2016
DOI: 10.48550/arxiv.1607.00148
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
193
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 121 publications
(194 citation statements)
references
References 0 publications
0
193
0
Order By: Relevance
“…• LSTM-AE [8], which is a reconstruction-based method using a single-layer LSTM on both encoder and decoder.…”
Section: Comparison Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…• LSTM-AE [8], which is a reconstruction-based method using a single-layer LSTM on both encoder and decoder.…”
Section: Comparison Methodsmentioning
confidence: 99%
“…As the model is trained exclusively on normal data, whenever it is not able to reconstruct a given input with equal quality compared to the reconstruction of normal data, the instance is treated as an anomaly. The LSTM Encoder-Decoder model [8] is proposed to learn temporal representations of the time series via the LSTM networks and use reconstruction errors to detect anomalies. Despite its effectiveness, LSTM does not take spatial correlation into consideration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…LSTM models are a type of recurrent neural networks which possess the ability to retain short term memory. They are capable of learning complex and inter-related input features and predict output sequences [36]. LSTMs are useful in processing long sequences as they are able to comprehend and retain the overall global distribution as well as map that to local changes.…”
Section: B Long Short-term Memorymentioning
confidence: 99%
“…The selection of similarity measurement is very important for clustering-based methods. The second category of approaches is reconstruction-based methods ( [19,20,21,11]). These methods usually construct an auto-encoder network, which model the distribution of the entire time series and reconstruct the original input based on latent representations.…”
Section: Attack Detection For Cpssmentioning
confidence: 99%