{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:13:22Z","timestamp":1772039602886,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802129"],"award-info":[{"award-number":["61802129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province, China","doi-asserted-by":"publisher","award":["2018A030310381"],"award-info":[{"award-number":["2018A030310381"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3044610","type":"journal-article","created":{"date-parts":[[2020,12,14]],"date-time":"2020-12-14T21:05:58Z","timestamp":1607979958000},"page":"226397-226408","source":"Crossref","is-referenced-by-count":37,"title":["An Anomaly Detection Algorithm for Microservice Architecture Based on Robust Principal Component Analysis"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3484-8723","authenticated-orcid":false,"given":"Mingxu","family":"Jin","sequence":"first","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"given":"Aoran","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8682-6089","authenticated-orcid":false,"given":"Yuanpeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0535-6789","authenticated-orcid":false,"given":"Zijiang","family":"Wen","sequence":"additional","affiliation":[{"name":"JOYY Inc., Guangzhou, China"}]},{"given":"Yubin","family":"Zhong","sequence":"additional","affiliation":[{"name":"JOYY Inc., Guangzhou, China"}]},{"given":"Zexin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"given":"Jiang","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"given":"Hejie","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"given":"Hanheng","family":"He","sequence":"additional","affiliation":[{"name":"School of Mathematics, South China University of Technology, Guangzhou, China"}]},{"given":"Fengyi","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Management Administration, Guangdong Industry Polytechnic, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/sym11040571"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.2000.889420"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"ref31","first-page":"112","article-title":"Detecting large-scale system problems by mining console logs","author":"xu","year":"2010","journal-title":"Proc 27th Int Conf Mach Learn (ICML)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2853498"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2826566"},{"key":"ref35","article-title":"Robust principal component analysis: Exact recovery of corrupted low-rank matrices","author":"wright","year":"2009","journal-title":"arXiv 0905 0233"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2016.7820614"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/ICDM.2006.165","article-title":"Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems","author":"perdisci","year":"2006","journal-title":"Proc of Intl Conf on Data Mining (ICDM)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59592-0_9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2017.80"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2012.6287816"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2018.00076"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-030-03596-9_1","article-title":"Microscope: Pinpoint performance issues with causal graphs in micro-service environments","author":"lin","year":"2018","journal-title":"Proc 16th Int Conf Service-Oriented Comput (ICSOC)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2607739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848128"},{"key":"ref18","first-page":"246","article-title":"AutoMAP: Diagnose your microservice-based Web applications automatically","author":"ma","year":"2020","journal-title":"Proc Web Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2188837"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infrared.2020.103203"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2019.8704556"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2018.8586404"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2018.8711092"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC48623.2020.9084931"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/2494232.2465753","article-title":"Root cause detection in a service-oriented architecture","volume":"41","author":"kim","year":"2013","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"ref5","article-title":"Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study","author":"zhou","year":"2018","journal-title":"IEEE Trans Softw Eng"},{"key":"ref8","first-page":"1435","article-title":"Fault diagnosis for microservices with execution trace monitoring","volume":"28","author":"wang","year":"2017","journal-title":"J Softw"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2166","DOI":"10.3390\/app10062166","article-title":"A causality mining and knowledge graph based method of root cause diagnosis for performance anomaly in cloud applications","volume":"10","author":"qiu","year":"2020","journal-title":"Appl Sci"},{"key":"ref2","first-page":"57","article-title":"Exploration of research on microservice fault diagnosis technology","volume":"9","author":"zhao","year":"2020","journal-title":"J Netw New Media"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1176","DOI":"10.14778\/3389133.3389136","article-title":"Diagnosing root causes of intermittent slow queries in cloud databases","volume":"13","author":"ma","year":"2020","journal-title":"Proc VLDB Endowment"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110432"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2018.8553584"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2257913"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.05.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2853589"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EI2.2017.8245663"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103741"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09293310.pdf?arnumber=9293310","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T03:42:07Z","timestamp":1724038927000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9293310\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3044610","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}