{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:24:27Z","timestamp":1770337467740,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972144"],"award-info":[{"award-number":["61972144"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62025201"],"award-info":[{"award-number":["62025201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/tnse.2022.3189365","type":"journal-article","created":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T19:31:02Z","timestamp":1657308662000},"page":"3531-3545","source":"Crossref","is-referenced-by-count":18,"title":["A Novel Sequence Tensor Recovery Algorithm for Quick and Accurate Anomaly Detection"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7309-2426","authenticated-orcid":false,"given":"Wenbin","family":"Huang","sequence":"first","affiliation":[{"name":"Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2163-2723","authenticated-orcid":false,"given":"Kun","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of College of Computer Science and Electronics Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7896-5388","authenticated-orcid":false,"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"Department of School of Computer and Information Engineering, Central South University of Forestry and Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0204507"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0022002719861676"},{"key":"ref3","first-page":"999","article-title":"Finding network misconfigurations by automatic template inference","volume-title":"Proc. Netw. Syst. Des. Implementation","author":"Kakarla","year":"2020"},{"key":"ref4","article-title":"Applying Attestation to the Border Gateway Protocol","author":"Filsfils","year":"2020"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref6","article-title":"Anomaly detection with generative adversarial networks for multivariate time series","author":"Li","year":"2018"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PIC.2010.5687485"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/24.664004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796653"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2784361"},{"key":"ref11","first-page":"4","article-title":"Streaming classification with emerging new class by class matrix sketching","author":"Liu","year":"2017","journal-title":"Proc. 31st AAAI Conf. Artif. Intell."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-019-03508-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057217"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107271"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.074"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110588"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2748590"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802833"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2978769"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-019-01257-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2813320"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2819892"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486332"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2761704"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2819507"},{"key":"ref27","first-page":"374","article-title":"Beyond streams and graphs: Dynamic tensor analysis","volume-title":"Proc. 12th ACM SIGKDD Int. Conf. Knowl. Discov. Data Mining","author":"Jimeng","year":"2006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111341"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2775230"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218633"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2595569"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2019.124783"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2017.2690524"},{"key":"ref37","first-page":"268","article-title":"Tensor vs matrix methods: Robust tensor decomposition under block sparse perturbations","author":"Anandkumar","year":"2016","journal-title":"Proc. Artif. Intell. Statist."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2891760"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8058-6"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2017.04.002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2227-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-018-0475-8"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-00672-6"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102763"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1049\/iet-gtd.2019.1790"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524463"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2797094"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737562"},{"key":"ref51","article-title":"Compromising PCA-based anomaly detectors for network-wide traffic","author":"Rubinstein","year":"2008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1023\/B:JONS.0000015698.32353.61"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6211919"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/9882997\/09822960.pdf?arnumber=9822960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T05:33:53Z","timestamp":1706765633000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9822960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":50,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2022.3189365","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}