{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:49:19Z","timestamp":1769744959164,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,19]],"date-time":"2023-06-19T00:00:00Z","timestamp":1687132800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"publisher","award":["61972381"],"award-info":[{"award-number":["61972381"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["CAS-WX2022SF-0401"],"award-info":[{"award-number":["CAS-WX2022SF-0401"]}],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,19]]},"DOI":"10.1109\/iwqos57198.2023.10188761","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T17:21:00Z","timestamp":1690478460000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Multi-Layer Collaborative Bandit for Multivariate Time Series Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Weiyao","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences"}]},{"given":"Xuying","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences"}]},{"given":"Jinyang","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences"}]},{"given":"Yequan","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Academy of Artificial Intelligence"}]},{"given":"Yujun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences"}]}],"member":"263","reference":[{"key":"ref13","first-page":"2249","article-title":"An empirical evaluation of thompson sampling","volume":"24","author":"chapelle","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.01.016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772758"},{"key":"ref34","first-page":"2312","article-title":"Improved algorithms for linear stochastic bandits","volume":"24","author":"abbasi-yadkori","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3097137"},{"key":"ref37","article-title":"On upper-confidence bound policies for non-stationary bandit problems","author":"garivier","year":"2008","journal-title":"ArXiv Preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290964"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462852"},{"key":"ref30","first-page":"495","article-title":"Learning contextual bandits in a nonstationary environment","author":"wu","year":"0","journal-title":"International ACM SIGIR Conference on Research and Development in Information Retrieval"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/MNET.001.1900287","article-title":"A vision of 6g wireless systems: Applications, trends, technologies, and open research problems","volume":"34","author":"saad","year":"2019","journal-title":"IEEE Network"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/405"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921208"},{"key":"ref32","first-page":"757","article-title":"Online clustering of bandits","author":"gentile","year":"2014","journal-title":"International Conference on Machine Learning"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041379"},{"key":"ref1","first-page":"1093","article-title":"Understanding the mirai botnet","author":"antonakakis","year":"0","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref17","article-title":"Adapting to user preference changes in interactive recommendation","author":"hariri","year":"0","journal-title":"Twenty-Fourth International Joint Conference on Artificial Intelligence"},{"key":"ref39","year":"2022","journal-title":"Skab dataset"},{"key":"ref16","first-page":"208","article-title":"Contextual bandits with linear payoff functions","author":"chu","year":"0","journal-title":"Proceedings of the Fourteenth International Conference on Artificial Intelligence and Statistics"},{"key":"ref38","year":"2022","journal-title":"Kpi dataset"},{"key":"ref19","article-title":"Lstm-based encoder-decoder for multi-sensor anomaly detection","author":"malhotra","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11746"},{"key":"ref24","article-title":"Glad: Glocalized anomaly detection via human-in-the-loop learning","author":"islam","year":"2018","journal-title":"ArXiv Preprint"},{"key":"ref23","article-title":"Nearest-neighbor-based active learning for rare category detection","volume":"20","author":"he","year":"2007","journal-title":"Advances in neural information processing systems"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0102"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref42","first-page":"2776","article-title":"Semiparametric contextual bandits","author":"krishnamurthy","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref41","first-page":"1245","article-title":"Contextual combinatorial cascading bandits","author":"li","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.04.056"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220083"},{"key":"ref27","article-title":"Incorporating feedback into tree-based anomaly detection","author":"das","year":"2017","journal-title":"ArXiv Preprint"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.69"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00037"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE52982.2021.00022"},{"key":"ref9","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796964"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2019.00051"}],"event":{"name":"2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)","location":"Orlando, FL, USA","start":{"date-parts":[[2023,6,19]]},"end":{"date-parts":[[2023,6,21]]}},"container-title":["2023 IEEE\/ACM 31st International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10188660\/10188690\/10188761.pdf?arnumber=10188761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,14]],"date-time":"2023-08-14T17:39:13Z","timestamp":1692034753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10188761\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,19]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/iwqos57198.2023.10188761","relation":{},"subject":[],"published":{"date-parts":[[2023,6,19]]}}}