{"id":"https://openalex.org/W4415743953","doi":"https://doi.org/10.1109/qrs-c65679.2025.00057","title":"Anomaly Detection for Multivariate Industrial Time Series Based on Consistency Models","display_name":"Anomaly Detection for Multivariate Industrial Time Series Based on Consistency Models","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415743953","doi":"https://doi.org/10.1109/qrs-c65679.2025.00057"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022905824","display_name":"Bin Fang","orcid":"https://orcid.org/0000-0002-6916-587X"},"institutions":[{"id":"https://openalex.org/I46520130","display_name":"Chaohu University","ror":"https://ror.org/00mwds915","country_code":"CN","type":"education","lineage":["https://openalex.org/I46520130"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bingwu Fang","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence of Chaohu University,Hefei,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence of Chaohu University,Hefei,China","institution_ids":["https://openalex.org/I46520130"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100711681","display_name":"Yong Li","orcid":"https://orcid.org/0000-0003-2278-6991"},"institutions":[{"id":"https://openalex.org/I1334729051","display_name":"Xinjiang Normal University","ror":"https://ror.org/00ndrvk93","country_code":"CN","type":"education","lineage":["https://openalex.org/I1334729051"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Li","raw_affiliation_strings":["College of Computer Science and Technology of Xinjiang Normal University,Urumqi,China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology of Xinjiang Normal University,Urumqi,China","institution_ids":["https://openalex.org/I1334729051"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111822524","display_name":"Zhenyu Liu","orcid":"https://orcid.org/0000-0001-7559-8519"},"institutions":[{"id":"https://openalex.org/I46520130","display_name":"Chaohu University","ror":"https://ror.org/00mwds915","country_code":"CN","type":"education","lineage":["https://openalex.org/I46520130"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Liu","raw_affiliation_strings":["School of Computer Science and Artificial Intelligence of Chaohu University,Hefei,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Artificial Intelligence of Chaohu University,Hefei,China","institution_ids":["https://openalex.org/I46520130"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022905824"],"corresponding_institution_ids":["https://openalex.org/I46520130"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16549584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"400","last_page":"406"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9606999754905701,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9606999754905701,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.023499999195337296,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.0019000000320374966,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5845000147819519},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5753999948501587},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5722000002861023},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.516700029373169},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.4997999966144562},{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.4620000123977661},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.4422999918460846},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.34940001368522644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6638000011444092},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5845000147819519},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5753999948501587},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5722000002861023},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.516700029373169},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.4997999966144562},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.4620000123977661},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.4422999918460846},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43950000405311584},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35920000076293945},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.34940001368522644},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.34360000491142273},{"id":"https://openalex.org/C134261354","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical inference","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31459999084472656},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.29440000653266907},{"id":"https://openalex.org/C163294075","wikidata":"https://www.wikidata.org/wiki/Q581861","display_name":"Noise reduction","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.2840999960899353},{"id":"https://openalex.org/C103824480","wikidata":"https://www.wikidata.org/wiki/Q185889","display_name":"Time domain","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27079999446868896},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2644999921321869},{"id":"https://openalex.org/C82029504","wikidata":"https://www.wikidata.org/wiki/Q4373882","display_name":"Sequential consistency","level":4,"score":0.26089999079704285},{"id":"https://openalex.org/C137668524","wikidata":"https://www.wikidata.org/wiki/Q189813","display_name":"Censoring (clinical trials)","level":2,"score":0.25270000100135803}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00057","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00057","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320330920","display_name":"Chaohu University","ror":"https://ror.org/00mwds915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2911200746","https://openalex.org/W3081497074","https://openalex.org/W3169450514","https://openalex.org/W4283318673","https://openalex.org/W4309765030","https://openalex.org/W4323322022","https://openalex.org/W4385562582","https://openalex.org/W4388334594","https://openalex.org/W4391054939","https://openalex.org/W4391557953","https://openalex.org/W4391568704","https://openalex.org/W4392374367","https://openalex.org/W4399054419","https://openalex.org/W4402056503","https://openalex.org/W4404713971","https://openalex.org/W4405436651","https://openalex.org/W4408355024","https://openalex.org/W4411143628"],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"multivariate":[1],"time":[2,22,38,44],"series":[3,23,39],"anomaly":[4,24],"detection":[5,25],"faces":[6],"challenges":[7],"such":[8],"as":[9],"high-dimensional":[10],"correlations,":[11],"multi-scale":[12,58,75],"dependencies,":[13],"and":[14,61,79,138],"dynamic":[15],"noise":[16,132],"distributions.":[17],"This":[18],"paper":[19],"proposes":[20],"a":[21,52,74,80,99],"framework":[26],"based":[27],"on":[28,91],"consistency":[29,34,55,77],"models":[30,35],"(CMTS-AD),":[31],"which":[32],"introduces":[33],"into":[36],"the":[37,42],"domain":[40],"for":[41],"first":[43],"to":[45,65,87,105,121,136],"achieve":[46],"efficient":[47],"single-step":[48,53],"inference.":[49],"CMTS-AD":[50,97],"combines":[51],"generative":[54],"model":[56,67,107],"with":[57,109],"temporal":[59,76],"convolutions":[60],"graph":[62],"attention":[63],"mechanisms":[64],"accurately":[66],"spatio-temporal":[68],"features.":[69],"We":[70],"also":[71],"innovatively":[72],"design":[73],"loss":[78],"noise-adaptive":[81],"scheduling":[82],"strategy,":[83],"significantly":[84],"enhancing":[85],"robustness":[86],"mixed":[88,131],"noise.":[89],"Experiments":[90],"five":[92],"industrial":[93],"datasets":[94],"show":[95],"that":[96],"achieves":[98],"6.1%":[100],"improvement":[101],"in":[102,129],"F1-score":[103],"compared":[104,120],"diffusion":[106,122],"baselines,":[108],"an":[110],"inference":[111],"latency":[112],"of":[113],"only":[114,143],"15":[115],"ms":[116],"(a":[117],"90%":[118],"reduction":[119],"models).":[123],"Additionally,":[124],"its":[125,139],"performance":[126],"degradation":[127],"rate":[128],"Gaussian-Poisson":[130],"scenarios":[133],"is":[134,142],"reduced":[135],"6.3%,":[137],"memory":[140],"consumption":[141],"158":[144],"MB,":[145],"meeting":[146],"edge":[147],"deployment":[148],"requirements.":[149]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-31T00:00:00"}
