{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:50:54Z","timestamp":1764874254377,"version":"3.46.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2024YFB3310900"],"award-info":[{"award-number":["2024YFB3310900"]}]},{"DOI":"10.13039\/501100003787","name":"Natural Science Foundation of Hebei Province","doi-asserted-by":"publisher","award":["F2023202076"],"award-info":[{"award-number":["F2023202076"]}],"id":[{"id":"10.13039\/501100003787","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tmc.2025.3604253","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:43:59Z","timestamp":1756489439000},"page":"1254-1269","source":"Crossref","is-referenced-by-count":0,"title":["Transfer Learning Assisted Detection of Anomalous Events With Insufficient Primary Attribute Data Samples in MEC Networks"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3707-069X","authenticated-orcid":false,"given":"Jine","family":"Tang","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7163-6068","authenticated-orcid":false,"given":"Xiaotong","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Artificial Intelligence, Hebei University of Technology, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5385-1402","authenticated-orcid":false,"given":"Song","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Information Technology, Deakin University, Geelong, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3195-2253","authenticated-orcid":false,"given":"Zhangbing","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Engineering, China University of Geosciences, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3549765"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3349305"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3221086"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109486"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3225476"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.10.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110054"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.110127"},{"issue":"1","key":"ref9","first-page":"45","article-title":"A blockchain-based approach for data deduplication in IoT networks","volume":"20","author":"Zhao","year":"2023","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2023.3287193"},{"issue":"3","key":"ref11","first-page":"1023","article-title":"Dimensionality reduction for high-dimensional data: A comprehensive review","volume":"35","author":"Liu","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-020-02016-y"},{"key":"ref13","first-page":"5689","article-title":"GAIN: Missing data imputation using generative adversarial Nets","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Yoon"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3377851"},{"issue":"4","key":"ref15","first-page":"1437","article-title":"A survey of time series imputation: Methods, challenges, and future directions","volume":"36","author":"Wang","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09513-1"},{"issue":"2","key":"ref17","first-page":"245","article-title":"Performance of interpolation methods for missing data in time series: A comparative study","volume":"45","author":"Liu","year":"2023","journal-title":"J. Time Ser. Anal."},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.033"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/sym12060886"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107315"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3248064"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.enconman.2020.113106"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.02.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108431"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3203700"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.02.028"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/sym14030454"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07377-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114430"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.005"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3096245"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3289611"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3086687"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113391"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.02.007"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119520"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3270293"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1002\/lom3.10556"},{"article-title":"Skoltech anomaly benchmark (SKAB)","year":"2020","author":"Katser","key":"ref39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3025875"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2022.3212547"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s22166185"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109456"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3201379"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.08.019"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2023.3295461"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010041"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2024.3365159"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.102182"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.112491"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/11275706\/11144518.pdf?arnumber=11144518","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:39:22Z","timestamp":1764873562000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11144518\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2025.3604253","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}