{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T10:30:42Z","timestamp":1772361042611,"version":"3.50.1"},"reference-count":53,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.054826","type":"journal-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T06:06:01Z","timestamp":1727589961000},"page":"1275-1300","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":8,"title":["Advancing Autoencoder Architectures for Enhanced Anomaly Detection in Multivariate Industrial Time Series"],"prefix":"10.32604","volume":"81","author":[{"given":"Byeongcheon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Sangmin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Muazzam","family":"Maqsood","sequence":"additional","affiliation":[]},{"given":"Jihoon","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","first-page":"1233","article-title":"A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT","volume":"140","author":"Liu","year":"May 2024","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/JPROC.2015.2512235","article-title":"The cybersecurity landscape in industrial control systems","volume":"104","author":"McLaughlin","year":"May 2016","journal-title":"Proc. IEEE"},{"key":"ref3","first-page":"3387","article-title":"Efficient and secure IoT based smart home automation using multi-model learning and blockchain technology","volume":"139","author":"Alturki","year":"Mar. 2024","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"34564","DOI":"10.1109\/ACCESS.2020.2975142","article-title":"Security and privacy in smart farming: Challenges and opportunities","volume":"8","author":"Gupta","year":"Feb. 2020","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"A. Valdes and S. Cheung, \u201cIntrusion monitoring in process control systems,\u201d presented at the 42nd Hawaii Int. Conf. Syst. Sci., Waikoloa, HI, USA, Jan. 5\u20138, 2009, pp. 1\u20137.","DOI":"10.1109\/HICSS.2009.273"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"B. Zhu, A. Joseph, and S. Sastry, \u201cA taxonomy of cyber attacks on SCADA systems,\u201d presented at the 2011 Int. Conf. Internet Things 4th Int. Conf. Cyber, Phys. Soc. Comput., Dalian, China, Oct. 19\u201322, 2011, pp. 380\u2013388.","DOI":"10.1109\/iThings\/CPSCom.2011.34"},{"key":"ref7","first-page":"3011","article-title":"Cross-dimension attentive feature fusion network for unsupervised time-series anomaly detection","volume":"139","author":"Wang","year":"Mar. 2024","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"D. S. Terzi, R. Terzi, and S. Sagiroglu, \u201cBig data analytics for network anomaly detection from NetFlow data,\u201d presented at the 2017 Int. Conf. Comput. Sci. Eng. (UBMK), Antalya, Turkey, Oct. 5\u20138, 2017, pp. 592\u2013597.","DOI":"10.1109\/UBMK.2017.8093473"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"R. Primartha and B. A. Tama, \u201cAnomaly detection using random forest: A performance revisited,\u201d presented at the 2017 Int. Conf. Data Softw. Eng. (ICoDSE), Palembang, Indonesia, Nov. 1\u20132, 2017, pp. 1\u20136.","DOI":"10.1109\/ICODSE.2017.8285847"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.3390\/s20010109","article-title":"Tackling faults in the Industry 4.0 era\u2014A survey of machine-learning solutions and key aspects","volume":"20","author":"Angelopoulos","year":"2019","journal-title":"Sensors"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/electronics10040407","article-title":"A machine learning approach for anomaly detection in industrial control systems based on measurement data","volume":"10","author":"Mokhtari","year":"Feb. 2021","journal-title":"Electronics"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/systems11050237","article-title":"Development of a hybrid support vector machine with grey wolf optimization algorithm for detection of the solar power plants anomalies","volume":"11","author":"Ahmed","year":"Apr. 2023","journal-title":"Systems"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2207","DOI":"10.1109\/JIOT.2017.2756025","article-title":"Recursive principal component analysis-based data outlier detection and sensor data aggregation in IoT systems","volume":"4","author":"Yu","year":"Dec. 2017","journal-title":"IEEE Internet Things J."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"177460","DOI":"10.1109\/ACCESS.2019.2958284","article-title":"On the generation of anomaly detection datasets in industrial control systems","volume":"7","author":"Perales G\u00f3mez","year":"Dec. 2019","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"Y. Fu and F. Xue, \u201cMAD: Self-supervised masked anomaly detection task for multivariate time series,\u201d presented at the 2022 Int. Joint Conf. Neural Netw. (IJCNN), Padua, Italy, Jul. 18\u201323, 2022, pp. 1\u20138.","DOI":"10.1109\/IJCNN55064.2022.9892218"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"C. Seong, Y. Song, J. Hyun, and Y. G. Cheong, \u201cTowards building intrusion detection systems for multivariate time-series data,\u201d presented at the Silicon Val. Cybersecurity Conf., San Jose, CA, USA, Dec. 2\u20133, 2021, pp. 45\u201356.","DOI":"10.1007\/978-3-030-96057-5_4"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/TASE.2021.3073396","article-title":"Hybrid statistical-machine learning for real-time anomaly detection in industrial cyber-physical systems","volume":"20","author":"Hao","year":"Jan. 2023","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.3390\/aerospace7080115","article-title":"Unsupervised anomaly detection in flight data using convolutional variational auto-encoder","volume":"7","author":"Memarzadeh","year":"Aug. 2020","journal-title":"Aerospace"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103094","article-title":"GRU-based interpretable multivariate time series anomaly detection in industrial control system","volume":"127","author":"Tang","year":"Apr. 2023","journal-title":"Comput. Secur."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"88348","DOI":"10.1109\/ACCESS.2020.2993335","article-title":"Multivariate abnormal detection for industrial control systems using 1D CNN and GRU","volume":"8","author":"Xie","year":"May 2020","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"Y. Su et al., \u201cRobust anomaly detection for multivariate time series through stochastic recurrent neural network,\u201d presented at the 25th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., Anchorage, AK, USA, Aug. 4\u20138, 2019, pp. 2828\u20132837.","DOI":"10.1145\/3292500.3330672"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"108346","DOI":"10.1109\/ACCESS.2020.3001350","article-title":"Anomaly-based intrusion detection from network flow features using variational autoencoder","volume":"8","author":"Zavrak","year":"Jun. 2020","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103750","article-title":"Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems","volume":"140","author":"Liu","year":"May 2024","journal-title":"Comput. Secur."},{"key":"ref24","article-title":"A traffic anomaly detection approach based on unsupervised learning for industrial cyber-physical system","volume":"279","author":"Yang","year":"Nov. 2023","journal-title":"Know.-Based Syst."},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"J. Audibert, P. Michiardi, F. Guyard, S. Marti, and M. A. Zuluaga, \u201cUSAD: Unsupervised anomaly detection on multivariate time series,\u201d presented at the 26th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., CA, USA, Jul. 6\u201310, 2020, pp. 3395\u20133404.","DOI":"10.1145\/3394486.3403392"},{"key":"ref26","doi-asserted-by":"crossref","unstructured":"D. Li et al., \u201cMAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks,\u201d presented at the Int. Conf. Artif. Neural Netw., Munich, Germany, Sep. 17\u201319, 2019, pp. 703\u2013716.","DOI":"10.1007\/978-3-030-30490-4_56"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.14778\/3514061.3514067","article-title":"TranAD: Deep transformer networks for anomaly detection in multivariate time series data","volume":"15","author":"Tuli","year":"Feb. 2022","journal-title":"Proc. VLDB Endow."},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.3390\/s23052844","article-title":"Unsupervised anomaly detection for IoT-based multivariate time series: Existing solutions, performance analysis and future directions","volume":"23","author":"Belay","year":"Feb. 2023","journal-title":"Sensors"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439950","article-title":"Deep learning for anomaly detection: A review","volume":"54","author":"Pang","year":"Mar. 2021","journal-title":"ACM Comput. Surv."},{"key":"ref30","unstructured":"H. K. Shin, W. Lee, S. Choi, J. H. Yun, and B. G. Min, \u201cHAI (HIL-based augmented ICS) security dataset,\u201d GitHub, 2023. Accessed: Mar. 1, 2024. [Online]. Available: https:\/\/github.com\/icsdataset\/hai"},{"key":"ref31","article-title":"Unsupervised learning approach for anomaly detection in industrial control systems","volume":"7","author":"Choi","year":"Feb. 2024","journal-title":"Appl. Syst. Innov."},{"key":"ref32","article-title":"A study on performance metrics for anomaly detection based on industrial control system operation data","volume":"11","author":"Kim","year":"Apr. 2022","journal-title":"Electronics"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103825","article-title":"ADT: Time series anomaly detection for cyber-physical systems via deep reinforcement learning","volume":"141","author":"Yang","year":"Jun. 2024","journal-title":"Comput. Secur."},{"key":"ref34","article-title":"A survey on anomaly detection for technical systems using LSTM networks","volume":"131","author":"Lindemann","year":"Oct. 2021","journal-title":"Comput. Ind."},{"key":"ref35","doi-asserted-by":"crossref","first-page":"3469","DOI":"10.1109\/TII.2020.3022432","article-title":"Variational LSTM enhanced anomaly detection for industrial big data","volume":"17","author":"Zhou","year":"May 2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"M Said Elsayed, N. A. Le-Khac, S. Dev, and A. D. Jurcut, \u201cNetwork anomaly detection using LSTM based autoencoder,\u201d presented at the 16th ACM Symp. QoS Sec. Wireless Mobile Netw, Alicante, Spain, Nov. 16\u201320, 2020, pp. 37\u201345.","DOI":"10.1145\/3416013.3426457"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1016\/j.neunet.2005.06.042","article-title":"Framewise phoneme classification with bidirectional LSTM and other neural network architectures","volume":"18","author":"Graves","year":"Aug. 2005","journal-title":"Neural Netw."},{"key":"ref38","unstructured":"W. Tang, G. Long, L. Liu, T. Zhou, M. Blumenstein and J. Jiang, \u201cOmni-scale CNNs: A simple and effective kernel size configuration for time series classification,\u201d presented at the Int. Conf. Learn. Rep. (ICLR), Virtual, Apr. 25\u201329, 2022, pp. 1\u201317."},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.3390\/app12167986","article-title":"A one-dimensional convolutional neural network (1D-CNN) based deep learning system for network intrusion detection","volume":"12","author":"Qazi","year":"Aug. 2022","journal-title":"Appl. Sci."},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1016\/j.measurement.2020.108518","article-title":"Bearing fault diagnosis based on vibro-acoustic data fusion and 1D-CNN network","volume":"173","author":"Wang","year":"Mar. 2021","journal-title":"Measurement"},{"key":"ref41","doi-asserted-by":"crossref","unstructured":"C. Zhou and R. C. Paffenroth, \u201cAnomaly detection with robust deep autoencoders,\u201d presented at the 23rd ACM SIGKDD Int. Conf. Knowl. Discov. Data Min. (KDD), Halifax, NS, Canada, Aug. 13\u201317, 2017, pp. 655\u2013674.","DOI":"10.1145\/3097983.3098052"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"7103","DOI":"10.1002\/int.22582","article-title":"Improved autoencoder for unsupervised anomaly detection","volume":"36","author":"Cheng","year":"Jul. 2021","journal-title":"Int. J. Intell. Syst."},{"key":"ref43","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2021.115524","article-title":"A bidirectional LSTM deep learning approach for intrusion detection","volume":"185","author":"Imrana","year":"Dec. 2021","journal-title":"Expert Syst. Appl."},{"key":"ref44","doi-asserted-by":"crossref","unstructured":"A. Farzad and T. A. Gulliver, \u201cLog message anomaly detection and classification using auto-B\/LSTM and auto-GRU,\u201d Nov. 2019. doi: 10.48550\/arXiv.1911.08744.","DOI":"10.31224\/osf.io\/d4e6a"},{"key":"ref45","doi-asserted-by":"crossref","unstructured":"Z. Qu, L. Su, X. Wang, S. Zheng, X. Song and X. Song, \u201cAn unsupervised learning method of anomaly detection using GRU,\u201d presented at the 2018 IEEE Int. Conf. Big Data Smart Comput. (BigComp), Shanghai, China, Jan. 15\u201317, 2018, pp. 685\u2013688.","DOI":"10.1109\/BigComp.2018.00126"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"41283","DOI":"10.1109\/ACCESS.2021.3064830","article-title":"A ConvBiLSTM deep learning model-based approach for Twitter sentiment classification","volume":"9","author":"Tam","year":"Mar. 2021","journal-title":"IEEE Access"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"131191","DOI":"10.1109\/ACCESS.2021.3112545","article-title":"SSS-AE: Anomaly detection using self-attention based sequence-to-sequence auto-encoder in SMD assembly machine sound","volume":"9","author":"Nam","year":"Sep. 2021","journal-title":"IEEE Access"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"144","DOI":"10.30941\/CESTEMS.2023.00014","article-title":"Fault detection for motor drive control system of industrial robots using CNN-LSTM-based observers","volume":"7","author":"Wang","year":"Jun. 2023","journal-title":"CES Trans. Electr. Mach. Syst."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"107982","DOI":"10.1109\/ACCESS.2023.3320928","article-title":"Anomaly detection dataset for industrial control systems","volume":"11","author":"Dehlaghi-Ghadim","year":"Sep. 2023","journal-title":"IEEE Access"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","article-title":"Deep learning-based intrusion detection approach for securing industrial Internet of Things","volume":"81","author":"Soliman","year":"Oct. 2023","journal-title":"Alex Eng. J."},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101092","article-title":"An explainable multi-modal model for advanced cyber-attack detection in industrial control systems","volume":"25","author":"Bahadoripour","year":"Apr. 2024","journal-title":"Internet Things"},{"key":"ref52","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.127068","article-title":"A hybrid methodology for anomaly detection in cyber-physical systems","volume":"568","author":"Jeffrey","year":"Feb. 2024","journal-title":"Neurocomputing"},{"key":"ref53","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103675","article-title":"A feature selection based on genetic algorithm for intrusion detection of industrial control systems","volume":"139","author":"Fang","year":"Apr. 2024","journal-title":"Comput. Secur."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_54826\/TSP_CMC_54826.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:35:18Z","timestamp":1741314918000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.054826","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}