{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T15:56:17Z","timestamp":1776441377732,"version":"3.51.2"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100013148","name":"Science and Technology Foundation of State Grid Corporation of China","doi-asserted-by":"publisher","award":["5700-202340675A-3-3-JC"],"award-info":[{"award-number":["5700-202340675A-3-3-JC"]}],"id":[{"id":"10.13039\/501100013148","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,1]]},"DOI":"10.1109\/jiot.2024.3362398","type":"journal-article","created":{"date-parts":[[2024,2,28]],"date-time":"2024-02-28T18:57:27Z","timestamp":1709146647000},"page":"19368-19379","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly Detection via Graph Attention Networks-Augmented Mask Autoregressive Flow for Multivariate Time Series"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-3338-6815","authenticated-orcid":false,"given":"Hao","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Data and Artificial Intelligence, NARI Group Company Ltd. (State Grid Electric Power Research Institute Company Ltd.), Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1898-3714","authenticated-orcid":false,"given":"Wang","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Data and Artificial Intelligence, NARI Group Company Ltd. (State Grid Electric Power Research Institute Company Ltd.), Nanjing, China"}]},{"given":"Lixin","family":"Han","sequence":"additional","affiliation":[{"name":"College of Computer and Information, Hohai University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6331-9383","authenticated-orcid":false,"given":"Peng","family":"Gao","sequence":"additional","affiliation":[{"name":"Information Security Research Center, NARI Group Company Ltd. (State Grid Electric Power Research Institute Company Ltd.), Nanjing, China"}]},{"given":"Weiyong","family":"Yang","sequence":"additional","affiliation":[{"name":"Information Security Research Center, NARI Group Company Ltd. (State Grid Electric Power Research Institute Company Ltd.), Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6921-7369","authenticated-orcid":false,"given":"Guangjie","family":"Han","sequence":"additional","affiliation":[{"name":"Changzhou Key Laboratory of Internet of Things Technology for Intelligent River and Lake, Hohai University, Changzhou, China"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Graph-augmented normalizing flows for anomaly detection of multiple time series","author":"Dai","year":"2022"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icdm.2008.17"},{"key":"ref3","first-page":"972","article-title":"A linear method for deviation detection in large databases","volume-title":"Proc. 2nd Int. Conf. Knowl. Discov. Data Min.","author":"Arning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_62"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.1127647"},{"key":"ref8","first-page":"802","article-title":"Convolutional LSTM network: A machine learning approach for precipitation nowcasting","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Shi"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1406.1078"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345450"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref13","first-page":"1","article-title":"Semi-supervised classification with graph convolutional networks","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Kipf"},{"key":"ref14","first-page":"1","article-title":"Graph attention networks","volume-title":"Proc. 6th Int. Conf. Learn. Represent.","author":"Veli\u010dkovi\u0107"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380027"},{"key":"ref16","article-title":"Temporal graph networks for deep learning on dynamic graphs","author":"Rossi","year":"2020","journal-title":"arXiv:2006.10637"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s18103367"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref19","article-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection","author":"Malhotra","year":"2016","journal-title":"arXiv:1607.00148"},{"key":"ref20","article-title":"Anomaly detection with generative adversarial networks for multivariate time series","author":"Li","year":"2018","journal-title":"arXiv:1809.04758"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467174"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn48605.2020.9207569"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2020.2980749"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2022.3191341"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/tim.2021.3139696"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403118"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/332"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531848"},{"key":"ref29","first-page":"3621","article-title":"Deep variational graph convolutional recurrent network for multivariate time series anomaly detection","volume-title":"Proc. 39th Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539117"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/icde53745.2022.00097"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15919-0_11"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3100509"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3181737"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3094295"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2022.3227570"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86362-3_12"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86362-3_9"},{"key":"ref39","first-page":"1","article-title":"Density estimation using real NVP","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Dinh"},{"key":"ref40","first-page":"2339","article-title":"Masked autoregressive flow for density estimation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Papamakarios"},{"key":"ref41","article-title":"Multivariate probabilistic time series forecasting via conditioned normalizing flows","author":"Rasul","year":"2020","journal-title":"arXiv:2002.06103"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/icdm50108.2020.00093"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref45","volume-title":"The CERT insider threat database","author":"Trzeciak","year":"2011"},{"key":"ref46","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Ruff"},{"key":"ref47","first-page":"3711","article-title":"DROCC: Deep robust one-class classification","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Goyal"},{"key":"ref48","first-page":"1","article-title":"Deep semi-supervised anomaly detection","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Ruff"},{"key":"ref49","first-page":"1","article-title":"Pruning convolutional neural networks for resource efficient inference","volume-title":"Proc. 5th Int. Conf. Learn. Represent.","author":"Molchanov"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01264-9_8"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10536937\/10453361.pdf?arnumber=10453361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,23]],"date-time":"2024-05-23T04:50:17Z","timestamp":1716439817000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10453361\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,1]]},"references-count":50,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3362398","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,1]]}}}