{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:48Z","timestamp":1750220388758,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3506990","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Residual size is not enough for anomaly detection"],"prefix":"10.1145","author":[{"given":"Jeong-Han","family":"Yun","sequence":"first","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Jonguk","family":"Kim","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Won-Seok","family":"Hwang","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]},{"given":"Young Geun","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]},{"given":"Simon S.","family":"Woo","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Republic of Korea"}]},{"given":"Byung-Gil","family":"Min","sequence":"additional","affiliation":[{"name":"The Affiliated Institute of ETRI, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"S. Ahmad and S. Purdy. 2016. Real-time anomaly detection for streaming analytics. In arXiv.","DOI":"10.1016\/j.neucom.2017.04.070"},{"volume-title":"ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS.","author":"Ahmed C. M.","key":"e_1_3_2_1_2_1","unstructured":"C. M. Ahmed, G. R. Mani, and A. P. Mathur. 2020. Challenges in Machine Learning based approaches for Real-Time Anomaly Detection in Industrial Control Systems. In ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS."},{"volume-title":"Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks.","author":"Ahmed C. M.","key":"e_1_3_2_1_3_1","unstructured":"C. M. Ahmed, V. R. Palleti, and A. P. Mathur. 2017. WADI: a water distribution testbed for research in the design of secure cyber physical systems. In Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks."},{"volume-title":"Proceedings of the 34th Annual Computer Security Applications Conference.","author":"Ahmed C. M.","key":"e_1_3_2_1_4_1","unstructured":"C. M. Ahmed, J. Zhou, and A. P. Mathur. 2018. Noise Matters: Using Sensor and Process Noise Fingerprint to Detect Stealthy Cyber Attacks and Authenticate Sensors in CPS. In Proceedings of the 34th Annual Computer Security Applications Conference."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 28th International Conference on Neural Information Processing Systems -","volume":"1","author":"Andoni A.","unstructured":"A. Andoni, P. Indyk, T. Laarhoven, I. Razenshteyn, and L. Schmidt. 2015. Practical and Optimal LSH for Angular Distance. In Proceedings of the 28th International Conference on Neural Information Processing Systems - Volume 1."},{"volume-title":"Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.","author":"Audibert J.","key":"e_1_3_2_1_6_1","unstructured":"J. Audibert, P. Michiardi, F. Guyard, S. Marti, and M. A. Zuluaga. 2020. USAD: UnSupervised Anomaly Detection on Multivariate Time Series. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining."},{"key":"e_1_3_2_1_7_1","unstructured":"C. M. Bishop. 1994. Mixture density networks. (1994)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"P. J. Brockwell and R. A. Davis. 2016. Introduction to time series and forecasting. springer.","DOI":"10.1007\/978-3-319-29854-2"},{"key":"e_1_3_2_1_9_1","unstructured":"Pavel Filonov Fedor Kitashov and Andrey Lavrentyev. 2017. RNN-based Early Cyber-Attack Detection for the Tennessee Eastman Process. In arXiv."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"volume-title":"International Conference on Critical Information Infrastructures Security (CRITIS).","author":"Goh J.","key":"e_1_3_2_1_11_1","unstructured":"J. Goh, S. Adepu, K. N. Junejo, and A. P. Mathur. 2016. A Dataset to Support Research in the Design of Secure Water Treatment Systems. In International Conference on Critical Information Infrastructures Security (CRITIS)."},{"volume-title":"2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).","author":"Goh J.","key":"e_1_3_2_1_12_1","unstructured":"J. Goh, S. Adepu, M. Tan, and Z. S. Lee. 2017. Anomaly detection in cyber physical systems using recurrent neural networks. In 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE)."},{"key":"e_1_3_2_1_13_1","unstructured":"G. Hinton O. Vinyals and J. Dean. 2015. Distilling the knowledge in a neural network. arXiv (2015)."},{"volume-title":"Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery amp; Data Mining.","author":"Hundman K.","key":"e_1_3_2_1_14_1","unstructured":"K. Hundman, V. Constantinou, C. Laporte, I. Colwell, and T. Soderstrom. 2018. Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery amp; Data Mining."},{"volume-title":"Proceedings of the 28th ACM International Conference on Information and Knowledge Management.","author":"Hwang W.-S.","key":"e_1_3_2_1_15_1","unstructured":"W.-S. Hwang, J.-H. Yun, J. Kim, and H. C. Kim. 2019. Time-Series Aware Precision and Recall for Anomaly Detection: Considering Variety of Detection Result and Addressing Ambiguous Labeling. In Proceedings of the 28th ACM International Conference on Information and Knowledge Management."},{"volume-title":"The Network and Distributed System Security Symposium (NDSS).","author":"Joo K.","key":"e_1_3_2_1_16_1","unstructured":"K. Joo, W. Choi, and D. H. Lee. 2020. Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft. In The Network and Distributed System Security Symposium (NDSS)."},{"volume-title":"Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"Keogh E.","key":"e_1_3_2_1_17_1","unstructured":"E. Keogh and S. Kasetty. 2002. On the Need for Time Series Data Mining Benchmarks: A Survey and Empirical Demonstration. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining."},{"volume-title":"Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT.","author":"Kim J.","key":"e_1_3_2_1_18_1","unstructured":"J. Kim, J.-H. Yun, and H. C. Kim. 2019. Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks. In Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT."},{"volume-title":"International Conference on Learning Representations.","author":"Kim K. H.","key":"e_1_3_2_1_19_1","unstructured":"K. H. Kim, S. Shim, Y. Lim, J. Jeon, J. Choi, B. Kim, and A. S. Yoon. 2019. RaPP: Novelty Detection with Reconstruction along Projection Pathway. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_20_1","volume-title":"Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns. In IFIP International Conference on ICT Systems Security and Privacy Protection.","author":"Kim Y. G.","year":"2021","unstructured":"Y. G. Kim, J.-H. Yun, S. Han, H.C. Kim, and Simon S Woo. 2021. Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns. In IFIP International Conference on ICT Systems Security and Privacy Protection."},{"volume-title":"the art of computer programming","author":"Knuth Donald","key":"e_1_3_2_1_21_1","unstructured":"Donald Knuth. 1973. Searching and Sorting, the art of computer programming, vol. 3."},{"key":"e_1_3_2_1_22_1","unstructured":"A. Y. Ng M. I. Jordan and Y. Weiss. 2002. On spectral clustering: Analysis and an algorithm. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_23_1","volume-title":"On the Convergence of Adam and Beyond. In The 6th International Conference on Learning Representations (ICLR).","author":"Reddi Sashank J.","year":"2018","unstructured":"Sashank J. Reddi, Satyen Kale, and Sanjiv Kumar. 2018. On the Convergence of Adam and Beyond. In The 6th International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_24_1","unstructured":"D. Shalyga P. Filonov and A. Lavrentyev. 2018. Anomaly detection for water treatment system based on neural network with automatic architecture optimization. In arXiv."},{"volume-title":"Implementation of Programmable CPS Testbed for Anomaly Detection. In CSET (USENIX workshop).","author":"Shin H.-K.","key":"e_1_3_2_1_25_1","unstructured":"H.-K. Shin, W. Lee, J.-H. Yun, and H. C. Kim. 2019. Implementation of Programmable CPS Testbed for Anomaly Detection. In CSET (USENIX workshop)."},{"volume-title":"13th USENIX Workshop on Cyber Security Experimentation and Test (CSET).","author":"Shin H.-K.","key":"e_1_3_2_1_26_1","unstructured":"H.-K. Shin, W. Lee, J.-H. Yun, and H.C. Kim. 2020. HAI 1.0: HIL-based Augmented ICS Security Dataset. In 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET)."},{"key":"e_1_3_2_1_27_1","volume-title":"Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed. In 14th Workshop on Cyber Security Experimentation and Test (CSET).","author":"Shin H.-K.","year":"2021","unstructured":"H.-K. Shin, W. Lee, J.-H. Yun, and B.-G. Min. 2021. Two ICS Security Datasets and Anomaly Detection Contest on the HIL-based Augmented ICS Testbed. In 14th Workshop on Cyber Security Experimentation and Test (CSET)."},{"volume-title":"Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.","author":"Siffer A.","key":"e_1_3_2_1_28_1","unstructured":"A. Siffer, P.-A. Fouque, A. Termier, and C. Largouet. 2017. Anomaly Detection in Streams with Extreme Value Theory. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining."},{"volume-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery amp; Data Mining.","author":"Su Y.","key":"e_1_3_2_1_29_1","unstructured":"Y. Su, Y. Zhao, C. Niu, R. Liu, W. Sun, and D. Pei. 2019. Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network. In Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery amp; Data Mining."},{"key":"e_1_3_2_1_30_1","unstructured":"I. Sutskever O. Vinyals and Q. V. Le. 2014. Sequence to sequence learning with neural networks. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_31_1","unstructured":"N. Tatbul T. J. Lee S. Zdonik M. Alam and J. Gottschlich. 2018. Precision and Recall for Time Series. In NeurIPS."},{"volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.","author":"Urbina D. I.","key":"e_1_3_2_1_32_1","unstructured":"D. I. Urbina, J. A. Giraldo, A. A. Cardenas, N. O. Tippenhauer, J. Valente, M. Faisal, J. Ruths, R. Candell, and H. Sandberg. 2016. Limiting the Impact of Stealthy Attacks on Industrial Control Systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Learning Representations.","author":"You Y.","year":"2020","unstructured":"Y. You, J. Li, S. Reddi, J. Hseu, S. Kumar, S. Bhojanapalli, X. Song, J. Demmel, K. Keutzer, and C.-J. Hsieh. 2020. Large Batch Optimization for Deep Learning: Training BERT in 76 minutes. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"J.-H. Yun Y. Hwang W. Lee H.-K. Ahn and S.-K. Kim. 2018. Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. In Research in Attacks Intrusions and Defenses.","DOI":"10.1007\/978-3-030-00470-5_27"},{"volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence.","author":"Zhang C.","key":"e_1_3_2_1_35_1","unstructured":"C. Zhang, D. Song, Y. Chen, X. Feng, C. Lumezanu, W. Cheng, J. Ni, B. Zong, H. Chen, and N. V. Chawla. 2019. A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data. In Proceedings of the AAAI Conference on Artificial Intelligence."},{"volume-title":"The 6th International Conference on Learning Representations (ICLR).","author":"Zong B.","key":"e_1_3_2_1_36_1","unstructured":"B. Zong, Q. Song, M. R. Min, W. Cheng, C. Lumezanu, D. Cho, and H. Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In The 6th International Conference on Learning Representations (ICLR)."}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3506990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3506990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:33Z","timestamp":1750191513000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3506990"}},"subtitle":["improving detection performance using residual similarity in multivariate time series"],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":36,"alternative-id":["10.1145\/3477314.3506990","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3506990","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}