{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:11Z","timestamp":1750309571563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,6]],"date-time":"2024-12-06T00:00:00Z","timestamp":1733443200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,6]]},"DOI":"10.1145\/3711618.3711643","type":"proceedings-article","created":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T11:22:41Z","timestamp":1740223361000},"page":"59-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Storage Strategies for Multi-source Heterogeneous Subway Monitoring Data and Anomaly Detection Technologies"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4073-7467","authenticated-orcid":false,"given":"Xinling","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Municipal Engineering Research Institute, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7814-4360","authenticated-orcid":false,"given":"Jinglai","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Municipal Engineering Research Institute, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3720-1159","authenticated-orcid":false,"given":"Zhuxin","family":"Zhang","sequence":"additional","affiliation":[{"name":"North Automatic Control Technology Institute, TaiYuan, Shanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3305-8519","authenticated-orcid":false,"given":"Yue","family":"Su","sequence":"additional","affiliation":[{"name":"Beijing Municipal Engineering Research Institute, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8619-3043","authenticated-orcid":false,"given":"Hui","family":"Fang","sequence":"additional","affiliation":[{"name":"Beijing Municipal Engineering Research Institute, Beijing, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9592-8751","authenticated-orcid":false,"given":"Hao","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Municipal Engineering Research Institute, Beijing, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","unstructured":"Hakan\u00a0Can Altunay and Zafer Albayrak. 2023. A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks. Engineering Science and Technology an International Journal 38 (2023) 101322. 10.1016\/j.jestch.2022.101322","DOI":"10.1016\/j.jestch.2022.101322"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Juan\u00a0Antonio Guerrero-ibanez Sherali Zeadally and Juan Contreras-Castillo. 2015. Integration challenges of intelligent transportation systems with connected vehicle cloud computing and internet of things technologies. IEEE Wireless Communications 22 6 (2015) 122\u2013128. 10.1109\/MWC.2015.7368833","DOI":"10.1109\/MWC.2015.7368833"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Kai Lu Jiangtao Liu Xuesong Zhou and Baoming Han. 2021. A Review of Big Data Applications in Urban Transit Systems. IEEE Transactions on Intelligent Transportation Systems 22 5 (2021) 2535\u20132552. 10.1109\/TITS.2020.2973365","DOI":"10.1109\/TITS.2020.2973365"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Changxi Ma Bowen Zhang Shukai Li and Youpeng Lu. 2024. Urban rail transit passenger flow prediction with ResCNN-GRU based on self-attention mechanism. Physica A: Statistical Mechanics and its Applications 638 (2024) 129619.","DOI":"10.1016\/j.physa.2024.129619"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","unstructured":"Qian Ma Cong Sun Baojiang Cui and Xiaohui Jin. 2021. A novel model for anomaly detection in network traffic based on kernel support vector machine. Computers & Security 104 (2021) 102215. 10.1016\/j.cose.2021.102215","DOI":"10.1016\/j.cose.2021.102215"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00038"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton Van\u00a0Den Hengel. 2021. Deep Learning for Anomaly Detection: A Review. ACM Comput. Surv. 54 2 Article 38 (March 2021) 38\u00a0pages. 10.1145\/3439950","DOI":"10.1145\/3439950"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Lukas Ruff Jacob\u00a0R. Kauffmann Robert\u00a0A. Vandermeulen Gr\u00e9goire Montavon Wojciech Samek Marius Kloft Thomas\u00a0G. Dietterich and Klaus-Robert M\u00fcller. 2021. A Unifying Review of Deep and Shallow Anomaly Detection. Proc. IEEE 109 5 (2021) 756\u2013795.","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASYU56188.2022.9925457"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWAMTIP.2014.7073442"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Erico Tjoa and Cuntai Guan. 2021. A Survey on Explainable Artificial Intelligence (XAI): Toward Medical XAI. IEEE Transactions on Neural Networks and Learning Systems 32 11 (2021) 4793\u20134813. 10.1109\/TNNLS.2020.3027314","DOI":"10.1109\/TNNLS.2020.3027314"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Ana\u00a0Isabel Torre-Bastida Javier\u00a0Del Ser Ibai La\u00f1a Maitena Ilardia Miren\u00a0Nekane Bilbao and Sergio Campos-Cordob\u00e9s. 2018. Big Data for transportation and mobility: recent advances trends and challenges. IET Intelligent Transport Systems 12 (2018) 742\u2013755. Issue 8. 10.1049\/iet-its.2018.5188","DOI":"10.1049\/iet-its.2018.5188"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.5555\/3295222.3295349"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS52988.2021.9663742"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITAIC54216.2022.9836629"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/CASE49439.2021.9551442"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Zheng Zhao Weihai Chen Xingming Wu Peter C.\u00a0Y. Chen and Jingmeng Liu. 2017. LSTM network: a deep learning approach for short-term traffic forecast. Iet Intelligent Transport Systems 11 (2017) 68\u201375. https:\/\/api.semanticscholar.org\/CorpusID:114567527","DOI":"10.1049\/iet-its.2016.0208"}],"event":{"name":"ICCNS 2024: 2024 14th International Conference on Communication and Network Security","acronym":"ICCNS 2024","location":"Xiamen Shanghai China"},"container-title":["Proceedings of the 2024 14th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711643","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711618.3711643","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:14Z","timestamp":1750295954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711618.3711643"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":17,"alternative-id":["10.1145\/3711618.3711643","10.1145\/3711618"],"URL":"https:\/\/doi.org\/10.1145\/3711618.3711643","relation":{},"subject":[],"published":{"date-parts":[[2024,12,6]]},"assertion":[{"value":"2025-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}