{"id":"https://openalex.org/W2948597484","doi":"https://doi.org/10.1145/3323679.3326527","title":"Scaling Deep Learning Models for Spectrum Anomaly Detection","display_name":"Scaling Deep Learning Models for Spectrum Anomaly Detection","publication_year":2019,"publication_date":"2019-06-04","ids":{"openalex":"https://openalex.org/W2948597484","doi":"https://doi.org/10.1145/3323679.3326527","mag":"2948597484"},"language":"en","primary_location":{"id":"doi:10.1145/3323679.3326527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3323679.3326527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3323679.3326527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3323679.3326527","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022275027","display_name":"Zhijing Li","orcid":"https://orcid.org/0000-0002-2066-9874"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zhijing Li","raw_affiliation_strings":["University of California, Santa Barbara"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006246393","display_name":"Zhujun Xiao","orcid":null},"institutions":[{"id":"https://openalex.org/I40347166","display_name":"University of Chicago","ror":"https://ror.org/024mw5h28","country_code":"US","type":"education","lineage":["https://openalex.org/I40347166"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhujun Xiao","raw_affiliation_strings":["University of Chicago"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Chicago","institution_ids":["https://openalex.org/I40347166"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101511925","display_name":"Bolun Wang","orcid":"https://orcid.org/0000-0002-0963-3942"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bolun Wang","raw_affiliation_strings":["University of California, Santa Barbara"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108248360","display_name":"Ben Y. Zhao","orcid":"https://orcid.org/0009-0003-8909-0494"},"institutions":[{"id":"https://openalex.org/I40347166","display_name":"University of Chicago","ror":"https://ror.org/024mw5h28","country_code":"US","type":"education","lineage":["https://openalex.org/I40347166"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ben Y. Zhao","raw_affiliation_strings":["University of Chicago"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Chicago","institution_ids":["https://openalex.org/I40347166"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022672030","display_name":"Hai-Tao Zheng","orcid":"https://orcid.org/0000-0001-5128-5649"},"institutions":[{"id":"https://openalex.org/I40347166","display_name":"University of Chicago","ror":"https://ror.org/024mw5h28","country_code":"US","type":"education","lineage":["https://openalex.org/I40347166"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haitao Zheng","raw_affiliation_strings":["University of Chicago"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"University of Chicago","institution_ids":["https://openalex.org/I40347166"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022275027"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":3.1929,"has_fulltext":true,"cited_by_count":34,"citation_normalized_percentile":{"value":0.93580457,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"300"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8311153650283813},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7488711476325989},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6839171648025513},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5858209729194641},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5798783898353577},{"id":"https://openalex.org/keywords/spectrum-management","display_name":"Spectrum management","score":0.5622774362564087},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5545064806938171},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5427612662315369},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.47969433665275574},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.47740545868873596},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.43077605962753296},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4304197132587433},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.39276552200317383},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3742724061012268},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3719902038574219},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33500319719314575},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.2673758864402771},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17042547464370728},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13224780559539795}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8311153650283813},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7488711476325989},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6839171648025513},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5858209729194641},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5798783898353577},{"id":"https://openalex.org/C63029442","wikidata":"https://www.wikidata.org/wiki/Q6504978","display_name":"Spectrum management","level":4,"score":0.5622774362564087},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5545064806938171},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5427612662315369},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.47969433665275574},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.47740545868873596},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.43077605962753296},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4304197132587433},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39276552200317383},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3742724061012268},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3719902038574219},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33500319719314575},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.2673758864402771},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17042547464370728},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13224780559539795},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3323679.3326527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3323679.3326527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3323679.3326527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3323679.3326527","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3323679.3326527","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3323679.3326527","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4399999976158142,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G2811553095","display_name":null,"funder_award_id":"CNS-1527939","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3485579720","display_name":"SaTC: CORE: Medium: Collaborative: Defending against Compromise and Manipulation of Mobile Communities","funder_award_id":"1705042","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3818558036","display_name":null,"funder_award_id":"CNS-1705042","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G51858836","display_name":"TWC: Small: User Behavior Modeling and Prediction in Anonymous Social Networks","funder_award_id":"1527939","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2948597484.pdf","grobid_xml":"https://content.openalex.org/works/W2948597484.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W103215147","https://openalex.org/W1530159762","https://openalex.org/W1738379222","https://openalex.org/W1966387329","https://openalex.org/W1968463027","https://openalex.org/W2012655284","https://openalex.org/W2054860223","https://openalex.org/W2064675550","https://openalex.org/W2093935141","https://openalex.org/W2098936723","https://openalex.org/W2100139208","https://openalex.org/W2110242546","https://openalex.org/W2115185534","https://openalex.org/W2115991477","https://openalex.org/W2119842120","https://openalex.org/W2120614617","https://openalex.org/W2120636900","https://openalex.org/W2121632109","https://openalex.org/W2141413079","https://openalex.org/W2141704978","https://openalex.org/W2143694093","https://openalex.org/W2149721097","https://openalex.org/W2165698076","https://openalex.org/W2293829681","https://openalex.org/W2322427245","https://openalex.org/W2526456701","https://openalex.org/W2546625419","https://openalex.org/W2553036665","https://openalex.org/W2564960719","https://openalex.org/W2598351857","https://openalex.org/W2623333128","https://openalex.org/W2740107378","https://openalex.org/W2762817092","https://openalex.org/W2790361021","https://openalex.org/W2963895067","https://openalex.org/W2964052684","https://openalex.org/W3104727908"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W4375867731","https://openalex.org/W4235240664","https://openalex.org/W2965083567","https://openalex.org/W1838576100","https://openalex.org/W2095886385","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W97075385","https://openalex.org/W2357523926"],"abstract_inverted_index":{"Spectrum":[0],"management":[1],"in":[2,13,19,46],"cellular":[3],"networks":[4],"is":[5,109,158],"a":[6,65,121,159],"challenging":[7],"task":[8],"that":[9,102,163],"will":[10],"only":[11],"increase":[12],"di":[14],"culty":[15],"as":[16,83],"complexity":[17],"grows":[18],"hardware,":[20],"con":[21],"gurations,":[22],"and":[23,36,41,44,50,80,93,116,126,144,152,171],"new":[24],"access":[25],"technology":[26],"(e.g.":[27],"LTE":[28,97,181],"for":[29,141],"IoT":[30],"devices).":[31],"Wireless":[32],"providers":[33],"need":[34],"robust":[35],"exible":[37],"tools":[38],"to":[39,51,75,85,114,148],"monitor":[40],"detect":[42,86],"faults":[43,92],"misbehavior":[45],"physical":[47],"spectrum":[48,77,87,98,142,178],"usage,":[49],"deploy":[52,117],"them":[53,82],"at":[54,120],"scale.":[55],"In":[56],"this":[57,107,135],"paper,":[58],"we":[59,100],"explore":[60],"the":[61,103,131],"design":[62,108],"of":[63,124,177],"such":[64],"system":[66],"by":[67,137],"building":[68,138],"deep":[69],"neural":[70],"network":[71],"(DNN)":[72],"models":[73,119,140],"1":[74],"capture":[76],"usage":[78,88,143],"patterns":[79],"use":[81],"baselines":[84],"anomalies":[89,179],"resulting":[90],"from":[91],"misuse.":[94],"Using":[95],"detailed":[96],"measurements,":[99],"show":[101],"key":[104],"challenge":[105,136],"facing":[106],"model":[110,162],"scalability,":[111],"i.e.":[112],"how":[113],"train":[115],"DNN":[118,161],"large":[122],"number":[123],"static":[125,172],"mobile":[127,170],"observers":[128],"located":[129],"throughout":[130],"network.":[132],"We":[133],"address":[134],"context-agnostic":[139],"applying":[145],"transfer":[146],"learning":[147],"minimize":[149],"training":[150],"time":[151],"dataset":[153],"constraints.":[154],"The":[155],"end":[156],"result":[157],"practical":[160],"can":[164],"be":[165],"easily":[166],"deployed":[167],"on":[168],"both":[169],"observers,":[173],"enabling":[174],"timely":[175],"detection":[176],"across":[180],"networks.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2025-10-10T00:00:00"}
