{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T07:11:39Z","timestamp":1770275499264,"version":"3.49.0"},"reference-count":33,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.060564","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:28:16Z","timestamp":1744259296000},"page":"5181-5197","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Robust Deep One-Class Classification Time Series Anomaly Detection"],"prefix":"10.32604","volume":"83","author":[{"given":"Zhengdao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xuewei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Haiwei","family":"Sang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","article-title":"Procedures for detecting outlying observations in samples","volume":"11","author":"Grubbs","year":"1969","journal-title":"Technometrics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439950","article-title":"Deep learning for anomaly detection: a review","volume":"54","author":"Pang","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.comcom.2023.04.002","article-title":"DRL: dynamic rebalance learning for adversarial robustness of UAV with long-tailed distribution","volume":"205","author":"Sun","year":"2023","journal-title":"Comput Commun"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1186\/s13677-023-00534-3","article-title":"RPU-PVB: robust object detection based on a unified metric perspective with bilinear interpolation","volume":"12","author":"Yang","year":"2023","journal-title":"J Cloud Comput"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"9430132","DOI":"10.1155\/2021\/9430132","article-title":"BCEAD: a blockchain-empowered ensemble anomaly detection for wireless sensor network via isolation forest","volume":"2021","author":"Yang","year":"2021","journal-title":"Secur Commun Netw"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"Hinton","year":"2006","journal-title":"Science"},{"key":"ref7","unstructured":"Tishby N, Pereira FC, Bialek W. The information bottleneck method. arXiv:physics\/0004057. 2000. doi:10.48550\/arXiv.physics\/0004057."},{"key":"ref8","first-page":"1275","article-title":"Advancing autoencoder architectures for enhanced anomaly detection in multivariate industrial time series","volume":"81","author":"Lee","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref9","first-page":"1","article-title":"Enhancing internet of things intrusion detection using artificial intelligence","volume":"81","author":"Bar","year":"2024","journal-title":"Comput, Mater Contin"},{"key":"ref10","first-page":"327","article-title":"PUNet: a semi-supervised anomaly detection model for network anomaly detection based on positive unlabeled data","volume":"81","author":"Long","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3444690","article-title":"A review on outlier\/anomaly detection in time series data","volume":"54","author":"Bl\u00e1zquez-Garc\u00eda","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref12","series-title":"International Conference on Machine Learning","first-page":"4393","article-title":"Deep one-class classification","author":"Ruff","year":"2018"},{"key":"ref13","unstructured":"Sohn K, Li CL, Yoon J, Jin M, Pfister T. Learning and evaluating representations for deep one-class classification. arXiv:2011.02578. 2020. doi:10.48550\/arXiv.2011.02578."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2702","DOI":"10.1109\/TII.2023.3297663","article-title":"When deep learning-based soft sensors encounter reliability challenges: a practical knowledge-guided adversarial attack and its defense","volume":"20","author":"Guo","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3909","DOI":"10.3390\/s24123909","article-title":"Adversarial robustness enhancement for deep learning-based soft sensors: an adversarial training strategy using historical gradients and domain adaptation","volume":"24","author":"Guo","year":"2024","journal-title":"Sensors"},{"key":"ref16","series-title":"International Conference on Information Processing in Medical Imaging","first-page":"146","article-title":"Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","author":"Schlegl","year":"2017"},{"key":"ref17","unstructured":"Malhotra P, Ramakrishnan A, Anand G, Vig L, Agarwal P, Shroff G. LSTM-based encoder-decoder for multi-sensor anomaly detection. arXiv:1607.00148. 2016. doi:10.48550\/arXiv.1607.00148."},{"key":"ref18","series-title":"International Conference on Learning Representations","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","author":"Zong","year":"2018"},{"key":"ref19","series-title":"International Conference on Machine Learning","first-page":"8703","article-title":"Neural transformation learning for deep anomaly detection beyond images","author":"Qiu","year":"2021"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1970392.1970395","article-title":"Robust principal component analysis?","volume":"58","author":"Cand\u00e8s","year":"2011","journal-title":"J ACM"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1002\/cpa.20132","article-title":"For most large underdetermined systems of linear equations the minimal l1-norm solution is also the sparsest solution","volume":"59","author":"Donoho","year":"2006","journal-title":"Commun Pure Appl Math: A J Issued Courant Institute Math Sci"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"Boyd S, Parikh N, Chu E, Peleato B, Eckstein J. Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends\u00ae Mach Learn. 2011;3(1):1\u2013122. doi:10.1561\/2200000016.","DOI":"10.1561\/2200000016"},{"key":"ref23","doi-asserted-by":"crossref","unstructured":"Parikh N, Boyd S, et al. Proximal algorithms. Found Trends\u00ae Optim. 2014;1(3):127\u2013239. doi:10.1561\/2400000003.","DOI":"10.1561\/2400000003"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1109\/JAS.2019.1911747","article-title":"The UCR time series archive","volume":"6","author":"Dau","year":"2019","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"ref25","author":"Sch\u00f6lkopf","year":"1999","journal-title":"Advances in neural information processing systems"},{"key":"ref26","series-title":"International Conference on Machine Learning","first-page":"2712","article-title":"Robust random cut forest based anomaly detection on streams","author":"Guha","year":"2016"},{"key":"ref27","doi-asserted-by":"crossref","unstructured":"Eldele E, Ragab M, Chen Z, Wu M, Kwoh CK, Li X, et al. Time-series representation learning via temporal and contextual contrasting. arXiv:2106.14112. 2021. doi:10.24963\/ijcai.2021.","DOI":"10.24963\/ijcai.2021\/324"},{"key":"ref28","series-title":"ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"1","article-title":"Deep autoencoding one-class time series anomaly detection","author":"Mou","year":"2023"},{"key":"ref29","series-title":"Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"635","article-title":"Local evaluation of time series anomaly detection algorithms","author":"Huet","year":"2022"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.14778\/3538598.3538602","article-title":"Anomaly detection in time series: a comprehensive evaluation","volume":"15","author":"Schmidl","year":"2022","journal-title":"Proc VLDB Endow"},{"key":"ref31","series-title":"Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining","first-page":"2828","article-title":"Robust anomaly detection for multivariate time series through stochastic recurrent neural network","author":"Su","year":"2019"},{"key":"ref32","first-page":"2421","article-title":"Current time series anomaly detection benchmarks are flawed and are creating the illusion of progress","volume":"35","author":"Wu","year":"2021","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref33","series-title":"Thirty-Fifth Conference on Neural Information Processing Systems Datasets and Benchmarks Track (Round 1)","article-title":"Revisiting time series outlier detection: definitions and benchmarks","author":"Lai","year":"2021"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_60564\/TSP_CMC_60564.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:26:50Z","timestamp":1763342810000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/60982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.060564","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-11-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-04","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}