{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:50:19Z","timestamp":1775620219270,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T00:00:00Z","timestamp":1673654400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T00:00:00Z","timestamp":1673654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"ARTICONF project","award":["825134"],"award-info":[{"award-number":["825134"]}]},{"name":"ARTICONF project","award":["825134"],"award-info":[{"award-number":["825134"]}]},{"name":"ARTICONF project","award":["825134"],"award-info":[{"award-number":["825134"]}]},{"name":"BlueCloud project","award":["862409"],"award-info":[{"award-number":["862409"]}]},{"name":"BlueCloud project","award":["862409"],"award-info":[{"award-number":["862409"]}]},{"name":"BlueCloud project","award":["862409"],"award-info":[{"award-number":["862409"]}]},{"name":"ENVRIFAIR project","award":["824068"],"award-info":[{"award-number":["824068"]}]},{"name":"ENVRIFAIR project","award":["824068"],"award-info":[{"award-number":["824068"]}]},{"name":"ENVRIFAIR project","award":["824068"],"award-info":[{"award-number":["824068"]}]},{"name":"Science and Technology Program of Sichuan Province","award":["2020JDRC0067, 2020YFG0326"],"award-info":[{"award-number":["2020JDRC0067, 2020YFG0326"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Effectively detecting run-time performance anomalies is crucial for clouds to identify abnormal performance behavior and forestall future incidents. To be used for real-world applications, an effective anomaly detection framework should meet three main challenging requirements: high accuracy for identifying anomalies, good robustness when application patterns change, and prediction ability for upcoming anomalies. Unfortunately, existing research about performance anomaly detection usually focuses on improving detection accuracy, while little research tackles the three challenges simultaneously. We conduct experiments for existing detection methods on multiple application monitoring data, and results show that existing detection methods usually focus on different features in data, which will lead to their diverse performance on different data patterns. Therefore, existing anomaly detection methods have difficulty improving detection accuracy and robustness and predicting anomalies. To address the three requirements, we propose an Ensemble Learning-Based Detection (ELBD) framework which integrates existing well-selected detection methods. The framework includes three classic linear ensemble methods (maximum, average, and weighted average) and a novel deep ensemble method. Our experiments show that the ELBD framework realizes better detection accuracy and robustness, where the deep ensemble method can achieve the most accurate and robust detection for cloud applications. In addition, it can predict anomalies in the next four minutes with an F1 score higher than 0.8. The paper also proposes a new indicator <jats:inline-formula><jats:alternatives><jats:tex-math>$$ARP\\_score$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>A<\/mml:mi>\n                    <mml:mi>R<\/mml:mi>\n                    <mml:mi>P<\/mml:mi>\n                    <mml:mi>_<\/mml:mi>\n                    <mml:mi>s<\/mml:mi>\n                    <mml:mi>c<\/mml:mi>\n                    <mml:mi>o<\/mml:mi>\n                    <mml:mi>r<\/mml:mi>\n                    <mml:mi>e<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> to measure detection accuracy, robustness, and multi-step prediction ability. The <jats:inline-formula><jats:alternatives><jats:tex-math>$$ARP\\_score$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>A<\/mml:mi>\n                    <mml:mi>R<\/mml:mi>\n                    <mml:mi>P<\/mml:mi>\n                    <mml:mi>_<\/mml:mi>\n                    <mml:mi>s<\/mml:mi>\n                    <mml:mi>c<\/mml:mi>\n                    <mml:mi>o<\/mml:mi>\n                    <mml:mi>r<\/mml:mi>\n                    <mml:mi>e<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula> of the deep ensemble method is 5.1821, which is much higher than other detection methods.<\/jats:p>","DOI":"10.1186\/s13677-022-00383-6","type":"journal-article","created":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T14:03:09Z","timestamp":1673704989000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Robust and accurate performance anomaly detection and prediction for cloud applications: a novel ensemble learning-based framework"],"prefix":"10.1186","volume":"12","author":[{"given":"Ruyue","family":"Xin","sequence":"first","affiliation":[]},{"given":"Hongyun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,14]]},"reference":[{"issue":"5","key":"383_CR1","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/TDSC.2018.2821693","volume":"17","author":"JA Cid-Fuentes","year":"2018","unstructured":"Cid-Fuentes JA, Szabo C, Falkner K (2018) Adaptive performance anomaly detection in distributed systems using online svms. IEEE Trans Dependable Secure Comput 17(5):928\u2013941","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"383_CR2","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.engappai.2019.07.008","volume":"85","author":"A Borghesi","year":"2019","unstructured":"Borghesi A, Bartolini A, Lombardi M, Milano M, Benini L (2019) A semisupervised autoencoder-based approach for anomaly detection in high performance computing systems. Eng Appl Artif Intell 85:634\u2013644","journal-title":"Eng Appl Artif Intell"},{"key":"383_CR3","doi-asserted-by":"crossref","unstructured":"Zhu M, Ye K, Xu CZ (2018) Network anomaly detection and identification based on deep learning methods. In: International Conference on Cloud Computing. Springer, Cham, 219\u2013234","DOI":"10.1007\/978-3-319-94295-7_15"},{"key":"383_CR4","doi-asserted-by":"crossref","unstructured":"Siffer A, Fouque PA, Termier A, Largouet C (2017) Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '17). Association for Computing Machinery, New York, 1067\u20131075","DOI":"10.1145\/3097983.3098144"},{"key":"383_CR5","doi-asserted-by":"publisher","first-page":"27760","DOI":"10.1109\/ACCESS.2018.2840086","volume":"6","author":"M Hu","year":"2018","unstructured":"Hu M, Ji Z, Yan K, Guo Y, Feng X, Gong J, Zhao X, Dong L (2018) Detecting anomalies in time series data via a meta-feature based approach. IEEE Access 6:27760\u201327776","journal-title":"IEEE Access"},{"key":"383_CR6","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel HP, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD '00). Association for Computing Machinery, New York, 93\u2013104","DOI":"10.1145\/342009.335388"},{"key":"383_CR7","doi-asserted-by":"crossref","unstructured":"Audibert J, Michiardi P, Guyard F, Marti S, Zuluaga MA (2020) Usad: Unsupervised anomaly detection on multivariate time series. In: Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. 3395\u20133404","DOI":"10.1145\/3394486.3403392"},{"key":"383_CR8","unstructured":"Zhang H, Yu Y, Jiao J, Xing E, El Ghaoui L, Jordan M (2019) Theoretically principled trade-off between robustness and accuracy. In: Proceedings of the 36th International Conference on Machine Learning (ICML), Long Beach, California, USA, Vol. 97 of Proceedings of Machine Learning Research, PMLR. 7472\u20137482"},{"key":"383_CR9","doi-asserted-by":"crossref","unstructured":"Wu W, He L, Lin W, Su Y, Cui Y, Maple C, Jarvis SA (2020) Developing an unsupervised real-time anomaly detection scheme for time series with multi-seasonality. IEEE Trans Knowl Data Eng 34(9):4147\u20134160","DOI":"10.1109\/TKDE.2020.3035685"},{"key":"383_CR10","unstructured":"Ibidunmoye O (2017) Performance anomaly detection and resolution for autonomous clouds. PhD thesis, Ume\u00e5 University"},{"issue":"1","key":"383_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2791120","volume":"48","author":"O Ibidunmoye","year":"2015","unstructured":"Ibidunmoye O, Hern\u00e1ndez-Rodriguez F, Elmroth E (2015) Performance anomaly detection and bottleneck identification. ACM Comput Surv (CSUR) 48(1):1\u201335","journal-title":"ACM Comput Surv (CSUR)"},{"key":"383_CR12","doi-asserted-by":"crossref","unstructured":"Qi GJ, Luo J (2020) Small data challenges in big data era: A survey of recent progress on unsupervised and semi-supervised methods. IEEE Trans Pattern Anal Mach Intell 44(4):2168\u20132187","DOI":"10.1109\/TPAMI.2020.3031898"},{"key":"383_CR13","doi-asserted-by":"crossref","unstructured":"Su Y, Zhao Y, Niu C, Liu R, Sun W, Pei D (2019) Robust anomaly detection for multivariate time series through stochastic recurrent neural network. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '19). Association for Computing Machinery, New York, 2828\u20132837","DOI":"10.1145\/3292500.3330672"},{"key":"383_CR14","doi-asserted-by":"crossref","unstructured":"Tang J, Chen Z, Fu AWC, Cheung DW (2002) Enhancing effectiveness of outlier detections for low density patterns. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin, Heidelberg, 535\u2013548","DOI":"10.1007\/3-540-47887-6_53"},{"key":"383_CR15","doi-asserted-by":"crossref","unstructured":"Papadimitriou S, Kitagawa H, Gibbons PB, Faloutsos C (2003) Loci: Fast outlier detection using the local correlation integral. In: Proceedings 19th international conference on data engineering (Cat. No. 03CH37405). IEEE, pp 315\u2013326","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"383_CR16","doi-asserted-by":"crossref","unstructured":"Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD '00). Association for Computing Machinery, New York, pp 427\u2013438","DOI":"10.1145\/342009.335437"},{"key":"383_CR17","doi-asserted-by":"crossref","unstructured":"Zhang K, Hutter M, Jin H (2009) A new local distance-based outlier detection approach for scattered real-world data. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining. Lecture Notes in Computer Science, vol 5476. Springer, Berlin, Heidelberg, 813\u2013822","DOI":"10.1007\/978-3-642-01307-2_84"},{"issue":"7","key":"383_CR18","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comput 13(7):1443\u20131471","journal-title":"Neural Comput"},{"issue":"4","key":"383_CR19","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/TSMCC.2002.807277","volume":"32","author":"Q Song","year":"2002","unstructured":"Song Q, Hu W, Xie W (2002) Robust support vector machine with bullet hole image classification. IEEE Trans Syst Man Cybern C (Appl Rev) 32(4):440\u2013448","journal-title":"IEEE Trans Syst Man Cybern C (Appl Rev)"},{"key":"383_CR20","doi-asserted-by":"crossref","unstructured":"Liu FT, Ting KM, Zhou ZH (2008) Isolation forest. In: 2008 eighth ieee international conference on data mining. IEEE, pp 413\u2013422","DOI":"10.1109\/ICDM.2008.17"},{"key":"383_CR21","doi-asserted-by":"crossref","unstructured":"Sakurada M, Yairi T (2014) Anomaly detection using autoencoders with nonlinear dimensionality reduction. In: Proceedings of the MLSDA 2014 2nd Workshop on Machine Learning for Sensory Data Analysis (MLSDA'14). Association for Computing Machinery, New York, 4\u201311","DOI":"10.1145\/2689746.2689747"},{"key":"383_CR22","unstructured":"Kingma DP, Welling M (2013) Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114"},{"issue":"9","key":"383_CR23","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","volume":"30","author":"X Yuan","year":"2019","unstructured":"Yuan X, He P, Zhu Q, Li X (2019) Adversarial examples: Attacks and defenses for deep learning. IEEE Trans Neural Netw Learn Syst 30(9):2805\u20132824","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"383_CR24","doi-asserted-by":"crossref","unstructured":"Hashemi MJ, Keller E (2020) Enhancing robustness against adversarial examples in network intrusion detection systems. In: 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). Leganes. 37\u201343","DOI":"10.1109\/NFV-SDN50289.2020.9289869"},{"key":"383_CR25","doi-asserted-by":"publisher","first-page":"830","DOI":"10.1016\/j.knosys.2018.10.009","volume":"163","author":"A Galicia","year":"2019","unstructured":"Galicia A, Talavera-Llames R, Troncoso A, Koprinska I, Mart\u00ednez-\u00c1lvarez F (2019) Multi-step forecasting for big data time series based on ensemble learning. Knowl-Based Syst 163:830\u2013841","journal-title":"Knowl-Based Syst"},{"key":"383_CR26","doi-asserted-by":"crossref","unstructured":"Zhou ZH (2012) Ensemble methods: foundations and algorithms. Chapman and Hall\/CRC, New York","DOI":"10.1201\/b12207"},{"issue":"1","key":"383_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/2830544.2830549","volume":"17","author":"CC Aggarwal","year":"2015","unstructured":"Aggarwal CC, Sathe S (2015) Theoretical foundations and algorithms for outlier ensembles. ACM sigkdd Explor Newsl 17(1):24\u201347","journal-title":"ACM sigkdd Explor Newsl"},{"issue":"8","key":"383_CR28","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.1007\/s00521-020-05172-3","volume":"33","author":"H Tyralis","year":"2021","unstructured":"Tyralis H, Papacharalampous G, Langousis A (2021) Super ensemble learning for daily streamflow forecasting: Large-scale demonstration and comparison with multiple machine learning algorithms. Neural Comput Applic 33(8):3053\u20133068","journal-title":"Neural Comput Applic"},{"key":"383_CR29","doi-asserted-by":"publisher","first-page":"24120","DOI":"10.1109\/ACCESS.2020.2969428","volume":"8","author":"BA Tama","year":"2020","unstructured":"Tama BA, Nkenyereye L, Islam SR, Kwak KS (2020) An enhanced anomaly detection in web traffic using a stack of classifier ensemble. IEEE Access 8:24120\u201324134","journal-title":"IEEE Access"},{"key":"383_CR30","doi-asserted-by":"crossref","unstructured":"Adeyemo VE, Abdullah A, JhanJhi N, Supramaniam M, Balogun AO (2019) Ensemble and deep-learning methods for two-class and multi-attack anomaly intrusion detection: an empirical study. Int J Adv Comput Sci Appl 10(9):520\u2013528","DOI":"10.14569\/IJACSA.2019.0100969"},{"key":"383_CR31","doi-asserted-by":"crossref","unstructured":"Wei C, Sohn K, Mellina C, Yuille A, Yang F (2021) Crest: A class-rebalancing self-training framework for imbalanced semi-supervised learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR), virtual. Computer Vision Foundation\/IEEE. 10857\u201310866","DOI":"10.1109\/CVPR46437.2021.01071"},{"key":"383_CR32","doi-asserted-by":"crossref","unstructured":"Jian C, Ao Y (2022) Imbalanced fault diagnosis based on semi-supervised ensemble learning. J Intell Manuf 34:1\u201316","DOI":"10.1007\/s10845-022-01985-2"},{"issue":"6","key":"383_CR33","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TPAMI.2005.113","volume":"27","author":"AL Fred","year":"2005","unstructured":"Fred AL, Jain AK (2005) Combining multiple clusterings using evidence accumulation. IEEE Trans Pattern Anal Mach Intell 27(6):835\u2013850","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"5","key":"383_CR34","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1109\/TKDE.2015.2503753","volume":"28","author":"D Huang","year":"2015","unstructured":"Huang D, Lai JH, Wang CD (2015) Robust ensemble clustering using probability trajectories. IEEE Trans Knowl Data Eng 28(5):1312\u20131326","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"383_CR35","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.patcog.2015.08.015","volume":"50","author":"D Huang","year":"2016","unstructured":"Huang D, Lai J, Wang CD (2016) Ensemble clustering using factor graph. Pattern Recog 50:131\u2013142","journal-title":"Pattern Recog"},{"issue":"1","key":"383_CR36","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10479-017-2716-8","volume":"276","author":"R \u00dcnl\u00fc","year":"2019","unstructured":"\u00dcnl\u00fc R, Xanthopoulos P (2019) A weighted framework for unsupervised ensemble learning based on internal quality measures. Ann Oper Res 276(1):229\u2013247","journal-title":"Ann Oper Res"},{"issue":"1","key":"383_CR37","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPAMI.2004.1261097","volume":"26","author":"J Yang","year":"2004","unstructured":"Yang J, Zhang D, Frangi AF, Jy Yang (2004) Two-dimensional pca: a new approach to appearance-based face representation and recognition. IEEE Trans Pattern Anal Mach Intell 26(1):131\u2013137","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"383_CR38","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi H, Williams LJ (2010) Principal component analysis. Wiley Interdiscip Rev Comput Stat 2(4):433\u2013459","journal-title":"Wiley Interdiscip Rev Comput Stat"},{"key":"383_CR39","unstructured":"Freund Y, Mason L (1999) The alternating decision tree learning algorithm. In: Proceedings of the Sixteenth International Conference on Machine Learning (ICML '99). Morgan Kaufmann Publishers Inc., San Francisco, 124\u2013133"},{"issue":"3","key":"383_CR40","doi-asserted-by":"publisher","first-page":"100013","DOI":"10.1016\/j.bcra.2021.100013","volume":"2","author":"N Saurabh","year":"2021","unstructured":"Saurabh N, Rubia C, Palanisamy A, Koulouzis S, Sefidanoski M, Chakravorty A, Zhao Z, Karadimce A, Prodan R (2021) The articonf approach to decentralized car-sharing. Blockchain Res Appl 2(3):100013","journal-title":"Blockchain Res Appl"},{"key":"383_CR41","doi-asserted-by":"crossref","unstructured":"Geethika D, Jayasinghe M, Gunarathne Y, Gamage TA, Jayathilaka S, Ranathunga S, Perera S (2019) Anomaly detection in high-performance api gateways. In: 2019 International Conference on High Performance Computing & Simulation (HPCS). Dublin. 995\u20131001","DOI":"10.1109\/HPCS48598.2019.9188100"},{"key":"383_CR42","unstructured":"Shin K, Fernandes D, Miyazaki S (2011) Consistency measures for feature selection: a formal definition, relative sensitivity comparison and a fast algorithm. In: Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI'11). AAAI Press, Barcelona, 1491\u20131497"},{"key":"383_CR43","doi-asserted-by":"publisher","first-page":"10219","DOI":"10.1109\/ACCESS.2022.3144425","volume":"10","author":"Y Chabchoub","year":"2022","unstructured":"Chabchoub Y, Togbe MU, Boly A, Chiky R (2022) An in-depth study and improvement of isolation forest. IEEE Access 10:10219\u201310237","journal-title":"IEEE Access"},{"issue":"3","key":"383_CR44","first-page":"2701","volume":"5","author":"C Saranya","year":"2013","unstructured":"Saranya C, Manikandan G (2013) A study on normalization techniques for privacy preserving data mining. Int J Eng Technol (IJET) 5(3):2701\u20132704","journal-title":"Int J Eng Technol (IJET)"},{"issue":"2","key":"383_CR45","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1022859003006","volume":"51","author":"LI Kuncheva","year":"2003","unstructured":"Kuncheva LI, Whitaker CJ (2003) Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy. Mach Learn 51(2):181\u2013207","journal-title":"Mach Learn"},{"key":"383_CR46","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.neucom.2015.08.104","volume":"184","author":"Y Wang","year":"2016","unstructured":"Wang Y, Yao H, Zhao S (2016) Auto-encoder based dimensionality reduction. Neurocomputing 184:232\u2013242","journal-title":"Neurocomputing"},{"key":"383_CR47","doi-asserted-by":"crossref","unstructured":"Sundermeyer M, Schl\u00fcter R, Ney H (2012) Lstm neural networks for language modeling. In: Thirteenth annual conference of the International Speech Communication Association. Portland, ISCA, 194\u2013197","DOI":"10.21437\/Interspeech.2012-65"},{"key":"383_CR48","doi-asserted-by":"crossref","unstructured":"Gill SS, Xu M, Ottaviani C, Patros P, Bahsoon R, Shaghaghi A, Golec M, Stankovski V, Wu H, Abraham A et al (2022) AI for next generation computing: Emerging trends and future directions. Internet Things 19:100514,\u00a0Piscataway","DOI":"10.1016\/j.iot.2022.100514"},{"key":"383_CR49","doi-asserted-by":"crossref","unstructured":"Shah M, Shaikh M, Mishra V, Tuscano G (2020) Decentralized cloud storage using blockchain. In: 2020 4th International conference on trends in electronics and informatics (ICOEI)(48184). IEEE, pp 384\u2013389","DOI":"10.1109\/ICOEI48184.2020.9143004"},{"issue":"5","key":"383_CR50","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"R Li","year":"2018","unstructured":"Li R, Song T, Mei B, Li H, Cheng X, Sun L (2018) Blockchain for large-scale internet of things data storage and protection. IEEE Trans Serv Comput 12(5):762\u2013771","journal-title":"IEEE Trans Serv Comput"},{"issue":"9","key":"383_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3472291","volume":"54","author":"P Ren","year":"2021","unstructured":"Ren P, Xiao Y, Chang X, Huang PY, Li Z, Gupta BB, Chen X, Wang X (2021) A survey of deep active learning. ACM Comput Surv (CSUR) 54(9):1\u201340","journal-title":"ACM Comput Surv (CSUR)"},{"key":"383_CR52","doi-asserted-by":"crossref","unstructured":"Ren H, Xu B, Wang Y, Yi C, Huang C, Kou X, Xing T, Yang M, Tong J, Zhang Q (2019) Time-series anomaly detection service at microsoft. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '19). Association for Computing Machinery, New York, 3009\u20133017","DOI":"10.1145\/3292500.3330680"},{"key":"383_CR53","doi-asserted-by":"crossref","unstructured":"Li J, Di S, Shen Y, Chen L (2021) Fluxev: A fast and effective unsupervised framework for time-series anomaly detection. In: Proceedings of the 14th ACM International Conference on Web Search and Data Mining (WSDM '21). Association for Computing Machinery, New York, 824\u2013832","DOI":"10.1145\/3437963.3441823"},{"key":"383_CR54","doi-asserted-by":"crossref","unstructured":"Xu F, Uszkoreit H, Du Y, Fan W, Zhao D, Zhu J (2019) Explainable AI: A brief survey on history, research areas, approaches and challenges. In: CCF international conference on natural language processing and Chinese computing. Springer, Cham, 563\u2013574","DOI":"10.1007\/978-3-030-32236-6_51"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00383-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-022-00383-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-022-00383-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T14:04:41Z","timestamp":1673705081000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-022-00383-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,14]]},"references-count":54,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["383"],"URL":"https:\/\/doi.org\/10.1186\/s13677-022-00383-6","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,14]]},"assertion":[{"value":"26 May 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 January 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"7"}}