{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:56Z","timestamp":1750306196899,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T00:00:00Z","timestamp":1498694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1313606 and DBI-1565137"],"award-info":[{"award-number":["IIS-1313606 and DBI-1565137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"crossref","award":["R01GM115833-01"],"award-info":[{"award-number":["R01GM115833-01"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2017,11,30]]},"abstract":"<jats:p>Detecting system anomalies is an important problem in many fields such as security, fault management, and industrial optimization. Recently, invariant network has shown to be powerful in characterizing complex system behaviours. In the invariant network, a node represents a system component and an edge indicates a stable, significant interaction between two components. Structures and evolutions of the invariance network, in particular the vanishing correlations, can shed important light on locating causal anomalies and performing diagnosis. However, existing approaches to detect causal anomalies with the invariant network often use the percentage of vanishing correlations to rank possible casual components, which have several limitations: (1) fault propagation in the network is ignored, (2) the root casual anomalies may not always be the nodes with a high percentage of vanishing correlations, (3) temporal patterns of vanishing correlations are not exploited for robust detection, and (4) prior knowledge on anomalous nodes are not exploited for (semi-)supervised detection. To address these limitations, in this article we propose a network diffusion based framework to identify significant causal anomalies and rank them. Our approach can effectively model fault propagation over the entire invariant network and can perform joint inference on both the structural and the time-evolving broken invariance patterns. As a result, it can locate high-confidence anomalies that are truly responsible for the vanishing correlations and can compensate for unstructured measurement noise in the system. Moreover, when the prior knowledge on the anomalous status of some nodes are available at certain time points, our approach is able to leverage them to further enhance the anomaly inference accuracy. When the prior knowledge is noisy, our approach also automatically learns reliable information and reduces impacts from noises. By performing extensive experiments on synthetic datasets, bank information system datasets, and coal plant cyber-physical system datasets, we demonstrate the effectiveness of our approach.<\/jats:p>","DOI":"10.1145\/3046946","type":"journal-article","created":{"date-parts":[[2017,6,30]],"date-time":"2017-06-30T12:36:19Z","timestamp":1498826179000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Ranking Causal Anomalies for System Fault Diagnosis via Temporal and Dynamical Analysis on Vanishing Correlations"],"prefix":"10.1145","volume":"11","author":[{"given":"Wei","family":"Cheng","sequence":"first","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Jingchao","family":"Ni","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2111-7617","authenticated-orcid":false,"given":"Kai","family":"Zhang","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Haifeng","family":"Chen","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Guofei","family":"Jiang","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Yu","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles, Los Angeles, CA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"volume-title":"Convex Optimization","author":"Boyd Stephen","key":"e_1_2_1_3_1","unstructured":"Stephen Boyd and Lieven Vandenberghe . 2004. Convex Optimization . Cambridge University Press . Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. Cambridge University Press."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.51"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2601436"},{"volume-title":"Fault Detection and Diagnosis in Engineering Systems","author":"Gertler Janos","key":"e_1_2_1_8_1","unstructured":"Janos Gertler . 1998. Fault Detection and Diagnosis in Engineering Systems . CRC Press . Janos Gertler. 1998. Fault Detection and Diagnosis in Engineering Systems. CRC Press."},{"key":"e_1_2_1_9_1","unstructured":"Satoshi Hara Tetsuro Morimura Toshihiro Takahashi Hiroki Yanagisawa and Taiji Suzuki. 2015. A consistent method for graph based anomaly localization. In AISTATS. 333--341.  Satoshi Hara Tetsuro Morimura Toshihiro Takahashi Hiroki Yanagisawa and Taiji Suzuki. 2015. A consistent method for graph based anomaly localization. In AISTATS. 333--341."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835828"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557147"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014102"},{"volume-title":"Proximity-based anomaly detection using sparse structure learning","author":"Id\u00e9 Tsuyoshi","key":"e_1_2_1_13_1","unstructured":"Tsuyoshi Id\u00e9 , Aurelie C. Lozano , Naoki Abe , and Yan Liu . 2009. Proximity-based anomaly detection using sparse structure learning . In SDM. SIAM , 97--108. Tsuyoshi Id\u00e9, Aurelie C. Lozano, Naoki Abe, and Yan Liu. 2009. Proximity-based anomaly detection using sparse structure learning. In SDM. SIAM, 97--108."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.12"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2006.1662399"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.52"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190648"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88690-7_20"},{"key":"e_1_2_1_20_1","unstructured":"Daniel D. Lee and H. Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In NIPS. 556--562.  Daniel D. Lee and H. Sebastian Seung. 2001. Algorithms for non-negative matrix factorization. In NIPS. 556--562."},{"key":"e_1_2_1_21_1","volume-title":"System Identification: Theory for the User","author":"Lennart Ljung","year":"1999","unstructured":"Ljung Lennart . 1999 . System Identification: Theory for the User . PTR Prentice Hall , Upper Saddle River, NJ, 1--14. Ljung Lennart. 1999. System Identification: Theory for the User. PTR Prentice Hall, Upper Saddle River, NJ, 1--14."},{"volume-title":"\u201cbacktrace","author":"Liu Chao","key":"e_1_2_1_22_1","unstructured":"Chao Liu , Xifeng Yan , Hwanjo Yu , Jiawei Han , and S. Yu Philip . 2005. Mining behavior graphs for \u201cbacktrace \u201d of noncrashing bugs. In SDM. SIAM , 286--297. Chao Liu, Xifeng Yan, Hwanjo Yu, Jiawei Han, and S. Yu Philip. 2005. Mining behavior graphs for \u201cbacktrace\u201d of noncrashing bugs. In SDM. SIAM, 286--297."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433479"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150445"},{"key":"e_1_2_1_25_1","volume-title":"Barto","author":"Sutton Richard S.","year":"1998","unstructured":"Richard S. Sutton and Andrew G . Barto . 1998 . Reinforcement Learning : An Introduction. MIT Press , Cambridge, MA. Richard S. Sutton and Andrew G. Barto. 1998. Reinforcement Learning: An Introduction. MIT Press, Cambridge, MA."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.74"},{"key":"e_1_2_1_27_1","volume-title":"Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Ser. B (Methodological)","author":"Tibshirani Robert","year":"1996","unstructured":"Robert Tibshirani . 1996. Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Ser. B (Methodological) ( 1996 ), 267--288. Robert Tibshirani. 1996. Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Ser. B (Methodological) (1996), 267--288."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.70"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.492975"},{"key":"e_1_2_1_30_1","volume-title":"Protein function prediction by integrating multiple kernels","author":"Yu Guoxian","year":"1869","unstructured":"Guoxian Yu , Huzefa Rangwala , Carlotta Domeniconi , Guoji Zhang , and Zili Zhang . 2013. Protein function prediction by integrating multiple kernels . In IJCAI. AAAI Press , 1869 --1875. Guoxian Yu, Huzefa Rangwala, Carlotta Domeniconi, Guoji Zhang, and Zili Zhang. 2013. Protein function prediction by integrating multiple kernels. In IJCAI. AAAI Press, 1869--1875."},{"key":"e_1_2_1_31_1","volume-title":"Jason Weston, and Bernhard Sch\u00f6lkopf.","author":"Zhou Dengyong","year":"2004","unstructured":"Dengyong Zhou , Olivier Bousquet , Thomas Navin Lal , Jason Weston, and Bernhard Sch\u00f6lkopf. 2004 . Learning with local and global consistency. In NIPS. 321--328. Dengyong Zhou, Olivier Bousquet, Thomas Navin Lal, Jason Weston, and Bernhard Sch\u00f6lkopf. 2004. Learning with local and global consistency. In NIPS. 321--328."}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3046946","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3046946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:24Z","timestamp":1750218624000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3046946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,29]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,11,30]]}},"alternative-id":["10.1145\/3046946"],"URL":"https:\/\/doi.org\/10.1145\/3046946","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2017,6,29]]},"assertion":[{"value":"2016-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}