{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T17:51:30Z","timestamp":1774893090087,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,24]],"date-time":"2024-08-24T00:00:00Z","timestamp":1724457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3307503"],"award-info":[{"award-number":["2023YFB3307503"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,25]]},"DOI":"10.1145\/3637528.3671739","type":"proceedings-article","created":{"date-parts":[[2024,8,25]],"date-time":"2024-08-25T04:55:12Z","timestamp":1724561712000},"page":"3176-3187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["<scp>CutAddPaste:<\/scp>\n            Time Series Anomaly Detection by Exploiting Abnormal Knowledge"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5900-605X","authenticated-orcid":false,"given":"Rui","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1445-3742","authenticated-orcid":false,"given":"Xudong","family":"Mou","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6334-4925","authenticated-orcid":false,"given":"Renyu","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4716-0680","authenticated-orcid":false,"given":"Kai","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Future Cities, The Chinese University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8056-2671","authenticated-orcid":false,"given":"Pin","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Information Engineering, China University of Geosciences Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5902-4700","authenticated-orcid":false,"given":"Chongwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Kuaishou Inc., Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5331-3364","authenticated-orcid":false,"given":"Tianyu","family":"Wo","sequence":"additional","affiliation":[{"name":"School of Software, Beihang University &amp; Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8566-660X","authenticated-orcid":false,"given":"Xudong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University &amp; Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Lstm-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148","author":"Malhotra Pankaj","year":"2016","unstructured":"Pankaj Malhotra, Anusha Ramakrishnan, Gaurangi Anand, Lovekesh Vig, Puneet Agarwal, and Gautam Shroff. Lstm-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148, 2016."},{"key":"e_1_3_2_2_2_1","first-page":"4393","volume-title":"International conference on machine learning","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Robert Vandermeulen, Nico Goernitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. Deep one-class classification. In International conference on machine learning, pages 4393--4402. PMLR, 2018."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977653.ch78"},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Learning Representations","author":"Hendrycks Dan","year":"2018","unstructured":"Dan Hendrycks, Mantas Mazeika, and Thomas Dietterich. Deep anomaly detection with outlier exposure. In International Conference on Learning Representations, 2018."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"e_1_3_2_2_6_1","volume-title":"Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694","author":"Ruff Lukas","year":"2019","unstructured":"Lukas Ruff, Robert A Vandermeulen, Nico G\u00f6rnitz, Alexander Binder, Emmanuel M\u00fcller, Klaus-Robert M\u00fcller, and Marius Kloft. Deep semi-supervised anomaly detection. arXiv preprint arXiv:1906.02694, 2019."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/394"},{"key":"e_1_3_2_2_8_1","volume-title":"Thirty-fifth conference on neural information processing systems datasets and benchmarks track (round 1)","author":"Lai Kwei-Herng","year":"2021","unstructured":"Kwei-Herng Lai, Daochen Zha, Junjie Xu, Yue Zhao, Guanchu Wang, and Xia Hu. Revisiting time series outlier detection: Definitions and benchmarks. In Thirty-fifth conference on neural information processing systems datasets and benchmarks track (round 1), 2021."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.10.008"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_2_12_1","volume-title":"Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2):1--38","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. Deep learning for anomaly detection: A review. ACM Computing Surveys (CSUR), 54(2):1--38, 2021."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.12.093"},{"key":"e_1_3_2_2_15_1","volume-title":"ICLR","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. Deep autoencoding gaussian mixture model for unsu-pervised anomaly detection. In ICLR, 2018."},{"key":"e_1_3_2_2_16_1","volume-title":"ICLR","author":"Sohn Kihyuk","year":"2021","unstructured":"Kihyuk Sohn, Chun-Liang Li, Jinsung Yoon, Minho Jin, and Tomas Pfister. Learning and evaluating representations for deep one-class classification. ICLR, 2021."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095724"},{"key":"e_1_3_2_2_18_1","volume-title":"Klaus-Robert M\u00fcller, and Marius Kloft. Rethinking assumptions in deep anomaly detection. arXiv preprint arXiv:2006.00339","author":"Ruff Lukas","year":"2020","unstructured":"Lukas Ruff, Robert A Vandermeulen, Billy Joe Franks, Klaus-Robert M\u00fcller, and Marius Kloft. Rethinking assumptions in deep anomaly detection. arXiv preprint arXiv:2006.00339, 2020."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3112126"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2015.141"},{"key":"e_1_3_2_2_21_1","volume-title":"S5 - a labeled anomaly detection dataset, version 1.0 (16m). https: \/\/webscope.sandbox.yahoo.com\/catalog.php?datatype=s&did=70","year":"2015","unstructured":"Yahoo. S5 - a labeled anomaly detection dataset, version 1.0 (16m). https: \/\/webscope.sandbox.yahoo.com\/catalog.php?datatype=s&did=70, 2015. Accessed: 2023-04-14."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"e_1_3_2_2_23_1","volume-title":"The 1st match for aiops. https:\/\/github.com\/NetManAIOps\/KPI-Anomaly-Detection","author":"Challenge Ops","year":"2018","unstructured":"AIOps Challenge. The 1st match for aiops. https:\/\/github.com\/NetManAIOps\/KPI-Anomaly-Detection, 2018. Accessed: 2023-04-14."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CySWater.2016.7469060"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i7.20680"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539339"},{"key":"e_1_3_2_2_28_1","first-page":"582","volume-title":"NIPS","volume":"12","author":"Sch\u00f6lkopf Bernhard","year":"1999","unstructured":"Bernhard Sch\u00f6lkopf, Robert C Williamson, Alexander J Smola, John Shawe-Taylor, John C Platt, et al. Support vector method for novelty detection. In NIPS, volume 12, pages 582--588. Citeseer, 1999."},{"key":"e_1_3_2_2_29_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1):1--39","author":"Liu Fei Tony","year":"2012","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. Isolation-based anomaly detection. ACM Transactions on Knowledge Discovery from Data (TKDD), 6(1):1--39, 2012."},{"key":"e_1_3_2_2_30_1","first-page":"2712","volume-title":"ICML","author":"Guha Sudipto","year":"2016","unstructured":"Sudipto Guha, Nina Mishra, Gourav Roy, and Okke Schrijvers. Robust random cut forest based anomaly detection on streams. In ICML, pages 2712--2721. PMLR, 2016."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539271"},{"key":"e_1_3_2_2_33_1","volume-title":"International Conference on Learning Representations","author":"Xu Jiehui","year":"2021","unstructured":"Jiehui Xu, Haixu Wu, Jianmin Wang, and Mingsheng Long. Anomaly transformer: Time series anomaly detection with association discrepancy. In International Conference on Learning Representations, 2021."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/324"},{"key":"e_1_3_2_2_35_1","volume-title":"et al. Merlion: A machine learning library for time series. arXiv preprint arXiv:2109.09265","author":"Bhatnagar Aadyot","year":"2021","unstructured":"Aadyot Bhatnagar, Paul Kassianik, Chenghao Liu, Tian Lan, Wenzhuo Yang, Rowan Cassius, Doyen Sahoo, Devansh Arpit, Sri Subramanian, Gerald Woo, et al. Merlion: A machine learning library for time series. arXiv preprint arXiv:2109.09265, 2021"}],"event":{"name":"KDD '24: The 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Barcelona Spain","acronym":"KDD '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637528.3671739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:01Z","timestamp":1750291561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637528.3671739"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,24]]},"references-count":35,"alternative-id":["10.1145\/3637528.3671739","10.1145\/3637528"],"URL":"https:\/\/doi.org\/10.1145\/3637528.3671739","relation":{},"subject":[],"published":{"date-parts":[[2024,8,24]]},"assertion":[{"value":"2024-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}