BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability
Abstract
1. Introduction
- BiTAD: A novel anomaly detection model that combines a stacked BiLSTM (leveraging the standard LSTM cell gates) with a custom single-head temporal self-attention mechanism. BiTAD integrates bidirectional sequence modelling and attention weighting to emphasise informative timesteps within each flow sequence while preserving LSTM’s intrinsic gating dynamics.
- TwinLens Explainability: A dual explainability module integrating SHAP and TimeSHAP to reveal both what features and when they contribute to anomaly decisions.
2. Related Work
2.1. Classical and Statistical Approaches to Network Anomaly Detection
2.2. Deep Learning Models for Temporal Anomaly Detection
2.3. Public Datasets for 5G Anomaly Detection
2.4. Explainability for Temporal Black-Box Models
3. Methodology
3.1. The 5G-NIDD Dataset
3.2. Data Preprocessing
- Removal of Irrelevant Fields: Identifiers or metadata that are not contributing to anomaly detection, such as flow IDs, are removed. These features may introduce noise and affect the data modelling.
- Categorical Encoding: The 5G-NIDD dataset contains 52 features, including 8 categorical fields (e.g., protocol type, flag, slice ID). These categorical variables are converted to numerical form using one-hot encoding and ordinal encoding. For example, in one-hot encoding, a categorical feature with k values is mapped to a k-dimensional binary vector in such a way that the index corresponding to the category, i.e., category i, is set to 1, and the remaining ones are set to 0:
- Normalization: Continuous features (i.e., flow duration, byte counts, packet rates, inter-arrival times) are standardized using Z-score scaling so that all features have comparable ranges (mean 0, standard deviation 1). For instance, Z-score scaling uses:The normalization process helps prevent large-magnitude features (e.g., flood packet counts) from dominating the learning process. Additionally, it also mitigates exploding gradients and speeds training convergence.
- Sequence Shaping: To accommodate sequence-based models in this study, we group the network flows into fixed-length sequences. With a window size of T = 5, each instance is defined as , where d is the feature dimension after encoding. Thus, the data input to the model is in a 3D shape of (batch_size, 5, d). For flow-level classification to determine whether a specific network flow is normal or an attack, the label for each sequence is taken from the most recent timestep . It is worth noting that the framework accepts grouping multiple consecutive flows into a sequence for capturing temporal dependencies. This could facilitate the sequence-based models to learn the dynamic patterns across the flows. This characteristic is useful in identifying slow-building attacks or sequential behaviours.
- Class Balancing: As mentioned previously, the 5G-NIDD dataset is imbalanced, with approximately 60% of flows labeled as attacks. Among the attack cases, some classes, such as ICMP Flood, account for less than 1% of all malicious flows. Oversampling methods such as SMOTE or ADASYN were explored but found to be impractical because of the dataset’s large scale (≈5.1 million flows) and their tendency to distort sequential dependencies across consecutive flows. Consequently, we use class weighting. Specifically, we weight the loss for each class by where N is the total number of samples, C is the number of classes (9), and N(C) is the number of samples in class c. This weighting scheme effectively mitigates imbalance while preserving the temporal structure of the sequences. Such preprocessing (label encoding, normalization, and class weighting) follows established best practices for telecom anomaly detection.
3.3. Model Architecture
3.4. Model Variants for Comparison
3.5. TwinLens: Explainability Framework
4. Results and Analysis
4.1. Model Performance Analysis
4.2. Why BiLSTM + Attention Excels?
4.3. TwinLens Interpretability
4.3.1. Performance Interpretability Trade-Offs
4.3.2. SHAP Analysis: Which Features
4.3.3. TimeSHAP Analysis: When Features Matter
4.3.4. Model Tuning Guided by XAI Insights
- Feature pruning: Based on the SHAP value rankings, the top 10 ranked features are selected (SHAP-based).
- Temporal pruning: From the previous analysis, TimeSHAP findings exhibit that the early time steps (i.e., t1-t3 possess higher predictive power. Thereby, the input sequence is reduced from 5 to 3-time steps (TimeSHAP-based).
4.3.5. Training Curve and Confusion Matrix Analysis
- Training Loss: Drops from ~0.15 to <0.075 over 9 epochs.
- Validation Loss: Relatively stable, fluctuating around ~0.20.
- Accuracy: Gradual increase to ~0.90, with minimal fluctuation.
- Training Loss: Drops from ~0.13 to <0.07 within 5–6 epochs.
- Validation Loss: Slightly higher, fluctuating around ~0.24.
- Accuracy: Achieves ~0.90 in fewer epochs, matching the original’s final performance.
4.3.6. Summary and Justification
4.4. Comparative Benchmarking and Dataset Discrepancy
4.5. Computational Efficiency, Experimental Setup, and Reproducibility
4.6. Real-World Deployment and Real-Time Detection
4.6.1. Deployment Challenges and Practical Considerations
- High Data Volume and Scalability:5G core networks routinely sustain hundreds of gigabits per second of traffic while serving millions of devices. As emphasized by Bocu and Iavich [34], real-time intrusion detection in high-bandwidth 5G cores is feasible when deployed in a virtualized and distributed manner. In this context, BiTAD’s compact architecture (approximately 83,000 parameters) and linear inference complexity enable parallelized deployment across network slices or MEC clusters, distributing the computational load efficiently.
- Low-Latency Requirements:Intrusion detection systems must operate within strict temporal budgets to enable real-time threat mitigation. Studies such as [34] have demonstrated that ML-based IDS frameworks can achieve real-time performance in live 5G cores without disrupting low-latency services. Similarly, Azkaei et al. [35] reported that their ML-based anomaly detectors executed within the near-real-time RIC loop, validating the feasibility of such systems. Given BiTAD’s lightweight design and attention-based sequence modelling, similar sub-second inference times are achievable when deployed on MEC or near-real-time RIC infrastructure.
- Dynamic Network Conditions:5G networks evolve continuously through new services, firmware updates, and shifting traffic distributions. To address concept drift, BiTAD can be periodically retrained or fine-tuned using recently captured flow data. This aligns with operational ML pipelines that incorporate incremental learning for adaptive intrusion detection in live networks.
- System Integration and Explainability:Integration with software-defined and virtualized 5G architectures (e.g., NFV, SDN, and MANO) facilitates elastic scaling and automated deployment. BiTAD can be containerized as a microservice within such frameworks, enabling per-slice or per-cluster instantiation. The TwinLens explainability module complements this deployment by providing interpretable, feature- and time-level attributions, enhancing analysts’ trust and situational awareness—capabilities identified as critical for operational IDS adoption [27].
4.6.2. Real-Time Detection Feasibility
- 1.
- Efficient Model Design:By employing bidirectional temporal encoding with attention and a reduced parameter count, BiTAD minimizes inference latency. Similar deep learning architectures, such as ScalaDetect-5G [36], have achieved F1 > 99% while supporting real-time deployment through feature compression and model optimization.
- 2.
- Edge and Hierarchical Deployment:Locating detection instances at MEC nodes or near the RAN layer reduces data transmission delay and allows faster decision-making. Azkaei et al. [35] demonstrated that ML-based anomaly detectors deployed at the edge can operate efficiently within O-RAN’s near-real-time (≈1 s) control loop, validating the practicality of such designs.
- 3.
- Parallelization and Slicing:Logical partitioning of traffic across multiple BiTAD instances or slices enables concurrent analysis of large data volumes. Bocu and Iavich [34] confirmed that appropriately defined 5G virtual networks can sustain real-time IDS performance across high-throughput subnets.
4.6.3. Summary
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zolotukhin, M.; Zhang, D.; Hämäläinen, T.; Miraghaei, P. On Attacking Future 5G Networks with Adversarial Examples: Survey. Network 2022, 3, 39–90. [Google Scholar] [CrossRef]
- Mohale, V.Z.; Obagbuwa, I.C. Evaluating machine learning-based intrusion detection systems with explainable AI: Enhancing transparency and interpretability. Front. Comput. Sci. 2025, 7, 1520741. [Google Scholar] [CrossRef]
- Pavani, G.K.; Veeramallu, B. Hybrid Machine Learning Framework for Anomaly Detection in 5G Networks. J. Inf. Syst. Eng. Manag. 2025, 10, 733–739. [Google Scholar] [CrossRef]
- Rabih, R.; Vahdat-Nejad, H.; Mansoor, W.; Joloudari, J.H. Highly accurate anomaly based intrusion detection through integration of the local outlier factor and convolutional neural network. Sci. Rep. 2025, 15, 21147. [Google Scholar] [CrossRef]
- Wang, Z.; Fok, K.W.; Thing, V.L.L. Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection Strategies. In Proceedings of the 2024 IEEE International Conference on Cyber Security and Resilience, CSR, London, UK, 2–4 September 2024; pp. 114–119. [Google Scholar] [CrossRef]
- Rahman, A.-U.; Mahmud, M.; Iqbal, T.; Saraireh, L.; Kholidy, H.; Gollapalli, M.; Musleh, D.; Alhaidari, F.; Almoqbil, D.; Ahmed, M.I.B. Network Anomaly Detection in 5G Networks. Math. Model. Eng. Probl. 2022, 9, 397–404. [Google Scholar] [CrossRef]
- Noor, K.; Imoize, A.L.; Li, C.-T.; Weng, C.-Y. A Review of Machine Learning and Transfer Learning Strategies for Intrusion Detection Systems in 5G and Beyond. Mathematics 2025, 13, 1088. [Google Scholar] [CrossRef]
- Waghmode, P.; Kanumuri, M.; El-Ocla, H.; Boyle, T. Intrusion detection system based on machine learning using least square support vector machine. Sci. Rep. 2025, 15, 12066. [Google Scholar] [CrossRef]
- Kurochkin, I.I.; Volkov, S.S. Using GRU based deep neural network for intrusion detection in software-defined networks. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Ulaanbaatar, Mongolia, 10–13 September 2020. [Google Scholar] [CrossRef]
- Kamel, F.F.; Mahdi, M.S. Intrusion Detection Systems Based on RNN and GRU Models using CSE-CIC-IDS2018 Dataset in AWS Cloud. J. Al-Qadisiyah Comput. Sci. Math. 2024, 16, 141–160. [Google Scholar] [CrossRef]
- Nikitenko, A.; Bashkov, Y. Construction of a network intrusion detection system based on a convolutional neural network and a bidirectional gated recurrent unit with attention mechanism. East.-Eur. J. Enterp. Technol. 2024, 3, 6–15. [Google Scholar] [CrossRef]
- Hu, Z.; Liu, G.; Li, Y.; Zhuang, S. SAGB: Self-attention with gate and BiGRU network for intrusion detection. Complex Intell. Syst. 2024, 10, 8467–8479. [Google Scholar] [CrossRef]
- Zhang, J.; Zhang, X.; Liu, Z.; Fu, F.; Jiao, Y.; Xu, F. A Network Intrusion Detection Model Based on BiLSTM with Multi-Head Attention Mechanism. Electronics 2023, 12, 4170. [Google Scholar] [CrossRef]
- Samarakoon, S.; Siriwardhana, Y.; Porambage, P.; Liyanage, M.; Chang, S.-Y.; Kim, J.; Ylianttila, M. 5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. arXiv 2022, arXiv:2212.01298. [Google Scholar] [CrossRef]
- Farzaneh, B.; Shahriar, N.; Al Muktadir, A.H.; Towhid, S.; Khosravani, M.S. DTL-5G: Deep transfer learning-based DDoS attack detection in 5G and beyond networks. Comput. Commun. 2024, 228, 107927. [Google Scholar] [CrossRef]
- Harshdeep, K.; Sumalatha, K.; Mathur, R. DeepTransIDS: Transformer-Based Deep learning Model for Detecting DDoS Attacks on 5G NIDD. Results Eng. 2025, 26, 104826. [Google Scholar] [CrossRef]
- Zhang, A.; Zhao, Y.; Zhou, C.; Zhang, T. ResACAG: A graph neural network based intrusion detection. Comput. Electr. Eng. 2024, 122, 109956. [Google Scholar] [CrossRef]
- Peterson, J.M.; Leevy, J.L.; Khoshgoftaar, T.M. A Review and Analysis of the Bot-IoT Dataset. In Proceedings of the 15th IEEE International Conference on Service-Oriented System Engineering, SOSE 2021, Online, 23–26 August 2021; pp. 20–27. [Google Scholar] [CrossRef]
- Jiang, K.; Wang, W.; Wang, A.; Wu, H. Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network. IEEE Access 2020, 8, 32464–32476. [Google Scholar] [CrossRef]
- Moustafa, N.; Slay, J. UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). In Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 10–12 November 2015; IEEE: Piscataway, NJ, USA, 2015. [Google Scholar] [CrossRef]
- Borah, S.; Panigrahi, R. A detailed analysis of CICIDS2017 dataset for designing Intrusion Detection Systems. Int. J. Eng. Technol. 2018, 7, 479–482. Available online: https://www.researchgate.net/publication/329045441 (accessed on 16 October 2025).
- Hermosilla, P.; Berríos, S.; Allende-Cid, H. Explainable AI for Forensic Analysis: A Comparative Study of SHAP and LIME in Intrusion Detection Models. Appl. Sci. 2025, 15, 7329. [Google Scholar] [CrossRef]
- Kumar, A.; Thing, V.L.L. Evaluating The Explainability of State-of-the-Art Deep Learning-based Network Intrusion Detection Systems. arXiv 2025, arXiv:2408.14040. [Google Scholar] [CrossRef]
- Keshk, M.; Koroniotis, N.; Pham, N.; Moustafa, N.; Turnbull, B.; Zomaya, A.Y. An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf. Sci. 2023, 639, 119000. [Google Scholar] [CrossRef]
- Lundberg, S.; Lee, S.-I. A Unified Approach to Interpreting Model Predictions. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS’17), Long Beach, CA, USA, 4–9 December 2017; pp. 4768–4777. [Google Scholar] [CrossRef]
- Ribeiro, M.T.; Singh, S.; Guestrin, C. Why Should I Trust You? Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 13–17 August 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 1135–1144. [Google Scholar] [CrossRef]
- Radoglou-Grammatikis, P.; Nakas, G.; Amponis, G.; Giannakidou, S.; Lagkas, T.; Argyriou, V.; Goudos, S.; Sarigiannidis, P. 5GCIDS: An Intrusion Detection System for 5G Core with AI and Explainability Mechanisms. In Proceedings of the 2023 IEEE Globecom Workshops, GC Wkshps 2023, Kuala Lumpur, Malaysia, 4–8 December 2023; pp. 353–358. [Google Scholar] [CrossRef]
- Bento, J.; Saleiro, P.; Cruz, A.F.; Figueiredo, M.A.; Bizarro, P. TimeSHAP: Explaining Recurrent Models through Sequence Perturbations. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Virtually, 14–18 August 2021; pp. 2565–2573. [Google Scholar] [CrossRef]
- Li, B. Unsupervised Temporal Anomaly Detection: Time Series, Data Stream, and Interpretability. Ph.D. Thesis, Technische Universität Dortmund, Dortmund, Germany, 2024. [Google Scholar]
- Islam, A.; Chang, S.-Y.; Kim, J.; Kim, J. Anomaly Detection in 5G using Variational Autoencoders. In Proceedings of the 2024 Silicon Valley Cybersecurity Conference, SVCC 2024, Seoul, Republic of Korea, 17–19 June 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Corea, P.M.; Liu, Y.; Wang, J.; Niu, S.; Song, H. Explainable AI for Comparative Analysis of Intrusion Detection Models. In Proceedings of the 2024 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), Madrid, Spain, 8–11 July 2024; pp. 585–590. [Google Scholar] [CrossRef]
- Gaspar, D.; Silva, P.; Silva, C. Explainable AI for Intrusion Detection Systems: LIME and SHAP Applicability on Multi-Layer Perceptron. IEEE Access 2024, 12, 30164–30175. [Google Scholar] [CrossRef]
- Barnard, P.; Marchetti, N.; DaSilva, L.A. Robust Network Intrusion Detection Through Explainable Artificial Intelligence (XAI). IEEE Netw. Lett. 2022, 4, 167–171. [Google Scholar] [CrossRef]
- Bocu, R.; Iavich, M. Real-Time Intrusion Detection and Prevention System for 5G and beyond Software-Defined Networks. Symmetry 2022, 15, 110. [Google Scholar] [CrossRef]
- Azkaei, B.; Joshi, K.C.; Exarchakos, G. Machine Learning-Driven Anomaly Detection for 5G O-RAN Performance Metrics. arXiv 2025, arXiv:2509.03290. [Google Scholar] [CrossRef]
- Chang, S.; Cui, B.; Feng, S. ScalaDetect-5G: Ultra High-Precision Highly Elastic Deep Intrusion Detection System for 5G Network. CMES—Comput. Model. Eng. Sci. 2025, 144, 3805–3827. [Google Scholar] [CrossRef]












| Method | Aspect | Strengths | Limitations | Example Data |
|---|---|---|---|---|
| Signature-based | Rule-based | Fast detection of known attacks | Cannot detect unknown/zero-day; requires expert-crafted rules | NSL-KDD, CICIDS |
| SVM | ML classifier | Strong theoretical foundation | Requires manual features; no inherent time modelling; scales poorly on big data | NSL-KDD, UNSW-NB15 |
| Decision Tree/RF | ML classifier | Interpretable rules; fast | Static features only; can overfit non-sequential noise | NSL-KDD, CICIDS-2017 |
| K-Nearest Neighbours | ML classifier | Simple, nonparametric | Slow during prediction; ignores feature drift over time | NSL-KDD |
| Naive Bayes (NB) | ML classifier | Computationally efficient | Assumes independent features; static model (no memory of sequence) | NSL-KDD |
| Model | Temporal Dependency Handling | Accuracy | Training Time | Suitability for 5G Anomaly Detection |
|---|---|---|---|---|
| LSTM [14] | Excellent (built-in memory for sequences) | ~90–95% | Moderate | Highly Suitable |
| GRU [10] | Good-simpler, shorter memory than LSTM | 87–89% | Moderate | Suitable-efficient, but weaker for long dependencies |
| CNN–BiGRU [12] | Combines spatial + bidirectional temporal modelling | ~89% | Slow | Strong-heavier model |
| RNN [11] | Good (sequence modelling, but weaker than LSTM) | ~90% | Moderate | Suitable (short sequences only) |
| SAG–BiGRU [13] | BiGRU with self-attention for salient time steps | 95–99% | Slow | Promising for imbalanced traffic, but more complex |
| Transformer [16] | Global self-attention captures long-range dependencies | 98–99% | Slow (GPU intensive) | State-of-the-art accuracy; resource-intensive |
| GCN [17] | Graph message passing across flows | 96–99% | Slow (GPU intensive) | Strong on topology data; limited validation on real 5G |
| Dataset | Year | Traffic Domain | Notes |
|---|---|---|---|
| NSL-KDD [19] | 2009 | Simulated, Campus network | Classic IDS benchmark; outdated (no 5G) |
| UNSW-NB15 [20] | 2015 | Synthetic, web browsing | Modern attacks (2015); lacks 5G context |
| CICIDS2017 [21] | 2017 | Synthetic, mixed traffic | Includes IoT/web attacks; no 5G |
| BoT-IoT [18] | 2019 | Simulated IoT devices | Large (72M flows); botnet/DDoS focus |
| 5G-NIDD [14] | 2024 | Real 5G testbed | Real 5G traffic, contains GTP and slice info |
| Model Variant | LSTM Units | Bidirectional | Attention | Dropout | Output |
|---|---|---|---|---|---|
| LSTM | 64 | No | No | 0.3 | Softmax (9 classes) |
| LSTM + Attn | 64 | No | Yes | 0.3 | Softmax (9 classes) |
| BiLSTM | 64 + 64 (fw/bw) | Yes | No | 0.3 | Softmax (9 classes) |
| The proposed BiTAD | 64 + 64 (fw/bw) | Yes | Yes | 0.3 | Softmax (9 classes) |
| Task | Model | Accuracy | Precision | Recall | F1-Score |
|---|---|---|---|---|---|
| Binary | LSTM | 90.82% | 0.82 | 0.98 | 0.89 |
| LSTM + Attention | 91.41% | 0.83 | 0.98 | 0.90 | |
| BiLSTM | 91.36% | 0.83 | 0.99 | 0.90 | |
| BiTAD | 93.33% | 0.84 | 0.99 | 0.91 | |
| Multiclass | LSTM | 86.32% | 0.88 | 0.84 | 0.86 |
| LSTM + Attention | 87.40% | 0.90 | 0.87 | 0.88 | |
| BiLSTM | 88.75% | 0.91 | 0.88 | 0.90 | |
| BiTAD | 90.47% | 0.92 | 0.91 | 0.91 |
| Class | Accuracy | Precision | Recall | F1-Score |
|---|---|---|---|---|
| Benign | 91.09% | 0.99 | 0.83 | 0.91 |
| HTTPFlood | 99.27% | 0.98 | 0.97 | 0.97 |
| ICMPFlood | 99.72% | 0.13 | 1.00 | 0.24 |
| SYNFlood | 100.00% | 0.99 | 1.00 | 0.99 |
| SYNScan | 100.00% | 0.99 | 0.99 | 0.99 |
| SlowrateDoS | 99.53% | 0.97 | 0.98 | 0.98 |
| TCPConnectScan | 99.58% | 0.48 | 0.98 | 0.65 |
| UDPFlood | 91.74% | 0.63 | 0.99 | 0.77 |
| UDPScan | 100.00% | 0.99 | 0.99 | 0.99 |
| Model | Sequence Length | Feature Count | Total Parameters |
|---|---|---|---|
| BiTAD (Original) | 5 | 16 | 83,342 |
| TwinLens-Tuned BiTAD | 3 | 10 | 80,268 |
| Class | Accuracy | Precision | Recall | F1-Score |
|---|---|---|---|---|
| Benign | 91.06% | 0.99 | 0.83 | 0.91 |
| HTTPFlood | 99.23% | 0.97 | 0.97 | 0.97 |
| ICMPFlood | 99.86% | 0.24 | 0.98 | 0.39 |
| SYNFlood | 100.00% | 0.99 | 1.00 | 0.99 |
| SYNScan | 99.99% | 0.98 | 0.99 | 0.99 |
| SlowrateDoS | 99.47% | 0.97 | 0.98 | 0.98 |
| TCPConnectScan | 99.57% | 0.48 | 0.99 | 0.65 |
| UDPFlood | 91.67% | 0.63 | 0.99 | 0.77 |
| UDPScan | 100.00% | 0.99 | 0.99 | 0.99 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lau, J.L.T.; Pang, Y.H.; Zarakovitis, C.; Lim, H.S.; Skordoulis, D.; Ooi, S.Y.; Chan, K.Y.; Pang, W.L. BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability. Future Internet 2025, 17, 482. https://doi.org/10.3390/fi17110482
Lau JLT, Pang YH, Zarakovitis C, Lim HS, Skordoulis D, Ooi SY, Chan KY, Pang WL. BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability. Future Internet. 2025; 17(11):482. https://doi.org/10.3390/fi17110482
Chicago/Turabian StyleLau, Justin Li Ting, Ying Han Pang, Charilaos Zarakovitis, Heng Siong Lim, Dionysis Skordoulis, Shih Yin Ooi, Kah Yoong Chan, and Wai Leong Pang. 2025. "BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability" Future Internet 17, no. 11: 482. https://doi.org/10.3390/fi17110482
APA StyleLau, J. L. T., Pang, Y. H., Zarakovitis, C., Lim, H. S., Skordoulis, D., Ooi, S. Y., Chan, K. Y., & Pang, W. L. (2025). BiTAD: An Interpretable Temporal Anomaly Detector for 5G Networks with TwinLens Explainability. Future Internet, 17(11), 482. https://doi.org/10.3390/fi17110482

