{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:35:39Z","timestamp":1764174939184,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T00:00:00Z","timestamp":1604275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2499"],"award-info":[{"award-number":["N00014-17-1-2499"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3400302.3415672","type":"proceedings-article","created":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T01:19:19Z","timestamp":1608254359000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["IoT-CAD"],"prefix":"10.1145","author":[{"given":"Rozhin","family":"Yasaei","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Felix","family":"Hernandez","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Mohammad Abdullah Al","family":"Faruque","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMTECH.2017.8065757"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2013.6583680"},{"volume-title":"Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. 29th Usenix Security","year":"2020","author":"Barua Anomadarshi","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744922"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2015.7344872"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968456.2974008"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310085"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203896"},{"volume-title":"Anomaly Detection for IoT Time-Series Data: A Survey. Internet of Things Journal","year":"2019","author":"Cook Andrew","key":"e_1_3_2_1_11_1"},{"volume-title":"Arnav Vaibhav Malawade, John Charles Chaput, William H Grover, Philip Brisk, and Mohammad Abdullah Al Faruque.","year":"2019","author":"Faezi Sina","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate Industrial Time Series with Cyber-Attack Simulation: Fault Detection Using an LSTM-based Predictive Data Model. arXiv:1612.06676 [cs.LG]  Pavel Filonov Andrey Lavrentyev and Artem Vorontsov. 2016. Multivariate Industrial Time Series with Cyber-Attack Simulation: Fault Detection Using an LSTM-based Predictive Data Model. arXiv:1612.06676 [cs.LG]"},{"volume-title":"Anomaly Detection Models for IoT Time Series Data. arXiv","year":"2018","author":"Giannoni Federico","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2016.7870046"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"volume-title":"Sungwook Kang, Jung Kyu Park, and Huy Kang Kim.","year":"2015","author":"Han Mee Lan","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(03)00003-5"},{"volume-title":"Long short-term memory. Neural computation 9, 8","year":"1997","author":"Hochreiter Sepp","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819251"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00502-016-0428-4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/316"},{"volume-title":"CANN: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-based systems 78","year":"2015","author":"Lin Wei-Chao","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171119"},{"volume-title":"DS 31: Proceedings of ICED 03, the 14th International Conference on Engineering Design","year":"2003","author":"Longueville Barth\u00e9l\u00e9my","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.7500\/AEPS20181012004"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019325"},{"volume-title":"Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering. Internet of Things Journal","year":"2017","author":"Lyu Lingjuan","key":"e_1_3_2_1_29_1"},{"volume-title":"International Joint Conference on Neural Networks.","year":"2003","author":"Ma Junshui","key":"e_1_3_2_1_30_1"},{"volume-title":"LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148","year":"2016","author":"Malhotra Pankaj","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"Pankaj Malhotra Vishnu TV Anusha Ramakrishnan Gaurangi Anand Lovekesh Vig Puneet Agarwal and Gautam Shroff. 2016. Multi-Sensor Prognostics using an Unsupervised Health Index based on LSTM Encoder-Decoder. arXiv:1608.06154 [cs.LG]  Pankaj Malhotra Vishnu TV Anusha Ramakrishnan Gaurangi Anand Lovekesh Vig Puneet Agarwal and Gautam Shroff. 2016. Multi-Sensor Prognostics using an Unsupervised Health Index based on LSTM Encoder-Decoder. arXiv:1608.06154 [cs.LG]"},{"volume-title":"Proceedings. Presses universitaires de Louvain, 89","year":"2015","author":"Malhotra Pankaj","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660334"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2018.8465788"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Yao Qin Dongjin Song Haifeng Chen Wei Cheng Guofei Jiang and Garrison Cottrell. 2017. A Dual-Stage Attention-Based Recurrent Neural Network for Time Series Prediction. arXiv:1704.02971 [cs.LG]  Yao Qin Dongjin Song Haifeng Chen Wei Cheng Guofei Jiang and Garrison Cottrell. 2017. A Dual-Stage Attention-Based Recurrent Neural Network for Time Series Prediction. arXiv:1704.02971 [cs.LG]","DOI":"10.24963\/ijcai.2017\/366"},{"volume-title":"SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks 11, 8","year":"2013","author":"Raza Shahid","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510811"},{"volume-title":"SAKE: Software Attestation for Key Establishment in Sensor Networks. In Distributed Computing in Sensor Systems, Sotiris E","year":"2008","author":"Seshadri Arvind","key":"e_1_3_2_1_40_1"},{"volume-title":"Workshop on Wireless Security.","author":"Seshadri Arvind","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3140257"},{"key":"e_1_3_2_1_43_1","unstructured":"Yuankai Wu and Huachun Tan. 2016. Short-term traffic flow forecasting with spatial-temporal correlation in a hybrid deep learning framework. arXiv:1612.01022 [cs.CV]  Yuankai Wu and Huachun Tan. 2016. Short-term traffic flow forecasting with spatial-temporal correlation in a hybrid deep learning framework. arXiv:1612.01022 [cs.CV]"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17071501"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2016.0208"}],"event":{"name":"ICCAD '20: IEEE\/ACM International Conference on Computer-Aided Design","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE CEDA","IEEE CS"],"location":"Virtual Event USA","acronym":"ICCAD '20"},"container-title":["Proceedings of the 39th International Conference on Computer-Aided Design"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415672","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3400302.3415672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:52Z","timestamp":1750197772000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3400302.3415672"}},"subtitle":["context-aware adaptive anomaly detection in IoT systems through sensor association"],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":46,"alternative-id":["10.1145\/3400302.3415672","10.1145\/3400302"],"URL":"https:\/\/doi.org\/10.1145\/3400302.3415672","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}