Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240700124-8.doi: 10.11896/jsjkx.240700124
• Big Data & Data Science • Previous Articles Next Articles
YIN Wencui, XIE Ping, YE Chengxu, HAN Jiaxin, XIA Xing
CLC Number:
[1]NING W Y.Research on multivariate time series anomaly detection methods [D].Nanchang:East China Jiaotong University,2023. [2]PANG G,SHEN C,CAN L,et al.Deep learning for anomaly de-tection:A review[J].ACM Computing Surveys(CSUR),2021,54(2):1-38. [3]YANG C C,YAN X H,CHEN R J,et al.Time Series Anomaly Detection Model with Dual Attention Mechanism [J].Journal of Computer Science and Exploration,2024,18(3):740-754. [4]YIN R G,WEI S,LI H,et al.Introduction of UnsupervisedLearning Methods in Deep Learning [J].Applications of Computer Systems,2016,25(8):1-7. [5]ZHOU Y,ZHU W H,FANG Q,et al.Survey of Outlier Detection Methods Based on Clustering [J].Computer Engineering and Applications,2019,57(12):37-45. [6]JI Q,SUN Y F,HU Y L,et al.Review of Clustering With Deep Learning.Journal of Beijing University of Technology,2021,47(8):912-924. [7]董洪荣,付亚军,张帅,等.基于欧式距离聚类的自适应过采样方法[J].印刷与数字媒体技术研究,2023(5):26-41. [8]AHMAD H,KASASBEH B,ALDABAYBAH B,et al.Classbalancing framework for credit card fraud detection based on clustering and similarity-based selection(SBS)[J].International Journal of Information Technology,2023,15(1):325-333. [9]DONG H R,FU Y J,ZHANG S,et al.Review of anomaly detection algorithms for multidimensional time series [J].Print and Digital Media Technology Research,2023(5):26-41. [10]WANG S H.Research on Anomaly Detection Method of Multivariate Time Series Based on Deep Learning [D].Harbin:Harbin Engineering University,2021. [11]LAI J,WANG X D,FORWARD,et al.Review on autoencoder and its application [J].Journal of Communications,2021,42(9):218-230. [12]KIPF,THOMAS N,WELLING.Variational graph auto-en-coders[C]//NIPS Workshop on Bayesian Deep Learning.Barcelona,Spain,2016:1-3. [13]ZHENG Y J.Research on Time Series Anomaly DetectionBased on Deep Learning[D].Beijing:Beijing University of Civil Engineering and Architecture,2021. [14]LI D,CHEN D,JIN B,et al.MAD-GAN:Multivariate anomalydetection for time series data with generative adversarial networks[C]//International Conference on Artificial Neural Networks.Cham:Springer International Publishing,2019:703-716. [15]SU Y,ZHAO Y,NIU C,et al.Robust anomaly detection for multivariate time series through stochastic recurrent neural network[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.Anchorage,AK,USA,2019:2828-2837. [16]AUDIBERT J,MICHIARDI P,GUYARD F,et al.Usad:Unsupervised anomaly detection on multivariate time series[C]//Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.New York,United States,2020:3395-3404. [17]CHEN W,TIAN L,CHEN B,et al.Deep variational graph convolutional recurrent network for multivariate time series anomaly detection[C]//International Conference on Machine Lear-ning.Baltimore,Maryland,USA,2022:3621-3633. [18]LIU Y,JIN M,PAN S,et al.Graph self-supervised learning:A survey[J].IEEE Transactions on Knowledge and Data Engineering,2022,35(6):5879-5900. [19]DENG A,HOOI B.Graph neural network-based anomaly detection in multivariate time series[C]//Proceedings of the AAAI Conference on Artificial Intelligence.Vancouver,Canada,2021,35(5):4027-4035. [20]ZHOU J,CUI G,HU S,et al.Graph neural networks:A review of methods and applications[J].AI open,2020,1:57-81. [21]VELIČKOVIĆ P,CUCURULL G,CASANOVA A,et al.Graph attention networks[C]//6th International Conference on Lear-ning Representation.Vancouver,BC,Canada,2018:1-12. [22]XIE Y,XU Z,ZHANG J,et al.Self-supervised learning of graph neural networks:A unified review[J].IEEE transactions on pattern analysis and machine intelligence,2022,45(2):2412-2429. [23]LI Z ,JIN X L,ZHUANG C Z,et al.Overview on Graph Based Anomaly Detection [J].Journal of Software,2020,32(1):167-193. [24]YAN S H,CHEN Z D.GAE-based Unsupervised Anomaly Detection of Multivariable Time Series [J].Applications of Computer Systems,2023,32(5):308-315. [25]ZHANG Y,LU M M,ZHENG Y J,et al.Student Grade Prediction Based on Graph Auto-Encoder Model [J].Computer Engineering and Applications,2019,57(13):251-257. [26]CHEN X,GÜTTEL S.Fast and exact fixed-radius neighborsearch based on sorting[J].PeerJ Computer Science,2024,10:1-17. [27]ZHANG S,TONG H,XU J,et al.Graph convolutional net-works:a comprehensive review[J].Computational Social Networks,2019,6(1):1-23. [28]LI Z,LI C,XU Z,et al.Frequency analysis of precipitation extremes in Heihe River basin based on generalized Pareto distribution[J].Stochastic environmental research and risk assessment,2014,28:1709-1721. [29]MATHUR A P,TIPPENHAUER N O.SWaT:A water treatment testbed for research and training on ICS security[C]//International Workshop on Cyber-physical Systems for Smart Water Networks(CySWater).Vienna,Austria,2016:31-36. [30]TULI S,CASALE G,JENNINGS N R.Tranad:Deep trans-former networks for anomaly detection in multivariate time series data[J].arXiv:2201.07284,2022. [31]CEMGIL T,GHAISAS S,DVIJOTHAM K,et al.The autoencoding variational autoencoder[J].Advances in Neural Information Processing Systems,2020,33:15077-15087. |
[1] | LIAO Sirui, HUANG Feihu, ZHAN Pengxiang, PENG Jian, ZHANG Linghao. DCDAD:Differentiated Context Dependency for Time Series Anomaly Detection Method [J]. Computer Science, 2025, 52(6): 106-117. |
[2] | YUAN Ye, CHEN Ming, WU Anbiao, WANG Yishu. Graph Anomaly Detection Model Based on Personalized PageRank and Contrastive Learning [J]. Computer Science, 2025, 52(2): 80-90. |
[3] | HE Liren, PENG Bo, CHI Mingmin. Unsupervised Multi-class Anomaly Detection Based on Prototype Reverse Distillation [J]. Computer Science, 2025, 52(2): 202-211. |
[4] | YAN Tingju, CAO Yan, WANG Yijing. Low-power Bluetooth Spoofing Attack Detection Technology Based on RFFAD_DeepSVDD [J]. Computer Science, 2025, 52(2): 380-387. |
[5] | KONG Lingchao, LIU Guozhu. Review of Outlier Detection Algorithms [J]. Computer Science, 2024, 51(8): 20-33. |
[6] | GUO Fangyuan, JI Genlin. Video Anomaly Detection Method Based on Dual Discriminators and Pseudo Video Generation [J]. Computer Science, 2024, 51(8): 217-223. |
[7] | ZENG Zihui, LI Chaoyang, LIAO Qing. Multivariate Time Series Anomaly Detection Algorithm in Missing Value Scenario [J]. Computer Science, 2024, 51(7): 108-115. |
[8] | FAN Yi, HU Tao, YI Peng. Host Anomaly Detection Framework Based on Multifaceted Information Fusion of SemanticFeatures for System Calls [J]. Computer Science, 2024, 51(7): 380-388. |
[9] | QIAO Hong, XING Hongjie. Attention-based Multi-scale Distillation Anomaly Detection [J]. Computer Science, 2024, 51(6A): 230300223-11. |
[10] | PENG Bo, LI Yaodong, GONG Xianfu. Improved K-means Photovoltaic Energy Data Cleaning Method Based on Autoencoder [J]. Computer Science, 2024, 51(6A): 230700070-5. |
[11] | SI Jia, LIANG Jianfeng, XIE Shuo, DENG Yingjun. Research Progress of Anomaly Detection in IaaS Cloud Operation Driven by Deep Learning [J]. Computer Science, 2024, 51(6A): 230400016-8. |
[12] | WANG Li, CHEN Gang, XIA Mingshan, HU Hao. DUWe:Dynamic Unknown Word Embedding Approach for Web Anomaly Detection [J]. Computer Science, 2024, 51(6A): 230300191-5. |
[13] | WU Nannan, GUO Zehao, ZHAO Yiming, YU Wei, SUN Ying, WANG Wenjun. Study on Anomalous Evolution Pattern on Temporal Networks [J]. Computer Science, 2024, 51(6): 118-127. |
[14] | WU Huinan, XING Hongjie, LI Gang. Deep Multiple-sphere Support Vector Data Description Based on Variational Autoencoder with Mixture-of-Gaussians Prior [J]. Computer Science, 2024, 51(6): 135-143. |
[15] | LI Shasha, XING Hongjie. Robust Anomaly Detection Based on Adversarial Samples and AutoEncoder [J]. Computer Science, 2024, 51(5): 363-373. |
|