{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T14:56:49Z","timestamp":1772031409325,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"22","license":[{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,15]],"date-time":"2022-11-15T00:00:00Z","timestamp":1668470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"publisher","award":["F2018019"],"award-info":[{"award-number":["F2018019"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1763627"],"award-info":[{"award-number":["CNS-1763627"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["DGE-1820640"],"award-info":[{"award-number":["DGE-1820640"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,11,15]]},"DOI":"10.1109\/jiot.2022.3150048","type":"journal-article","created":{"date-parts":[[2022,2,9]],"date-time":"2022-02-09T20:38:10Z","timestamp":1644439090000},"page":"22410-22421","source":"Crossref","is-referenced-by-count":15,"title":["Data-Correlation-Aware Unsupervised Deep-Learning Model for Anomaly Detection in Cyber\u2013Physical Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2736-829X","authenticated-orcid":false,"given":"Liang","family":"Xi","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Ruidong","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4225-7333","authenticated-orcid":false,"given":"Zygmunt J.","family":"Haas","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953888"},{"key":"ref38","first-page":"1","article-title":"Graph attention networks","author":"veli?kovi?","year":"2018","journal-title":"Proc 6th Int Conf Learn Represent"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105020"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref30","article-title":"Adversarially learned anomaly detection on CMS open data: Re-discovering the top quark","author":"knapp","year":"2020","journal-title":"arXiv 2005 01598"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961770"},{"key":"ref36","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2017","journal-title":"Proc 5th Int Conf Learn Represent"},{"key":"ref35","first-page":"1024","article-title":"Inductive representation learning on large graphs","author":"hamilton","year":"2017","journal-title":"Proc 31st Conf Neural Inf Process Syst"},{"key":"ref34","first-page":"3844","article-title":"Convolutional neural networks on graphs with fast localized spectral filtering","author":"defferrard","year":"2016","journal-title":"Proc 30th Conf Neural Inf Process Syst"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2838668"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800458"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7965877"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2804940"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2018.05.024"},{"key":"ref24","article-title":"Anomaly detection algorithm based on FCM with improved krill herd","author":"rui","year":"2018","journal-title":"Proc Int Symp Power Electron Control Eng"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0642-6"},{"key":"ref26","first-page":"1100","article-title":"Deep structured energy based models for anomaly detection","author":"zhai","year":"2016","journal-title":"Proc 33rd Int Conf Mach Learn"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106458"},{"key":"ref50","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11241-018-9314-y"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00257"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00041"},{"key":"ref13","author":"krizhevsky","year":"2009","journal-title":"CIFAR-10 Dataset"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47436-2_52"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4020036"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00012-7_30"},{"key":"ref18","first-page":"1","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","author":"zong","year":"2018","journal-title":"Proc 6th Int Conf Learn Represent"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2018.8430788"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2919635"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1363-y"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2497705"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/1475921718757405"},{"key":"ref49","article-title":"Calculating the similarity between words and sentences using a lexical database and corpus statistics","author":"pawar","year":"2018","journal-title":"arXiv 1802 05667"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2019.02.018"},{"key":"ref46","year":"1993","journal-title":"UC Irvine Machine Learning Repository"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK.2017.8093521"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.188"},{"key":"ref47","author":"chen","year":"2019","journal-title":"ECG5000 Dataset"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"ref41","first-page":"2048","article-title":"Show, attend and tell: Neural image caption generation with visual attention","author":"xu","year":"2015","journal-title":"Proc 32nd Int Conf Mach Learn"},{"key":"ref44","article-title":"Activation functions: Comparison of trends in practice and research for deep learning","author":"nwankpa","year":"2018","journal-title":"arXiv 1811 03378"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975673.67"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6488907\/9939125\/9708436-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9939125\/09708436.pdf?arnumber=9708436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T23:00:52Z","timestamp":1670281252000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9708436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,15]]},"references-count":50,"journal-issue":{"issue":"22"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3150048","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,15]]}}}