{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:08:09Z","timestamp":1755907689267,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,10]]},"DOI":"10.1145\/3665348.3665401","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T18:25:40Z","timestamp":1720031140000},"page":"313-318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Unsupervised Industrial Internet Time Series Anomaly Detection Based on Reinforcement Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-7327-4584","authenticated-orcid":false,"given":"Yaqing","family":"Huang","sequence":"first","affiliation":[{"name":"North China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5003-4696","authenticated-orcid":false,"given":"Zhe","family":"Dong","sequence":"additional","affiliation":[{"name":"North China University of Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0240-8749","authenticated-orcid":false,"given":"Junpeng","family":"He","sequence":"additional","affiliation":[{"name":"North China University of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Multi-scale compositionality: identifying the compositional structures of social dynamics using deep learning[J]. PloS one","author":"Peng H K","year":"2015","unstructured":"Peng H K, Marculescu R. Multi-scale compositionality: identifying the compositional structures of social dynamics using deep learning[J]. PloS one, 2015, 10(4): e0118309."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Javaid A Niyaz Q Sun W A deep learning approach for network intrusion detection system[C]\/\/Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS). 2016: 21-26.","DOI":"10.4108\/eai.3-12-2015.2262516"},{"key":"e_1_3_2_1_3_1","volume-title":"Deep learning for anomaly detection: A survey[J]. arXiv preprint arXiv:1901.03407","author":"Chalapathy R","year":"2019","unstructured":"Chalapathy R, Chawla S. Deep learning for anomaly detection: A survey[J]. arXiv preprint arXiv:1901.03407, 2019."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2019.07.008"},{"key":"e_1_3_2_1_5_1","volume-title":"Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference on. IEEE, 1-8.","author":"Xiaodi Hou","year":"2007","unstructured":"Xiaodi Hou and Liqing Zhang. 2007. Saliency detection: A spectral residual approach. In Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Conference on. IEEE, 1-8."},{"volume-title":"Time-series anomaly detection service at microsoft[C]\/\/Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining. 2019: 3009-3017","author":"Ren H","key":"e_1_3_2_1_6_1","unstructured":"Ren H, Xu B, Wang Y, Time-series anomaly detection service at microsoft[C]\/\/Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining. 2019: 3009-3017."},{"key":"e_1_3_2_1_7_1","volume-title":"Ortiz J. Rlad: Time series anomaly detection through reinforcement learning and active learning[J]. arXiv preprint arXiv:2104.00543","author":"Wu T","year":"2021","unstructured":"Wu T, Ortiz J. Rlad: Time series anomaly detection through reinforcement learning and active learning[J]. arXiv preprint arXiv:2104.00543, 2021."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Yu Mengran and Shiliang Sun. \"Policy-based reinforcement learning for time series anomaly detection.\"\u00a0Engineering Applications of Artificial Intelligence\u00a095 2020: 103919.","DOI":"10.1016\/j.engappai.2020.103919"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2023.104089"},{"key":"e_1_3_2_1_10_1","volume-title":"Autoencoders, GANs, Variational Autoencoders, Deep Reinforcement Learning, Policy Gradients, and More","author":"Atienza R.","year":"2018","unstructured":"Atienza, R. Advanced Deep Learning with Keras: Apply Deep Learning T echniques, Autoencoders, GANs, Variational Autoencoders, Deep Reinforcement Learning, Policy Gradients, and More; Packt Publishing Ltd.: Birmingham, UK, 2018; p. 272."},{"key":"e_1_3_2_1_11_1","volume-title":"Learning from delayed rewards[J]","author":"Watkins C J C H","year":"1989","unstructured":"Watkins C J C H. Learning from delayed rewards[J]. 1989."},{"key":"e_1_3_2_1_12_1","unstructured":"Ziad Salloum. [n.d.]. Exploration in Reinforcement Learning. https:\/\/towardsdatascience.com\/exploration-in-reinforcement-learning-e59ec7eeaa75.Accessed: 2019-04-24."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.43.8.749"},{"key":"e_1_3_2_1_14_1","first-page":"112","article-title":"Anomaly detecting method for time series based on sliding windows[J]","volume":"12","author":"Teng T","year":"2021","unstructured":"Teng T, Maolin S, Xueguan S, Anomaly detecting method for time series based on sliding windows[J]. Instrum. Tech. Sens, 2021, 12: 112-116.","journal-title":"Instrum. Tech. Sens"},{"key":"e_1_3_2_1_15_1","volume-title":"Towards experienced anomaly detector through reinforcement learning[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence","author":"Huang C","year":"2018","unstructured":"Huang C, Wu Y, Zuo Y, Towards experienced anomaly detector through reinforcement learning[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 2018, 32(1)."},{"issue":"3","key":"e_1_3_2_1_16_1","first-page":"804","article-title":"Unsupervised time series anomaly detection model based on re-encoding[J]","volume":"43","year":"2023","unstructured":"YIN C, ZHOU L. Unsupervised time series anomaly detection model based on re-encoding[J]. Journal of Computer Applications, 2023, 43(3): 804.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-023-00708-5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Xu H Chen W Zhao N Unsupervised anomaly detection via variational auto-encoder for seasonal kpis in web applications[C]\/\/Proceedings of the 2018 world wide web conference. 2018: 187-196.","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_1_19_1","volume-title":"A Novel Technique for {Long-Term} Anomaly Detection in the Cloud[C]\/\/6th USENIX workshop on hot topics in cloud computing (HotCloud 14)","author":"Vallis O","year":"2014","unstructured":"Vallis O, Hochenbaum J, Kejariwal A. A Novel Technique for {Long-Term} Anomaly Detection in the Cloud[C]\/\/6th USENIX workshop on hot topics in cloud computing (HotCloud 14). 2014."},{"volume-title":"Anomaly detection in streams with extreme value theory[C]\/\/Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. 2017: 1067-1075","author":"Siffer A","key":"e_1_3_2_1_20_1","unstructured":"Siffer A, Fouque P A, Termier A, Anomaly detection in streams with extreme value theory[C]\/\/Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining. 2017: 1067-1075."},{"key":"e_1_3_2_1_21_1","volume-title":"Auto-encoding variational bayes[J]. arXiv preprint arXiv: 1312.6114","author":"Kingma D P","year":"2013","unstructured":"Kingma D P, Welling M. Auto-encoding variational bayes[J]. arXiv preprint arXiv: 1312.6114, 2013."}],"event":{"name":"GAIIS 2024: 2024 International Conference on Generative Artificial Intelligence and Information Security","acronym":"GAIIS 2024","location":"Kuala Lumpur Malaysia"},"container-title":["Proceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665348.3665401","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3665348.3665401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:22:56Z","timestamp":1755879776000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665348.3665401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":21,"alternative-id":["10.1145\/3665348.3665401","10.1145\/3665348"],"URL":"https:\/\/doi.org\/10.1145\/3665348.3665401","relation":{},"subject":[],"published":{"date-parts":[[2024,5,10]]},"assertion":[{"value":"2024-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}