Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/80594
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor王勝德(Seng-De Wang)
dc.contributor.authorWei-Chin Chienen
dc.contributor.author簡暐晉zh_TW
dc.date.accessioned2022-11-24T03:10:15Z-
dc.date.available2022-02-16
dc.date.available2022-11-24T03:10:15Z-
dc.date.copyright2022-02-16
dc.date.issued2022
dc.date.submitted2022-02-10
dc.identifier.citation[1] P. Baldi. Autoencoders, unsupervised learning, and deep architectures. In I. Guyon, G. Dror, V. Lemaire, G. Taylor, and D. Silver, editors, Proceedings of ICML Workshop on Unsupervised and Transfer Learning, volume 27 of Proceedings of Machine Learning Research, pages 37–49, Bellevue, Washington, USA, 02 Jul 2012. PMLR. [2] D. Bank, N. Koenigstein, and R. Giryes. Autoencoders, 2021. [Online]. Available: https://arxiv.org/abs/2003.05991 [3] J. Devlin, M.-W. Chang, K. Lee, and K. Toutanova. Bert: Pre-training of deep bidirectional transformers for language understanding, 2019. [Online]. Available: https://arxiv.org/abs/1810.04805 [4] I. J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial networks, 2014. [Online]. Available: https://arxiv.org/abs/1406.2661 [5] V. Hautamaki, I. Karkkainen, and P. Franti. Outlier detection using k-nearest neighbour graph. In Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004., volume 3, pages 430–433 Vol.3, 2004. [6] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition, 2015. [Online]. Available: https://arxiv.org/abs/1512.03385 [7] M.Hearst,S.Dumais,E.Osuna,J.Platt,andB.Scholkopf.Supportvectormachines. IEEE Intelligent Systems and their Applications, 13(4):18–28, 1998. [8] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780, 1997. [9] T. Kieu, B. Yang, C. Guo, and C. S. Jensen. Outlier detection for time series with recurrent autoencoder ensembles. In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19, pages 2725–2732. International Joint Conferences on Artificial Intelligence Organization, 7 2019. [10] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 25, pages 1097–1105. Curran Associates, Inc., 2012. [11] K. Lee, H. Lee, K. Lee, and J. Shin. Training confidence-calibrated classifiers for detecting out-of-distribution samples, 2018. [Online]. Available: https://arxiv.org/ abs/1711.09325 [12] F. Mao, X. Wu, H. Xue, and R. Zhang. Hierarchical video frame sequence repre- sentation with deep convolutional graph network. Computer Vision–ECCV 2018 Workshops, page 262–270, 2021. [13] A.P.MathurandN.O.Tippenhauer.Swat:awatertreatmenttestbedforresearchand training on ics security. In 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater), pages 31–36, 2016. [14] M. Munir, S. A. Siddiqui, A. Dengel, and S. Ahmed. Deepant: A deep learning approach for unsupervised anomaly detection in time series. IEEE Access, 7:1991– 2005, 2019. [15] C. Ranjan, M. Reddy, M. Mustonen, K. Paynabar, and K. Pourak. Dataset: Rare event classification in multivariate time series, 2019. [Online]. Available: https:// arxiv.org/abs/1809.10717 [16] S. Russo, A. Disch, F. Blumensaat, and K. Villez. Anomaly detection using deep autoencoders for in-situ wastewater systems monitoring data, 2020. [Online]. Available: https://arxiv.org/abs/2002.03843 [17] T. Schlegl, P. Seeböck, S. M. Waldstein, U. Schmidt-Erfurth, and G. Langs. Unsupervised anomaly detection with generative adversarial networks to guide marker discovery, 2017. [Online]. Available: https://arxiv.org/abs/1703.05921 [18] B. Schölkopf, R. C. Williamson, A. J. Smola, J. Shawe-Taylor, J. C. Platt, et al. Support vector method for novelty detection. In NIPS, volume 12, pages 582–588. Citeseer, 1999. [19] R. Taormina, S. Galelli, N. O. Tippenhauer, E. Salomons, A. Ostfeld, D. G. Eliades, M. Aghashahi, R. Sundararajan, M. Pourahmadi, M. K. Banks, et al. Battle of the attack detection algorithms: Disclosing cyber attacks on water distribution networks. Journal of Water Resources Planning and Management, 144(8):04018048, 2018. [20] H. Thanh-Tung and T. Tran. On catastrophic forgetting and mode collapse in generative adversarial networks, 2020. [Online]. Available: https:// arxiv.org/ abs/ 1807.04015 [21] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin. Attention is all you need, 2017. [Online]. Available: https:// arxiv.org/abs/1706.03762 [22] Y. Wang, J. Wong, and A. Miner. Anomaly intrusion detection using one class svm. In Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004., pages 358–364, 2004. [23] C. Zhang, D. Song, Y. Chen, X. Feng, C. Lumezanu, W. Cheng, J. Ni, B. Zong, H. Chen, and N. V. Chawla. A deep neural network for unsupervised anomaly de- tection and diagnosis in multivariate time series data, 2018. [Online]. Available: https://arxiv.org/abs/1811.08055 [24] Z. Zhang, Y. Song, and H. Qi. Decoupled learning for conditional adversarial net- works, 2018. [Online]. Available: https://arxiv.org/abs/1801.06790
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/80594-
dc.description.abstract"在工業控制系統中,時常產生具有時間序列關係的數據。這些數據可能來自於橋樑震動,配水系統,或製造設備的監測數據。本文提出一個可預測多變數時間序列的異常偵測模型與訓練方法。該方法基於自編碼器,並且近一步使用生成式對抗網路,結合由生成模型產生殘差,以及判别模型輔助產生的異常分數,以增加預測精準度。所提出的演算法也降低了訓練生成式對抗網路的難度,並且該方法在SWaT, BATADAL, 以及Rare Event Classification 資料集上均比常見方法在F1 socre上取得了更好的表現。"zh_TW
dc.description.provenanceMade available in DSpace on 2022-11-24T03:10:15Z (GMT). No. of bitstreams: 1
U0001-0802202214442000.pdf: 1134461 bytes, checksum: eafe2aafa05fa1b71ba8e7f1aa82d41e (MD5)
Previous issue date: 2022
en
dc.description.tableofcontentsContents Acknowledgements i 摘要 iii Abstract v Contents vii List of Figures ix List of Tables xi Chapter 1 Introduction 1 Chapter 2 Related Work 5 2.1 Traditional Method........................... 5 2.2 DeepLearningMethod......................... 6 Chapter 3 Proposed Approach 11 3.1 Overview................................ 11 3.2 Problem formulation .......................... 11 3.3 Stage1:Autoencoder.......................... 12 3.4 Stage2:GAN.............................. 14 3.5 Anomaly Detection-Testing Stage ................... 16 Chapter 4 Experiments 19 4.1 Setup ................... 19 4.1.1 Dataset................................. 19 4.1.2 SWaT(SecureWaterTreatment) ................... 19 4.1.3 BATADAL (BATtle of the Attack Detection ALgorithms) . . . . . . 20 4.1.4 RareEventClassification....................... 20 4.2 Evaluation metrics ........................... 21 4.3 Baseline Models for Comparison .................... 22 4.4 Result .................................. 23 4.5 Analysis ................................ 24 Chapter 5 Conclusion 27 References 29 List of Figures 1.1 Example of a system with multivariate time series anomaly. . . . . . . . 2 2.1 An example of univariate anomaly detection. . . . . . . . . . . . . . . . 7 2.2 A simple illustration of autoencoder . . . . . . . . . . . . . . . . . . . . 8 2.3 A simple structure of GAN . . . . . . . . . . . . . . . . . . . . . . . . . 9 3.1 A module of LSTM cell . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.2 First stage with autoencoder . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3 Second stage with autoencoder and GAN . . . . . . . . . . . . . . . . . 16 4.1 SWaT testbed process overview.[13] . . . . . . . . . . . . . . . . . . . . 20 4.2 Graphical representation of BATADAL C-Town water distribution system.[19] . . . . . . . . . . . . . 21 4.3 Visualization result on SWaT dataset of different methods . . . . . . . . . 25 4.4 Visualization result on BATADAL dataset of different methods . . . . . . 26 4.5 Visualization result on Rare Event dataset of different methods . . . . . . 26 List of Tables 4.1 Hyperparameters of different methods . . . . . . . . . . . . . . . . . . . 23 4.2 f1 score on SWaT and BATADAL dataset . . . . . . . . . . . . . . . . . 23 4.3 f1 score on Rare Event classification dataset . . . . . . . . . . . . . . . . 24 4.4 statistics for the datasets . . . . . . . . . . . . . . . . . . . . . . . . . . 24
dc.language.isoen
dc.subject生成對抗網路zh_TW
dc.subject異常偵測zh_TW
dc.subject時間序列zh_TW
dc.subject自編碼器zh_TW
dc.subjectAnomaly Detectionen
dc.subjectGenerative Adversarial Networken
dc.subjectAutoencoderen
dc.subjectTime Seriesen
dc.title基於解構式生成對抗網路於多變數工業傳感資料之異常檢測zh_TW
dc.titleAnomaly Detection for Multivariate Industrial Sensor Data via Decoupled Generative Adversarial Networken
dc.date.schoolyear110-1
dc.description.degree碩士
dc.contributor.oralexamcommittee雷欽隆(Lily I-Wen Su),余承叡(Shu-chen Sherry Ou),(Yu-An Lu),(Chenhao Chiu)
dc.subject.keyword異常偵測,時間序列,自編碼器,生成對抗網路,zh_TW
dc.subject.keywordAnomaly Detection,Time Series,Autoencoder,Generative Adversarial Network,en
dc.relation.page32
dc.identifier.doi10.6342/NTU202200380
dc.rights.note同意授權(限校園內公開)
dc.date.accepted2022-02-11
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電機工程學研究所zh_TW
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
U0001-0802202214442000.pdf
授權僅限NTU校內IP使用(校園外請利用VPN校外連線服務)
1.11 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved