{"id":"https://openalex.org/W2318956585","doi":"https://doi.org/10.1109/tpds.2016.2542815","title":"Post-Deployment Anomaly Detection and Diagnosis in Networked Embedded Systems by Program Profiling and Symptom Mining","display_name":"Post-Deployment Anomaly Detection and Diagnosis in Networked Embedded Systems by Program Profiling and Symptom Mining","publication_year":2016,"publication_date":"2016-03-16","ids":{"openalex":"https://openalex.org/W2318956585","doi":"https://doi.org/10.1109/tpds.2016.2542815","mag":"2318956585"},"language":"en","primary_location":{"id":"doi:10.1109/tpds.2016.2542815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2016.2542815","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074340955","display_name":"Wei Dong","orcid":"https://orcid.org/0000-0001-6884-3459"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wei Dong","raw_affiliation_strings":["College of Computer Science, Zhejiang University, Zhejiang, 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Zhejiang University, Zhejiang, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087112835","display_name":"Luyao Luo","orcid":"https://orcid.org/0000-0002-6255-4370"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luyao Luo","raw_affiliation_strings":["College of Computer Science, Zhejiang University, Zhejiang, 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Zhejiang University, Zhejiang, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100373367","display_name":"Chun Chen","orcid":"https://orcid.org/0000-0002-6198-7481"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun Chen","raw_affiliation_strings":["College of Computer Science, Zhejiang University, Zhejiang, 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Zhejiang University, Zhejiang, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052757755","display_name":"Jiajun Bu","orcid":"https://orcid.org/0000-0002-1097-2044"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajun Bu","raw_affiliation_strings":["College of Computer Science, Zhejiang University, Zhejiang, 310027, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science, Zhejiang University, Zhejiang, 310027, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101501086","display_name":"Xue Liu","orcid":"https://orcid.org/0000-0002-7854-7845"},"institutions":[{"id":"https://openalex.org/I5023651","display_name":"McGill University","ror":"https://ror.org/01pxwe438","country_code":"CA","type":"education","lineage":["https://openalex.org/I5023651"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xue Liu","raw_affiliation_strings":["School of Computer Science, McGill University, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, McGill University, Canada","institution_ids":["https://openalex.org/I5023651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101877973","display_name":"Yunhao Liu","orcid":"https://orcid.org/0000-0001-8052-9200"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunhao Liu","raw_affiliation_strings":["MOE Key Lab for Information System Security, School of Software, TNLIST, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"MOE Key Lab for Information System Security, School of Software, TNLIST, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5074340955"],"corresponding_institution_ids":["https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":2.0268,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.87567778,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"27","issue":"12","first_page":"3588","last_page":"3601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8496003746986389},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7468527555465698},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6243641972541809},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6106269359588623},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5962836742401123},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5230294466018677},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.47218313813209534},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.4186326265335083},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4033653438091278},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3585476279258728},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2190476357936859},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13106924295425415}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8496003746986389},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7468527555465698},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6243641972541809},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6106269359588623},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5962836742401123},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5230294466018677},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.47218313813209534},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.4186326265335083},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4033653438091278},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3585476279258728},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2190476357936859},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13106924295425415},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tpds.2016.2542815","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tpds.2016.2542815","pdf_url":null,"source":{"id":"https://openalex.org/S97130795","display_name":"IEEE Transactions on Parallel and Distributed Systems","issn_l":"1045-9219","issn":["1045-9219","1558-2183","2161-9883"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Parallel and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Decent work and economic growth","score":0.4399999976158142,"id":"https://metadata.un.org/sdg/8"}],"awards":[{"id":"https://openalex.org/G3511886273","display_name":null,"funder_award_id":"61472360","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1999935041","https://openalex.org/W2030836134","https://openalex.org/W2033547278","https://openalex.org/W2039157918","https://openalex.org/W2042922122","https://openalex.org/W2050123402","https://openalex.org/W2055643465","https://openalex.org/W2062200967","https://openalex.org/W2062284132","https://openalex.org/W2070291735","https://openalex.org/W2094636498","https://openalex.org/W2097981093","https://openalex.org/W2099574482","https://openalex.org/W2100395498","https://openalex.org/W2101274757","https://openalex.org/W2102258543","https://openalex.org/W2105422753","https://openalex.org/W2118581494","https://openalex.org/W2136845025","https://openalex.org/W2139217778","https://openalex.org/W2139515706","https://openalex.org/W2140616837","https://openalex.org/W2144201174","https://openalex.org/W2146924294","https://openalex.org/W2147580074","https://openalex.org/W2148764493","https://openalex.org/W2151965112","https://openalex.org/W2157578436","https://openalex.org/W2160343401","https://openalex.org/W2166998733","https://openalex.org/W2169346729","https://openalex.org/W2169458211","https://openalex.org/W2169854556","https://openalex.org/W2432517183","https://openalex.org/W2981264952","https://openalex.org/W3143762821","https://openalex.org/W4235904988","https://openalex.org/W4242053589","https://openalex.org/W4254718585"],"related_works":["https://openalex.org/W4321442002","https://openalex.org/W2015265939","https://openalex.org/W2284072287","https://openalex.org/W2155788121","https://openalex.org/W4235469518","https://openalex.org/W2387706296","https://openalex.org/W2480201319","https://openalex.org/W2611067230","https://openalex.org/W2059759476","https://openalex.org/W1618604010"],"abstract_inverted_index":{"Detecting":[0],"and":[1,21,62,116,126,179,192,224],"diagnosing":[2],"anomalies":[3],"in":[4,67,118,199,219],"networked":[5,119],"embedded":[6,120],"systems":[7,121],"like":[8],"sensor":[9,205,221],"networks":[10],"is":[11,161],"a":[12,64,81,109,173,203],"very":[13],"difficult":[14],"task,":[15],"due":[16],"to":[17,32,59,88,133,163,167,215,233],"the":[18,37,55,68,71,84,91,94,104,141,168,200,226,234],"variable":[19],"workloads":[20],"severe":[22],"resource":[23],"constraints.":[24],"In":[25],"this":[26],"paper,":[27],"we":[28,106],"focus":[29],"on":[30,140,189],"how":[31],"aid":[33,213],"bug":[34],"diagnosis":[35,76,117],"after":[36],"system":[38],"has":[39],"been":[40],"deployed.":[41],"We":[42,184],"notice":[43],"that":[44,209],"most":[45,74,169],"node-level":[46],"debugging":[47],"tools":[48,77],"can":[49,78,212],"provide":[50],"detailed":[51,99],"program":[52,100,124,180],"information":[53],"inside":[54],"node":[56,95],"but":[57,86],"fail":[58,87],"detect":[60,80],"when":[61],"where":[63],"problem":[65,82,92],"occurs":[66],"network.":[69,206],"On":[70],"other":[72],"hand,":[73],"network-level":[75],"effectively":[79],"from":[83],"network":[85,154,222],"narrow":[89],"down":[90],"within":[93],"because":[96],"they":[97],"lack":[98],"information.":[101],"To":[102],"close":[103],"gap,":[105],"propose":[107],"D2,":[108],"new":[110],"method":[111,187,211],"for":[112,151],"post-deployment":[113],"anomaly":[114],"detection":[115],"by":[122,172,196],"combining":[123,176],"profiling":[125],"symptom":[127],"mining.":[128],"D2":[129,143,160],"employs":[130],"binary":[131],"instrumentation":[132],"perform":[134],"lightweight":[135],"function":[136],"count":[137],"profiling.":[138],"Based":[139],"statistics,":[142],"uses":[144],"PCA":[145],"(Principal":[146],"Component":[147],"Analysis)":[148],"based":[149,188],"approach":[150,175],"automatically":[152],"detecting":[153],"anomalies.":[155],"Compared":[156],"with":[157],"previous":[158],"methods,":[159],"able":[162],"point":[164],"programmers":[165,214],"closer":[166],"likely":[170],"causes":[171],"novel":[174],"statistical":[177],"tests":[178],"call":[181],"graph":[182],"analysis.":[183],"implement":[185],"our":[186,210],"TinyOS":[190],"2.1.1":[191],"evaluate":[193],"its":[194],"effectiveness":[195],"case":[197],"studies":[198],"development":[201],"of":[202],"working":[204],"Results":[207],"show":[208],"diagnose":[216],"problems":[217],"quickly":[218],"real-world":[220],"systems,":[223],"at":[225],"same":[227],"time,":[228],"incurs":[229],"an":[230],"acceptable":[231],"overhead":[232],"running":[235],"system.":[236]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
