{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T18:40:10Z","timestamp":1772563210814,"version":"3.50.1"},"reference-count":61,"publisher":"Ubiquity Press, Ltd.","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,4]]},"DOI":"10.5334\/dsj-2024-010","type":"journal-article","created":{"date-parts":[[2024,3,4]],"date-time":"2024-03-04T07:06:47Z","timestamp":1709536007000},"source":"Crossref","is-referenced-by-count":5,"title":["KBJNet: Kinematic Bi-Joint Temporal Convolutional Network Attention for Anomaly Detection in Multivariate Time Series Data"],"prefix":"10.5334","volume":"23","author":[{"given":"Muhammad","family":"Abdan Mulia","sequence":"first","affiliation":[]},{"given":"Muhammad Bintang","family":"Bahy","sequence":"additional","affiliation":[]},{"given":"Muhammad Zain Fawwaz Nuruddin","family":"Siswantoro","sequence":"additional","affiliation":[]},{"given":"Nur Rahmat Dwi","family":"Riyanto","sequence":"additional","affiliation":[]},{"given":"Nella Rosa","family":"Sudianjaya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8762-3141","authenticated-orcid":false,"given":"Ary Mazharuddin","family":"Shiddiqi","sequence":"additional","affiliation":[]}],"member":"3285","reference":[{"key":"key20240304075008_B1","volume-title":"Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks","year":"2017"},{"key":"key20240304075008_B2","first-page":"1","article-title":"Nearest-neighbor and clustering based anomaly detection algorithms for rapidminer","year":"2012"},{"key":"key20240304075008_B3","article-title":"Efficient anomaly detection by isolation using nearest neighbour ensemble","year":"2014"},{"issue":"12","key":"key20240304075008_B4","doi-asserted-by":"crossref","first-page":"2941","DOI":"10.14778\/3415478.3415514","article-title":"GraphAn","volume":"13","year":"2020","journal-title":"Proceedings of the VLDB Endowment"},{"key":"key20240304075008_B5","article-title":"LOF","year":"2000"},{"key":"key20240304075008_B6","article-title":"Unsupervised anomaly detection using k-means, local outlier factor and one class SVM","year":"2019"},{"key":"key20240304075008_B7","doi-asserted-by":"crossref","first-page":"132330","DOI":"10.1109\/ACCESS.2020.3010274","article-title":"Anomalous example detection in deep learning: A survey","volume":"8","year":"2020","journal-title":"IEEE Access"},{"key":"key20240304075008_B8","doi-asserted-by":"crossref","first-page":"100568","DOI":"10.1016\/j.iot.2022.100568","article-title":"IoT anomaly detection methods and applications: A survey","volume":"19","year":"2022","journal-title":"Internet of Things"},{"key":"key20240304075008_B9","volume-title":"Interspeech 2020","year":"2020"},{"issue":"12","key":"key20240304075008_B10","doi-asserted-by":"crossref","first-page":"9179","DOI":"10.1109\/JIOT.2021.3100509","article-title":"Learning graph structures with transformer for multivariate time-series anomaly detection in IoT","volume":"9","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"key20240304075008_B11","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1007\/s11069-017-2835-1","article-title":"Identification of pre-seismic anomalies of soil radon-222 signal using Hilbert\u2013Huang transform","volume":"87","year":"2017","journal-title":"Natural Hazards"},{"key":"key20240304075008_B12","article-title":"Deep learning for time series anomaly detection: A survey","year":"2022"},{"issue":"6","key":"key20240304075008_B13","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1109\/JAS.2019.1911747","article-title":"The UCR time series archive","volume":"6","year":"2019","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"key20240304075008_B14","first-page":"4027","article-title":"Graph neural networkbased anomaly detection in multivariate time series","year":"2021"},{"issue":"4","key":"key20240304075008_B15","doi-asserted-by":"crossref","first-page":"3462","DOI":"10.1109\/TEC.2021.3075897","article-title":"Wind turbine gearbox anomaly detection based on adaptive threshold and twin support vector machines","volume":"36","year":"2021","journal-title":"IEEE Transactions on Energy Conversion"},{"issue":"8","key":"key20240304075008_B16","doi-asserted-by":"crossref","first-page":"3127","DOI":"10.1109\/TNNLS.2019.2935975","article-title":"Unsupervised anomaly detection with LSTM neural networks","volume":"31","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"key20240304075008_B17","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","year":"2017"},{"key":"key20240304075008_B18","first-page":"59","article-title":"Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm","volume":"1","year":"2012","journal-title":"KI-2012: poster and demo track"},{"issue":"2","key":"key20240304075008_B19","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/TKDE.2018.2882404","article-title":"Anomaly detection using local kernel density estimation and context-based regression","volume":"32","year":"2020","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"key20240304075008_B20","doi-asserted-by":"crossref","first-page":"2064","DOI":"10.1109\/TNSM.2020.3034647","article-title":"HitAnomaly: Hierarchical transformers for anomaly detection in system log","volume":"17","year":"2020","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"key20240304075008_B21","first-page":"387","article-title":"Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding","year":"2018"},{"key":"key20240304075008_B22","first-page":"352","article-title":"Anomaly detection in time series via robust PCA","year":"2017"},{"issue":"3","key":"key20240304075008_B23","doi-asserted-by":"crossref","first-page":"268","DOI":"10.14778\/3430915.3430918","article-title":"Elle","volume":"14","year":"2020","journal-title":"Proceedings of the VLDB Endowment"},{"key":"key20240304075008_B24","article-title":"Data clustering-based anomaly detection in industrial control systems","year":"2014"},{"key":"key20240304075008_B25","first-page":"703","article-title":"Mad-GAN: Multivariate anomaly detection for time series data with generative adversarial networks","year":"2019"},{"key":"key20240304075008_B26","article-title":"COPOD: Copula-based outlier detection","year":"2020"},{"key":"key20240304075008_B27","article-title":"Dual-path RNN: Efficient long sequence modeling for time-domain single-channel speech separation","year":"2020"},{"key":"key20240304075008_B28","unstructured":"Malhotra, P, Ramakrishnan, A, Anand, G, Vig, L, Agarwal, P and Shroff, G. 2016. Lstm-based encoder-decoder for multi-sensor anomaly detection. arXiv preprint arXiv:1607.00148."},{"key":"key20240304075008_B29","volume-title":"2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater)","year":"2016"},{"issue":"3","key":"key20240304075008_B30","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/51.932724","article-title":"The impact of the MIT-BIH arrhythmia database","volume":"20","year":"2001","journal-title":"IEEE Engineering in Medicine and Biology Magazine"},{"issue":"3","key":"key20240304075008_B31","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1710115.1710118","article-title":"Ganesha","volume":"37","year":"2010","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"3","key":"key20240304075008_B32","doi-asserted-by":"crossref","first-page":"1544","DOI":"10.1109\/LRA.2018.2801475","article-title":"A multimodal anomaly detector for robot-assisted feeding using an LSTM-based variational autoencoder","volume":"3","year":"2018","journal-title":"IEEE Robotics and Automation Letters"},{"issue":"12","key":"key20240304075008_B33","doi-asserted-by":"crossref","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","article-title":"An overview of anomaly detection techniques: Existing solutions and latest technological trends","volume":"51","year":"2007","journal-title":"Computer Networks"},{"key":"key20240304075008_B34","article-title":"Unsupervised anomaly detection in time series using LSTM-based autoencoders","year":"2019"},{"key":"key20240304075008_B35","article-title":"A unsupervised learning method of anomaly detection using GRU","year":"2018"},{"issue":"2","key":"key20240304075008_B36","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1145\/335191.335437","article-title":"Efficient algorithms for mining outliers from large data sets","volume":"29","year":"2000","journal-title":"ACM SIGMOD Record"},{"issue":"1","key":"key20240304075008_B37","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/ijehmc.2014010102","article-title":"Anomaly detection in medical wireless sensor networks using SVM and linear regression models","volume":"5","year":"2014","journal-title":"International Journal of E-Health and Medical Communications"},{"issue":"5","key":"key20240304075008_B38","article-title":"Data science and analytics: An overview from data-driven smart computing, decision-making and applications perspective","volume":"2","year":"2021","journal-title":"SN Computer Science"},{"issue":"7","key":"key20240304075008_B39","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the support of a highdimensional distribution","volume":"13","year":"2001","journal-title":"Neural Computation"},{"key":"key20240304075008_B40","article-title":"Research on industrial control anomaly detection based on FCM and SVM","year":"2018"},{"issue":"8\u20139","key":"key20240304075008_B41","first-page":"1421","article-title":"Temporal pattern attention for multivariate time series forecasting","volume":"108","year":"2019","journal-title":"Machine Learning"},{"key":"key20240304075008_B42","year":"2003"},{"key":"key20240304075008_B43","article-title":"Anomaly detection in streams with extreme value theory","year":"2017"},{"key":"key20240304075008_B44","article-title":"Robust anomaly detection for multivariate time series through stochastic recurrent neural network","year":"2019"},{"key":"key20240304075008_B45","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","article-title":"Support vector data description","volume":"54","year":"2004","journal-title":"Machine Learning"},{"key":"key20240304075008_B46","doi-asserted-by":"crossref","first-page":"107751","DOI":"10.1016\/j.asoc.2021.107751","article-title":"Temporal convolutional autoencoder for unsupervised anomaly detection in time series","volume":"112","year":"2021","journal-title":"Applied Soft Computing"},{"issue":"1","key":"key20240304075008_B47","article-title":"A comprehensive survey of anomaly detection techniques for high dimensional big data","volume":"7","year":"2020","journal-title":"Journal of Big Data"},{"issue":"2","key":"key20240304075008_B48","doi-asserted-by":"crossref","first-page":"141","DOI":"10.14778\/3425879.3425885","article-title":"Real-time distance-based outlier detection in data streams","volume":"14","year":"2020","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"6","key":"key20240304075008_B49","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.14778\/3514061.3514067","article-title":"TranAD: Deep Transformer Networks for Anomaly Detection in Multivariate Time Series Data","volume":"15","year":"2022","journal-title":"Proceedings of VLDB"},{"key":"key20240304075008_B50","article-title":"Graph Attention Networks","year":"2018"},{"issue":"9","key":"key20240304075008_B51","doi-asserted-by":"crossref","first-page":"7183","DOI":"10.1016\/j.aej.2021.12.061","article-title":"Research on anomaly detection and real-time reliability evaluation with the log of cloud platform","volume":"61","year":"2022","journal-title":"Alexandria Engineering Journal"},{"issue":"3","key":"key20240304075008_B52","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1109\/TITS.2020.2970295","article-title":"Real-time sensor anomaly detection and recovery in connected automated vehicle sensors","volume":"22","year":"2021","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"key20240304075008_B53","article-title":"Anomaly transformer: Time series anomaly detection with association discrepancy","year":"2022"},{"key":"key20240304075008_B54","article-title":"ARIMA based network anomaly detection","year":"2010"},{"key":"key20240304075008_B55","doi-asserted-by":"crossref","first-page":"56145","DOI":"10.1109\/ACCESS.2022.3175516","article-title":"Long-term prediction of network security situation through the use of the transformer-based model","volume":"10","year":"2022","journal-title":"IEEE Access"},{"key":"key20240304075008_B56","article-title":"DTAAD: Dual TCN-attention networks for anomaly detection in multivariate time series data","year":"2023"},{"key":"key20240304075008_B57","first-page":"1059","article-title":"Markov chain-based feature extraction for anomaly detection in time series and its industrial application","year":"2018"},{"key":"key20240304075008_B58","first-page":"1409","article-title":"A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data","year":"2019"},{"key":"key20240304075008_B59","first-page":"1","article-title":"Unsupervised deep anomaly detection for multi-sensor timeseries signals","year":"2021","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"key20240304075008_B60","article-title":"Multivariate time-series anomaly detection via graph attention network","year":"2020"},{"key":"key20240304075008_B61","article-title":"Deep autoencoding gaussian mixture model for unsupervised anomaly detection","year":"2018"}],"container-title":["Data Science Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/storage.googleapis.com\/jnl-up-j-dsj-files\/journals\/1\/articles\/1602\/651e9f456c9c4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T08:02:21Z","timestamp":1761552141000},"score":1,"resource":{"primary":{"URL":"http:\/\/datascience.codata.org\/articles\/10.5334\/dsj-2024-010\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":61,"alternative-id":["10.5334\/dsj-2024-010"],"URL":"https:\/\/doi.org\/10.5334\/dsj-2024-010","relation":{},"ISSN":["1683-1470"],"issn-type":[{"value":"1683-1470","type":"print"}],"subject":[],"published":{"date-parts":[[2024]]},"article-number":"10"}}