{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:20:00Z","timestamp":1769214000300,"version":"3.49.0"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Rogers Communications Canada Inc."},{"name":"Mitacs Accelerate Grant"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1109\/tmc.2025.3582195","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T13:29:32Z","timestamp":1750685372000},"page":"11657-11674","source":"Crossref","is-referenced-by-count":0,"title":["Anomaly Detection and Localization in NFV Systems by Utilizing Masked-Autoencoder and XAI"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0447-6407","authenticated-orcid":false,"given":"Seyed Soheil","family":"Johari","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1101-6716","authenticated-orcid":false,"given":"Nashid","family":"Shahriar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Regina, Regina, SK, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0740-1061","authenticated-orcid":false,"given":"Massimo","family":"Tornatore","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7936-6862","authenticated-orcid":false,"given":"Raouf","family":"Boutaba","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Aladdin","family":"Saleh","sequence":"additional","affiliation":[{"name":"Rogers Communications Canada Inc., Toronto, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601201"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185495"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2018.00031"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165361"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s23115340"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3362991"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269108"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.09.078"},{"key":"ref12","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Zong","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01070"},{"key":"ref14","article-title":"Pseudo-label: The simple and efficient semi-supervised learning method for deep neural networks","volume-title":"Proc. Workshop Challenges Representation Learn.","author":"Lee","year":"2013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"ref16","article-title":"Dataset augmentation in feature space","author":"DeVries","year":"2017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05057-3_5"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789938"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/fi14020059"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109281"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-00925-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2598420"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3183216"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.32"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-021-00941-x"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC52510.2021.9621043"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269100"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.058"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2016.7562212"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3086424"},{"key":"ref31","article-title":"Anomaly detection for tabular data with internal contrastive learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Shenkar","year":"2022"},{"key":"ref32","first-page":"2370","article-title":"Semanticmask: A contrastive view design for anomaly detection in tabular data","volume-title":"Proc. 33rd Int. Joint Conf. Artif. Intell.","author":"Tao","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3326096"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.3029459"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ITC3249928.2020.00012"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803446"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3203246"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327795"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS56928.2023.10154357"},{"key":"ref40","first-page":"18153","article-title":"Latent outlier exposure for anomaly detection with contaminated data","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Qiu","year":"2022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3191341"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/fi14030080"},{"key":"ref43","article-title":"Deep semi-supervised anomaly detection","author":"Ruff","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599302"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502423"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.68"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282383"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010064"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481903"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747882"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS54207.2022.9789858"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2575829"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2023.3294506"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322496"},{"key":"ref56","first-page":"4768","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg","year":"2017"},{"key":"ref57","article-title":"itu-ai-ml-in-5g-challenge","year":"2020"},{"key":"ref59","article-title":"iptables","year":"2001"},{"key":"ref60","article-title":"suricata - open source ids\/ips\/nsm engine","year":"2010"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906427"},{"key":"ref62","article-title":"ntopng - high-speed web-based traffic analysis and flow collection","year":"2013"},{"key":"ref63","first-page":"664","article-title":"Savi testbed: Control and management of converged virtual ICT resources","volume-title":"Proc. 2013 IFIP\/IEEE Int. Symp. Integr. Netw. Manage.","author":"Kang","year":"2013"},{"key":"ref66","article-title":"Active learning literature survey","author":"Settles","year":"2009"},{"key":"ref67","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff","year":"2018"},{"key":"ref68","article-title":"Scarf: Self-supervised contrastive learning using random feature corruption","author":"Bahri","year":"2021"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11192678\/11048415.pdf?arnumber=11048415","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T19:41:57Z","timestamp":1759779717000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11048415\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":65,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3582195","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11]]}}}