{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T19:54:59Z","timestamp":1777924499496,"version":"3.51.4"},"reference-count":195,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"16","license":[{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771013"],"award-info":[{"award-number":["61771013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fundamental Research Funds of Shanghai Jiading District"},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171302"],"award-info":[{"award-number":["62171302"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012542","name":"Sichuan Science and Technology Program","doi-asserted-by":"publisher","award":["2023NSFSC1965"],"award-info":[{"award-number":["2023NSFSC1965"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Youth Science and Technology Innovation Team","award":["2022JDTD0014"],"award-info":[{"award-number":["2022JDTD0014"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,8,15]]},"DOI":"10.1109\/jiot.2023.3243391","type":"journal-article","created":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T20:35:09Z","timestamp":1676579709000},"page":"14285-14306","source":"Crossref","is-referenced-by-count":57,"title":["Unsupervised Deep Learning for IoT Time Series"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4562-7654","authenticated-orcid":false,"given":"Ya","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1129-0213","authenticated-orcid":false,"given":"Yingjie","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan university, Chengdu, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5983-198X","authenticated-orcid":false,"given":"Kai","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2292-3845","authenticated-orcid":false,"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Fudan University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref57","first-page":"1","article-title":"The Internet of Things: An overview","volume":"80","author":"rose","year":"2015","journal-title":"Proc Internet Soc (ISOC)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP49362.2020.00015"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1168\/3\/032011"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988293"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.12.024"},{"key":"ref52","first-page":"83","article-title":"Data mining concepts and techniques third edition","volume":"5","author":"han","year":"2011","journal-title":"Manag Data Syst"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCE.2015.14"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2426723"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/69.553155"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/app11125320"},{"key":"ref48","article-title":"Change and anomaly detection framework for Internet of Things data streams","author":"armon","year":"2016","journal-title":"Intel"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2603961"},{"key":"ref42","author":"brockwell","year":"2009","journal-title":"Time Series Theory and Methods"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47578-3_1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.01.008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800079"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2957602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2695738"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTAC.2017.8249990"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2312291"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2799210"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.00-54"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.149"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010051"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/S0959-440X(96)80056-X"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958551"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10182-013-0213-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10233001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.mlwa.2020.100001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2020.0209"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2923982"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2011.6019794"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.104743"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-811968-6.00009-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3444690"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.01.025"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-019-00619-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref22","article-title":"Anomaly detection in univariate time-series: A survey on the state-of-the-art","author":"braei","year":"2020","journal-title":"arxiv abs\/2004 00433"},{"key":"ref21","first-page":"21","article-title":"Time series anomaly detection in online social network: Challenges & solutions","author":"islam","year":"2017","journal-title":"Proc IEEE 1st Int Conf Mach Learn Data Eng (iCMLDE)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/312521"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11634-011-0100-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2015.04.007"},{"key":"ref128","article-title":"Feature encoding with autoencoders for weakly-supervised anomaly detection","author":"zhou","year":"2021","journal-title":"arXiv 2105 10500"},{"key":"ref129","article-title":"Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach","author":"liu","year":"2020","journal-title":"arxiv abs\/2007 09712"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"ref126","article-title":"LSTM-based encoder&#x2013;decoder for multi-sensor anomaly detection","author":"malhotra","year":"2016","journal-title":"arxiv abs\/1607 00148"},{"key":"ref96","first-page":"1298","article-title":"An unsupervised framework for anomaly detection in a water treatment system","author":"carrasco","year":"2019","journal-title":"Proc 18th IEEE Int Conf Mach Learn Appl (ICMLA)"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref99","article-title":"Self-supervised learning: Generative or contrastive","author":"liu","year":"2020","journal-title":"arxiv abs\/2006 08218"},{"key":"ref124","article-title":"Auto-encoding variational Bayes","author":"kingma","year":"2014","journal-title":"arxiv abs\/1312 6114"},{"key":"ref98","article-title":"Time series anomaly detection using convolutional neural networks and transfer learning","author":"wen","year":"2019","journal-title":"arxiv abs\/1905 13628"},{"key":"ref125","article-title":"Real-valued (medical) time series generation with recurrent conditional GANs","author":"esteban","year":"2017","journal-title":"arXiv 1706 02633"},{"key":"ref93","first-page":"5243","article-title":"Enhancing the locality and breaking the memory bottleneck of transformer on time series forecasting","volume":"32","author":"li","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_90"},{"key":"ref92","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.2307\/2282967"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_25"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2624761"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/FG.2019.8756618"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2930202"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2765202"},{"key":"ref90","article-title":"Autoencoders","author":"bank","year":"2020","journal-title":"arXiv 2003 05991"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2019.8679157"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100509"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.11.014"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1555942"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/CIC52973.2021.00013"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93417-4_38"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.glohj.2019.07.001"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403118"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3000771"},{"key":"ref82","article-title":"Quasi-recurrent neural networks","author":"bradbury","year":"2016","journal-title":"arXiv 1611 01576"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/3152494.3156816"},{"key":"ref81","article-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting","author":"shi","year":"2015","journal-title":"arXiv 1506 04214"},{"key":"ref145","article-title":"Anomaly detection models for IoT time series data","author":"giannoni","year":"2018","journal-title":"arXiv 1812 00890"},{"key":"ref84","article-title":"An empirical evaluation of generic convolutional and recurrent networks for sequence modeling","author":"bai","year":"2018","journal-title":"arXiv abs\/1803 01271"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389155"},{"key":"ref83","article-title":"Dilated recurrent neural networks","author":"chang","year":"2017","journal-title":"arXiv 1710 02224"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2020.100453"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3095853"},{"key":"ref80","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"chung","year":"2014","journal-title":"arXiv abs\/1412 3555"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00207"},{"key":"ref106","article-title":"Deep anomaly detection in packet payload","author":"liu","year":"2019","journal-title":"arXiv 1912 02549"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA.2018.8474912"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/86.895948"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682365"},{"key":"ref76","first-page":"3077","article-title":"Improving one-class SVM for anomaly detection","volume":"5","author":"li","year":"2003","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref71","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"goodfellow","year":"2015","journal-title":"Nature"},{"key":"ref111","article-title":"Clustering time series data through autoencoder-based deep learning models","author":"tavakoli","year":"2020","journal-title":"arxiv abs\/2004 07296"},{"key":"ref70","article-title":"Robust time series denoising with learnable wavelet packet transform","author":"frusque","year":"2022","journal-title":"arXiv 2206 06126"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053558"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2019.1911747"},{"key":"ref72","article-title":"Time series data augmentation for deep learning: A survey","author":"wen","year":"2020","journal-title":"arxiv abs\/2002 12478"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2017.0-126"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209703"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI47803.2020.9308512"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3038416"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988797"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/S1018-3639(18)30755-4"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3025580"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.3390\/rs12111816"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986444"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/200"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2017.8397411"},{"key":"ref113","first-page":"13","article-title":"Challenges in time-stamp aware anomaly detection in traffic videos","author":"biradar","year":"2019","journal-title":"Proc CVPR Workshops"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2844341"},{"key":"ref114","article-title":"Autoencoder-based time series clustering with energy applications","author":"richard","year":"2020","journal-title":"arxiv abs\/2002 03624"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.2000031"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2014.2329330"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.08.006"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68935-7_54"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896243"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106458"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2019.8661976"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2697440"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2899264"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47358-7_52"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.3390\/s20226578"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/3242969.3242985"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.041"},{"key":"ref173","first-page":"88","article-title":"A dataset to support research in the design of secure water treatment systems","author":"goh","year":"2016","journal-title":"Proc CRITIS"},{"key":"ref174","year":"2022","journal-title":"Water Distribution"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijepes.2018.03.025"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/s12053-014-9316-0"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.5220\/0009187802070218"},{"key":"ref180","author":"parmisano","year":"2020","journal-title":"A labeled dataset with malicious and benign IoT network traffic"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64758-2_6"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09816-7"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TRPMS.2021.3066428"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"ref187","article-title":"Meta-learning in neural networks: A survey","author":"hospedales","year":"2020","journal-title":"arXiv 2004 05439"},{"key":"ref184","year":"2022","journal-title":"The IoTHealthDataSet"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851966"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.102994"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3102056"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.065"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2840129"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2020.100377"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920699"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.atmosenv.2016.08.066"},{"key":"ref156","doi-asserted-by":"crossref","first-page":"471","DOI":"10.17576\/jsm-2018-4703-06","article-title":"Applied chemometric approach in identification sources of air quality pattern in Selangor, Malaysia","volume":"47","author":"hua","year":"2018","journal-title":"Sains Malaysiana"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICONSIP.2016.7857445"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2766085"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.12.018"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2017.8309076"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-017-0487-4"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2868609"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemolab.2014.11.003"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107093"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2020.2981636"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00015"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2474743"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2018.06.001"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC48513.2020.9065280"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2702388"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100291"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/MeditCom49071.2021.9647514"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"ref15","first-page":"3776","article-title":"Learning representations for time series clustering","author":"ma","year":"2019","journal-title":"Proc NeurIPS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118309"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7786378"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015409"},{"key":"ref17","article-title":"Unsupervised feature learning and deep learning: A review and new perspectives","author":"bengio","year":"2012","journal-title":"arxiv abs\/1206 5538"},{"key":"ref16","article-title":"Deep learning for time-series analysis","author":"gamboa","year":"2017","journal-title":"arXiv 1701 01887"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107975"},{"key":"ref18","first-page":"1048","article-title":"Unsupervised anomaly based botnet detection in IoT networks","author":"omm","year":"2018","journal-title":"Proc 17th IEEE Int Conf Mach Learn Appl (ICMLA)"},{"key":"ref2","author":"manyika","year":"2015","journal-title":"The Internet of Things Mapping the Value beyond the Hype"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2025794"},{"key":"ref191","article-title":"TimeAutoML: Autonomous representation learning for multivariate irregularly sampled time series","author":"jiao","year":"2020","journal-title":"arXiv 2010 01596"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.02.046"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918951"},{"key":"ref195","article-title":"Privacy in deep learning: A survey","author":"mireshghallah","year":"2020","journal-title":"arXiv 2004 12254"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983110"},{"key":"ref194","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n?","year":"2016","journal-title":"arXiv 1610 05492"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10210448\/10043819.pdf?arnumber=10043819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T18:05:40Z","timestamp":1693245940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10043819\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,15]]},"references-count":195,"journal-issue":{"issue":"16"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3243391","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,15]]}}}