{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:35:15Z","timestamp":1725730515455},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,17]]},"DOI":"10.1109\/ipccc59175.2023.10253824","type":"proceedings-article","created":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T17:44:32Z","timestamp":1697651072000},"page":"109-115","source":"Crossref","is-referenced-by-count":0,"title":["UDAD: An Accurate Unsupervised Database Anomaly Detection Method"],"prefix":"10.1109","author":[{"given":"Huazhen","family":"Zhong","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Mobile Information Technology Center,Beijing,China"}]},{"given":"Yining","family":"Zhao","sequence":"additional","affiliation":[{"name":"China Mobile Information Technology Center,Beijing,China"}]},{"given":"Weifang","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Mobile Information Technology Center,Beijing,China"}]},{"given":"Wenjie","family":"Xiao","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Xuehai","family":"Tang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]},{"given":"Liangjun","family":"Zang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Institute of Information Engineering,Beijing,China"}]}],"member":"263","reference":[{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167307"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2500853.2500857"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093488"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699111"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54876-0_12"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-93956-4_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76687-4_2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2831214"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510155"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517861"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363224"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.158"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2487221"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04219-5_3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473933"},{"article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","volume-title":"International Conference on Learning Representations","author":"Zong","key":"ref32"}],"event":{"name":"2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)","start":{"date-parts":[[2023,11,17]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2023,11,19]]}},"container-title":["2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10253817\/10253818\/10253824.pdf?arnumber=10253824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T02:32:52Z","timestamp":1709346772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10253824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/ipccc59175.2023.10253824","relation":{},"subject":[],"published":{"date-parts":[[2023,11,17]]}}}