Computer Engineering & Science ›› 2024, Vol. 46 ›› Issue (05): 826-835.
• Computer Network and Znformation Security • Previous Articles Next Articles
YIN Chun-yong,ZHAO Feng
Received:
2023-04-03
Revised:
2023-07-23
Accepted:
2024-05-25
Online:
2024-05-25
Published:
2024-05-30
YIN Chun-yong, ZHAO Feng. An anomaly detection model of time series based on dual attention and deep autoencoder[J]. Computer Engineering & Science, 2024, 46(05): 826-835.
[1] | Choi K,Yi J,Park C,et al.Deep learning for anomaly detection in time-series data:Review,analysis,and guidelines[J].IEEE Access,2021,9:120043-120065. |
[2] | Rousseeuw P J,Leroy A M.Robust regression and outlier detection[M].New York:John Wiley & Sons,2005. |
[3] | Fuse T,Kamiya K.Statistical anomaly detection in human dynamics monitoring using a hierarchical dirichlet process hidden markov model[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(11):3083-3092. |
[4] | Liu P,Xu H,Ouyang Q,et al.Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks[C]∥Proc of 2020 IEEE 31st International Symposium on Software Reliability Engineering,2020:48-58. |
[5] | Park D,Kim H,Hoshi Y,et al.A multimodal execution monitor with anomaly classification for robot-assisted feeding[C]∥Proc of 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems,2017:5406-5413. |
[6] | Rodriguez A,Bourne D,Mason M,et al.Failure detection in assembly:Force signature analysis[C]∥Proc of 2010 IEEE International Conference on Automation Science & Engineering,2010:210-215. |
[7] | Zhang Y X,Wang J D,Chen Y Q,et al.Adaptive memory networks with self-supervised learning for unsupervised anomaly detection[J].IEEE Transactions on Knowledge and Data Engineering,2023,35(12):12068-12080. |
[8] | Munir M,Siddiqui S A,Dengel A,et al.DeepAnT:A deep learning approach for unsupervised anomaly detection in time series[J].IEEE Access,2018,7:1991-2005. |
[9] | Amarbayasgalan T,Pham V H,Theera-Umpon N,et al.Unsupervised anomaly detection approach for time-series in multi-domains using deep reconstruction error[J].Symmetry,2020,12(8):1251. |
[10] | Chen Z,Yeo C K,Lee B S,et al.Autoencoder-based network anomaly detection[C]∥Proc of 2018 Wireless Telecommunications Symposium,2018:1-5. |
[11] | Berberidis C,Vlahavas I.Mining for weak periodic signals in time series databases[J].Intelligent Data Analysis,2005,9(1):29-42. |
[12] | VanderPlas J T. Understanding the lomb-scargle periodogram[J].arXiv:1703.09824,2017. |
[13] | Yu C Y,Han R,Song M P,et al.A simplified 2D-3D CNN architecture for hyperspectral image classification based on spatial-spectral fusion[J].IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing,2020,13:2485-2501. |
[14] | Zhang S,Li X,Zong M,et al.Efficient kNN classification with different numbers of nearest neighbors[J].IEEE Transactions on Neural Networks and Learning Systems,2017,29(5):1774-1785. |
[15] | Alghushairy O,Alsini R,Soule T,et al.A review of local outlier factor algorithms for outlier detection in big data streams[J].Big Data and Cognitive Computing,2021,5(1):No.1. |
[16] | Pena E H M,de Assis M V O,Provena M L.Anomaly detection using forecasting methods ARIMA and HWDS[C]∥Proc of 2013 32nd International Conference of the Chilean Computer Science Society,2013:63-66. |
[17] | Teoh T T,Chiew G,Franco E J,et al.Anomaly detection in cyber security attacks on networks using MLP deep learning[C]∥Proc of 2018 International Conference on Smart Computing and Electronic Enterprise,2018:1-5. |
[18] | Bontemps L,Cao V L,Mcdermott J,et al.Collective anomaly detection based on long short-term memory recurrent neural networks[C]∥Proc of International Conference on Future Data and Security Engineering,2016:141-152. |
[19] | Ahmad S,Lavin A,Purdy S,et al.Unsupervised real-time anomaly detection for streaming data[J].Neurocomputing,2017,262:134-147. |
[20] | Hoang D H, Nguyen H D.A PCA-based method for IoT network traffic anomaly detection[C]∥Proc of 2018 20th International Conference on Advanced Communication Technology,2018:381-386. |
[21] | Siwach M,Mann S.Anomaly detection for weblog data analysis using weighted PCA technique[J].Journal of Information and Optimization Sciences,2022,43(1):131-141. |
[22] | Malhotra P,Ramakrishnan A,Anand G,et al.LSTM-based encoder-decoder for multi-sensor anomaly detection[J].arXiv:1607.00148,2016. |
[23] | 夏火松,孙泽林.基于自编码器和集成学习的半监督异常检测算法[J].计算机工程与科学,2020,42(8):1440-1447. |
Xia Huo-song,Sun Ze-lin.A semi-supervised outlier detection model based on autoencoder and integrated learning[J].Computer Engineering & Science,2020,42(8):1440-1447. | |
[24] | Bahdanau D,Cho K,Bengio Y.Neural machine translation by jointly learning to align and translate[J].arXiv:1409.0473,2014. |
[25] | Vaswani A,Shazeer N,Parmar N,et al.Attention is all you need[C]∥Proc of the 31st International Conference on Neural Information Processing Systems,2017:6000-6010. |
[26] | Zhang C,Song D,Chen Y,et al.A deep neural network for unsupervised anomaly detection and diagnosis in multivariate time series data[C]∥Proc of the AAAI Conference on Artificial Intelligence,2019:1409-1416. |
[27] | Pereira J,Silveira M.Unsupervised anomaly detection in energy time series data using variational recurrent autoencoders with attention[C]∥Proc of 2018 17th IEEE International Conference on Machine Learning and Applications,2018:1275-1282. |
[28] | Qin Y,Song D,Chen H,et al.A dual-stage attention-based recurrent neural network for time series prediction[J].arXiv:1704.02971,2017. |
[29] | Ren Y,Wu Y.Convolutional deep belief networks for feature extraction of EEG signal[C]∥Proc of 2014 International Joint Conference on Neural Networks,2014:2850-2853. |
[30] | Lomb N R.Least-squares frequency analysis of unequally spaced data[J].Astrophysics and Space Science,1976,39:447-462. |
[31] | Scargle J D.Studies in astronomical time series analysis.II-Statistical aspects of spectral analysis of unevenly spaced data[J].Astrophysical Journal,1982,263:835-853. |
[32] | 袁非牛,章琳,史劲亭,等.自编码神经网络理论及应用综述[J].计算机学报,2019,42(1):203-230. |
Yuan Fei-niu,Zhang Lin,Shi Jin-ting,et al.Theories and applications of auto-encoder neural networks:A literature survey[J].Chinese Journal of Computers,2019,42(1):203-230. | |
[33] | Cho K, Merrinboer B,Gulcehre C, et al.Learning phrase representations using RNN encoder-decoder for statistical machine translation[C]∥Proc of the 2014 Conference on Empirical Methods in Natural Language Processing,2014:1724-1734. |
[34] | Shahid F,Zameer A,Muneeb M.Predictions for COVID-19 with deep learning models of LSTM,GRU and Bi-LSTM[J].Chaos,Solitons & Fractals,2020,140:110212. |
[35] | Hübner R,Steinhauser M,Lehle C.A dual-stage two-phase model of selective attention[J].Psychological Review,2010,117(3):759-784. |
[36] | Hundman K, Constantinou V,Laporte C,et al.Detecting spacecraft anomalies using LSTMs and nonparametric dynamic thresholding[C]∥Proc of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining,2018:387-395. |
[37] | Li D,Chen D,Jin B,et al.MAD-GAN:Multivariate anomaly detection for time series data with generative adversarial networks[C]∥Proc of International Conference on Artificial Neural Networks,2019:703-716. |
[38] | Salinas D,Flunkert V,Gasthaus J,et al.DeepAR:Probabilistic forecasting with autoregressive recurrent networks[J].International Journal of Forecasting,2020,36(3):1181-1191. |
[39] | Geiger A,Liu D Y,Alnegheimish S,et al.TadGAN:Time series anomaly detection using generative adversarial networks[C]∥Proc of 2020 IEEE International Conference on Big Data,2020:33-43. |
[1] | XU Jia, ZHANG Ji-xian, WANG Zhe-min, LIU Lin-jie. Truthful auction mechanisms for multi-resource allocation based on NUMA architecture of cloud computing [J]. Computer Engineering & Science, 2024, 46(05): 761-775. |
[2] | ZHONG Quan, CHEN Zhi-guang, GAO Lan-guang. EMRI-Tree: A hierarchical data structure for multi-resolution visualization [J]. Computer Engineering & Science, 2024, 46(05): 776-784. |
[3] | LI Liu-hui, WANG Liang, YANG Chun-yan, CHEN Yi-long, CHEN Peng. Preparation and high-precision assembly technique of CCGA devices [J]. Computer Engineering & Science, 2024, 46(05): 794-800. |
[4] | TAN Yu-song, WANG Wei, JIAN Song-lei, YI Chao-xiong. Weakly-supervised IDS with abnormal-preserving transformation learning [J]. Computer Engineering & Science, 2024, 46(05): 801-809. |
[5] | ZHAO Yue, ZHOU Tong-qing, ZENG Hui, CAI Zhi-ping, XIAO Nong. Push after delay:A delayed push synchronization strategy for low-power mobile end-to-end systems [J]. Computer Engineering & Science, 2024, 46(05): 810-817. |
[6] | YUAN Yu-lei, ZHAO Bao-kang, Lv Gao-feng. SRv4: Design and implementation of segment routing data plane for IPv4 [J]. Computer Engineering & Science, 2024, 46(05): 818-825. |
[7] | FAN Qi, WANG Shan-min, LIU Cheng-guang, LIU Qing-shan. Multi-target domain facial expression recognition based on class-wise feature constraint [J]. Computer Engineering & Science, 2024, 46(05): 836-845. |
[8] | LUO Chao, MIAO Jun, ZHENG Yi-lin, HUA Feng, Chu Jun. A single image reflection removal cascaded algorithm using non-local correlation and contrast constraint [J]. Computer Engineering & Science, 2024, 46(05): 861-871. |
[9] | WANG Ying-chao. Research and application of whale optimization algorithm [J]. Computer Engineering & Science, 2024, 46(05): 881-896. |
[10] | CHU Xu, NING Ai-bing, HU Kai-yuan, DAI Su-yu, ZHANG Hui-zhen. A backtracking algorithm with reduction for the threshold-minimum dominating set problem [J]. Computer Engineering & Science, 2024, 46(05): 897-906. |
[11] | LIU Pan, GUO Yan-ming, LEI Jun, WANG Hao-ran, LAO Song-yang, LI Guo-hui. A context-aware feature representation method in fine-grained entity typing [J]. Computer Engineering & Science, 2024, 46(05): 929-936. |
[12] | LI Xin-jie, WANG Wen-jun, DONG Ling, LAI Hua, YU Zheng-tao, GAO Sheng-xiang, . An unsupervised phoneme segmentation method for Lao language with multi-feature interaction fusion [J]. Computer Engineering & Science, 2024, 46(05): 937-944. |
[13] | YU Qin, Wu Fei, ZHANG Meng, XIE Chang-sheng. A survey of error correction codes in holographic storage [J]. Computer Engineering & Science, 2024, 46(04): 571-579. |
[14] | CHEN Jie, LI Cheng, LIU Zhong. Convolutional neural network inference and training vectorization method for multicore vector accelerators [J]. Computer Engineering & Science, 2024, 46(04): 580-589. |
[15] | REN Sheng-qi, SONG Wei. Feature extraction and prediction of multidimensional time series based on GGInformer model [J]. Computer Engineering & Science, 2024, 46(04): 590-598. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
Copyright © Computer Engineering & Science, All Rights Reserved.
Address:109 Deya Rd,Changsha,hunan(410073) Tel: 0731-87002567 Email: jsjgcykx@vip.163.com
Powered by Beijing Magtech Co., Ltd.