{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:44:38Z","timestamp":1777016678836,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,17]]},"DOI":"10.1145\/3799830.3799839","type":"proceedings-article","created":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T06:45:08Z","timestamp":1777013108000},"page":"80-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["GPU-Accelerated Time Series Anomaly Detection using Matrix Profile"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3732-1067","authenticated-orcid":false,"given":"Raviteja","family":"Nandam","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Bhilai, Bhilai, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3105-922X","authenticated-orcid":false,"given":"Vishwesh","family":"Jatala","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Indian Institute of Technology Bhilai, Bhilai, India"}]}],"member":"320","published-online":{"date-parts":[[2026,4,23]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"M. Ahmed A.\u00a0N. Mahmood and J. Hu. 2016. A Survey of Anomaly Detection Techniques in Time Series Data. IEEE Access (2016).","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Sara Alaee Kaveh Kamgar and Eamonn Keogh. 2020. Matrix Profile XXII: Exact Discovery of Time Series Motifs under DTW. doi:10.48550\/arXiv.2009.07907","DOI":"10.1109\/ICDM50108.2020.00099"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91445-5_12"},{"key":"e_1_3_3_1_5_2","volume-title":"International Conference on Machine Learning (ICML)","author":"Baytas I.","year":"2017","unstructured":"I. Baytas and et al.2017. Capture Temporal Anomalies with Convolutional Neural Networks. In International Conference on Machine Learning (ICML)."},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Varun Chandola Arindam Banerjee and Vipin Kumar. 2009. Anomaly detection: A survey. ACM Comput. Surv. 41 3 Article 15 (July 2009) 58\u00a0pages. doi:10.1145\/1541880.1541882","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"crossref","unstructured":"V. Chandola A. Banerjee and V. Kumar. 2009. Anomaly Detection: A Survey. Comput. Surveys (2009).","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_3_1_8_2","unstructured":"Y. Cheng and et al.2020. Challenges in Using Deep Learning for Time Series Anomaly Detection. Journal of Machine Learning Research (2020)."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3097993"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Hui Ding Goce Trajcevski Peter Scheuermann Xiaoyue Wang and Eamonn Keogh. 2008. Querying and mining of time series data: experimental comparison of representations and distance measures. Proc. VLDB Endow. 1 2 (Aug. 2008) 1542\u20131552.","DOI":"10.14778\/1454159.1454226"},{"key":"e_1_3_3_1_11_2","volume-title":"ICDM","author":"D\u00e4ubener S.","year":"2019","unstructured":"S. D\u00e4ubener and et al.2019. Large Anomaly Detection in Univariate Time Series: An Empirical Comparison of Machine Learning Algorithms. In ICDM."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Arik Ermshaus Patrick Sch\u00e4fer and Ulf Leser. 2022. Window Size Selection in Unsupervised Time Series Analytics: A Review and Benchmark. Springer-Verlag Berlin Heidelberg 83\u2013101. doi:10.1007\/978-3-031-24378-3_6","DOI":"10.1007\/978-3-031-24378-3_6"},{"key":"e_1_3_3_1_13_2","unstructured":"Eamonn\u00a0Keogh et al.2021. UCR Time Series Anomaly Archive 2021. https:\/\/www.cs.ucr.edu\/\u00a0eamonn\/time_series_data_2018\/."},{"key":"e_1_3_3_1_14_2","unstructured":"P. Filonov A. Lavrentyev and A. Vorontsov. 2016. Multivariate industrial time series with cyber-attack simulation: Fault detection using an lstm-based predictive data model. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1612.06676 (2016)."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.21"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"Waleed Hilal S.\u00a0Andrew Gadsden and John Yawney. 2022. Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances. Expert Systems with Applications 193 (2022) 116429. doi:10.1016\/j.eswa.2021.116429","DOI":"10.1016\/j.eswa.2021.116429"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"V. Hodge and J. Austin. 2004. A Survey of Outlier Detection Methodologies. Artificial Intelligence Review (2004).","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"crossref","unstructured":"Eamonn Keogh. 2023. Time Series Data Mining: A Unifying View. Proc. VLDB Endow. 16 12 (Aug. 2023) 3861\u20133863. doi:10.14778\/3611540.3611570","DOI":"10.14778\/3611540.3611570"},{"key":"e_1_3_3_1_21_2","unstructured":"Q. Li and J. Chen. 2012. Outlier Detection and Robust Estimation of Parameters in Time Series: A Review. Journal of Statistical Computation and Simulation (2012)."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3193556"},{"key":"e_1_3_3_1_23_2","unstructured":"F. Liu X. Wu and Z. Zhang. 2012. Random Forests for Time Series Anomaly Detection. Journal of Statistical Computing and Simulation (2012)."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM58522.2023.00148"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539271"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK.2019.00031"},{"key":"e_1_3_3_1_27_2","unstructured":"P. Malhotra A. Shanmugam R. Agerri and et al.2016. LSTM-based Anomaly Detection in Multivariate Time Series. Proceedings of the European Conference on Machine Learning (ECML) (2016)."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00151"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM54844.2022.00044"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Takaaki Nakamura Ryan Mercer Makoto Imamura and Eamonn Keogh. 2023. MERLIN++: parameter-free discovery of time series anomalies. Data Mining and Knowledge Discovery 37 (01 2023). doi:10.1007\/s10618-022-00876-7","DOI":"10.1007\/s10618-022-00876-7"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"John Paparrizos Yuhao Kang Paul Boniol Ruey\u00a0S. Tsay Themis Palpanas and Michael\u00a0J. Franklin. 2022. TSB-UAD: an end-to-end benchmark suite for univariate time-series anomaly detection. Proc. VLDB Endow. 15 8 (April 2022) 1697\u20131711. doi:10.14778\/3529337.3529354","DOI":"10.14778\/3529337.3529354"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Sadaf Tafazoli Yue Lu Renjie Wu Thirumalai Srinivas Hannah Cruz Ryan Mercer and Eamonn Keogh. 2024. CMP: the marriage of catch22 and the matrix profile creates a fast efficient and interpretable anomaly detector. Knowledge and Information Systems 66 (05 2024) 1\u201335. doi:10.1007\/s10115-024-02107-5","DOI":"10.1007\/s10115-024-02107-5"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2019.00170"},{"key":"e_1_3_3_1_34_2","unstructured":"Y. Xia J. Yang and Z. Zhang. 2015. Anomaly Detection for Multivariate Time Series using k-means Clustering. Journal of Machine Learning (2015)."},{"key":"e_1_3_3_1_35_2","unstructured":"L. Xie and S. Chien. 2008. A Statistical Approach to Time Series Anomaly Detection. IEEE Transactions on Knowledge and Data Engineering (2008)."},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Xue Yang Xuejun Qi and Xiaobo Zhou. 2023. Deep Learning Technologies for Time Series Anomaly Detection in Healthcare: A Review. IEEE Access 11 (2023) 117788\u2013117799. doi:10.1109\/ACCESS.2023.3325896","DOI":"10.1109\/ACCESS.2023.3325896"},{"key":"e_1_3_3_1_37_2","unstructured":"Chin-Chia\u00a0Michael Yeh Audrey Der Uday Saini Vivian Lai Yan Zheng Junpeng Wang Xin Dai Zhongfang Zhuang Yujie Fan Huiyuan Chen Prince Aboagye Liang Wang Wei Zhang and Eamonn Keogh. 2024. Matrix Profile for Anomaly Detection on Multidimensional Time Series. doi:10.48550\/arXiv.2409.09298"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.66"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Chin-Chia\u00a0Michael Yeh Yan Zhu Liudmila Ulanova Nurjahan Begum Yifei Ding Anh Dau Diego Silva Abdullah Mueen and Eamonn Keogh. 2016. Matrix Profile I: All Pairs Similarity Joins for Time Series: A Unifying View That Includes Motifs Discords and Shapelets. 1317\u20131322. doi:10.1109\/ICDM.2016.0179","DOI":"10.1109\/ICDM.2016.0179"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011409"},{"key":"e_1_3_3_1_41_2","unstructured":"V. Zhang. 2019. A Tour of AI Technologies in Time Series Prediction."},{"key":"e_1_3_3_1_42_2","unstructured":"L. Zhao L. Yang and X. Hu. 2013. Anomaly Detection in Time Series Data Using Unsupervised Machine Learning Approaches. IEEE Transactions on Knowledge and Data Engineering (2013)."},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"crossref","unstructured":"Yan Zhu Abdullah Mueen and Eamonn Keogh. 2018. Admissible Time Series Motif Discovery with Missing Data. IEEE Transactions on Knowledge and Data Engineering PP (02 2018). doi:10.1109\/TKDE.2019.2950623","DOI":"10.1109\/TKDE.2019.2950623"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00099"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00099"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0085"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362721"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Zachary Zimmerman Nader Shakibay\u00a0Senobari Gareth Funning Evangelos Papalexakis Samet Oymak Philip Brisk and Eamonn Keogh. 2019. Matrix Profile XVIII: Time Series Mining in the Face of Fast Moving Streams using a Learned Approximate Matrix Profile. 936\u2013945. doi:10.1109\/ICDM.2019.00104","DOI":"10.1109\/ICDM.2019.00104"},{"key":"e_1_3_3_1_49_2","unstructured":"B. Zong Y. Song Y. Wang and et al.2018. Deep Autoencoding Models for Unsupervised Anomaly Detection in Time Series. ACM SIGKDD (2018)."}],"event":{"name":"CODS 2025: 13th ACM IKDD International Conference on Data Science","location":"Pune India","acronym":"CODS 2025"},"container-title":["Proceedings of the 13th ACM IKDD International Conference on Data Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3799830.3799839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T07:13:13Z","timestamp":1777014793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3799830.3799839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,17]]},"references-count":48,"alternative-id":["10.1145\/3799830.3799839","10.1145\/3799830"],"URL":"https:\/\/doi.org\/10.1145\/3799830.3799839","relation":{},"subject":[],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2026-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}