{"id":"https://openalex.org/W3209380738","doi":"https://doi.org/10.1109/icccnt51525.2021.9579828","title":"AI based Segmented Anomaly Detection","display_name":"AI based Segmented Anomaly Detection","publication_year":2021,"publication_date":"2021-07-06","ids":{"openalex":"https://openalex.org/W3209380738","doi":"https://doi.org/10.1109/icccnt51525.2021.9579828","mag":"3209380738"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt51525.2021.9579828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012451183","display_name":"Kiran S. Raj","orcid":"https://orcid.org/0000-0001-6356-491X"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kiran S Raj","raw_affiliation_strings":["Amrita School of Engineering, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Amrita School of Engineering, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101528447","display_name":"Priyanka Kumar","orcid":"https://orcid.org/0000-0001-6655-4864"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Priyanka Kumar","raw_affiliation_strings":["Amrita School of Engineering, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Amrita School of Engineering, Coimbatore, India","institution_ids":["https://openalex.org/I81556334"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5012451183"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15674776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"abs 2101 1073","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.874087929725647},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.775772213935852},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5792302489280701},{"id":"https://openalex.org/keywords/scope","display_name":"Scope (computer science)","score":0.560421347618103},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4764036238193512},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4102541208267212},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3550716042518616}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.874087929725647},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.775772213935852},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5792302489280701},{"id":"https://openalex.org/C2778012447","wikidata":"https://www.wikidata.org/wiki/Q1034415","display_name":"Scope (computer science)","level":2,"score":0.560421347618103},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4764036238193512},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4102541208267212},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3550716042518616},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt51525.2021.9579828","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt51525.2021.9579828","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2016053056","https://openalex.org/W2021659075","https://openalex.org/W2041390734","https://openalex.org/W2186910770","https://openalex.org/W2331812431","https://openalex.org/W2539222059","https://openalex.org/W2763384612","https://openalex.org/W2791842687","https://openalex.org/W2963045681","https://openalex.org/W2963795951","https://openalex.org/W2999166549","https://openalex.org/W3092920241","https://openalex.org/W3107664750","https://openalex.org/W3112567121","https://openalex.org/W3120503799","https://openalex.org/W4250482878","https://openalex.org/W6788322089"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"This":[0],"paper":[1],"aims":[2],"at":[3],"targeting":[4],"to":[5,27,49,63,83,97,131,136,147,162,171,181,184,192],"solve":[6],"the":[7,29,43,64,72,85,89,119,132,142,148,164,173,178],"problem":[8],"of":[9,31,45,52,66,68,79,88,115,177],"anomaly":[10,101,121],"detection":[11,122],"by":[12,76],"proposing":[13],"a":[14,35],"system":[15,39,143,179],"that":[16,112,137,195],"would":[17,104,113,203],"be":[18,114,185,190],"efficient":[19],"in":[20,34,55,106,125],"detecting":[21,32],"anomalies":[22,33,51,111,124],"and":[23,108,145,168,188,209],"also":[24],"being":[25,61],"region-specific":[26,99,120],"narrow":[28],"target":[30],"particular":[36],"environment.":[37],"The":[38,91,155,175],"elaborates":[40],"on":[41],"leveraging":[42],"power":[44],"convolutional":[46],"autoencoders,":[47],"LSTMs":[48],"detect":[50],"various":[53,80,193],"kinds":[54],"an":[56,77,126],"unsupervised":[57],"manner,":[58],"hence":[59,140,189],"not":[60],"limited":[62],"scope":[65],"labels":[67],"pre-trained":[69],"modules.":[70],"Furthermore,":[71],"architecture":[73],"is":[74,152,180,197],"enhanced":[75],"ensemble":[78],"such":[81,201],"modules":[82],"improve":[84],"overall":[86],"performance":[87],"system.":[90],"obtained":[92,157],"results":[93,158],"are":[94,128,159],"further":[95],"analysed":[96],"provide":[98],"based":[100],"detection,":[102],"this":[103],"help":[105,204],"prioritising":[107],"investigating":[109],"those":[110],"greater":[116],"risk.":[117],"With":[118],"module,":[123],"environment":[127,150],"prioritised":[129],"according":[130],"risk":[133],"it":[134,151],"poses":[135],"specific":[138,149],"environment,":[139],"making":[141],"robust":[144],"adaptable":[146],"working":[153],"on.":[154],"final":[156],"then":[160],"used":[161],"enforce":[163],"necessary":[165],"contingencies,":[166],"precautions":[167,187],"prevention":[169],"methods":[170],"combat":[172],"same.":[174],"outcome":[176],"prepare":[182],"humans":[183,205],"take":[186],"vigilant":[191],"anomalies/risks":[194],"one":[196],"subjected":[198],"to.":[199],"Preventing":[200],"risks":[202],"become":[206],"more":[207],"intrepid":[208],"hopeful":[210],"about":[211],"their":[212],"bright":[213],"future.":[214]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
