{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:30:58Z","timestamp":1778347858273,"version":"3.51.4"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009108","name":"Fundamental Research Funds of Shandong University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009108","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,6,15]]},"DOI":"10.1109\/jiot.2021.3100509","type":"journal-article","created":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T20:52:16Z","timestamp":1627419136000},"page":"9179-9189","source":"Crossref","is-referenced-by-count":472,"title":["Learning Graph Structures With Transformer for Multivariate Time-Series Anomaly Detection in IoT"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5564-137X","authenticated-orcid":false,"given":"Zekai","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Computer Science, George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3123-6572","authenticated-orcid":false,"given":"Dingshuo","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0824-9284","authenticated-orcid":false,"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"given":"Zixuan","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Business, Rutgers University, New Brunswick, NJ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.10.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00023"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref12","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Zong"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45681-3_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081891"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3459992"},{"key":"ref20","volume-title":"Anomaly detection with generative adversarial networks for multivariate time series","author":"Li","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.01.001"},{"key":"ref22","article-title":"Graph attention networks","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Velickovic"},{"key":"ref23","first-page":"6861","article-title":"Simplifying graph convolutional networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Wu"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2751541"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403118"},{"key":"ref26","first-page":"17766","article-title":"Advances in neural information processing systems","volume-title":"Spectral Temporal Graph Neural Network for Multivariate Time-Series Forecasting","volume":"33","author":"Cao","year":"2020"},{"key":"ref27","first-page":"5998","article-title":"Attention is all you need","volume-title":"Advances in Information Processing Systems (NeurIPS)","author":"Vaswani","year":"2017"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3444690"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330146"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/837601"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2886457"},{"key":"ref32","volume-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection","author":"Malhotra","year":"2016"},{"key":"ref33","volume-title":"Multivariate industrial time series with cyber-attack simulation: Fault detection using an LSTM-based predictive data model","author":"Filonov","year":"2016"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0449-3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870151"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"ref39","first-page":"481","article-title":"Time series anomaly discovery with grammar-based compression","volume-title":"Proc. 18th Int. Conf. Extending Database Technol. (EDBT)","author":"Senin"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2017.2656939"},{"key":"ref41","first-page":"3837","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","volume-title":"Proc. 30th Annu. Conf. Neural Inf. Process. Syst.","author":"Defferrard"},{"key":"ref42","first-page":"3086","article-title":"A* sampling","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","author":"Maddison","year":"2014"},{"key":"ref43","article-title":"Categorical reparameterization with gumbel-softmax","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Jang"},{"key":"ref44","article-title":"Routing networks: Adaptive selection of non-linear functions for multi-task learning","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Rosenbaum"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00494"},{"key":"ref46","article-title":"Multi-scale context aggregation by dilated convolutions","volume-title":"Proc. 4th Int. Conf. Learn. Represent.","author":"Yu"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.4324\/9781410605337-29"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5431"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-1448"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.49"},{"key":"ref51","volume-title":"Synthesizer: Rethinking self-attention in transformer models","author":"Tay","year":"2020"},{"key":"ref52","article-title":"Lite transformer with long-short range attention","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Wu"},{"key":"ref53","article-title":"Pay less attention with lightweight and dynamic convolutions","volume-title":"Proc. 7th Int. Conf. Learn. Represent.","author":"Wu"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17325"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/IGARSS.2010.5652291"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23204"},{"key":"ref58","volume-title":"Fast graph representation learning with pytorch geometric","author":"Fey","year":"2019"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9789736\/09497343.pdf?arnumber=9497343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:15:26Z","timestamp":1705014926000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9497343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,15]]},"references-count":58,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3100509","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,15]]}}}