{"id":"https://openalex.org/W4297099474","doi":"https://doi.org/10.1109/dsc54232.2022.9888874","title":"A Survey on Explainable Anomaly Detection for Industrial Internet of Things","display_name":"A Survey on Explainable Anomaly Detection for Industrial Internet of Things","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099474","doi":"https://doi.org/10.1109/dsc54232.2022.9888874"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016956555","display_name":"Zijie Huang","orcid":"https://orcid.org/0000-0002-6001-6579"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Zijie Huang","raw_affiliation_strings":["College of Engineering, Mathematics and Physical Sciences, University of Exeter,Exeter,UK,EX4 4QF"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Mathematics and Physical Sciences, University of Exeter,Exeter,UK,EX4 4QF","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004458037","display_name":"Yulei Wu","orcid":"https://orcid.org/0000-0003-0801-8443"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Yulei Wu","raw_affiliation_strings":["College of Engineering, Mathematics and Physical Sciences, University of Exeter,Exeter,UK,EX4 4QF"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Mathematics and Physical Sciences, University of Exeter,Exeter,UK,EX4 4QF","institution_ids":["https://openalex.org/I23923803"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016956555"],"corresponding_institution_ids":["https://openalex.org/I23923803"],"apc_list":null,"apc_paid":null,"fwci":2.2069,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.89514132,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9912999868392944,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8837579488754272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7206482887268066},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5634546875953674},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.509280800819397},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.4868554472923279},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4831351935863495},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.38325104117393494},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3414847254753113},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33212488889694214},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.3081217408180237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10544019937515259}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8837579488754272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7206482887268066},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5634546875953674},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.509280800819397},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.4868554472923279},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4831351935863495},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38325104117393494},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3414847254753113},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33212488889694214},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3081217408180237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10544019937515259},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888874","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","display_name":"Decent work and economic growth","score":0.5199999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2107528096","https://openalex.org/W2122646361","https://openalex.org/W2171033594","https://openalex.org/W2296719434","https://openalex.org/W2516809705","https://openalex.org/W2621033546","https://openalex.org/W2788403449","https://openalex.org/W2806741695","https://openalex.org/W2846676623","https://openalex.org/W2899072250","https://openalex.org/W2932771740","https://openalex.org/W2962862931","https://openalex.org/W2963248736","https://openalex.org/W2964303497","https://openalex.org/W2964449086","https://openalex.org/W2968184987","https://openalex.org/W2969495950","https://openalex.org/W2972596963","https://openalex.org/W2987793235","https://openalex.org/W2998908795","https://openalex.org/W3012334351","https://openalex.org/W3023316813","https://openalex.org/W3040536599","https://openalex.org/W3040717095","https://openalex.org/W3043766109","https://openalex.org/W3044131578","https://openalex.org/W3045593282","https://openalex.org/W3092273386","https://openalex.org/W3095770664","https://openalex.org/W3097297712","https://openalex.org/W3107871149","https://openalex.org/W3109541357","https://openalex.org/W3116286104","https://openalex.org/W3129391370","https://openalex.org/W3153872861","https://openalex.org/W3155020919","https://openalex.org/W3159028649","https://openalex.org/W3168145774","https://openalex.org/W3191893406","https://openalex.org/W3194320491","https://openalex.org/W3199795887","https://openalex.org/W3200601607","https://openalex.org/W3216015240","https://openalex.org/W3216835679","https://openalex.org/W4205782309","https://openalex.org/W4212827171","https://openalex.org/W4254182148","https://openalex.org/W6737947904","https://openalex.org/W6760822222","https://openalex.org/W6785427385","https://openalex.org/W6803650108","https://openalex.org/W6804710081","https://openalex.org/W7016021835"],"related_works":["https://openalex.org/W4318049614","https://openalex.org/W2042251007","https://openalex.org/W2550930058","https://openalex.org/W2984111956","https://openalex.org/W2065643612","https://openalex.org/W2110365568","https://openalex.org/W4311571903","https://openalex.org/W2130317780","https://openalex.org/W2063729131","https://openalex.org/W2619477556"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,60,93,105,120,130,145],"techniques":[2,106,121],"in":[3,80,107,156],"the":[4,46,49,81,116,140],"Industrial":[5],"Internet":[6],"of":[7,18,90,102,142],"Things":[8],"(IIoT)":[9],"are":[10,24,40],"driving":[11],"traditional":[12],"industries":[13],"towards":[14],"an":[15,100],"unprecedented":[16],"level":[17],"efficiency,":[19],"productivity":[20],"and":[21,30,84,131],"performance.":[22],"They":[23],"typically":[25],"developed":[26],"based":[27,127,133],"on":[28,57,78],"supervised":[29],"unsupervised":[31],"machine":[32,37],"learning":[33,38],"models.":[34,73],"However,":[35],"some":[36],"models":[39,56],"facing":[41],"\u201cblack":[42,64],"box\u201d":[43,65],"problems,":[44],"namely":[45,125],"rationale":[47],"behind":[48],"algorithm":[50],"is":[51,86],"not":[52],"understandable.":[53],"Recently,":[54],"several":[55],"explainable":[58,91,103,118,128,134,143],"anomaly":[59,92,104,119,129,135,144],"have":[61,67],"emerged.":[62],"The":[63],"problems":[66],"been":[68],"studied":[69],"by":[70],"using":[71],"such":[72],"But":[74],"few":[75],"works":[76],"focus":[77],"applications":[79,141],"IIoT":[82,148],"field,":[83],"there":[85],"no":[87],"related":[88],"review":[89],"techniques.":[94],"In":[95],"this":[96,157],"survey,":[97],"we":[98,151],"provide":[99],"overview":[101],"IIoT.":[108],"We":[109,137],"propose":[110],"a":[111],"new":[112],"taxonomy":[113],"to":[114],"classify":[115],"state-of-the-art":[117],"into":[122],"two":[123],"categories,":[124],"intrinsic":[126],"explainer":[132],"detection.":[136],"further":[138],"discuss":[139],"across":[146],"various":[147],"fields.":[149],"Finally,":[150],"suggest":[152],"future":[153],"study":[154],"options":[155],"rapidly":[158],"expanding":[159],"subject.":[160]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
