{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:32:11Z","timestamp":1769826731394,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["871319"],"award-info":[{"award-number":["871319"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["314544"],"award-info":[{"award-number":["314544"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3613879","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1867-1878","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8104-1645","authenticated-orcid":false,"given":"Qinghua","family":"Xu","sequence":"first","affiliation":[{"name":"Simula Research Laboratory, Oslo, Norway \/ University of Oslo, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9979-3519","authenticated-orcid":false,"given":"Shaukat","family":"Ali","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory, Oslo, Norway \/ Oslo Metropolitan University, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3262-5577","authenticated-orcid":false,"given":"Tao","family":"Yue","sequence":"additional","affiliation":[{"name":"Simula Research Laboratory, Oslo, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0391-6473","authenticated-orcid":false,"given":"Zaimovic","family":"Nedim","sequence":"additional","affiliation":[{"name":"Alstom Rail, V\u00e4ster\u00e5s, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-9022-9850","authenticated-orcid":false,"given":"Inderjeet","family":"Singh","sequence":"additional","affiliation":[{"name":"Alstom Rail, V\u00e4ster\u00e5s, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_2_2_2_1","volume-title":"A COMPARATIVE STUDY ON INTRUSION DETECTION SYSTEMS FOR SECURED COMMUNICATION IN INTERNET OF THINGS. ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, 12, 03","author":"Anushiya R","year":"2021","unstructured":"R Anushiya and V S Lavanya. 2021. A COMPARATIVE STUDY ON INTRUSION DETECTION SYSTEMS FOR SECURED COMMUNICATION IN INTERNET OF THINGS. ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, 12, 03 (2021)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1006\/jmps.1999.1279"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"KR1442 Chowdhary and KR Chowdhary. 2020. Natural language processing. Fundamentals of artificial intelligence 603\u2013649.","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Kevin Clark Minh-Thang Luong Christopher D Manning and Quoc V Le. 2018. Semi-supervised sequence modeling with cross-view training. arXiv preprint arXiv:1809.08370.","DOI":"10.18653\/v1\/D18-1217"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","unstructured":"Violeta Damjanovic-Behrendt. 2018. A Digital Twin-based Privacy Enhancement Mechanism for the Automotive Industry. https:\/\/doi.org\/10.1109\/IS.2018.8710526 Pages: 279 10.1109\/IS.2018.8710526","DOI":"10.1109\/IS.2018.8710526"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023421"},{"key":"e_1_3_2_2_9_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arxiv:1810.04805 arXiv:1810.04805 [cs]","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. arxiv:1810.04805 arXiv:1810.04805 [cs]"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2021.100379"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-25312-7_14"},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Seventeenth International Conference on Machine Learning (ICML \u201900)","author":"Eskin Eleazar","year":"2000","unstructured":"Eleazar Eskin. 2000. Anomaly Detection over Noisy Data Using Learned Probability Distributions. In Proceedings of the Seventeenth International Conference on Machine Learning (ICML \u201900). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA. 255\u2013262. isbn:1558607072"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781315400624-12"},{"key":"e_1_3_2_2_14_1","unstructured":"Eric L. Goodman Chase Zimmerman and Corey Hudson. 2020. Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data. arxiv:2004.14477 arXiv:2004.14477 [cs]"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Daniela Narezo Guzman Edin Hadzic Robert Schuil Eric Baars and J\u00f6rn Christoffer Groos. 2018. Data-driven condition now- and forecasting of railway switches for improvement in the quality of railway transportation.","DOI":"10.36001\/phme.2018.v4i1.456"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","unstructured":"H. Zhao H. Chen W. Dong X. Sun and Y. Ji. 2017. Fault diagnosis of rail turnout system based on case-based reasoning with compound distance methods. In 2017 29th Chinese Control And Decision Conference (CCDC). 4205\u20134210. isbn:1948-9447 https:\/\/doi.org\/10.1109\/CCDC.2017.7979237 Journal Abbreviation: 2017 29th Chinese Control And Decision Conference (CCDC) 10.1109\/CCDC.2017.7979237","DOI":"10.1109\/CCDC.2017.7979237"},{"key":"e_1_3_2_2_17_1","unstructured":"Liping Han Shaukat Ali Tao Yue Aitor Arrieta and Maite Arratibel. 2022. Uncertainty-aware Robustness Assessment of Industrial Elevator Systems."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558955"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/cit2.12078"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11182813"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00178"},{"key":"e_1_3_2_2_22_1","first-page":"1","article-title":"Wireshark user\u2019s guide","volume":"4","author":"Lamping Ulf","year":"2004","unstructured":"Ulf Lamping and Ed Warnicke. 2004. Wireshark user\u2019s guide. Interface, 4, 6 (2004), 1.","journal-title":"Interface"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2023.02.008"},{"key":"e_1_3_2_2_24_1","volume-title":"Neural Information Processing, Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, and El-Sayed M","author":"Li Zhipeng","unstructured":"Zhipeng Li, Zheng Qin, Kai Huang, Xiao Yang, and Shuxiong Ye. 2017. Intrusion Detection Using Convolutional Neural Networks for Representation Learning. In Neural Information Processing, Derong Liu, Shengli Xie, Yuanqing Li, Dongbin Zhao, and El-Sayed M. El-Alfy (Eds.). Springer International Publishing, Cham. 858\u2013866. isbn:978-3-319-70139-4"},{"key":"e_1_3_2_2_25_1","unstructured":"Ilya Loshchilov and Frank Hutter. 2017. Decoupled weight decay regularization. arXiv preprint arXiv:1711.05101."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613897"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453155"},{"key":"e_1_3_2_2_28_1","volume-title":"Information Security and Cryptology\u2013ICISC 2017: 20th International Conference","author":"Mimura Mamoru","year":"2017","unstructured":"Mamoru Mimura and Hidema Tanaka. 2018. Reading network packets as a natural language for intrusion detection. In Information Security and Cryptology\u2013ICISC 2017: 20th International Conference, Seoul, South Korea, November 29-December 1, 2017, Revised Selected Papers 20. 339\u2013350."},{"key":"e_1_3_2_2_29_1","unstructured":"Adam Paszke Sam Gross Soumith Chintala Gregory Chanan Edward Yang Zachary DeVito Zeming Lin Alban Desmaison Luca Antiga and Adam Lerer. 2017. Automatic differentiation in pytorch."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Matthew E. Peters Mark Neumann Mohit Iyyer Matt Gardner Christopher Clark Kenton Lee and Luke Zettlemoyer. 2018. Deep contextualized word representations. arxiv:1802.05365 arXiv:1802.05365 [cs]","DOI":"10.18653\/v1\/N18-1202"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-70679-1_5"},{"key":"e_1_3_2_2_32_1","unstructured":"Alec Radford Karthik Narasimhan Tim Salimans and Ilya Sutskever. [n. d.]. Improving Language Understanding by Generative Pre-Training."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.06.141"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/asi4020036"},{"key":"e_1_3_2_2_35_1","volume-title":"Deep learning for computer vision: A brief review. Computational intelligence and neuroscience","author":"Voulodimos Athanasios","year":"2018","unstructured":"Athanasios Voulodimos, Nikolaos Doulamis, Anastasios Doulamis, and Eftychios Protopapadakis. 2018. Deep learning for computer vision: A brief review. Computational intelligence and neuroscience, 2018 (2018)."},{"key":"e_1_3_2_2_36_1","volume-title":"Tatsunori Hashimoto, Oriol Vinyals, Percy Liang, Jeff Dean, and William Fedus.","author":"Wei Jason","year":"2022","unstructured":"Jason Wei, Yi Tay, Rishi Bommasani, Colin Raffel, Barret Zoph, Sebastian Borgeaud, Dani Yogatama, Maarten Bosma, Denny Zhou, Donald Metzler, Ed H. Chi, Tatsunori Hashimoto, Oriol Vinyals, Percy Liang, Jeff Dean, and William Fedus. 2022. Emergent Abilities of Large Language Models. arxiv:2206.07682 arXiv:2206.07682 [cs]"},{"key":"e_1_3_2_2_37_1","volume-title":"Digital twin-based anomaly detection in cyber-physical systems","author":"Xu Qinghua","unstructured":"Qinghua Xu, Shaukat Ali, and Tao Yue. 2021. Digital twin-based anomaly detection in cyber-physical systems. IEEE, 205\u2013216. isbn:1-72816-836-8"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","unstructured":"Qinghua Xu Shaukat Ali and Tao Yue. 2023. Digital Twin-based Anomaly Detection with Curriculum Learning in Cyber-physical Systems. ACM Transactions on Software Engineering and Methodology Feb. 3582571. issn:1049-331X 1557-7392 https:\/\/doi.org\/10.1145\/3582571 10.1145\/3582571","DOI":"10.1145\/3582571"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558957"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613879"},{"key":"e_1_3_2_2_41_1","volume-title":"A review of recurrent neural networks: LSTM cells and network architectures. Neural computation, 31, 7","author":"Yu Yong","year":"2019","unstructured":"Yong Yu, Xiaosheng Si, Changhua Hu, and Jianxun Zhang. 2019. A review of recurrent neural networks: LSTM cells and network architectures. Neural computation, 31, 7 (2019), 1235\u20131270."},{"key":"e_1_3_2_2_42_1","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Tools and Trends","author":"Yue Tao","unstructured":"Tao Yue, Paolo Arcaini, and Shaukat Ali. 2021. Understanding Digital Twins for Cyber-Physical Systems: A Conceptual Model. In Leveraging Applications of Formal Methods, Verification and Validation: Tools and Trends, Tiziana Margaria and Bernhard Steffen (Eds.). Springer International Publishing, Cham. 54\u201371. isbn:978-3-030-83723-5"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3452383.3452388"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613879","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3613879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:10Z","timestamp":1750178230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":43,"alternative-id":["10.1145\/3611643.3613879","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3613879","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}