{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T05:13:50Z","timestamp":1733289230473,"version":"3.30.1"},"reference-count":37,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1109\/6gnet63182.2024.10765658","type":"proceedings-article","created":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T18:36:49Z","timestamp":1733164609000},"page":"84-92","source":"Crossref","is-referenced-by-count":0,"title":["Adversarial Deep Domain Adaptation Method for Unsupervised Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Yoichi","family":"Matsuo","sequence":"first","affiliation":[{"name":"NTT Corporation,NTT Network Service Systems Laboratories,Tokyo,Japan,180-8585"}]},{"given":"Kengo","family":"Tajiri","sequence":"additional","affiliation":[{"name":"NTT Corporation,NTT Network Service Systems Laboratories,Tokyo,Japan,180-8585"}]}],"member":"263","reference":[{"year":"2024","key":"ref1","article-title":"Ai-driven zero-touch operations"},{"year":"2024","key":"ref2","article-title":"Intelligent zero-touch operation"},{"volume-title":"Zero touch network & service management (zsm)","year":"2024","key":"ref3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ITC3249928.2020.00012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref7","article-title":"Estimation of dimensions contributing to detected anomalies with variational autoencoders","author":"Ikeda","year":"2018","journal-title":"arXiv preprint"},{"key":"ref8","first-page":"445","article-title":"Fault detection of ict systems with deep learning model for missing data","volume-title":"Proc. IM","author":"Tajiri","year":"2021"},{"volume-title":"Internet computing","year":"2020","author":"Sunyaev","key":"ref9"},{"issue":"1","key":"ref10","first-page":"2096","article-title":"Domain-adversarial training of neural networks","volume":"17","author":"Ganin","year":"2016","journal-title":"JMLR"},{"key":"ref11","article-title":"Variational recurrent adversarial deep domain adaptation","volume-title":"Proc. 5th ICLR","author":"Purushotham","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6054"},{"key":"ref13","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. of the 35th ICML","volume":"80","author":"Ruff","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2017.39"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/658"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5750"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5757"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6123"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6997"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016470"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3366424.3382722"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM59352.2023.10327845"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111341"},{"volume-title":"NetworkTrafficData","year":"2006","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.4108\/eai.10-1-2019.156245"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038827"},{"key":"ref31","article-title":"Loghub: A large collection of system log datasets towards automated log analytics","volume-title":"arXiv preprint","author":"He","year":"2020"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367332"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847986"},{"journal-title":"Adam: A method for stochastic optimization","year":"2017","author":"Kingma","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"issue":"86","key":"ref37","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"Van Der Maaten","year":"2008","journal-title":"JMLR"}],"event":{"name":"2024 3rd International Conference on 6G Networking (6GNet)","start":{"date-parts":[[2024,10,21]]},"location":"Paris, France","end":{"date-parts":[[2024,10,24]]}},"container-title":["2024 3rd International Conference on 6G Networking (6GNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10765362\/10765604\/10765658.pdf?arnumber=10765658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T06:17:03Z","timestamp":1733206623000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10765658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/6gnet63182.2024.10765658","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]}}}