{"id":"https://openalex.org/W4410227609","doi":"https://doi.org/10.1109/wcnc61545.2025.10978548","title":"Graphormer-Based Bayesian Network Conditional Normalizing Flow for Multivariate Time Series Anomaly Detection in Communication Networks","display_name":"Graphormer-Based Bayesian Network Conditional Normalizing Flow for Multivariate Time Series Anomaly Detection in Communication Networks","publication_year":2025,"publication_date":"2025-03-24","ids":{"openalex":"https://openalex.org/W4410227609","doi":"https://doi.org/10.1109/wcnc61545.2025.10978548"},"language":"en","primary_location":{"id":"doi:10.1109/wcnc61545.2025.10978548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100518477","display_name":"Ziwen Tan","orcid":"https://orcid.org/0000-0001-5682-2247"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zeyu Tan","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046019676","display_name":"Shiwen He","orcid":"https://orcid.org/0000-0003-0549-4970"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shiwen He","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University,Changsha,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University,Changsha,China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102833338","display_name":"Hang Zhan","orcid":"https://orcid.org/0000-0002-2382-4577"},"institutions":[{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Zhan","raw_affiliation_strings":["Pervasive Communication Center, Purple Mountain Laboratories,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"Pervasive Communication Center, Purple Mountain Laboratories,Nanjing,China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024880334","display_name":"Yong\u2010Ming Huang","orcid":"https://orcid.org/0000-0001-5749-3107"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongming Huang","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082547392","display_name":"Siyu Huang","orcid":"https://orcid.org/0000-0002-2880-8859"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siyu Huang","raw_affiliation_strings":["School of Information Science and Engineering, Southeast University,Nanjing,China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Southeast University,Nanjing,China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100518477"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":5.6468,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.95253436,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multivariate-statistics","display_name":"Multivariate statistics","score":0.7525370121002197},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.7218115329742432},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6666911244392395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6451827883720398},{"id":"https://openalex.org/keywords/series","display_name":"Series (stratigraphy)","score":0.6359257698059082},{"id":"https://openalex.org/keywords/time-series","display_name":"Time series","score":0.5320433378219604},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.513384222984314},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4425007402896881},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.42859748005867004},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3903576135635376},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.321564257144928},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.31122076511383057},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.08255484700202942}],"concepts":[{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.7525370121002197},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.7218115329742432},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6666911244392395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6451827883720398},{"id":"https://openalex.org/C143724316","wikidata":"https://www.wikidata.org/wiki/Q312468","display_name":"Series (stratigraphy)","level":2,"score":0.6359257698059082},{"id":"https://openalex.org/C151406439","wikidata":"https://www.wikidata.org/wiki/Q186588","display_name":"Time series","level":2,"score":0.5320433378219604},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.513384222984314},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4425007402896881},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.42859748005867004},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3903576135635376},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.321564257144928},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.31122076511383057},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.08255484700202942},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcnc61545.2025.10978548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcnc61545.2025.10978548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Wireless Communications and Networking Conference (WCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2374063051","display_name":null,"funder_award_id":"2242022k60002","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8071677997","display_name":null,"funder_award_id":"62225107,62171474","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1817561967","https://openalex.org/W2049058890","https://openalex.org/W2122646361","https://openalex.org/W2407991977","https://openalex.org/W2443352794","https://openalex.org/W2963166639","https://openalex.org/W2963194396","https://openalex.org/W2963764569","https://openalex.org/W3128634608","https://openalex.org/W4293476335","https://openalex.org/W4386445109","https://openalex.org/W4392173855","https://openalex.org/W4405869385","https://openalex.org/W6635084905","https://openalex.org/W6683167872","https://openalex.org/W6748102297","https://openalex.org/W6767707592","https://openalex.org/W6804049574"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"High-dimensional":[0],"time":[1,48,75,89,104],"series":[2,49,76,90,105],"data":[3,33,128],"are":[4,115,133,138],"becoming":[5],"more":[6,151],"widespread":[7],"in":[8,31],"many":[9],"domains,":[10],"including":[11],"large-scale":[12],"wireless":[13],"networks":[14],"for":[15,46,124],"communication.":[16],"However,":[17],"because":[18],"of":[19,73,99,170],"its":[20],"high":[21],"dimensionality,":[22],"label":[23],"scarcity,":[24],"and":[25,70,95,127,144,162],"complicated":[26],"temporal":[27,71],"connections,":[28],"anomaly":[29,50],"detection":[30],"such":[32],"is":[34],"difficult.":[35],"This":[36],"work":[37],"proposes":[38],"a":[39,62,92],"Bayesian":[40,54,93],"network":[41],"conditional":[42,80,118],"normalizing":[43,122],"flow":[44,123],"model":[45],"multivariate":[47],"detection,":[51],"called":[52],"Graphormer-based":[53],"Network":[55],"Conditional":[56],"Normalizing":[57],"Flow":[58],"(GBNCNF),":[59],"based":[60],"on":[61,140],"graph":[63],"Transformer":[64],"(Graphormer)":[65],"to":[66,130,165],"convert":[67],"the":[68,84,100,121,158,167],"spatial":[69],"dependencies":[72],"high-dimensional":[74],"into":[77,120],"simple":[78],"evaluable":[79],"densities.":[81],"It":[82],"models":[83],"causal":[85],"links":[86],"between":[87,102,160],"numerous":[88],"using":[91],"network,":[94],"it":[96],"obtains":[97],"representations":[98,114],"interdependencies":[101],"different":[103],"by":[106],"combining":[107],"LSTM":[108],"modules":[109],"with":[110],"Graphormer":[111],"modules.":[112],"These":[113],"introduced":[116],"as":[117,135],"information":[119],"density":[125,132],"estimation,":[126],"corresponding":[129],"low":[131],"judged":[134],"anomalies.":[136,172],"Experiments":[137],"conducted":[139],"two":[141],"real":[142],"datasets":[143],"show":[145],"that":[146],"our":[147],"method":[148],"detects":[149],"anomalies":[150],"accurately":[152,156],"than":[153],"baseline":[154],"methods,":[155],"captures":[157],"correlations":[159],"sensors,":[161],"allows":[163],"users":[164],"infer":[166],"root":[168],"causes":[169],"detected":[171]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-08T08:50:53.379069","created_date":"2025-10-10T00:00:00"}
