{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:04:35Z","timestamp":1774627475149,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["T2350710232"],"award-info":[{"award-number":["T2350710232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62466025"],"award-info":[{"award-number":["62466025"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["DUT20GJ205"],"award-info":[{"award-number":["DUT20GJ205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3588674","type":"journal-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:41:57Z","timestamp":1752514917000},"page":"7302-7316","source":"Crossref","is-referenced-by-count":2,"title":["SSDCL: Semi-Supervised Denoising-Aware Contrastive Learning for Time Series Anomaly Detection in Cyber-Physical Systems"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5684-2571","authenticated-orcid":false,"given":"Jiyu","family":"Tian","sequence":"first","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7969-6415","authenticated-orcid":false,"given":"Mingchu","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4397-7212","authenticated-orcid":false,"given":"Lingling","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence, Liaoning Normal University, Dalian, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0200-7989","authenticated-orcid":false,"given":"Liming","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Dalian University of Technology, Dalian, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3510410"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3453155"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3444690"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3130234"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403392"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539117"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3391486"},{"key":"ref11","article-title":"RobustTAD: Robust time series anomaly detection via decomposition and convolutional neural networks","volume-title":"Proc. 30th ACM SIGKDD Conf. Knowl. Discovery Data Mining","author":"Gao"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3637528.3671739"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2021.3139916"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3335317"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599295"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/324"},{"key":"ref17","first-page":"13918","article-title":"TimesURL: Self-supervised contrastive learning for universal time series representation learning","volume-title":"Proc. AAAI Conf. Artif. Intell.","author":"Liu"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20881"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/624"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3369704"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25575"},{"key":"ref22","article-title":"A closer look at few-shot classification","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Chen"},{"key":"ref23","article-title":"First de-trend then attend: Rethinking attention for time-series forecasting","volume-title":"Proc. NeurIPS","author":"Zhang"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3459631"},{"key":"ref28","article-title":"Soft contrastive learning for time series","volume-title":"Proc. 12th Int. Conf. Learn. Represent.","author":"Lee"},{"key":"ref29","volume-title":"Few-shot One-Class Classification Via Meta-Learning","author":"Frikha","year":"2020"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00814"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103825","article-title":"ADT: Time series anomaly detection for cyber-physical systems via deep reinforcement learning","volume":"141","author":"Yang","year":"2024","journal-title":"Comput. Secur."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00116"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2906161"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3047675"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3197265"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/394"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613879"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3326544"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3303099"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3393996"},{"key":"ref43","first-page":"2347","article-title":"Adaptive model pooling for online deep anomaly detection from a complex evolving data stream","volume-title":"Proc. 28th ACM SIGKDD Conf. Knowl. Discovery Data Mining","author":"Yoon"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3319701"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3148276"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3582571"},{"key":"ref47","first-page":"30750","article-title":"Finding order in chaos: A novel data augmentation method for time series in contrastive learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Demirel"},{"key":"ref48","first-page":"4892","article-title":"A contrastive framework for learning sentence representations from pairwise and triple-wise perspective in angular space","volume-title":"Proc. 60th Annu. Meeting Assoc. Comput. Linguistics Long Papers","volume":"1","author":"Zhang"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3360640"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525087"},{"key":"ref51","article-title":"Big self-supervised models are strong semi-supervised learners","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref52","article-title":"Unsupervised scalable representation learning multivariate time series","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Franceschi"},{"key":"ref53","article-title":"Unsupervised representation learning for time series with temporal neighborhood coding","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Tonekaboni"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3308189"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3679732"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11079776.pdf?arnumber=11079776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T17:54:19Z","timestamp":1753379659000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11079776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3588674","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}