{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:38Z","timestamp":1750220378088,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T00:00:00Z","timestamp":1627603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,30]]},"DOI":"10.1145\/3472634.3472656","type":"proceedings-article","created":{"date-parts":[[2021,10,3]],"date-time":"2021-10-03T06:09:29Z","timestamp":1633241369000},"page":"87-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System"],"prefix":"10.1145","author":[{"given":"Yihong","family":"Yang","sequence":"first","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Xiaolong","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology, China"}]},{"given":"Lina","family":"Wang","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Weiyi","family":"Zhong","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Chao","family":"Yan","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]},{"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[{"name":"Qufu Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2017.02.058"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2258-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045676"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885534"},{"volume-title":"Isolation forest. In 2008 eighth ieee international conference on data mining","author":"Liu Fei\u00a0Tony","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0971-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063948"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006354"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767852"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3401979"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408319"},{"volume-title":"Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing","year":"2020","author":"Xu Xiaolong","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2909137"},{"volume-title":"Service offloading with deep Q-network for digital twinning empowered Internet of Vehicles in edge computing","year":"2020","author":"Xu Xiaolong","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.2995622"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936869"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1066-2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.145"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107049"}],"event":{"name":"ACM TURC 2021: ACM Turing Award Celebration Conference - China ( ACM TURC 2021)","acronym":"ACM TURC 2021","location":"Hefei China"},"container-title":["ACM Turing Award Celebration Conference - China ( ACM TURC 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472634.3472656","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472634.3472656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:18Z","timestamp":1750191498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472634.3472656"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,30]]},"references-count":19,"alternative-id":["10.1145\/3472634.3472656","10.1145\/3472634"],"URL":"https:\/\/doi.org\/10.1145\/3472634.3472656","relation":{},"subject":[],"published":{"date-parts":[[2021,7,30]]},"assertion":[{"value":"2021-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}