{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T17:24:50Z","timestamp":1775237090662,"version":"3.50.1"},"reference-count":203,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"21","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Canada NSERC Discovery Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,11,1]]},"DOI":"10.1109\/jiot.2025.3585884","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T13:52:10Z","timestamp":1751637130000},"page":"44318-44342","source":"Crossref","is-referenced-by-count":32,"title":["Deep Learning Advancements in Anomaly Detection: A Comprehensive Survey"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-7820-9746","authenticated-orcid":false,"given":"Haoqi","family":"Huang","sequence":"first","affiliation":[{"name":"Lassonde School of Engineering, York University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1599-5480","authenticated-orcid":false,"given":"Ping","family":"Wang","sequence":"additional","affiliation":[{"name":"Lassonde School of Engineering, York University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4066-9230","authenticated-orcid":false,"given":"Jianhua","family":"Pei","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1252-8761","authenticated-orcid":false,"given":"Jiacheng","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]},{"given":"Shahen","family":"Alexanian","sequence":"additional","affiliation":[{"name":"Lassonde School of Engineering, York University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3677"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106382"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2973314"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.0001.1900097"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.9734\/ajrcos\/2021\/v9i230218"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2022.105548"},{"issue":"10","key":"ref8","first-page":"1","article-title":"Enhancing system observability with machine learning techniques for anomaly detection","volume":"14","author":"Bauskar","year":"2024","journal-title":"Int. J. Manag. IT Eng."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3077803"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.10.328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106878"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106816"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2023.3293772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2020.3007880"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/3538598.3538602"},{"key":"ref17","first-page":"1100","article-title":"Deep structured energy based models for anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Zhai"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ymssp.2019.106495"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30507-8_13"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s40745-021-00362-9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"ref22","article-title":"Deep nearest neighbor anomaly detection","author":"Bergman","year":"2020","journal-title":"arXiv:2002.10445"},{"key":"ref23","first-page":"333","article-title":"Unsupervised anomaly detection in network intrusion detection using clusters","volume-title":"Proc. 28th Aust. Conf. Comput. Sci.","volume":"38","author":"Leung"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254895"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1117-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105124"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2980749"},{"key":"ref28","article-title":"A comprehensive survey and analysis of generative models in machine learning","volume":"38","author":"Harshvardhan","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevD.101.075042"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083060"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.12.093"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103383"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111235"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.06.042"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp48618.2020.00-97"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/s23115024"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_8"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"ref41","volume-title":"The MNIST database of handwritten digits","author":"LeCun","year":"2025"},{"key":"ref42","volume-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref43","volume-title":"ODDS library: Outlier detection DataSets","author":"Rayana","year":"2025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00320-x"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100463"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2278017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2689746.2689747"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.3004478"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2968750"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539117"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3004312"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.nucengdes.2020.110699"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-05993-w"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.4266498"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3102110"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107969"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3205643"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121000"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3107783"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3003933"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/app11135861"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.10.008"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03501-8"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2021.3132852"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2019.114145"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3078381"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3464423"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-020-00985-1"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100402"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.116429"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2815178"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3066316"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.02.022"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/s10278-020-00413-2"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2022.102475"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2021.12.008"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3107163"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2020.101857"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2021.3093883"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.02.027"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2984093"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.103915"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3140058"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3361474"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3422622"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3626235"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3116668"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00838"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103733"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121161"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2976752"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993373"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.07.026"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2905606"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2020.1849876"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103569"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120284"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2021.3118635"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3288226"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3128667"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3097097"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2021.3057721"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2024.3411009"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123535"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3127716"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.2968516"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/332"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3022432"},{"key":"ref113","article-title":"Adversarial autoencoders","author":"Makhzani","year":"2015","journal-title":"arXiv:1511.05644"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3404027"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123010"},{"key":"ref116","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16452-1_4"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00624"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120612"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3290813"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121533"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111387"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2024.3407544"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28690"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111912"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.physd.2019.132306"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-020-09838-1"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103498"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2017.8053243"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3164087"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.renene.2021.03.078"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2021.103228"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.11.023"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3038991"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/EI247390.2019.9061946"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111002"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3339975"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103094"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.11.047"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111507"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105964"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.14778\/3514061.3514067"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102357"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.09.018"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110725"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.08.011"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.09.038"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3106940"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.127791"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3468464"},{"key":"ref152","article-title":"Large language models can deliver accurate and interpretable time series anomaly detection","author":"Liu","year":"2024","journal-title":"arXiv:2405.15370"},{"key":"ref153","article-title":"HuntGPT: Integrating machine learning-based anomaly detection and explainable AI with large language models (LLMs)","author":"Ali","year":"2023","journal-title":"arXiv:2309.16021"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3680685"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/BigData62323.2024.10825679"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/239"},{"key":"ref157","article-title":"LLM-assisted physical invariant extraction for cyber-physical systems anomaly detection","author":"Abshari","year":"2024","journal-title":"arXiv:2411.10918"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/3664647.3681190"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103645"},{"key":"ref160","article-title":"Holmes-VAD: Towards unbiased and explainable video anomaly detection via multi-modal LLM","author":"Zhang","year":"2024","journal-title":"arXiv:2406.12235"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA63151.2024.00084"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2024.3443141"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3094295"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211306"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16523"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3100509"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3325667"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM50108.2020.00093"},{"key":"ref170","first-page":"3621","article-title":"Deep variational graph convolutional recurrent network for multivariate time series anomaly detection","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Chen"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.11.024"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109235"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3230361"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.04.089"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126644"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2019.9010051"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0484-y"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.849"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.139"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICICCS53718.2022.9788440"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1002\/widm.53"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106919"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01055"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110550"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2020.2992934"},{"key":"ref186","article-title":"Fastflow: Unsupervised anomaly detection and localization via 2d normalizing flows","author":"Yu","year":"2021","journal-title":"arXiv:2111.07677"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2022.108703"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3349613"},{"key":"ref189","article-title":"Graph-augmented normalizing flows for anomaly detection of multiple time series","author":"Dai","year":"2022","journal-title":"arXiv:2202.07857"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.04.020"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3194920"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref193","article-title":"Time series data augmentation for deep learning: A survey","author":"Wen","year":"2020","journal-title":"arXiv:2002.12478"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106106"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2906038"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3196049"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3389714"},{"key":"ref199","article-title":"TOD: GPU-accelerated outlier detection via tensor operations","author":"Zhao","year":"2021","journal-title":"arXiv:2110.14007"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1051\/bioconf\/20249700019"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.03.091"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1186\/s40708-024-00222-1"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3411481"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11217273\/11071924.pdf?arnumber=11071924","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T21:09:57Z","timestamp":1771362597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11071924\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"references-count":203,"journal-issue":{"issue":"21"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3585884","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,1]]}}}