{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:46Z","timestamp":1762004566505},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,11,17]],"date-time":"2013-11-17T00:00:00Z","timestamp":1384646400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-269","type":"journal-article","created":{"date-parts":[[2013,11,17]],"date-time":"2013-11-17T02:01:21Z","timestamp":1384653681000},"source":"Crossref","is-referenced-by-count":21,"title":["Statistical wavelet-based anomaly detection in big data with compressive sensing"],"prefix":"10.1186","volume":"2013","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dunqiang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Baoju","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiasong","family":"Mu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,17]]},"reference":[{"issue":"3","key":"826_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V: Anomaly detection: a survey. ACM Comput. Surv. 2009, 41(3):1-72.","journal-title":"ACM Comput. Surv"},{"key":"826_CR2","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/LCN.2009.5355162","volume-title":"IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 20\u201323","author":"CT Chou","year":"2009","unstructured":"Chou CT, Rana R, Hu W: Energy efficient information collection in wireless sensor networks using adaptive compressive sensing. IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 20\u201323 October 2009 443-450."},{"key":"826_CR3","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/INFCOM.2012.6195803","volume-title":"Proceedings IEEE INFOCOM, Orlando, FL, 25\u201330","author":"J Wang","year":"2012","unstructured":"Wang J, Tang S, Yin B, et al.: Data gathering in wireless sensor networks through intelligent compressive sensing. Proceedings IEEE INFOCOM, Orlando, FL, 25\u201330 March 2012 603-611."},{"issue":"4","key":"826_CR4","doi-asserted-by":"publisher","first-page":"1289","DOI":"10.1109\/TIT.2006.871582","volume":"52","author":"DL Donoho","year":"2006","unstructured":"Donoho DL: Compressed sensing. IEEE Trans. Inf. Theory 2006, 52(4):1289-1306.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"826_CR5","first-page":"1433","volume-title":"Proceedings of International Congress of Mathematicians","author":"E Cand\u00e8s","year":"2006","unstructured":"Cand\u00e8s E: Compressive sampling. In Proceedings of International Congress of Mathematicians. Madrid: European Mathematical Society Publishing House; 2006:1433-1452."},{"key":"826_CR6","first-page":"296","volume-title":"8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing","author":"CM Yu","year":"2012","unstructured":"Yu CM, Lu CS, Kuo SY: CSI: compressed sensing-based clone identification in sensor networks. 8th IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing 2012, Lugano, 9\u201323 March 2012 296-301."},{"key":"826_CR7","first-page":"250","volume-title":"Proc IEEE ISCIT","author":"Y Xia","year":"2011","unstructured":"Xia Y, Zhao Z, Zhang H: Distributed anomaly event detection in wireless networks using compressed sensing. Proc IEEE ISCIT 2011, Hangzhou, 12\u201314 October 2011 250-255."},{"key":"826_CR8","first-page":"722","volume-title":"9th IEEE International Conference on Data Mining, Miami, FL, 6\u20139","author":"S Budhaditya","year":"2009","unstructured":"Budhaditya S, Pham DS, Lazarescu M, Venkatesh S: Effective anomaly detection in sensor networks data streams. 9th IEEE International Conference on Data Mining, Miami, FL, 6\u20139 December 2009 722-727."},{"key":"826_CR9","volume-title":"Data Min. Knowl. Discov","author":"DS Pham","year":"2012","unstructured":"Pham DS, Venkatesh S, Lazarescu M, Budhadity S: Anomaly detection in large-scale data stream networks. Data Min. Knowl. Discov. 2012. doi: 10.1007\/s10618-012-0297-3"},{"issue":"11","key":"826_CR10","doi-asserted-by":"publisher","first-page":"7419","DOI":"10.1109\/TIT.2013.2278017","volume":"59","author":"Q Ding","year":"2012","unstructured":"Ding Q, Kolaczyk ED: A compressed PCA subspace method for anomaly detection in high-dimensional data. IEEE Trans. Inf. Theory 2012, 59(11):7419-7422.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"826_CR11","volume-title":"Scalable network-wide anomaly detection using compressed data, Technical report","author":"DS Pham","year":"2009","unstructured":"Pham DS, Saha B, Lazarescu M, Venkatesh S: Scalable network-wide anomaly detection using compressed data, Technical report. Institute for Multisensor Processing and Content Analysis, Department of Computing, Curtin University of Technology; 2009."},{"issue":"7","key":"826_CR12","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1061\/(ASCE)0733-9445(2004)130:7(1055)","volume":"130","author":"Z Sun","year":"2004","unstructured":"Sun Z, Chang CC: Statistical wavelet-based method for structural health monitoring. J. Struct. Eng. 2004, 130(7):1055-1062. 10.1061\/(ASCE)0733-9445(2004)130:7(1055)","journal-title":"J. Struct. Eng"},{"key":"826_CR13","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/MSP.2007.914731","volume":"25","author":"E Cand\u00e8s","year":"2008","unstructured":"Cand\u00e8s E, Wakin M: An introduction to compressive sampling. IEEE Signal Process Mag. 2008, 25: 21-30.","journal-title":"IEEE Signal Process Mag"},{"key":"826_CR14","volume-title":"EURASIP J. Wirel. Commun. Netw","author":"L Xu","year":"2013","unstructured":"Xu L, Liang Q, Cheng X, Chen D: Compressive sensing in distributed radar sensor networks using pulse compression waveforms. EURASIP J. Wirel. Commun. Netw. 2013. doi: 10.1186\/1687-1499-2013-36"},{"issue":"3","key":"826_CR15","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.1109\/TAES.2012.6237581","volume":"48","author":"L Xu","year":"2012","unstructured":"Xu L, Liang Q: Zero correlation zone sequence pair sets for MIMO radar. IEEE Trans. Aerosp. Electron. Syst. 2012, 48(3):2100-2113.","journal-title":"IEEE Trans. Aerosp. Electron. Syst"},{"key":"826_CR16","volume-title":"IEEE Globecom, Miami, FL, 6\u201310 Dec","author":"L Xu","year":"2010","unstructured":"Xu L, Liang Q: Orthogonal pulse compression codes for MIMO radar system. IEEE Globecom, Miami, FL, 6\u201310 Dec. 2010"},{"key":"826_CR17","volume-title":"IEEE Globecom, Miami, FL, 6\u201310 Dec","author":"L Xu","year":"2010","unstructured":"Xu L, Liang Q: Waveform design and optimization in radar sensor network. IEEE Globecom, Miami, FL, 6\u201310 Dec. 2010"},{"issue":"10","key":"826_CR18","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1002\/1098-111X(200010)15:10<939::AID-INT3>3.0.CO;2-G","volume":"15","author":"Q Liang","year":"2000","unstructured":"Liang Q, Mendel JM: Design interval type-2 fuzzy logic systems using SVD-QR method: rule reduction. Int. J. Intell. Syst. 2000, 15(10):939-957. 10.1002\/1098-111X(200010)15:10<939::AID-INT3>3.0.CO;2-G","journal-title":"Int. J. Intell. Syst"},{"key":"826_CR19","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/1687-1499-2011-20","volume":"2011","author":"S Singh","year":"2011","unstructured":"Singh S, Liang Q, Chen D, Sheng L: Sense through wall human detection using UWB radar. EURASIP J. Wirel. Commun. Netw. 2011, 2011: 20. 10.1186\/1687-1499-2011-20","journal-title":"EURASIP J. Wirel. Commun. Netw"},{"key":"826_CR20","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/978-3-642-03737-5_25","volume":"243","author":"D Kocur","year":"2009","unstructured":"Kocur D, Rov\u0148\u00e1kov\u00e1 J, \u0160vecov\u00e1 M: Through wall tracking of moving targets by M-sequence UWB radar. Stud. Comput. Intell. 2009, 243: 349-364. 10.1007\/978-3-642-03737-5_25","journal-title":"Stud. Comput. Intell"},{"key":"826_CR21","volume-title":"Secur. Comm. Network","author":"W Wang","year":"2013","unstructured":"Wang W, Zhou X, Zhang B, Mu J: Anomaly detection in big data from UWB radars. Secur. Comm. Network 2013. doi: 10.1002\/sec.745"},{"issue":"2","key":"826_CR22","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/JSEN.2010.2060323","volume":"11","author":"L Xu","year":"2011","unstructured":"Xu L, Liang Q: Radar sensor network using a set of new ternary codes: theory and application. IEEE Sensors J. 2011, 11(2):439-450.","journal-title":"IEEE Sensors J"},{"issue":"2","key":"826_CR23","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/JSYST.2010.2090404","volume":"5","author":"Q Liang","year":"2011","unstructured":"Liang Q: Situation understanding based on heterogeneous sensor networks and human-inspired favor weak fuzzy logic system. IEEE Syst. J. 2011, 5(2):156-163.","journal-title":"IEEE Syst. J"},{"key":"826_CR24","doi-asserted-by":"crossref","first-page":"523435","DOI":"10.1155\/2010\/523435","volume":"2010","author":"Q Liang","year":"2010","unstructured":"Liang Q: Biologically-inspired target recognition in radar sensor networks. EURASIP J. Wirel. Commun. Netw. 2010, 2010: 523435.","journal-title":"EURASIP J. Wirel. Commun. Netw"},{"issue":"22","key":"826_CR25","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1109\/TAES.2010.5461641","volume":"46","author":"Q Liang","year":"2010","unstructured":"Liang Q, Cheng X, Samn S: NEW: network-enabled electronic warfare for target recognition. IEEE Trans. Aerosp. Electron. Syst. 2010, 46(22):558-568.","journal-title":"IEEE Trans. Aerosp. Electron. Syst"},{"issue":"3","key":"826_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/AES.2008.1587","volume":"44","author":"Q Liang","year":"2008","unstructured":"Liang Q, Cheng X: KUPS: knowledge-based ubiquitous and persistent sensor networks for threat assessment. IEEE Trans. Aerosp. Electron. Syst 2008, 44(3):1-7. 1060\u20131069","journal-title":"IEEE Trans. Aerosp. Electron. Syst"},{"issue":"2","key":"826_CR27","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.patrec.2007.10.016","volume":"29","author":"Q Liang","year":"2008","unstructured":"Liang Q: Automatic target recognition using waveform diversity in radar sensor networks. Pattern Recogn. Lett. 2008, 29(2):377-381.","journal-title":"Pattern Recogn. Lett"},{"key":"826_CR28","first-page":"1","volume-title":"EURASIP J. Wirel. Commun. Netw","author":"Q Liang","year":"2007","unstructured":"Liang Q: Radar sensor networks: algorithms for waveform design and diversity with application to ATP with delay-doppler uncertainty. EURASIP J. Wirel. Commun. Netw. 2007, 1-9."},{"key":"826_CR29","doi-asserted-by":"crossref","unstructured":"Liang Q: Waveform design and diversity in radar sensor networks: theoretical analysis and application to automatic target recognition. IEEE Third Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2006), Reston, VA, 28\u201328 September 2006","DOI":"10.1109\/SAHCN.2006.288531"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-269\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-269.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-269.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,8]],"date-time":"2020-08-08T03:36:26Z","timestamp":1596857786000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-269"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,17]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["826"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-269","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,17]]},"article-number":"269"}}