{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:07:44Z","timestamp":1775912864414,"version":"3.50.1"},"reference-count":278,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f?r Bildung und Forschung","doi-asserted-by":"publisher","award":["Athene"],"award-info":[{"award-number":["Athene"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100011033","name":"Agencia Estatal de Investigaci?n","doi-asserted-by":"publisher","award":["PID2021-125725OB-I00"],"award-info":[{"award-number":["PID2021-125725OB-I00"]}],"id":[{"id":"10.13039\/501100011033","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f?r Wissenschaft und Kunst","doi-asserted-by":"publisher","award":["Athene"],"award-info":[{"award-number":["Athene"]}],"id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3395051","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T17:43:07Z","timestamp":1714412587000},"page":"64006-64049","source":"Crossref","is-referenced-by-count":52,"title":["Anomaly Detection in Smart Environments: A Comprehensive Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5820-5733","authenticated-orcid":false,"given":"Daniel","family":"F\u00e4hrmann","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0765-9687","authenticated-orcid":false,"given":"Laura","family":"Mart\u00edn","sequence":"additional","affiliation":[{"name":"Network Planning and Mobile Communications Laboratory, Universidad de Cantabria, Santander, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0136-3420","authenticated-orcid":false,"given":"Luis","family":"S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Network Planning and Mobile Communications Laboratory, Universidad de Cantabria, Santander, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7910-7895","authenticated-orcid":false,"given":"Naser","family":"Damer","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Computer Graphics Research IGD, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsis.2019.01.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2016.7721736"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2991891"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3266647"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246029"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/jsan1030217"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v4i3.515"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/0009922816653385"},{"key":"ref9","article-title":"Security and privacy in your smart city","volume-title":"Proc. Barcelona Smart Cities Congr.","volume":"292","author":"Bartoli"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2926518"},{"issue":"6","key":"ref11","doi-asserted-by":"crossref","first-page":"521","DOI":"10.3233\/IDA-2006-10604","article-title":"A comprehensive survey of numeric and symbolic outlier mining techniques","volume":"10","author":"Agyemang","year":"2006","journal-title":"Intell. Data Anal."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2010.235"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2013.184"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref17","article-title":"Deep learning for anomaly detection: A survey","author":"Chalapathy","year":"2019","journal-title":"arXiv:1901.03407"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"issue":"3","key":"ref19","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1109\/TBDATA.2020.2991008","article-title":"Urban anomaly analytics: Description, detection, and prediction","volume":"8","author":"Zhang","year":"2022","journal-title":"IEEE Trans. Big Data"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2021.3052449"},{"key":"ref21","article-title":"Detecting anomalous sensor events in smart home data for enhancing the living experience","volume-title":"Proc. Conquest Complex. Artif. Intell. Smarter Living AAAI Workshop","volume":"WS-11-07","author":"Jakkula"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2006.12.001"},{"key":"ref24","volume-title":"Technologien Und Trends, Die IoT im Jahr 2020 Einen Dringend Ben\u00f6tigten Schub Geben","year":"2023"},{"key":"ref25","volume-title":"Forecast End-user Spending on Iot Solutions Worldwide From 2017 to 2025","year":"2023"},{"key":"ref26","volume-title":"Smart Cities Market","year":"2023"},{"key":"ref27","volume-title":"Smart Cities Market by Focus Area, Smart Transportation, Smart Buildings, Smart Utilities, Smart Citizen Services (Public Safety, Smart Healthcare, Smart Education, Smart Street Lighting, and E-Governance), and Region\u2014Global Forecast to 2026","year":"2026"},{"key":"ref28","volume-title":"Global Smart City Market","author":"Research","year":"2023"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01168-0_12"},{"key":"ref30","volume-title":"Number of Internet of Things (IoT) Connected Devices Worldwide in 2018, 2025 and 2030","year":"2022"},{"key":"ref31","volume-title":"Disruptive Civil Technologies","year":"2023"},{"key":"ref32","volume-title":"Unlocking the Full Life-Cycle Value From Connected-Car Data","year":"2022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102886"},{"key":"ref34","volume-title":"World Population Ageing","year":"2017"},{"key":"ref35","volume-title":"Ageing and Health","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/cifer.1997.618940"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s16060868"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081917"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SMC-IT.2006.79"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.04.007"},{"key":"ref41","article-title":"Monitoring health by detecting drifts and outliers for a smart environment","volume-title":"Proc. Int. Conf. Smart Homes Health Telematics","author":"Jain"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3414\/me9103"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ergon.2018.02.002","article-title":"A survey on health monitoring systems for health smart homes","volume":"66","author":"Mshali","year":"2018","journal-title":"Int. J. Ind. Ergonom."},{"key":"ref44","article-title":"Deep learning for unsupervised insider threat detection in structured cybersecurity data streams","volume-title":"Proc. 31rst AAAI Conf. Artif. Intell.","author":"Tuor"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/0470099747"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2_1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1063\/1.2995737","article-title":"Outliers in statistical data","volume-title":"Proc. OSD","author":"Barnett"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.2770-10.2010"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"issue":"12","key":"ref51","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","article-title":"Novelty detection: A review\u2014Part 2: Neural network based approaches","volume":"83","author":"Markou","year":"2003","journal-title":"Signal Process."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3229329.3229332"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"ref54","volume-title":"Attribution-ShareAlike 4.0 International","author":"Commons","year":"2024"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5121\/ijdkp.2015.5201"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143874"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543584"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/837"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2020.2991008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820813"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0192-5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3191786"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1497577.1497578"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3179720"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403271"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015409"},{"key":"ref69","article-title":"STR: Seasonal-trend decomposition using regression","author":"Dokumentov","year":"2020","journal-title":"arXiv:2009.05894"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0606291103"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109410"},{"key":"ref72","first-page":"1643","article-title":"Deep generative model with hierarchical latent factors for time series anomaly detection","volume-title":"Proc. 25th Int. Conf. Artif. Intell. Statist.","author":"Challu"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441823"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00116"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0072-8"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2018.8525737"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1540276.1540279"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3045700"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3596236"},{"key":"ref83","article-title":"Explainable artificial intelligence (XAI) for increasing user trust in deep reinforcement learning driven autonomous systems","author":"Druce","year":"2021","journal-title":"arXiv:2106.03775"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aay7120"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3233\/ais-180506"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref87","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure Multiparty Computation","author":"Cramer","year":"2015"},{"key":"ref88","article-title":"Pattern and anomaly detection in urban temporal networks","author":"He","year":"2019","journal-title":"arXiv:1912.01960"},{"key":"ref89","article-title":"Learning and evaluating representations for deep one-class classification","volume-title":"Proc. 9th Int. Conf. Learn. Represent. (ICLR)","author":"Sohn"},{"key":"ref90","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","author":"An","year":"2015"},{"key":"ref91","first-page":"10921","article-title":"Statistical analysis of nearest neighbor methods for anomaly detection","volume-title":"Proc. Adv. Neural Inf. Process. Syst., Annu. Conf. Neural Inf. Process. Syst.","author":"Gu"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3581807.3581881"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/tpami.2012.88"},{"key":"ref95","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1007\/978-0-387-73003-5_196","article-title":"Gaussian mixture models","volume-title":"Encyclopedia of Biometrics","author":"Reynolds","year":"2009"},{"issue":"2","key":"ref96","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/335191.335388","article-title":"LOF","volume":"29","author":"Breunig","year":"2000","journal-title":"ACM SIGMOD Rec."},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/2733381"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/1970392.1970395"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71249-9_3"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.23919\/ChiCC.2018.8482813"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref107","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. 6th Int. Conf. Learn. Represent. (ICLR)","author":"Zong"},{"key":"ref108","article-title":"Efficient GAN-based anomaly detection","author":"Zenati","year":"2018","journal-title":"arXiv:1802.06222"},{"key":"ref109","article-title":"Adversarial feature learning","author":"Donahue","year":"2016","journal-title":"arXiv:1605.09782"},{"key":"ref110","article-title":"Anomaly detection using one-class neural networks","author":"Chalapathy","year":"2018","journal-title":"arXiv:1802.06360"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ictai.2019.00028"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref113","first-page":"214","article-title":"Wasserstein generative adversarial networks","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"70","author":"Arjovsky"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2019.8851808"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-46150-8_13"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2019.2917862"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/wacv48630.2021.00368"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref119","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2015","journal-title":"arXiv:1511.05644"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1312.6114"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SAM.2010.5606734"},{"key":"ref122","first-page":"3861","article-title":"Towards K-means-friendly spaces: Simultaneous deep learning and clustering","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","volume":"70","author":"Yang"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/iccv.2017.244"},{"key":"ref125","article-title":"Unsupervised representation learning with deep convolutional generative adversarial networks","author":"Radford","year":"2015","journal-title":"arXiv:1511.06434"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378139"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2886457"},{"key":"ref130","article-title":"Long short term memory networks for anomaly detection in time series","volume-title":"Proc. 23rd Eur. Symp. Artif. Neural Netw. (ESANN)","author":"Malhotra"},{"key":"ref131","article-title":"LSTM-based encoder\u2013decoder for multi-sensor anomaly detection","author":"Malhotra","year":"2016","journal-title":"arXiv:1607.00148"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.compag.2016.08.009"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48057-2_9"},{"key":"ref134","volume-title":"UCI Machine Learning Repository","author":"Lichman","year":"2013"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/iros.2017.8206437"},{"key":"ref136","article-title":"Automatic anomaly detection in the cloud via statistical learning","author":"Hochenbaum","year":"2017","journal-title":"arXiv:1704. 07706"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/lra.2018.2801475"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2870151"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/378"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS.2017.7954844"},{"key":"ref142","article-title":"RobustTAD: Robust time series anomaly detection via decomposition and convolutional neural networks","author":"Gao","year":"2020","journal-title":"arXiv:2002.09545"},{"key":"ref143","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref144","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017","journal-title":"arXiv:1708.07747"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/34.291440"},{"key":"ref146","volume-title":"MNIST Handwritten Digit Database","author":"LeCun","year":"2010"},{"key":"ref147","volume-title":"Learning Multiple Layers of Features From Tiny Images","author":"Krizhevsky","year":"2009"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315291"},{"key":"ref149","article-title":"Caltech-256","author":"Griffin","year":"2007"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2011.6033395"},{"key":"ref151","first-page":"6479","article-title":"Real-world anomaly detection in surveillance videos","volume-title":"Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit.","author":"Sultani"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2004.836169"},{"key":"ref153","volume-title":"Nasa Shuttle Valve Data","author":"Ferrell","year":"2005"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/infvis.1999.801851"},{"key":"ref155","first-page":"4390","article-title":"Deep one-class classification","volume-title":"Proc. 35th Int. Conf. Mach. Learn. (ICML)","volume":"80","author":"Ruff"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2011.52"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3549932"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2013.107"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/lsp.2018.2889273"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/btas.2016.7791155"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2018.00029"},{"key":"ref162","volume-title":"The UCR Time Series Classification Archive","author":"Dau","year":"2018"},{"key":"ref163","volume-title":"DBLP Computer Science Bibliography","author":"Dagstuhl","year":"2024"},{"key":"ref164","volume-title":"Top Publications","year":"2024"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/tase.2015.2471842"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73281-5_11"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13778-5_18"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12019"},{"issue":"4","key":"ref169","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MPRV.2015.84","article-title":"Fall detection using location sensors and accelerometers","volume":"14","author":"Lustrek","year":"2015","journal-title":"IEEE Pervasive Comput."},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.102"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3157726"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/smartcomp.2016.7501687"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3439870"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.23919\/acc50511.2021.9483053"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/3555776.3577822"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/bigdatasecurity-hpsc-ids.2019.00015"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/infocomwkshps51825.2021.9484507"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.3390\/s22155626"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108193"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3194813"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3325929"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/mass.2014.16"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3560905.3567767"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/ises50453.2020.00026"},{"key":"ref185","first-page":"4223","article-title":"Hawatcher: Semantics-aware anomaly detection for Appified smart homes","volume-title":"Proc. 30th USENIX Security Symp.","author":"Fu"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/tce.2020.2981636"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3686755"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2018.2864702"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070966"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16917-5_18"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2012.328"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2017.2650865"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata47090.2019.9006249"},{"key":"ref194","article-title":"CADeSH dataset: Collaborative anomaly detection for smart homes","author":"Meidan","journal-title":"Zenodo"},{"key":"ref195","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v25i2.18857","article-title":"Detecting falls with location sensors and accelerometers","volume-title":"Proc. 23rd Conf. Innov. Appl. Artif. Intell.","author":"Lustrek"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09162-z"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409637"},{"key":"ref198","article-title":"ODDs: Occupancy detection dataset","author":"Makonin","year":"2015","journal-title":"Harvard Dataverse"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2007.897341"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/ELEKTRO.2012.6225617"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2893124"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/passat\/socialcom.2011.10"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2012.104"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.05.002"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/3284557.3284725"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/icc45855.2022.9838636"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/itsc55140.2022.9922142"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2011.18"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030127"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2013.2238531"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3022612"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/2346496.2346521"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29009-6_7"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2497352"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2971341"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/smartcomp.2019.00063"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/rtas52030.2021.00052"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/icc45855.2022.9838276"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/hpcc-smartcity-dss50907.2020.00148"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata55660.2022.10020470"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03501-8"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/iccps54341.2022.00026"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/3007540.3007545"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132933"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/issnip.2014.6827618"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983886"},{"key":"ref227","article-title":"Automatic road anomaly detection using smart mobile device","volume-title":"Proc. Conf. Technol. Appl. Artif. Intell. (TAAI)","author":"Tai"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7245-1_5"},{"key":"ref229","volume-title":"TLC Trip Record Data","year":"2020"},{"key":"ref230","article-title":"Taxi service trajectory\u2014Prediction challenge, ECML PKDD 2015","author":"Moreira-Matias","year":"2015"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795584"},{"key":"ref232","volume-title":"Local Weather Forecast","year":"2020"},{"key":"ref233","volume-title":"Here API","year":"2023"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.117"},{"key":"ref235","article-title":"Automotive can bus data: An example dataset from the aegis big data project","author":"Kaiser","journal-title":"Zenodo"},{"key":"ref236","volume-title":"Skoltech Anomaly Benchmark (SKAB)","year":"2023"},{"key":"ref237","volume-title":"311 Service Requests From 2010 to Present","year":"2011"},{"key":"ref238","volume-title":"CitiBike","year":"2022"},{"issue":"1","key":"ref239","first-page":"28","article-title":"Smart factory for Industry 4.0: A review","volume":"7","author":"Hozdi\u0107","year":"2015","journal-title":"Int. J. Mod. Manuf. Technol."},{"issue":"2","key":"ref240","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3390\/machines6020023","article-title":"Requirements of the smart factory system: A survey and perspective","volume":"6","author":"Mabkhot","year":"2018","journal-title":"Machines"},{"key":"ref241","volume-title":"Cyber-Physical Systems (CPS)","year":"2010"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1145\/3152042.3152080"},{"key":"ref243","volume-title":"What is Industrie 4.0?","year":"2020"},{"key":"ref244","volume-title":"2030 Vision for Industrie 4.0","year":"2019"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ieem.2014.7058728"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/smc.2019.8914524"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3324314"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1145\/3594806.3596558"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/smc.2019.8913901"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2023.3271754"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/med51440.2021.9480311"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3070659"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.3390\/s21072376"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/coase.2010.5584452"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa53316.2021.9564181"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3188102"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.3390\/s22114143"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2019.02.073"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/spawc51858.2021.9593188"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05189-8"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3139363"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119479"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.3390\/s22082886"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1145\/3369114.3369121"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn.2018.8489130"},{"issue":"12","key":"ref266","doi-asserted-by":"crossref","first-page":"2698","DOI":"10.1016\/j.anucene.2011.06.010","article-title":"CORE SIM: A multi-purpose neutronic tool for research and education","volume":"38","author":"Demazi\u00e8re","year":"2011","journal-title":"Ann. Nucl. Energy"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.05.016"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/tie.2019.2907441"},{"key":"ref269","first-page":"209","article-title":"MIMII dataset: Sound dataset for malfunctioning industrial machine investigation and inspection","volume-title":"Proc. Detection Classification Acoustic Scenes Events Workshop (DCASE)","author":"Purohit"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/milcis.2015.7348942"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2958284"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000983"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.005"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/cyswater.2016.7469060"},{"key":"ref277","volume-title":"Centre for Research in Cyber Security","year":"2022"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10380310\/10510320.pdf?arnumber=10510320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T04:51:18Z","timestamp":1715230278000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10510320\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":278,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3395051","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}