{"id":"https://openalex.org/W4416961230","doi":"https://doi.org/10.1109/tifs.2025.3639899","title":"DRCAD: Dual-View Experts Routing and Counterfactual Generation for Explainable Time Series Anomaly Detection","display_name":"DRCAD: Dual-View Experts Routing and Counterfactual Generation for Explainable Time Series Anomaly Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416961230","doi":"https://doi.org/10.1109/tifs.2025.3639899"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3639899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639899","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020197287","display_name":"Dawei Zhao","orcid":"https://orcid.org/0000-0002-1812-1316"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dawei Zhao","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haoran Li","orcid":"https://orcid.org/0009-0006-5816-8385"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoran Li","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006924079","display_name":"Lijuan Xu","orcid":"https://orcid.org/0000-0003-3386-4756"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijuan Xu","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Key Laboratory of Computing Power Network and Information Security, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422377","display_name":"Zhen Wang","orcid":"https://orcid.org/0000-0002-8182-2852"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Wang","raw_affiliation_strings":["School of Artificial Intelligence, Optics and Electronics (iOPEN), and the School of Mechanical Engineering, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Optics and Electronics (iOPEN), and the School of Mechanical Engineering, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Artificial Intelligence, Optics and Electronics (iOPEN), Northwestern Polytechnical University, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016214742","display_name":"Haipeng Peng","orcid":"https://orcid.org/0000-0003-4415-0126"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haipeng Peng","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China","Information Security Center, State Key Laboratoryof Networking and Switching Technology, and the National EngineeringLaboratory for Disaster Backup and Recovery, Beijing University of Postsand Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, and the National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratoryof Networking and Switching Technology, and the National EngineeringLaboratory for Disaster Backup and Recovery, Beijing University of Postsand Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020197287"],"corresponding_institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20023666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"13085","last_page":"13100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9466999769210815,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9466999769210815,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.010300000198185444,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12026","display_name":"Explainable Artificial Intelligence (XAI)","score":0.005400000140070915,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7713000178337097},{"id":"https://openalex.org/keywords/counterfactual-thinking","display_name":"Counterfactual thinking","score":0.670799970626831},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5935999751091003},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5590999722480774},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5008000135421753},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4781999886035919},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.476500004529953},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.47620001435279846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8159999847412109},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7713000178337097},{"id":"https://openalex.org/C108650721","wikidata":"https://www.wikidata.org/wiki/Q1783253","display_name":"Counterfactual thinking","level":2,"score":0.670799970626831},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5935999751091003},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5590999722480774},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5285000205039978},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5008000135421753},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4781999886035919},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.476500004529953},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.47620001435279846},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4740000069141388},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.47350001335144043},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.43220001459121704},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.3968999981880188},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3928999900817871},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3806000053882599},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.37860000133514404},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.36000001430511475},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.30219998955726624},{"id":"https://openalex.org/C2780719617","wikidata":"https://www.wikidata.org/wiki/Q1030752","display_name":"Salient","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C2780741293","wikidata":"https://www.wikidata.org/wiki/Q4818019","display_name":"Attack patterns","level":3,"score":0.26820001006126404},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.25859999656677246}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3639899","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3639899","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3260039398","display_name":null,"funder_award_id":"2023YFB3107303","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3443986154","display_name":null,"funder_award_id":"62172244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W2016287239","https://openalex.org/W2122646361","https://openalex.org/W2296719434","https://openalex.org/W2407991977","https://openalex.org/W2516809705","https://openalex.org/W2593048559","https://openalex.org/W2786827964","https://openalex.org/W2898680659","https://openalex.org/W2945295328","https://openalex.org/W2950361482","https://openalex.org/W2950757722","https://openalex.org/W2963166639","https://openalex.org/W2965433388","https://openalex.org/W3004207920","https://openalex.org/W3006123093","https://openalex.org/W3035524453","https://openalex.org/W3040389479","https://openalex.org/W3081435493","https://openalex.org/W3093787659","https://openalex.org/W3109518304","https://openalex.org/W3156245112","https://openalex.org/W3170937175","https://openalex.org/W3170981104","https://openalex.org/W3171007011","https://openalex.org/W3171362754","https://openalex.org/W3184778778","https://openalex.org/W3199714491","https://openalex.org/W3202810143","https://openalex.org/W4254182148","https://openalex.org/W4288057688","https://openalex.org/W4311415873","https://openalex.org/W4312750676","https://openalex.org/W4385245566","https://openalex.org/W4385562572","https://openalex.org/W4392365138","https://openalex.org/W4393145353","https://openalex.org/W4397000408","https://openalex.org/W4400909504","https://openalex.org/W4402056503"],"related_works":[],"abstract_inverted_index":{"Time":[0],"series":[1,106,118],"anomaly":[2,20,107,184,187],"detection":[3,21,85,108],"is":[4,77],"critical":[5],"in":[6,83,178,225,238],"domains":[7],"such":[8],"as":[9,135,209],"cybersecurity":[10],"monitoring,":[11],"network":[12],"operations,":[13],"and":[14,41,57,87,100,123,132,152,163,175,236],"industrial":[15],"control":[16],"systems.":[17],"Lately,":[18],"unsupervised":[19],"methods":[22],"that":[23,47,113],"utilize":[24],"contrastive":[25,140],"learning":[26,141],"have":[27],"shown":[28],"promise.":[29],"However,":[30],"existing":[31,243],"approaches":[32],"often":[33,78],"struggle":[34],"to":[35,59,203,242],"model":[36,127],"high-dimensional":[37],"temporal":[38],"dependencies":[39],"efficiently":[40],"rely":[42],"on":[43,215,229],"rigid":[44],"feature-fusion":[45],"schemes":[46],"can":[48],"inadvertently":[49],"amplify":[50],"noise.":[51],"These":[52,186],"factors":[53],"increase":[54],"computational":[55],"overhead":[56],"sensitivity":[58],"irrelevant":[60],"signals,":[61],"hindering":[62],"the":[63,69,139,171,179,190,210,226],"capture":[64],"of":[65,71,156,192],"salient":[66],"patterns.":[67],"Additionally,":[68],"explainability":[70,227],"anomalies":[72,115,168],"detected":[73],"by":[74,169],"these":[75],"mechanisms":[76],"limited,":[79],"restricting":[80],"their":[81],"application":[82],"traceable":[84],"processes":[86],"an":[88],"explicit":[89],"decision-making":[90],"basis.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95],"propose":[96],"dual-view":[97],"experts":[98],"routing":[99,162],"counterfactual":[101,193,239],"generation":[102,191,240],"for":[103,126,138,160],"explainable":[104],"time":[105,117],"(DRCAD),":[109],"a":[110,144,153,205],"novel":[111],"framework":[112],"detects":[114],"within":[116],"data":[119],"while":[120],"providing":[121],"intuitive":[122],"actionable":[124],"explanations":[125],"predictions.":[128],"DRCAD":[129,214,232],"uses":[130],"in-patch":[131],"patch-wise":[133],"perspectives":[134],"input":[136],"views":[137],"model,":[142],"employing":[143],"flattened":[145],"attention":[146],"mechanism":[147],"with":[148,199,245],"lightweight":[149],"spatial":[150],"projections":[151],"Patch":[154],"Mixture":[155],"Experts":[157],"(MoE)":[158],"layer":[159],"adaptive":[161],"information":[164],"fusion.":[165],"It":[166],"identifies":[167],"expanding":[170],"discrepancy":[172],"between":[173],"normal":[174],"anomalous":[176],"points":[177],"representation":[180],"space,":[181],"subsequently":[182],"outputting":[183],"scores.":[185],"scores":[188],"guide":[189],"samples,":[194],"integrating":[195],"feature":[196,201,206],"change":[197],"tendencies":[198],"normalized":[200],"impacts":[202],"derive":[204],"importance":[207],"ranking":[208],"explanation.":[211],"We":[212],"evaluate":[213],"six":[216],"widely":[217],"used":[218],"datasets,":[219],"observe":[220],"state-of-the-art":[221],"(SOTA)":[222],"performance.":[223],"Moreover,":[224],"evaluation":[228],"SWaT":[230],"dataset,":[231],"achieves":[233],"superior":[234],"realism":[235],"sparsity":[237],"compared":[241],"methods,":[244],"top-ranked":[246],"features":[247],"closely":[248],"matching":[249],"officially":[250],"documented":[251],"attack":[252],"characteristics.":[253]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-12-03T00:00:00"}
