Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection
Abstract
:1. Introduction
- We propose a new time-series data-encoding method called the time-scalar binary feature encoder that can significantly extract sensor data features with binary representations.
- We propose a binary-convolution data-reduction network that can extract binary data features without losing critical data information. It is useful for the edge side to pre-process the raw data and then transmit them to the cloud-side for further analysis.
- We propose a new hierarchical temporal memory-based detection model that achieves new state-of-the-art anomaly detection with data reduction. The model is also deployed on a real-world industrial project to present a representative case study.
2. Related Work
2.1. Online Time-Series Anomaly Detection
- EXPoSE (expected similarity estimation) [17]: an algorithm that determines anomalies by computing the deviation between input observations and the estimated distribution of past input values.
- Bayesian changepoint [18]: a Bayesian-based algorithm that detects a sudden changepoint.
- Skyline (https://github.com/etsy/skyline (accessed on 20 June 2023), https://github.com/earthgecko/skyline (accessed on 20 June 2023)): an ensemble learning algorithm that identifies anomalies when most detections are confirmed.
- Windowed Gaussian (https://github.com/numenta/NAB/blob/master/nab/detectors/gaussian/windowedGaussian_detector.py (accessed on 20 June 2023)): an anomaly-detection algorithm that determines anomalies based on the probability calculated by the new observation on the Gaussian distribution.
- Twitter ADVec (https://github.com/twitter/AnomalyDetection (accessed on 20 June 2023)): a method based on the seasonal hybrid ESD (S-H-ESD) algorithm. Extreme student deviations from the given time-series values are calculated for anomaly detection.
- Random cut forest [19]: an anomaly-detection algorithm published by Amazon, an improvement on the isolated forest.
- Relative Entropye [20]: a method that uses Kullback–Leibler divergence of two data distributions to decide whether the data are an anomaly.
- KNN CAD [21]: an algorithm based on K-nearest neighbors classification, which compares the observed values with reference values on the non-conformity measure that are calculated using the created caterpillar matrix to identify anomalies.
- CAD OSE (https://github.com/smirmik/CAD (accessed on 20 June 2023)): a method that determines anomalies if the contexts of the recent subsequence are significantly different from the past subsequences.
- HTM (hierarchical temporal memory) [23]: This is a representative unsupervised prediction-based method for online time-series anomaly detection. It implements a working mechanism similar to that of the cerebral cortex.
- OLAD (online non-parametric Bayesian method) [24]: This is a predictive algorithm with HTM as the base anomaly detector. It identifies anomalies when observations deviate from the modeled normality.
- OeSNN-UAD (the online evolving spiking NNs for unsupervised anomaly-detection framework) [25]: This is an online anomaly-detection algorithm based on OeSNN architecture but that works in an unsupervised way. With eSNNs, input values are labeled as inliers or outliers.
- EORELM-AD [26]: This is an anomaly-detection framework that contains streaming data normalization and online anomaly scoring and identification, enabling predictive algorithms to adapt to online time-series anomaly detection.
2.2. Data Reduction for Edge–Cloud
2.2.1. Representative Data Sampling
2.2.2. Data Features Extraction
3. Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection
3.1. Time-Scalar Binary Feature Encoding
3.2. Binary-Convolution Data-Reduction Network
3.2.1. Feature Smoothing
3.2.2. Binary Feature Reduction
3.3. Binary Feature Sequence Anomaly Detection
Algorithm 1 Anomaly-detection process. |
|
4. Experimental Evaluation
4.1. Preparations
4.1.1. Datasets
- realAWSCloudwatch: AWS server metrics including CPU utilization, network bytes in, and disk read bytes.
- realAdExchange: online advertisement clicking rates, where the metrics are cost per click (CPC) and cost per thousand impressions (CPM).
- realKnownCause: the data where we know the anomaly causes, with no hand labeling.
- realTraffic: real-time traffic data from the Twin Cities Metro area in Minnesota, including occupancy, speed, and travel time from specific sensors.
- realTweets: a collection of Twitter mentions of large publicly traded companies, such as Google and IBM.
- artificialNoAnomaly: artificially generated data without any anomalies.
- artificialWithAnomaly: artificially generated data with varying types of anomalies.
4.1.2. Hyperparameters
4.1.3. Evaluation Metrics
4.2. State-of-the-Art Comparisons
4.3. Hyperparameters Learning
4.3.1. Smoothing Window Size Tuning
4.3.2. Binary-Convolution Hyperparameters Tuning
4.4. Data-Reduction Analysis
4.5. Anomaly Detection-Duration Analysis
4.6. Ablation Studies
4.7. Discussion
5. Case Study
5.1. The Scenario
5.2. The Deployment
5.3. The Evaluations
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Wu, Y.; Dai, H.N.; Tang, H. Graph neural networks for anomaly detection in industrial internet of things. IEEE Internet Things J. 2021, 9, 9214–9231. [Google Scholar] [CrossRef]
- Siegel, B. Industrial anomaly detection: A comparison of unsupervised neural network architectures. IEEE Sensors Lett. 2020, 4, 1–4. [Google Scholar] [CrossRef]
- Jalali, A.; Heistracher, C.; Schindler, A.; Haslhofer, B.; Nemeth, T.; Glawar, R.; Sihn, W.; De Boer, P. Predicting time-to-failure of plasma etching equipment using machine learning. In Proceedings of the 2019 IEEE International Conference on Prognostics and Health Management (ICPHM), San Francisco, CA, USA, 17–20 June 2019; pp. 1–8. [Google Scholar]
- Li, B.; Yu, D.; Wu, J.; Ju, P.; Li, Z. Coordinated Cloud-Edge Anomaly Identification for Active Distribution Networks. IEEE Trans. Cloud Comput. 2022, 11, 1204–1216. [Google Scholar] [CrossRef]
- Bowden, D.; Marguglio, A.; Morabito, L.; Napione, C.; Panicucci, S.; Nikolakis, N.; Makris, S.; Coppo, G.; Andolina, S.; Macii, A. A Cloud-to-edge Architecture for Predictive Analytics. In Proceedings of the EDBT/ICDT Workshops, Lisbon, Portugal, 26 March 2019. [Google Scholar]
- Chen, A.; Liu, F.H.; Wang, S.D. Data reduction for real-time bridge vibration data on edge. In Proceedings of the 2019 IEEE International Conference on Data Science and Advanced Analytics (DSAA), Washington, DC, USA, 5–8 October 2019; pp. 602–603. [Google Scholar]
- Chen, B.; Wan, J.; Lan, Y.; Imran, M.; Li, D.; Guizani, N. Improving cognitive ability of edge intelligent IIoT through machine learning. IEEE Netw. 2019, 33, 61–67. [Google Scholar] [CrossRef]
- Tang, B.; Chen, Z.; Hefferman, G.; Pei, S.; Wei, T.; He, H.; Yang, Q. Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans. Ind. Inform. 2017, 13, 2140–2150. [Google Scholar] [CrossRef]
- Ghosh, A.M.; Grolinger, K. Edge-Cloud Computing for Internet of Things Data Analytics: Embedding Intelligence in the Edge With Deep Learning. IEEE Trans. Ind. Inform. 2021, 17, 2191–2200. [Google Scholar]
- Pang, G.; Shen, C.; Cao, L.; Hengel, A.V.D. Deep learning for anomaly detection: A review. ACM Comput. Surv. (CSUR) 2021, 54, 1–38. [Google Scholar] [CrossRef]
- Sadr, A.V.; Bassett, B.A.; Kunz, M. A flexible framework for anomaly Detection via dimensionality reduction. In Proceedings of the 2019 6th International Conference on Soft Computing & Machine Intelligence (ISCMI), Johannesburg, South Africa, 19–20 November 2019; pp. 106–110. [Google Scholar]
- Hafeez, T.; Xu, L.; Mcardle, G. Edge intelligence for data handling and predictive maintenance in IIOT. IEEE Access 2021, 9, 49355–49371. [Google Scholar] [CrossRef]
- Shi, W.; Dustdar, S. The promise of edge computing. Computer 2016, 49, 78–81. [Google Scholar] [CrossRef]
- Wen, Z.; Bhatotia, P.; Chen, R.; Lee, M. Approxiot: Approximate analytics for edge computing. In Proceedings of the 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), Vienna, Austria, 2–5 July 2018; pp. 411–421. [Google Scholar]
- Hafeez, T.; McArdle, G.; Xu, L. Adaptive window based sampling on the edge for Internet of Things data streams. In Proceedings of the 2020 11th International Conference on Network of the Future (NoF), Bordeaux, France, 12–14 October 2020; pp. 105–109. [Google Scholar]
- Ndubuaku, M.U.; Ali, M.K.; Anjum, A.; Liotta, A.; Reiff-Marganiec, S. Edge-enhanced analytics via latent space dimensionality reduction. In Proceedings of the 2020 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), Leicester, UK, 7–10 December 2020; pp. 87–95. [Google Scholar]
- Schneider, M.; Ertel, W.; Ramos, F. Expected similarity estimation for large-scale batch and streaming anomaly detection. Mach. Learn. 2016, 105, 305–333. [Google Scholar] [CrossRef] [Green Version]
- Adams, R.P.; MacKay, D.J.C. Bayesian Online Changepoint Detection. arXiv 2007, arXiv:0710.3742. [Google Scholar]
- Guha, S.; Mishra, N.; Roy, G.; Schrijvers, O. Robust random cut forest based anomaly detection on streams. In Proceedings of the International Conference on Machine Learning (PMLR), New York, NY, USA, 20–22 June 2016; pp. 2712–2721. [Google Scholar]
- Wang, C.; Viswanathan, K.; Choudur, L.; Talwar, V.; Satterfield, W.; Schwan, K. Statistical techniques for online anomaly detection in data centers. In Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, Dublin, Ireland, 23–27 May 2011; pp. 385–392. [Google Scholar]
- Burnaev, E.; Ishimtsev, V. Conformalized density- and distance-based anomaly detection in time-series data. arXiv 2016, arXiv:1608.04585. [Google Scholar]
- Blázquez-García, A.; Conde, A.; Mori, U.; Lozano, J.A. A Review on Outlier/Anomaly Detection in Time Series Data. ACM Comput. Surv. 2021, 54, 56:1–56:33. [Google Scholar] [CrossRef]
- Ahmad, S.; Lavin, A.; Purdy, S.; Agha, Z. Unsupervised real-time anomaly detection for streaming data. Neurocomputing 2017, 262, 134–147. [Google Scholar] [CrossRef]
- Xu, Z.; Kersting, K.; von Ritter, L. Stochastic Online Anomaly Analysis for Streaming Time Series. In Proceedings of the Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, Melbourne, Australia, Melbourne, Australia, 19–25 August 2017; pp. 3189–3195.
- Maciąg, P.S.; Kryszkiewicz, M.; Bembenik, R.; Lobo, J.L.; Del Ser, J. Unsupervised Anomaly Detection in Stream Data with Online Evolving Spiking Neural Networks. Neural Netw. 2021, 139, 118–139. [Google Scholar] [CrossRef]
- Iturria, A.; Labaien, J.; Charramendieta, S.; Lojo, A.; Del Ser, J.; Herrera, F. A framework for adapting online prediction algorithms to outlier detection over time series. Knowl.-Based Syst. 2022, 256, 109823. [Google Scholar] [CrossRef]
- Hole, K.J.; Ahmad, S. A thousand brains: Toward biologically constrained AI. SN Appl. Sci. 2021, 3, 743. [Google Scholar] [CrossRef]
- Cui, Y.; Ahmad, S.; Hawkins, J. Continuous online sequence learning with an unsupervised neural network model. Neural Comput. 2016, 28, 2474–2504. [Google Scholar] [CrossRef] [Green Version]
- Alieksieiev, V. One approach of approximation for incoming data stream in iot based monitoring system. In Proceedings of the 2018 IEEE second international conference on Data Stream Mining & Processing (DSMP), Lviv, Ukraine, 21–25 August 2018; pp. 94–97. [Google Scholar]
- Chang, K.C.; Chiang, M.H. Design of data reduction approach for aiot on embedded edge node. In Proceedings of the 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 15–18 October 2019; pp. 899–900. [Google Scholar]
- Ahmad, S.; Hawkins, J. How do neurons operate on sparse distributed representations? A mathematical theory of sparsity, neurons and active dendrites. arXiv 2016, arXiv:1601.00720. [Google Scholar]
- Purdy, S. Encoding data for HTM systems. arXiv 2016, arXiv:1602.05925. [Google Scholar]
- Cui, Y.; Ahmad, S.; Hawkins, J. The HTM Spatial Pooler—A Neocortical Algorithm for Online Sparse Distributed Coding. Front. Comput. Neurosci. 2017, 11, 111. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Karagiannidis, G.K.; Lioumpas, A.S. An improved approximation for the Gaussian Q-function. IEEE Commun. Lett. 2007, 11, 644–646. [Google Scholar] [CrossRef]
- Lavin, A.; Ahmad, S. Evaluating real-time anomaly detection algorithms—The Numenta anomaly benchmark. In Proceedings of the 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA, 9–11 December 2015; pp. 38–44. [Google Scholar]
Categories | Subdatasets | Anomaly Num | Total | Examples |
---|---|---|---|---|
artificialNoAnomaly | art daily no noise | 0 | 4032 | (2014/4/1 5:40:00, 20) |
art daily perfect square wave | (2014/4/2 11:50:00, 80) | |||
art daily small noise | (2014/4/1 0:00:00, 18.3249185392) | |||
art flatline | (2014/4/1 1:50:00, 45) | |||
art noisy | (2014/4/1 0:00:00, 18.6221849224) | |||
artificialWithAnomaly | art daily flatmiddle | 403 | 4032 | (2014/4/1 0:00:00, -21.0483826823) |
art daily jumpsdown | (2014/4/1 1:30:00, 18.1821019992) | |||
art daily jumpsup | (2014/4/1 0:00:00, 19.761251903) | |||
art daily nojump | (2014/4/1 0:00:00, 21.5980110405) | |||
art increase spike density | (2014/4/1 0:00:00, 20) | |||
art load balancer spikes | (2014/4/1 5:45:00, 0.1465598018) | |||
realAdExchange | exchange-2 cpc results | 163 | 1624 | (2011/7/1 0:00:01, 0.0819647355164) |
exchange-2 cpm results | 162 | 1624 | (2011/7/1 0:00:01, 0.401048098657) | |
exchange-3 cpc results | 153 | 1538 | (2011/7/1 0:15:01, 0.102708933718) | |
exchange-3 cpm results | 153 | 1538 | (2011/7/1 0:15:01, 0.405422534525) | |
exchange-4 cpc results | 165 | 1643 | (2011/7/1 0:15:01, 0.0917952281677) | |
exchange-4 cpm results | 164 | 1643 | (2011/7/1 0:15:01, 0.61822635122) | |
realAWSCloudwatch | ec2 cpu utilization 5f5533 | 402 | 4032 | (2014/2/14 14:27:00, 51.846) |
ec2 cpu utilization 24ae8d | 402 | 4032 | (2014/2/14 14:30:00, 0.132) | |
ec2 cpu utilization 53ea38 | 402 | 4032 | (2014/2/14 14:30:00, 1.732) | |
ec2 cpu utilization 77c1ca | 403 | 4032 | (2014/4/2 14:25:00, 0.068) | |
ec2 cpu utilization 825cc2 | 343 | 4032 | (2014/4/10 0:04:00, 91.958) | |
ec2 cpu utilization ac20cd | 403 | 4032 | (2014/4/2 14:29:00, 42.652) | |
ec2 cpu utilization c6585a | 0 | 4032 | (2014/4/2 14:29:00, 0.066) | |
ec2 cpu utilization fe7f93 | 405 | 4032 | (2014/2/14 14:27:00, 2.296) | |
ec2 disk write bytes 1ef3de | 473 | 4730 | (2014/3/3 7:59:00, 2423190) | |
ec2 disk write bytes c0d644 | 405 | 4032 | (2014/4/2 15:00:00, 19949200) | |
ec2 network in 5abac7 | 474 | 4730 | (2014/3/1 17:36:00, 42) | |
ec2 network in 257a54 | 403 | 4032 | (2014/4/10 0:04:00, 251643) | |
elb request count 8c0756 | 402 | 4032 | (2014/4/10 0:04:00, 94) | |
grok asg anomaly | 465 | 4621 | (2014/1/16 0:00:00, 33.5573) | |
iio us-east-1 i-a2eb1cd9 NetworkIn | 126 | 1243 | (2013/10/9 16:25:00, 9926554) | |
rds cpu utilization cc0c53 | 402 | 4032 | (2014/2/14 14:30:00, 6.456) | |
rds cpu utilization e47b3b | 402 | 4032 | (2014/4/10 0:02:00, 14.012) | |
realKnownCause | ambient temperature system failure | 726 | 7267 | (2013/7/4 0:00:00, 69.88083514) |
cpu utilization asg misconfiguration | 1499 | 18,050 | (2014/5/14 1:14:00, 85.835) | |
ec2 request latency system failure | 346 | 4032 | (2014/3/7 3:41:00, 45.868) | |
machine temperature system failure | 2268 | 22,695 | (2013/12/2 21:15:00, 73.96732207) | |
nyc taxi | 1035 | 10,320 | (2014/7/1 0:00, 10844) | |
rogue agent key hold | 190 | 1882 | (2014/7/6 20:10:00, 0.064534524) | |
rogue agent key updown | 530 | 5315 | (2014/7/6 20:10:00, 1.04725631) | |
realTraffic | occupancy 6005 | 239 | 2380 | (2015/9/1 13:45:00, 3.06) |
occupancy t4013 | 250 | 2500 | (2015/9/1 11:30:00, 13.56) | |
speed 6005 | 239 | 2500 | (2015/8/31 18:22:00, 90) | |
speed 7578 | 116 | 1127 | (2015/9/8 11:39:00, 73) | |
speed t4013 | 250 | 2495 | (2015/9/1 11:25:00, 58) | |
TravelTime 387 | 249 | 2500 | (2015/7/10 14:24:00, 564) | |
TravelTime 451 | 217 | 2162 | (2015/7/28 11:56:00, 248) | |
realTweets | Twitter volume AAPL | 1588 | 15,902 | (2015/2/26 21:42:53, 104) |
Twitter volume AMZN | 1580 | 15,831 | (2015/2/26 21:42:00, 57) | |
Twitter volume CRM | 1593 | 15,902 | (2015/2/26 21:42:53, 11) | |
Twitter volume CVS | 1526 | 15,853 | (2015/2/26 21:42:53, 0) | |
Twitter volume FB | 1582 | 15,833 | (2015/2/26 21:42:53, 53) | |
Twitter volume GOOG | 1432 | 15,842 | (2015/2/26 21:42:53, 35) | |
Twitter volume IBM | 1590 | 15,893 | (2015/2/26 21:42:53, 7) | |
Twitter volume KO | 1587 | 15,851 | (2015/2/26 21:42:53, 8) | |
Twitter volume PFE | 1588 | 15,858 | (2015/2/26 21:42:53, 3) | |
Twitter volume UPS | 1585 | 15,866 | (2015/2/26 21:42:53, 2) |
Symbol | Description | Settings |
---|---|---|
size of sliding window | 1/2/3/4/5/6/7/8/9/10 | |
size of convolution core | 2/3/4/5/6/7/8/9/10 | |
size and stride of pooling | 2/3/4/5/6/7/8/9/10 |
Metrics | |||
---|---|---|---|
SP | 1.0 | 1.0 | 0.11 |
RLFP | 1.0 | 1.0 | 0.22 |
RLFN | 1.0 | 2.0 | 0.11 |
Dataset | Ours | EA | AR | HTM | CO | EGS | KC | RE | RCF | TA | WG | ES | BC | EX | RD | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Total | SP | 70.0 | 46.4 | 74.9 | 70.1 | 69.9 | 58.2 | 58.0 | 54.6 | 51.7 | 47.1 | 39.6 | 35.7 | 17.7 | 16.4 | 11.0 |
RLFP | 64.6 | 32.1 | 65.2 | 63.1 | 67.0 | 46.2 | 43.4 | 47.6 | 38.4 | 33.6 | 20.9 | 27.1 | 3.2 | 3.2 | 1.2 | |
RLFN | 74.0 | 52.5 | 80.4 | 74.3 | 73.2 | 63.9 | 64.8 | 58.8 | 59.7 | 53.5 | 47.4 | 44.5 | 32.2 | 26.9 | 19.5 | |
DRR(%) | 96.19 | - | - | - | - | - | - | - | - | - | - | - | - | - | - | |
artificialWithAnomaly | SP | 68.9 | 0.2 | 70.3 | 70.2 | 73.0 | 40.2 | 45.3 | 56.6 | 15.5 | 76.7 | 2.6 | 30.9 | -5.8 | 40.3 | 56.9 |
RLFP | 62.6 | −32.2 | 60.6 | 68.4 | 67.1 | 33.2 | 26.9 | 50.2 | 15.5 | 57.4 | −11.2 | 0.0 | −1.7 | 0.0 | 51.4 | |
RLFN | 73.7 | 11.2 | 74.7 | 74.6 | 74.7 | 43.5 | 52.4 | 60.0 | 31.1 | 84.5 | 7.3 | 31.7 | 25.9 | 33.1 | 71.2 | |
realAdExchange | SP | 72.4 | 58.8 | 75.1 | 76.9 | 72.0 | 56.8 | 71.0 | 36.8 | 62.8 | 49.6 | 56.9 | 18.8 | 42.9 | 13.0 | - |
RLFP | 71.6 | 50.9 | 70.8 | 67.7 | 70.4 | 53.7 | 62.6 | 29.9 | 45.9 | 48.8 | 53.8 | 0.0 | −0.8 | 6.3 | - | |
RLFN | 74.4 | 63.0 | 78.7 | 79.8 | 72.9 | 59.3 | 75.9 | 41.2 | 65.4 | 52.1 | 59.4 | 19.7 | 60.8 | 13.1 | - | |
realAWSCloudwatch | SP | 73.3 | 50.0 | 69.5 | 73.4 | 71.5 | 58.1 | 60.7 | 50.0 | 57.6 | 38.5 | 31.2 | 49.3 | 39.7 | 2.3 | 16.4 |
RLFP | 69.7 | 36.2 | 59.0 | 65.8 | 67.7 | 45.2 | 53.1 | 44.0 | 44.9 | 25.5 | 4.9 | 42.2 | 24.1 | 2.8 | 7.0 | |
RLFN | 76.6 | 56.6 | 75.2 | 76.7 | 75.8 | 64.3 | 64.9 | 53.3 | 64.7 | 45.7 | 41.9 | 56.2 | 51.0 | 15.0 | 25.4 | |
realKnownCause | SP | 56.3 | 28.0 | 63.9 | 55.5 | 41.8 | 32.9 | 45.2 | 49.9 | 43.1 | 26.7 | 13.4 | 10.1 | −1.2 | 13.5 | 44.4 |
RLFP | 49.4 | 15.8 | 52.2 | 49.3 | 38.0 | 27.7 | 27.9 | 39.3 | 16.0 | 21.5 | 9.9 | 6.8 | −38.7 | 5.1 | 25.1 | |
RLFN | 62.1 | 32.7 | 70.7 | 61.5 | 49.4 | 36.0 | 54.7 | 56.1 | 47.8 | 30.1 | 15.9 | 12.0 | 22.9 | 21.8 | 57.7 | |
realTraffic | SP | 84.1 | 51.0 | 86.9 | 82.5 | 91.2 | 76.5 | 49.9 | 78.6 | 63.8 | 57.7 | 64.3 | 74.9 | 44.1 | 36.1 | - |
RLFP | 81.7 | 41.6 | 81.5 | 75.7 | 88.4 | 73.5 | 40.0 | 71.3 | 36.8 | 55.7 | 61.5 | 49.6 | 25.1 | 0.0 | - | |
RLFN | 87.0 | 55.4 | 91.2 | 86.0 | 92.7 | 79.6 | 54.7 | 83.4 | 66.1 | 59.9 | 66.7 | 78.5 | 51.8 | 55.9 | - | |
realTweets | SP | 68.4 | 54.8 | 81.8 | 68.0 | 74.5 | 68.9 | 64.3 | 59.8 | 48.1 | 59.6 | 51.4 | 29.4 | 2.7 | 19.8 | - |
RLFP | 59.6 | 37.4 | 70.1 | 61.1 | 73.1 | 45.3 | 42.2 | 55.0 | 46.9 | 35.8 | 16.3 | 31.8 | 1.7 | 3.0 | - | |
RLFN | 72.9 | 61.8 | 87.9 | 72.6 | 76.5 | 78.3 | 73.2 | 63.1 | 62.2 | 69.0 | 64.6 | 50.9 | 9.4 | 33.5 | - |
SP | RLFP | RLFN | APD * | DRR (%) | |
---|---|---|---|---|---|
HTM | 70.1 | 62.2 | 74.7 | baseline | none |
ours, = 2 | 67.9 | 62.8 | 71.9 | −1.94% | 94.84% |
ours, = 3 | 70.0 | 64.6 | 74.0 | +0.91% | 96.19% |
ours, = 4 | 64.0 | 60.7 | 67.8 | −6.79% | 96.86% |
ours, = 5 | 59.5 | 56.7 | 62.4 | −13.51% | 97.27% |
ours, = 6 | 60.3 | 56.3 | 63.5 | −12.84% | 97.54% |
ours, = 7 | 60.7 | 56.7 | 63.7 | −12.30% | 97.73% |
ours, = 8 | 55.9 | 53.8 | 58.3 | −18.58% | 97.87% |
ours, = 9 | 52.4 | 50.7 | 54.4 | −23.63% | 97.99% |
ours, = 10 | 51.5 | 50.2 | 53.6 | −24.71% | 98.08% |
Method | SP | RLFP | RLFN |
---|---|---|---|
Smoothing + Binary Convolution | 70.0 | 64.6 | 74.0 |
Smoothing | 69.7 | 63.5 | 73.7 |
Binary Convolution | 58.2 | 50.6 | 63.5 |
SP | RLFP | RLFN | DRR | |
---|---|---|---|---|
group1 | 65.3 | 63.9 | 65.8 | 96.19% |
group2 | 79.5 | 78.9 | 79.6 | |
group3 | 66.3 | 65.9 | 66.4 | |
group4 | 70.6 | 69.9 | 70.9 | |
group5 | 71.0 | 70.6 | 71.2 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xie, C.; Tao, W.; Zeng, Z.; Dong, Y. Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection. Electronics 2023, 12, 3229. https://doi.org/10.3390/electronics12153229
Xie C, Tao W, Zeng Z, Dong Y. Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection. Electronics. 2023; 12(15):3229. https://doi.org/10.3390/electronics12153229
Chicago/Turabian StyleXie, Cheng, Wenbiao Tao, Zuoying Zeng, and Yuran Dong. 2023. "Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection" Electronics 12, no. 15: 3229. https://doi.org/10.3390/electronics12153229
APA StyleXie, C., Tao, W., Zeng, Z., & Dong, Y. (2023). Binary-Convolution Data-Reduction Network for Edge–Cloud IIoT Anomaly Detection. Electronics, 12(15), 3229. https://doi.org/10.3390/electronics12153229