956364"],"award-info":[{"award-number":["1956364"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1016\/j.hcc.2022.100050","type":"journal-article","created":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T21:47:06Z","timestamp":1644356826000},"page":"100050","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"title":["Informer: Irregular traffic detection for containerized microservices RPC in the real world"],"prefix":"10.1016","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0144-6376","authenticated-orcid":false,"given":"Jiyu","family":"Chen","sequence":"first","affiliation":[]},{"given":"Heqing","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2022.100050_bib0001","unstructured":"Kubernetes contributors. Kubernetes: production-grade container orchestration. https:\/\/kubernetes.io\/."},{"key":"10.1016\/j.hcc.2022.100050_bib0002","unstructured":"Docker Inc.. Docker: enterprise container platform. https:\/\/www.docker.com\/."},{"key":"10.1016\/j.hcc.2022.100050_bib0003","unstructured":"Henaff, M., Bruna, J., & LeCun, Y. (2015). Deep convolutional networks on graph-structured data. arXiv preprint arXiv:1506.05163."},{"key":"10.1016\/j.hcc.2022.100050_bib0004","article-title":"Search-convolutional neural networks","author":"Atwood","year":"2015","journal-title":"CoRR"},{"key":"10.1016\/j.hcc.2022.100050_bib0005","series-title":"Thirtieth AAAI Conference on Artificial Intelligence","article-title":"Deep neural networks for learning graph representations","author":"Cao","year":"2016"},{"key":"10.1016\/j.hcc.2022.100050_bib0006","series-title":"Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1225","article-title":"Structural deep network embedding","author":"Wang","year":"2016"},{"key":"10.1016\/j.hcc.2022.100050_bib0007","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., & Bengio, Y. (2017). Graph attention networks. arXiv preprint arXiv:1710.10903."},{"key":"10.1016\/j.hcc.2022.100050_bib0008","unstructured":"Zhang, J., Shi, X., Xie, J., Ma, H., King, I., & Yeung, D.-Y. (2018). GaAN: gated attention networks for learning on large and spatiotemporal graphs. arXiv preprint arXiv:1803.07294."},{"key":"10.1016\/j.hcc.2022.100050_bib0009","unstructured":"Li, Y., Yu, R., Shahabi, C., & Liu, Y. (2017). Diffusion convolutional recurrent neural network: data-driven traffic forecasting. arXiv preprint arXiv:1707.01926."},{"key":"10.1016\/j.hcc.2022.100050_bib0010","doi-asserted-by":"crossref","unstructured":"Yu, B., Yin, H., & Zhu, Z. (2017). Spatio-temporal graph convolutional networks: a deep learning framework for traffic forecasting. arXiv preprint arXiv:1709.04875.","DOI":"10.24963\/ijcai.2018\/505"},{"key":"10.1016\/j.hcc.2022.100050_bib0011","unstructured":"Szegedy, C., Zaremba, W., Sutskever, I., Bruna, J., Erhan, D., Goodfellow, I., & Fergus, R. (2013). Intriguing properties of neural networks. arXiv preprint arXiv:1312.6199."},{"key":"10.1016\/j.hcc.2022.100050_bib0012","doi-asserted-by":"crossref","unstructured":"Lin, Y.-C., Hong, Z.-W., Liao, Y.-H., Shih, M.-L., Liu, M.-Y., & Sun, M. (2017). Tactics of adversarial attack on deep reinforcement learning agents. arXiv preprint arXiv:1703.06748.","DOI":"10.24963\/ijcai.2017\/525"},{"key":"10.1016\/j.hcc.2022.100050_bib0013","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"1369","article-title":"Adversarial examples for semantic segmentation and object detection","author":"Xie","year":"2017"},{"key":"10.1016\/j.hcc.2022.100050_bib0014","series-title":"2018 IEEE Security and Privacy Workshops (SPW)","first-page":"36","article-title":"Adversarial examples for generative models","author":"Kos","year":"2018"},{"key":"10.1016\/j.hcc.2022.100050_bib0015","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"3601","article-title":"Seq2Sick: evaluating the robustness of sequence-to-sequence models with adversarial examples","volume":"vol.\u00a034","author":"Cheng","year":"2020"},{"key":"10.1016\/j.hcc.2022.100050_bib0016","doi-asserted-by":"crossref","unstructured":"Z\u00fcgner, D., & G\u00fcnnemann, S. (2019). Adversarial attacks on graph neural networks via meta learning. arXiv preprint arXiv:1902.08412.","DOI":"10.24963\/ijcai.2019\/872"},{"key":"10.1016\/j.hcc.2022.100050_bib0017","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X. et\u00a0al.. A density-based algorithm for discovering clusters in large spatial databases with noise."},{"key":"10.1016\/j.hcc.2022.100050_bib0018","unstructured":"Vijaymeena, M. K., & Kavitha, K. (2016). A survey on similarity measures in text mining."},{"key":"10.1016\/j.hcc.2022.100050_bib0019","unstructured":"Chung, J., Gulcehre, C., Cho, K., & Bengio, Y. (2014). Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555."},{"key":"10.1016\/j.hcc.2022.100050_bib0020","article-title":"Sequence to sequence learning with neural networks","author":"Sutskever","year":"2014","journal-title":"CoRR"},{"key":"10.1016\/j.hcc.2022.100050_bib0021","unstructured":"Madry, A., Makelov, A., Schmidt, L., Tsipras, D., & Vladu, A. (2017). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083."},{"key":"10.1016\/j.hcc.2022.100050_bib0022","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"39","article-title":"Towards evaluating the robustness of neural networks","author":"Carlini","year":"2017"},{"key":"10.1016\/j.hcc.2022.100050_bib0023","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"922","article-title":"Attention based spatial-temporal graph convolutional networks for traffic flow forecasting","volume":"vol.\u00a033","author":"Guo","year":"2019"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000022?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000022?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:40:14Z","timestamp":1757407214000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295222000022"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["S2667295222000022"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100050","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2022,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Informer: Irregular traffic detection for containerized microservices RPC in the real world","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100050","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100050"}}