{"id":"https://openalex.org/W4411143681","doi":"https://doi.org/10.1109/tnsm.2025.3576927","title":"Category-Constrained Broad Recurrent System for Cloud Anomaly Detection","display_name":"Category-Constrained Broad Recurrent System for Cloud Anomaly Detection","publication_year":2025,"publication_date":"2025-06-09","ids":{"openalex":"https://openalex.org/W4411143681","doi":"https://doi.org/10.1109/tnsm.2025.3576927"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3576927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3576927","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115588700","display_name":"Xi Yao","orcid":"https://orcid.org/0009-0006-0204-9934"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xi Yao","raw_affiliation_strings":["School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005463262","display_name":"Fagui Liu","orcid":"https://orcid.org/0000-0003-1135-4982"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fagui Liu","raw_affiliation_strings":["School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010421115","display_name":"Jun Jiang","orcid":"https://orcid.org/0000-0002-8406-994X"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Jiang","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026775142","display_name":"Guoxiang Zhong","orcid":"https://orcid.org/0000-0002-3998-7282"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoxiang Zhong","raw_affiliation_strings":["Department of New Networks, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of New Networks, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100643265","display_name":"C. L. Philip Chen","orcid":"https://orcid.org/0000-0001-5451-7230"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"C. L. Philip Chen","raw_affiliation_strings":["School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5115588700"],"corresponding_institution_ids":["https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":1.4196,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83011653,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"5","first_page":"5015","last_page":"5030"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.977400004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9223999977111816,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7629896402359009},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6620626449584961},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6547032594680786},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4333832561969757},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.350175678730011},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13491833209991455}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7629896402359009},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6620626449584961},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6547032594680786},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4333832561969757},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.350175678730011},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13491833209991455},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3576927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3576927","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.7099999785423279}],"awards":[{"id":"https://openalex.org/G2167111956","display_name":null,"funder_award_id":"U24B20151","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7426666839","display_name":null,"funder_award_id":"2021B1111600001","funder_id":"https://openalex.org/F4320335957","funder_display_name":"Major Science and Technology Project of Hainan Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335957","display_name":"Major Science and Technology Project of Hainan Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W2003677307","https://openalex.org/W2088748973","https://openalex.org/W2169495281","https://openalex.org/W2324823555","https://openalex.org/W2738226240","https://openalex.org/W2752782242","https://openalex.org/W2766624504","https://openalex.org/W2767106145","https://openalex.org/W2783323081","https://openalex.org/W2786161686","https://openalex.org/W2789828921","https://openalex.org/W2795554423","https://openalex.org/W2808979505","https://openalex.org/W2969944804","https://openalex.org/W2972810968","https://openalex.org/W2982438846","https://openalex.org/W2989219518","https://openalex.org/W3007551217","https://openalex.org/W3011712950","https://openalex.org/W3022604549","https://openalex.org/W3082059448","https://openalex.org/W3093074257","https://openalex.org/W3093853576","https://openalex.org/W3156522613","https://openalex.org/W3161599138","https://openalex.org/W3195631217","https://openalex.org/W3212722888","https://openalex.org/W4200415345","https://openalex.org/W4206324092","https://openalex.org/W4207054917","https://openalex.org/W4223479306","https://openalex.org/W4226198717","https://openalex.org/W4285199572","https://openalex.org/W4288075232","https://openalex.org/W4291280485","https://openalex.org/W4292411782","https://openalex.org/W4310806103","https://openalex.org/W4311649025","https://openalex.org/W4312949663","https://openalex.org/W4313060919","https://openalex.org/W4313893694","https://openalex.org/W4324290749","https://openalex.org/W4327718158","https://openalex.org/W4328007235","https://openalex.org/W4353004226","https://openalex.org/W4377115543","https://openalex.org/W4387092659","https://openalex.org/W4387745459","https://openalex.org/W4390873111","https://openalex.org/W4391582413"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"Anomaly":[0],"detection":[1,26],"has":[2],"become":[3],"a":[4,29,61,73,123,162,227],"key":[5],"focus":[6],"in":[7,56,92,142,186,215,219],"maintaining":[8],"the":[9,14,48,51,76,83,88,93,104,143,153,200],"stability":[10],"and":[11,87,138,217],"reliability":[12],"of":[13,50,79,85,90,96,127,155,202,211],"cloud":[15,53,97],"environment.":[16],"Although":[17],"with":[18,70,117,176,226],"excellent":[19],"feature":[20,65,191],"extraction":[21,66],"ability,":[22],"deep":[23],"learning-based":[24],"anomaly":[25,58,68,111],"methods":[27,225],"entail":[28],"time-consuming":[30],"training":[31,229],"process.":[32],"Broad":[33],"learning":[34,178],"system":[35,160],"(BLS)":[36],"provides":[37],"an":[38,109,114,173],"alternative":[39],"supervised":[40],"way":[41],"for":[42,60,136],"efficient":[43],"training.":[44],"However,":[45],"due":[46],"to":[47,129,166,179,198,213,222],"imbalance":[49],"collected":[52],"computing":[54,98],"data":[55,99,131],"which":[57],"accounts":[59],"low":[62,228],"proportion,":[63],"sufficient":[64],"from":[67],"behaviors":[69],"BLS":[71,80,91,116,150,187],"becomes":[72],"challenge.":[74],"Moreover,":[75],"input":[77,144,156],"generation":[78,145],"only":[81],"considers":[82],"independence":[84],"data,":[86],"generalization":[89],"correlation":[94],"modeling":[95],"is":[100],"limited.":[101],"To":[102],"tackle":[103],"above":[105],"issues,":[106],"we":[107,121,148],"introduce":[108],"effective":[110],"detector,":[112],"CatBRS,":[113],"improved":[115],"rebalance":[118],"operations.":[119],"Initially,":[120],"employ":[122],"hybrid":[124],"resampling":[125],"method":[126],"SMOTE-Tomek":[128],"mitigate":[130],"imbalance,":[132],"retain":[133],"non-synthetic":[134],"samples":[135,141],"training,":[137],"involve":[139],"synthetic":[140],"later.":[146],"Subsequently,":[147],"extend":[149],"by":[151],"refining":[152],"process":[154],"generation.":[157],"This":[158],"enhanced":[159],"employs":[161],"simple":[163],"recurrent":[164],"architecture":[165],"model":[167,175],"temporal":[168],"dynamics.":[169],"Additionally,":[170],"it":[171],"integrates":[172],"autoencoder-based":[174],"metric":[177],"obtain":[180],"category-constrained":[181],"discriminant":[182],"features.":[183],"The":[184],"improvement":[185],"facilitates":[188],"more":[189],"comprehensive":[190],"extraction.":[192],"Finally,":[193],"extensive":[194],"experiments":[195],"are":[196],"conducted":[197],"evaluate":[199],"performance":[201],"CatBRS":[203,208],"on":[204],"four":[205],"benchmark":[206],"datasets.":[207],"shows":[209],"improvements":[210],"up":[212],"3.81%":[214],"AUC":[216],"6.09%":[218],"F1":[220],"compared":[221],"suboptimal":[223],"baseline":[224],"cost.":[230]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
