{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T06:32:52Z","timestamp":1777444372555,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,25]],"date-time":"2019-07-25T00:00:00Z","timestamp":1564012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Okawa Research Grant"},{"name":"Beijing National Research Center for Information Science and Technology (BNRist)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,25]]},"DOI":"10.1145\/3292500.3330672","type":"proceedings-article","created":{"date-parts":[[2019,7,26]],"date-time":"2019-07-26T13:17:26Z","timestamp":1564147046000},"page":"2828-2837","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1335,"title":["Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network"],"prefix":"10.1145","author":[{"given":"Ya","family":"Su","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Youjian","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chenhao","family":"Niu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Rong","family":"Liu","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Wei","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:1412.3555","author":"Chung Junyoung","year":"2014"},{"key":"e_1_3_2_1_2_1","unstructured":"Junyoung Chung Kyle Kastner Laurent Dinh Kratarth Goel Aaron C Courville and Yoshua Bengio. 2015. A recurrent latent variable model for sequential data. In Advances in neural information processing systems. 2980--2988.   Junyoung Chung Kyle Kastner Laurent Dinh Kratarth Goel Aaron C Courville and Yoshua Bengio. 2015. A recurrent latent variable model for sequential data. In Advances in neural information processing systems. 2980--2988."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220040"},{"key":"e_1_3_2_1_4_1","volume-title":"Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. arXiv preprint arXiv:1612.06676","author":"Filonov Pavel","year":"2016"},{"key":"e_1_3_2_1_5_1","volume-title":"Ulrich Paquet, and Ole Winther.","author":"Fraccaro Marco","year":"2016"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Second International Conference on Learning Representations (ICLR","author":"Diederik","year":"2014"},{"key":"e_1_3_2_1_8_1","series-title":"Smoothness Priors Analysis of Time Series","volume-title":"Linear Gaussian State Space Modeling","author":"Kitagawa Genshiro"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623374"},{"key":"e_1_3_2_1_11_1","volume-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148","author":"Malhotra Pankaj","year":"2016"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939783"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v35i4.2553"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788624"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8206437"},{"key":"e_1_3_2_1_18_1","volume-title":"Variational Inference with Normalizing Flows. Computer Science","author":"Rezende Danilo Jimenez","year":"2015"},{"key":"e_1_3_2_1_19_1","volume-title":"Monte Carlo statistical methods","author":"Robert Christian"},{"key":"e_1_3_2_1_20_1","volume-title":"2010 IEEE International Conference on Automation Science and Engineering. 210--215","author":"Rodriguez A."},{"key":"e_1_3_2_1_21_1","volume-title":"Parallel networks that learn to pronounce English text. Complex systems","author":"Sejnowski Terrence J","year":"1987"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098124"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365969"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Learning Representations.","author":"Zong Bo","year":"2018"}],"event":{"name":"KDD '19: The 25th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Anchorage AK USA","acronym":"KDD '19","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3292500.3330672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:09Z","timestamp":1750208529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3292500.3330672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,25]]},"references-count":27,"alternative-id":["10.1145\/3292500.3330672","10.1145\/3292500"],"URL":"https:\/\/doi.org\/10.1145\/3292500.3330672","relation":{},"subject":[],"published":{"date-parts":[[2019,7,25]]},"assertion":[{"value":"2019-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}