{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T10:26:46Z","timestamp":1776940006366,"version":"3.51.4"},"reference-count":124,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":329,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>Almost 85% of companies polled said they were looking into anomaly detection (AD) technologies for their industrial image anomalies. The present problem concerns detecting anomalies often occupied by redundant data. It can be either in images or in videos. Finding a correct pattern is a challenging task. AD is crucial for various applications, including network security, fraud detection, predictive maintenance, fault diagnosis, and industrial and healthcare monitoring. Many researchers have proposed numerous methods and worked in the area of AD. Multiple anomalies and considerable intraclass variation make industrial datasets tough. Further, research is needed to create robust, efficient techniques that generalize datasets and detect anomalies in complex industrial images. The outcome of this study focuses on various AD methods from 2019 to 2023. These techniques are categorized further into machine learning (ML), deep learning (DL), and federated learning (FL). It explores AD approaches, datasets, technologies, complexities, and obstacles, emphasizing the requirement for effective detection across domains. It explores the results achieved in various ML, DL, and FL AD methods, which helps researchers explore these techniques further. Future research directions include improving model performance, leveraging multiple validation techniques, optimizing resource utilization, generating high\u2010quality datasets, and focusing on real\u2010world applications. The paper addresses the changing environment of AD methods and emphasizes the importance of continuing research and innovation. Each ML and DL AD model has strengths and shortcomings, concentrating on accuracy and performance while applying quality parameters for evaluation. FL provides a collaborative way to improve AD using distributed data sources and data privacy.<\/jats:p>","DOI":"10.1049\/2024\/8821891","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T03:18:32Z","timestamp":1732504712000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019\u20132023"],"prefix":"10.1049","volume":"2024","author":[{"given":"Shalini","family":"Kumari","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2322-7289","authenticated-orcid":false,"given":"Chander","family":"Prabha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8532-6816","authenticated-orcid":false,"given":"Asif","family":"Karim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9890-0968","authenticated-orcid":false,"given":"Md. Mehedi","family":"Hassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7572-9750","authenticated-orcid":false,"given":"Sami","family":"Azam","sequence":"additional","affiliation":[]}],"member":"265","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"e_1_2_13_1_2","doi-asserted-by":"crossref","unstructured":"Sarafijanovic-DjukicN.andDavisJ. Fast Distance-Based Anomaly Detection in Images Using an Inception-Like Autoencoder International Conference on Discovery Science 2019 Springer 493\u2013508.","DOI":"10.1007\/978-3-030-33778-0_37"},{"key":"e_1_2_13_2_2","doi-asserted-by":"crossref","unstructured":"ShriramS.andSivasankarE. Anomaly Detection on Shuttle Data Using Unsupervised Learning Techniques 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE) 2019.","DOI":"10.1109\/ICCIKE47802.2019.9004325"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2020.117316"},{"key":"e_1_2_13_4_2","doi-asserted-by":"crossref","unstructured":"BaoZ. FengX. ZhouQ. andLiY. Anomaly Detection and Recognition of Video Surveillance Images Based on Deep Learning International Conference on Mechanisms and Robotics (ICMAR 2022) 2022.","DOI":"10.1117\/12.2652301"},{"key":"e_1_2_13_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"e_1_2_13_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2019.2919951"},{"key":"e_1_2_13_7_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2293408"},{"key":"e_1_2_13_8_2","unstructured":"ChalapathyR.andChawlaS. Deep Learning for Anomaly Detection: A Survey 2019 ArXiv record: https:\/\/arxiv.org\/abs\/1901.03407."},{"key":"e_1_2_13_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3244741"},{"key":"e_1_2_13_10_2","doi-asserted-by":"crossref","unstructured":"BoutalbiK. LoukilF. VerjusH. TelissonD. andSalamatianK. Machine Learning for Text Anomaly Detection: A Systematic Review 2023 IEEE 47th Annual Computers Software and Applications Conference (COMPSAC) 2023.","DOI":"10.1109\/COMPSAC57700.2023.00200"},{"key":"e_1_2_13_11_2","doi-asserted-by":"crossref","unstructured":"YaoH. LuoW. andLouJ. et al.Scalable Industrial Visual Anomaly Detection With Partial Semantics Aggregation Vision Transformer IEEE Transactions on Instrumentation and Measurement 2024 73 1\u201317.","DOI":"10.1109\/TIM.2023.3343832"},{"key":"e_1_2_13_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127728"},{"key":"e_1_2_13_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3348901"},{"key":"e_1_2_13_14_2","unstructured":"CaoY. et al.A Survey on Visual Anomaly Detection: Challenge Approach and Prospect 2024 arXiv [cs.CV]."},{"key":"e_1_2_13_15_2","unstructured":"GuoJ. LuS. JiaL. ZhangW. andLiH. ReContrast: Domain-Specific Anomaly Detection via Contrastive Reconstruction 2023 arXiv [cs.CV]."},{"key":"e_1_2_13_16_2","doi-asserted-by":"crossref","unstructured":"RothK. PemulaL. ZepedaJ. Sch\u00f6lkopfB. BroxT. andGehlerP. Towards Total Recall in Industrial Anomaly Detection 2022 14298\u201314308 https:\/\/doi.org\/10.1109\/CVPR52688.2022.01392.","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"e_1_2_13_17_2","doi-asserted-by":"crossref","unstructured":"LiuZ. ZhouY. XuY. andWangZ. SimpleNet: A Simple Network for Image Anomaly Detection and Localization 2023 20402\u201320411 https:\/\/doi.org\/10.1109\/CVPR52729.2023.01954.","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3627158"},{"key":"e_1_2_13_19_2","unstructured":"DemirU.andUnalG. Patch-Based Image Inpainting With Generative Adversarial Networks 2018 arXiv [cs.CV]."},{"key":"e_1_2_13_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/s24051368"},{"key":"e_1_2_13_21_2","doi-asserted-by":"crossref","unstructured":"HyunJ. KimS. JeonG. KimS. H. BaeK. andKangB. J. ReConPatch: Contrastive Patch Representation Learning for Industrial Anomaly Detection 2024 2041\u20132050 https:\/\/doi.org\/10.1109\/WACV57701.2024.00205.","DOI":"10.1109\/WACV57701.2024.00205"},{"key":"e_1_2_13_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3234745"},{"key":"e_1_2_13_23_2","doi-asserted-by":"crossref","unstructured":"YiJ.andYoonS. Patch svdd: Patch-Level svdd for Anomaly Detection and Segmentation Proceedings of the Asian Conference on Computer Vision 2020 1\u201316.","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"e_1_2_13_24_2","doi-asserted-by":"crossref","unstructured":"DefardT. SetkovA. LoeschA. andAudigierR. Padim: a Patch Distribution Modelling Framework for Anomaly Detection and Localization International Conference on Pattern Recognition 2021 Springer 475\u2013489.","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vrih.2022.07.006"},{"key":"e_1_2_13_26_2","unstructured":"GargV. K.andKalaiA. Supervising Unsupervised Learning 2017 arXiv [cs.AI]."},{"key":"e_1_2_13_27_2","doi-asserted-by":"crossref","unstructured":"XieX. WangC. ChenS. ShiG. andZhaoZ. Realtime Illegal Parking Detection System Based on Deep Learning Proceedings of the 2017 International Conference on Deep Learning Technologies 2017 23\u201327.","DOI":"10.1145\/3094243.3094261"},{"key":"e_1_2_13_28_2","doi-asserted-by":"crossref","unstructured":"KhokhlovI. PerezM. andReznikL. Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA) 2019.","DOI":"10.1109\/ICMLA.2019.00216"},{"key":"e_1_2_13_29_2","doi-asserted-by":"crossref","unstructured":"DoerschC. GuptaA. andEfrosA. A. Unsupervised Visual Representation Learning by Context Prediction 2015 1422\u20131430 arXiv [cs.CV]https:\/\/doi.org\/10.1109\/ICCV.2015.167 2-s2.0-84973916088.","DOI":"10.1109\/ICCV.2015.167"},{"key":"e_1_2_13_30_2","unstructured":"ChalapathyR.andChawlaS. Deep Learning for Anomaly Detection: A Survey 2019 arXiv [cs.LG]."},{"key":"e_1_2_13_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2019.2902487"},{"key":"e_1_2_13_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100059"},{"key":"e_1_2_13_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.023"},{"key":"e_1_2_13_34_2","doi-asserted-by":"crossref","unstructured":"BhatiaR. BennoS. EstebanJ. LakshmanT. V. andGroganJ. Unsupervised Machine Learning for Network-centric Anomaly Detection in IoT Proceedings of the 3rd ACM CoNEXT Workshop on Big Data Machine Learning and Artificial Intelligence for Data Communication Networks 2019.","DOI":"10.1145\/3359992.3366641"},{"key":"e_1_2_13_35_2","article-title":"An Anomaly Prediction Framework for Financial IT Systems Using Hybrid Machine Learning Methods","author":"Wang J.","year":"2019","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"e_1_2_13_36_2","doi-asserted-by":"crossref","unstructured":"YihunieF. AbdelfattahE. andRegmiA. Applying Machine Learning to Anomaly-Based Intrusion Detection Systems 2019 IEEE Long Island Systems Applications and Technology Conference (LISAT) 2019.","DOI":"10.1109\/LISAT.2019.8817340"},{"key":"e_1_2_13_37_2","doi-asserted-by":"crossref","unstructured":"AlrashdiI. AlqazzazA. AloufiE. AlharthiR. ZohdyM. andMingH. AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 2019.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"e_1_2_13_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2019.105686"},{"key":"e_1_2_13_39_2","doi-asserted-by":"crossref","unstructured":"PunmiyaR. ZyabkinaO. ChoeS. andMeyerJ. Anomaly Detection in Power Quality Measurements Using Proximity-based Unsupervised Machine Learning Techniques 2019 Electric Power Quality and Supply Reliability Conference (PQ) & 2019 Symposium on Electrical Engineering and Mechatronics (SEEM) 2019.","DOI":"10.1109\/PQ.2019.8818236"},{"key":"e_1_2_13_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.05.013"},{"key":"e_1_2_13_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.buildenv.2020.107212"},{"key":"e_1_2_13_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.09.003"},{"key":"e_1_2_13_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2979869"},{"key":"e_1_2_13_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICESC48915.2020.9155625"},{"key":"e_1_2_13_45_2","doi-asserted-by":"crossref","unstructured":"BaruaA. MuthirayanD. KhargonekarP. P. andFaruqueM. A. Al Hierarchical Temporal Memory-based Machine Learning for Real-time Unsupervised Anomaly Detection In Smart Grid: WiP Abstract 2020 ACM\/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS) 2020.","DOI":"10.1109\/ICCPS48487.2020.00027"},{"key":"e_1_2_13_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2020.112982"},{"key":"e_1_2_13_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10921-0"},{"key":"e_1_2_13_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10785-4"},{"key":"e_1_2_13_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03323-5"},{"key":"e_1_2_13_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2021.105356"},{"key":"e_1_2_13_51_2","doi-asserted-by":"crossref","unstructured":"AboahA. ShomanM. MandalV. DavamiS. Adu-GyamfiY. andSharmaA. A Vision-Based System for Traffic Anomaly Detection Using Deep Learning and Decision Trees 2021 4202\u20134207 arXiv [cs.CV]https:\/\/doi.org\/10.1109\/CVPRW53098.2021.00475.","DOI":"10.1109\/CVPRW53098.2021.00475"},{"key":"e_1_2_13_52_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22239327"},{"key":"e_1_2_13_53_2","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v25.i3.pp1406-1419"},{"key":"e_1_2_13_54_2","doi-asserted-by":"crossref","unstructured":"YouZ. YangK. andLuoW. et al.Anomaly Detection TRansformer with Feature Reconstruction 2023 13625 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-031-30111-7.","DOI":"10.1007\/978-3-031-30111-7"},{"key":"e_1_2_13_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3224044"},{"key":"e_1_2_13_56_2","doi-asserted-by":"publisher","DOI":"10.1299\/jsmermd.2022.2A1-N12"},{"key":"e_1_2_13_57_2","doi-asserted-by":"crossref","unstructured":"PanyalaA.R.andBaskarM. Deep Learning CNN Model-Based Anomaly Detection in 3D Brain MRI Images Using Feature Distribution Similarity (IJACSA) International Journal of Advanced Computer Science and Applications 2023 14 no. 3.","DOI":"10.14569\/IJACSA.2023.0140330"},{"key":"e_1_2_13_58_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i2.25309"},{"key":"e_1_2_13_59_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.2653893"},{"key":"e_1_2_13_60_2","doi-asserted-by":"crossref","unstructured":"JiaH.andLiuW. Anomaly Detection in Images with Shared Autoencoders Frontiers in Neurorobotics 2022 16.","DOI":"10.3389\/fnbot.2022.1046867"},{"key":"e_1_2_13_61_2","doi-asserted-by":"crossref","unstructured":"SmithA. D. DuS. andKurienA. Vision Transformers for Anomaly Detection and Localisation in Leather Surface Defect Classification Based on Low-Resolution Images and a Small Dataset Applied Sciences 13 8716.","DOI":"10.3390\/app13158716"},{"key":"e_1_2_13_62_2","doi-asserted-by":"crossref","unstructured":"NorooziM.andFavaroP. Unsupervised Learning of Visual Representations by Solving Jigsaw Puzzles 2016 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-319-46466-4 2-s2.0-84990066645.","DOI":"10.1007\/978-3-319-46466-4"},{"key":"e_1_2_13_63_2","doi-asserted-by":"crossref","unstructured":"PathakD. KrahenbuhlP. DonahueJ. DarrellT. andEfrosA. A. Context Encoders: Feature Learning by Inpainting 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016.","DOI":"10.1109\/CVPR.2016.278"},{"key":"e_1_2_13_64_2","doi-asserted-by":"crossref","unstructured":"ZhangR. IsolaP. andEfrosA. A. Colorful Image Colorization 2016 arXiv [cs.CV].","DOI":"10.1007\/978-3-319-46487-9_40"},{"key":"e_1_2_13_65_2","doi-asserted-by":"crossref","unstructured":"ZhangR. IsolaP. andEfrosA. A. Split-Brain Autoencoders: Unsupervised Learning by Cross-Channel Prediction 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2017.","DOI":"10.1109\/CVPR.2017.76"},{"key":"e_1_2_13_66_2","doi-asserted-by":"crossref","unstructured":"NorooziM. PirsiavashH. andFavaroP. Representation Learning by Learning to Count 2017 IEEE International Conference on Computer Vision (ICCV) 2017.","DOI":"10.1109\/ICCV.2017.628"},{"key":"e_1_2_13_67_2","unstructured":"GidarisS. SinghP. andKomodakisN. Unsupervised Representation Learning by Predicting Image Rotations 2018 arXiv [cs.CV]."},{"key":"e_1_2_13_68_2","doi-asserted-by":"crossref","unstructured":"CaronM. BojanowskiP. JoulinA. andDouzeM. Deep Clustering for Unsupervised Learning of Visual Features 2018 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-030-01264-9 2-s2.0-85055674986.","DOI":"10.1007\/978-3-030-01264-9"},{"key":"e_1_2_13_69_2","doi-asserted-by":"crossref","unstructured":"VondrickC. ShrivastavaA. FathiA. GuadarramaS. andMurphyK. Tracking Emerges by Colorizing Videos 2018 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-030-01261-8.","DOI":"10.1007\/978-3-030-01261-8"},{"key":"e_1_2_13_70_2","doi-asserted-by":"crossref","unstructured":"WangX.andGuptaA. Unsupervised Learning of Visual Representations Using Videos 2015 arXiv [cs.CV]https:\/\/doi.org\/10.1109\/ICCV.2015.320 2-s2.0-84973889989.","DOI":"10.1109\/ICCV.2015.320"},{"key":"e_1_2_13_71_2","doi-asserted-by":"crossref","unstructured":"MisraI. ZitnickC. L. andHebertM. Shuffle and Learn: Unsupervised Learning Using Temporal Order Verification 2016 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-319-46448-0.","DOI":"10.1007\/978-3-319-46448-0_32"},{"key":"e_1_2_13_72_2","doi-asserted-by":"crossref","unstructured":"WeiD. LimJ. ZissermanA. andFreemanW. T. Learning and Using the Arrow of Time 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition 2018.","DOI":"10.1109\/CVPR.2018.00840"},{"key":"e_1_2_13_73_2","doi-asserted-by":"crossref","unstructured":"LeeH.-Y. HuangJ.-B. SinghM. andYangM.-H. Unsupervised Representation Learning by Sorting Sequences 2017 667\u2013676 https:\/\/doi.org\/10.1109\/ICCV.2017.79 2-s2.0-85041918226.","DOI":"10.1109\/ICCV.2017.79"},{"key":"e_1_2_13_74_2","doi-asserted-by":"crossref","unstructured":"XuD. XiaoJ. ZhaoZ. ShaoJ. XieD. andZhuangY. Self-Supervised Spatiotemporal Learning Via Video Clip Order Prediction Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2019 10\u2013334.","DOI":"10.1109\/CVPR.2019.01058"},{"key":"e_1_2_13_75_2","doi-asserted-by":"crossref","unstructured":"XiaY. CaoX. WenF. HuaG. andSunJ. Learning Discriminative Reconstructions for Unsupervised Outlier Removal 2015 IEEE International Conference on Computer Vision (ICCV) 2015.","DOI":"10.1109\/ICCV.2015.177"},{"key":"e_1_2_13_76_2","article-title":"Variational Autoencoder Based Anomaly Detection Using Reconstruction Probability","volume":"2","author":"An J.","year":"2015","journal-title":"Special Lecture on IE"},{"key":"e_1_2_13_77_2","unstructured":"ZhaiS. ChengY. LuW. andZhangZ. Deep Structured Energy Based Models for Anomaly Detection 2016 arXiv [cs.LG]."},{"key":"e_1_2_13_78_2","unstructured":"ZongB. SongQ. andMinM. R. et al.Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection 2024."},{"key":"e_1_2_13_79_2","unstructured":"LiD. ChenD. GohJ. andNgS.-K. Anomaly Detection With Generative Adversarial Networks for Multivariate Time Series 2018 arXiv [cs.LG]."},{"key":"e_1_2_13_80_2","unstructured":"RuffL. et al.Deep one-class classification International conference on machine learning 2018 4393\u20134402."},{"key":"e_1_2_13_81_2","unstructured":"HendrycksD.andGimpelK. A Baseline for Detecting Misclassified and Out-of-Distribution Examples in Neural Networks 2016 arXiv [cs.NE]."},{"key":"e_1_2_13_82_2","unstructured":"LeeK. LeeH. LeeK. andShinJ. Training Confidence-Calibrated Classifiers for Detecting Out-of-Distribution Samples 2017 arXiv [stat.ML]."},{"key":"e_1_2_13_83_2","unstructured":"GolanI.andEl-YanivR. Deep Anomaly Detection Using Geometric Transformations 2018 arXiv [cs.LG]."},{"key":"e_1_2_13_84_2","doi-asserted-by":"crossref","unstructured":"ChongY. S.andTayY. H. Abnormal Event Detection in Videos Using Spatiotemporal Autoencoder 2017 10262 arXiv [cs.CV]https:\/\/doi.org\/10.1007\/978-3-319-59081-3.","DOI":"10.1007\/978-3-319-59081-3"},{"key":"e_1_2_13_85_2","doi-asserted-by":"crossref","unstructured":"HasanM. ChoiJ. NeumannJ. Roy-ChowdhuryA. K. andDavisL. S. Learning Temporal Regularity in Video Sequences 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) 2016.","DOI":"10.1109\/CVPR.2016.86"},{"key":"e_1_2_13_86_2","doi-asserted-by":"crossref","unstructured":"LuoW. LiuW. andGaoS. Remembering History With Convolutional LSTM for Anomaly Detection 2017 IEEE International Conference on Multimedia and Expo (ICME) 2017.","DOI":"10.1109\/ICME.2017.8019325"},{"key":"e_1_2_13_87_2","doi-asserted-by":"crossref","unstructured":"LiuW. LuoW. LianD. andGaoS. Future Frame Prediction for Anomaly Detection-a New Baseline Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition 2018 6536\u20136545.","DOI":"10.1109\/CVPR.2018.00684"},{"key":"e_1_2_13_88_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11193138"},{"key":"e_1_2_13_89_2","unstructured":"ReisizadehA. FarniaF. PedarsaniR. andJadbabaieA. Robust Federated Learning: The Case of Affine Distribution Shifts 2020 arXiv [cs.LG]."},{"key":"e_1_2_13_90_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23177331"},{"key":"e_1_2_13_91_2","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-3062769\/v1"},{"key":"e_1_2_13_92_2","doi-asserted-by":"crossref","unstructured":"LiuF. T. TingK. M. andZhouZ.-H. Isolation Forest 2008 Eighth IEEE International Conference on Data Mining 2008.","DOI":"10.1109\/ICDM.2008.17"},{"key":"e_1_2_13_93_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109805"},{"key":"e_1_2_13_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3377690"},{"key":"e_1_2_13_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127726"},{"key":"e_1_2_13_96_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06605-9_6"},{"key":"e_1_2_13_97_2","doi-asserted-by":"crossref","unstructured":"ZhaoN. WangH. andLiZ. et al.An Empirical Investigation of Practical Log Anomaly Detection for Online Service Systems Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering 2021.","DOI":"10.1145\/3468264.3473933"},{"key":"e_1_2_13_98_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2024.108613"},{"key":"e_1_2_13_99_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym11111350"},{"key":"e_1_2_13_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921912"},{"key":"e_1_2_13_101_2","doi-asserted-by":"crossref","unstructured":"SantosJ. LerouxP. WautersT. VolckaertB. andDe TurckF. Anomaly Detection for Smart City Applications Over 5G Low Power Wide Area Networks NOMS. 2018 - 2018 IEEE\/IFIP Network Operations and Management Symposium 2018.","DOI":"10.1109\/NOMS.2018.8406257"},{"key":"e_1_2_13_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932769"},{"key":"e_1_2_13_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110424"},{"key":"e_1_2_13_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3596907"},{"key":"e_1_2_13_105_2","unstructured":"CaldasS. Kone\u010dnyJ. McMahanH. B. andTalwalkarA. Expanding the Reach of Federated Learning by Reducing Client Resource Requirements 2018 arXiv [cs.LG]."},{"key":"e_1_2_13_106_2","doi-asserted-by":"crossref","unstructured":"NasrM. ShokriR. andHoumansadrA. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks Against Centralized and Federated Learning 2019 IEEE Symposium on Security and Privacy (SP) 2019.","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_2_13_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3128164"},{"key":"e_1_2_13_108_2","volume-title":"Frontiers in Artificial Intelligence and Applications","author":"Wu X.","year":"2021"},{"key":"e_1_2_13_109_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10796-1"},{"key":"e_1_2_13_110_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2023.04.001"},{"key":"e_1_2_13_111_2","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph20156539"},{"key":"e_1_2_13_112_2","doi-asserted-by":"crossref","unstructured":"JoseA. AzamS. KarimA. ShanmugamB. FaisalF. andIslamA. A Framework to Address Security Concerns in Three Layers of IoT 2020 2nd International Conference on Electrical Control and Instrumentation Engineering (ICECIE) 2020 Kuala Lumpur Malaysia 1\u20136 https:\/\/doi.org\/10.1109\/ICECIE50279.2020.9309710.","DOI":"10.1109\/ICECIE50279.2020.9309710"},{"key":"e_1_2_13_113_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3373697"},{"key":"e_1_2_13_114_2","doi-asserted-by":"crossref","unstructured":"KarmokarP. BairagiS. MondalA. NurF. N. MoonN. N. andKarimA. A Novel IoT based Accident Detection and Rescue System 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT) 2020 Tirunelveli India 322\u2013327 https:\/\/doi.org\/10.1109\/ICSSIT48917.2020.9214296.","DOI":"10.1109\/ICSSIT48917.2020.9214296"},{"key":"e_1_2_13_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT57764.2022.9943437"},{"key":"e_1_2_13_116_2","doi-asserted-by":"crossref","unstructured":"IvanovskaM. PersJ. TabernikD. andSkocajD. Evaluation of Anomaly Detection Algorithms for the Real-world Applications 2020 25th International Conference on Pattern Recognition (ICPR) 2021.","DOI":"10.1109\/ICPR48806.2021.9413265"},{"key":"e_1_2_13_117_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.117030"},{"key":"e_1_2_13_118_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.212"},{"key":"e_1_2_13_119_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010051"},{"key":"e_1_2_13_120_2","doi-asserted-by":"crossref","unstructured":"MusaT. YeoK. C. AzamS. ShanmugamB. KarimA. andBoerF. D. Analysis of Complex Networks for Security Issues using Attack Graph 2019 International Conference on Computer Communication and Informatics (ICCCI) 2019 Coimbatore India 1\u20136 https:\/\/doi.org\/10.1109\/ICCCI.2019.8822179 2-s2.0-85072930711.","DOI":"10.1109\/ICCCI.2019.8822179"},{"key":"e_1_2_13_121_2","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v14i4.pp4655-4663"},{"key":"e_1_2_13_122_2","doi-asserted-by":"crossref","unstructured":"PoorazadS. K. BenzaidC. andTalebT. A Novel Buffered Federated Learning Framework for Privacy-Driven Anomaly Detection in IIoT 2024 arXiv [cs.CR].","DOI":"10.1109\/GLOBECOM52923.2024.10901786"},{"key":"e_1_2_13_123_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071120"},{"key":"e_1_2_13_124_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-023-10443-0"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/2024\/8821891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T08:49:48Z","timestamp":1762332588000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/2024\/8821891"}},"subtitle":[],"editor":[{"given":"Peican","family":"Zhu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":124,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1049\/2024\/8821891"],"URL":"https:\/\/doi.org\/10.1049\/2024\/8821891","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2024-05-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8821891"}}