Anomaly Detection
Anomaly Detection
| Publish Date | Title | Authors | Code | |
|---|---|---|---|---|
| 2025-12-18 | TimeSeries2Report prompting enables adaptive large language model management of lithium-ion batteries | Jiayang Yang et.al. | 2512.16453 | null |
| 2025-12-18 | Coarse-to-Fine Open-Set Graph Node Classification with Large Language Models | Xueqi Ma et.al. | 2512.16244 | null |
| 2025-12-17 | Explainable AI in Big Data Fraud Detection | Ayush Jain et.al. | 2512.16037 | null |
| 2025-12-17 | Reusable theory representations for colliders: a demonstrator SMEFT foundation model | Supratim Das Bakshi et.al. | 2512.15862 | null |
| 2025-12-14 | Adversarial Robustness in Financial Machine Learning: Defenses, Economic Impact, and Governance Evidence | Samruddhi Baviskar et.al. | 2512.15780 | null |
| 2025-12-14 | Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection | Sudhanshu Sekhar Tripathy et.al. | 2512.15779 | null |
| 2025-12-12 | PHANTOM: Progressive High-fidelity Adversarial Network for Threat Object Modeling | Jamal Al-Karaki et.al. | 2512.15768 | null |
| 2025-12-06 | Bayesian Modeling for Uncertainty Management in Financial Risk Forecasting and Compliance | Sharif Al Mamun et.al. | 2512.15739 | null |
| 2025-12-17 | A Multivariate Statistical Framework for Detection, Classification and Pre-localization of Anomalies in Water Distribution Networks | Oleg Melnikov et.al. | 2512.15685 | null |
| 2025-12-17 | Online Partitioned Local Depth for semi-supervised applications | John D. Foley et.al. | 2512.15436 | null |
| 2025-12-17 | A Masked Reverse Knowledge Distillation Method Incorporating Global and Local Information for Image Anomaly Detection | Yuxin Jiang et.al. | 2512.15326 | null |
| 2025-12-17 | MECAD: A multi-expert architecture for continual anomaly detection | Malihe Dahmardeh et.al. | 2512.15323 | null |
| 2025-12-17 | Prototypical Learning Guided Context-Aware Segmentation Network for Few-Shot Anomaly Detection | Yuxin Jiang et.al. | 2512.15319 | null |
| 2025-12-17 | Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions | Siva Sai et.al. | 2512.15286 | null |
| 2025-12-17 | Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries | Louis Hackländer-Jansen et.al. | 2512.15275 | null |
| 2025-12-17 | Accelerating High-Throughput Catalyst Screening by Direct Generation of Equilibrium Adsorption Structures | Songze Huo et.al. | 2512.15228 | null |
| 2025-12-16 | Intrusion Detection in Internet of Vehicles Using Machine Learning | Hop Le et.al. | 2512.14958 | null |
| 2025-12-12 | Quantum-Augmented AI/ML for O-RAN: Hierarchical Threat Detection with Synergistic Intelligence and Interpretability (Technical Report) | Tan Le et.al. | 2512.14742 | null |
| 2025-12-12 | How Deep Does Your Dependency Tree Go? An Empirical Study of Dependency Amplification Across 10 Package Ecosystems | Jahidul Arafat et.al. | 2512.14739 | null |
| 2025-12-08 | SGEMAS: A Self-Growing Ephemeral Multi-Agent System for Unsupervised Online Anomaly Detection via Entropic Homeostasis | Mustapha Hamdi et.al. | 2512.14708 | null |
| 2025-12-16 | Hierarchical Persistence Velocity for Network Anomaly Detection: Theory and Applications to Cryptocurrency Markets | Omid Khormali et.al. | 2512.14615 | null |
| 2025-12-16 | Fusion of Cellular ISAC and Passive RF Sensing for UAV Detection and Tracking | Cole Dickerson et.al. | 2512.14608 | null |
| 2025-12-16 | LLmFPCA-detect: LLM-powered Multivariate Functional PCA for Anomaly Detection in Sparse Longitudinal Texts | Prasanjit Dubey et.al. | 2512.14604 | null |
| 2025-12-16 | Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset | Waqas Ahmed et.al. | 2512.14422 | null |
| 2025-12-16 | FusAD: Time-Frequency Fusion with Adaptive Denoising for General Time Series Analysis | Da Zhang et.al. | 2512.14078 | null |
| 2025-12-15 | Look everywhere effects in anomaly detection | Marie Hein et.al. | 2512.13787 | null |
| 2025-12-14 | DARTs: A Dual-Path Robust Framework for Anomaly Detection in High-Dimensional Multivariate Time Series | Xuechun Liu et.al. | 2512.13735 | null |
| 2025-12-15 | AgentIAD: Tool-Augmented Single-Agent for Industrial Anomaly Detection | Junwen Miao et.al. | 2512.13671 | null |
| 2025-12-15 | 3D Human-Human Interaction Anomaly Detection | Shun Maeda et.al. | 2512.13560 | null |
| 2025-12-15 | Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS | Sabrine Ennaji et.al. | 2512.13501 | null |
| 2025-12-15 | On-Device Continual Learning for Unsupervised Visual Anomaly Detection in Dynamic Manufacturing | Haoyu Ren et.al. | 2512.13497 | null |
| 2025-12-15 | Understanding Structured Financial Data with LLMs: A Case Study on Fraud Detection | Xuwei Tan et.al. | 2512.13040 | null |
| 2025-12-14 | A Rule-Aware Prompt Framework for Structured Numeric Reasoning in Cyber-Physical Systems | Yichen Liu et.al. | 2512.12794 | null |
| 2025-12-14 | FiD-QAE: A Fidelity-Driven Quantum Autoencoder for Credit Card Fraud Detection | Mansour El Alami et.al. | 2512.12689 | null |
| 2025-12-13 | Sleep pattern profiling using a finite mixture of contaminated multivariate skew-normal distributions on incomplete data | Jason Pillay et.al. | 2512.12464 | null |
| 2025-12-13 | Robust Outlier Detection and Low-Latency Concept Drift Adaptation for Data Stream Regression: A Dual-Channel Architecture | Bingbing Wang et.al. | 2512.12289 | null |
| 2025-12-13 | A Multi-Year Urban Streetlight Imagery Dataset for Visual Monitoring and Spatio-Temporal Drift Detection | Peizheng Li et.al. | 2512.12205 | null |
| 2025-12-12 | Rethinking Jailbreak Detection of Large Vision Language Models with Representational Contrastive Scoring | Peichun Hua et.al. | 2512.12069 | null |
| 2025-12-12 | Log Anomaly Detection with Large Language Models via Knowledge-Enriched Fusion | Anfeng Peng et.al. | 2512.11997 | null |
| 2025-12-12 | A Multi-Criteria Automated MLOps Pipeline for Cost-Effective Cloud-Based Classifier Retraining in Response to Data Distribution Shifts | Emmanuel K. Katalay et.al. | 2512.11541 | null |
| 2025-12-12 | Collaborative Reconstruction and Repair for Multi-class Industrial Anomaly Detection | Qishan Wang et.al. | 2512.11401 | null |
| 2025-12-12 | RcAE: Recursive Reconstruction Framework for Unsupervised Industrial Anomaly Detection | Rongcheng Wu et.al. | 2512.11284 | null |
| 2025-12-11 | Q-BAR: Blogger Anomaly Recognition via Quantum-enhanced Manifold Learning | Maida Wang et.al. | 2512.11071 | null |
| 2025-12-11 | An Efficient Variant of One-Class SVM with Lifelong Online Learning Guarantees | Joe Suk et.al. | 2512.11052 | null |
| 2025-12-11 | DCFO: Density-Based Counterfactuals for Outliers - Additional Material | Tommaso Amico et.al. | 2512.10659 | null |
| 2025-12-11 | Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks | Neha et.al. | 2512.10637 | null |
| 2025-12-11 | Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques | Kaleb Bacztub et.al. | 2512.10470 | null |
| 2025-12-11 | Semantic Reconstruction of Adversarial Plagiarism: A Context-Aware Framework for Detecting and Restoring “Tortured Phrases” in Scientific Literature | Agniva Maiti et.al. | 2512.10435 | null |
| 2025-12-10 | LogICL: Distilling LLM Reasoning to Bridge the Semantic Gap in Cross-Domain Log Anomaly Detection | Jingwei Ye et.al. | 2512.09627 | null |
| 2025-12-10 | Defect-aware Hybrid Prompt Optimization via Progressive Tuning for Zero-Shot Multi-type Anomaly Detection and Segmentation | Nadeem Nazer et.al. | 2512.09446 | null |
| 2025-12-09 | Natural Geometry of Robust Data Attribution: From Convex Models to Deep Networks | Shihao Li et.al. | 2512.09103 | null |
| 2025-12-09 | Explainable Anomaly Detection for Industrial IoT Data Streams | Ana Rita Paupério et.al. | 2512.08885 | null |
| 2025-12-09 | Reusability in MLOps: Leveraging Ports and Adapters to Build a Microservices Architecture for the Maritime Domain | Renato Cordeiro Ferreira et.al. | 2512.08657 | null |
| 2025-12-09 | The SMART+ Framework for AI Systems | Laxmiraju Kandikatla et.al. | 2512.08592 | null |
| 2025-12-09 | Labeled Delegated PSI and its Applications in the Public Sector | Kristof Verslype et.al. | 2512.08558 | null |
| 2025-12-09 | Developing a Strong CPS Defender: An Evolutionary Approach | Qingyuan Hu et.al. | 2512.08320 | null |
| 2025-12-09 | FedLAD: A Modular and Adaptive Testbed for Federated Log Anomaly Detection | Yihan Liao et.al. | 2512.08277 | null |
| 2025-12-09 | Improving the Sensitivity of Backdoor Detectors via Class Subspace Orthogonalization | Guangmingmei Yang et.al. | 2512.08129 | null |
| 2025-12-08 | The interstellar signature: A computational framework for open source interstellar tracking | Pancha Narayan Sahu et.al. | 2512.07910 | null |
| 2025-12-08 | Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments | Ibrahim Adabara et.al. | 2512.07909 | null |
| 2025-11-26 | Pattern Recognition of Ozone-Depleting Substance Exports in Global Trade Data | Muhammad Sukri Bin Ramli et.al. | 2512.07864 | null |
| 2025-11-26 | SetAD: Semi-Supervised Anomaly Learning in Contextual Sets | Jianling Gao et.al. | 2512.07863 | null |
| 2025-12-08 | An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning | Lukas Johannes Möller et.al. | 2512.07827 | null |
| 2025-12-08 | WaggleNet: A LoRa and MQTT-Based Monitoring System for Internal and External Beehive Conditions | Minju Jeon et.al. | 2512.07408 | null |
| 2025-12-07 | MINES: Explainable Anomaly Detection through Web API Invariant Inference | Wenjie Zhang et.al. | 2512.06906 | null |
| 2025-12-07 | Pseudo Anomalies Are All You Need: Diffusion-Based Generation for Weakly-Supervised Video Anomaly Detection | Satoshi Hashimoto et.al. | 2512.06845 | null |
| 2025-12-07 | CADE: Continual Weakly-supervised Video Anomaly Detection with Ensembles | Satoshi Hashimoto et.al. | 2512.06840 | null |
| 2025-12-07 | Financial Fraud Identification and Interpretability Study for Listed Companies Based on Convolutional Neural Network | Xiao Li et.al. | 2512.06648 | null |
| 2025-12-06 | AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity | Shovan Roy et.al. | 2512.06396 | null |
| 2025-12-06 | The Bag-and-Whisker Plot: A New Bagplot for Bivariate Data | Shenghao Qin et.al. | 2512.06314 | null |
| 2025-12-05 | AIMNET: An IoT-Empowered Digital Twin for Continuous Gas Emission Monitoring and Early Hazard Detection | Zifan Zhou et.al. | 2512.06148 | null |
| 2025-11-25 | Autoencoder-based time series anomaly detection for ATLAS Liquid Argon calorimeter data quality monitoring | Vilius Čepaitis et.al. | 2512.05977 | null |
| 2025-12-05 | A Unified AI System For Data Quality Control and DataOps Management in Regulated Environments | Devender Saini et.al. | 2512.05559 | null |
| 2025-12-05 | SCoNE: Spherical Consistent Neighborhoods Ensemble for Effective and Efficient Multi-View Anomaly Detection | Yang Xu et.al. | 2512.05540 | null |
| 2025-12-05 | IDK-S: Incremental Distributional Kernel for Streaming Anomaly Detection | Yang Xu et.al. | 2512.05531 | null |
| 2025-12-05 | Concept-based Explainable Data Mining with VLM for 3D Detection | Mai Tsujimoto et.al. | 2512.05482 | null |
| 2025-12-04 | Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection | Mohammad Arif Rasyidi et.al. | 2512.05069 | null |
| 2025-12-04 | Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming | Fang Li et.al. | 2512.04908 | null |
| 2025-12-04 | A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments | Oghenetejiri Okporokpo et.al. | 2512.04855 | null |
| 2025-12-04 | Optimal Transport Event Representation for Anomaly Detection | Aditya Bhargava et.al. | 2512.04839 | null |
| 2025-12-04 | Federated Learning for Anomaly Detection in Maritime Movement Data | Anita Graser et.al. | 2512.04635 | null |
| 2025-12-04 | Exploiting ftrace’s function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection | Kenan Begovic et.al. | 2512.04590 | null |
| 2025-12-04 | LLM-SrcLog: Towards Proactive and Unified Log Template Extraction via Large Language Models | Jiaqi Sun et.al. | 2512.04474 | null |
| 2025-12-04 | AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning | Praveen Anugula et.al. | 2512.04368 | null |
| 2025-12-03 | Inference-time Stochastic Refinement of GRU-Normalizing Flow for Real-time Video Motion Transfer | Tasmiah Haque et.al. | 2512.04282 | null |
| 2025-12-03 | TARA Test-by-Adaptive-Ranks for Quantum Anomaly Detection with Conformal Prediction Guarantees | Davut Emre Tasar et.al. | 2512.04016 | null |
| 2025-12-03 | Quantum Topological Graph Neural Networks for Detecting Complex Fraud Patterns | Mohammad Doost et.al. | 2512.03696 | null |
| 2025-12-03 | Federated Learning and Trajectory Compression for Enhanced AIS Coverage | Thomas Gräupl et.al. | 2512.03584 | null |
| 2025-11-30 | A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification | Berkani Khaled et.al. | 2512.03462 | null |
| 2025-12-03 | MAGE-ID: A Multimodal Generative Framework for Intrusion Detection Systems | Mahdi Arab Loodaricheh et.al. | 2512.03375 | null |
| 2025-12-03 | Hierarchical Attention for Sparse Volumetric Anomaly Detection in Subclinical Keratoconus | Lynn Kandakji et.al. | 2512.03346 | null |
| 2025-12-02 | Novelty detection on path space | Ioannis Gasteratos et.al. | 2512.03243 | null |
| 2025-12-02 | Deteccion de intrusiones en redes mediante algoritmos de aprendizaje automatico: Un estudio multiclase sobre el conjunto de datos NSL-KDD | Luis Miguel Osco Vasquez et.al. | 2512.03200 | null |
| 2025-12-02 | Neighborhood density estimation using space-partitioning based hashing schemes | Aashi Jindal et.al. | 2512.03187 | null |
| 2025-12-02 | AGENTSAFE: A Unified Framework for Ethical Assurance and Governance in Agentic AI | Rafflesia Khan et.al. | 2512.03180 | null |
| 2025-12-02 | Temporal Graph Neural Networks for Early Anomaly Detection and Performance Prediction via PV System Monitoring Data | Srijani Mukherjee et.al. | 2512.03114 | null |
| 2025-12-01 | ALARM: Automated MLLM-Based Anomaly Detection in Complex-EnviRonment Monitoring with Uncertainty Quantification | Congjing Zhang et.al. | 2512.03101 | null |
| 2025-12-02 | AuditCopilot: Leveraging LLMs for Fraud Detection in Double-Entry Bookkeeping | Md Abdul Kadir et.al. | 2512.02726 | null |
| 2025-12-02 | FGC-Comp: Adaptive Neighbor-Grouped Attribute Completion for Graph-based Anomaly Detection | Junpeng Wu et.al. | 2512.02705 | null |
| 2025-12-02 | ClimaOoD: Improving Anomaly Segmentation via Physically Realistic Synthetic Data | Yuxing Liu et.al. | 2512.02686 | null |
| 2025-12-02 | On the Problem of Consistent Anomalies in Zero-Shot Anomaly Detection | Tai Le-Gia et.al. | 2512.02520 | null |
| 2025-12-02 | Breast Cell Segmentation Under Extreme Data Constraints: Quantum Enhancement Meets Adaptive Loss Stabilization | Varun Kumar Dasoju et.al. | 2512.02302 | null |
| 2025-12-01 | Intrusion Detection on Resource-Constrained IoT Devices with Hardware-Aware ML and DL | Ali Diab et.al. | 2512.02272 | null |
| 2025-12-01 | AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data | Benjamin Blakely et.al. | 2512.01727 | null |
| 2025-12-01 | ICAD-LLM: One-for-All Anomaly Detection via In-Context Learning with Large Language Models | Zhongyuan Wu et.al. | 2512.01672 | null |
| 2025-12-01 | Deep Unsupervised Anomaly Detection in Brain Imaging: Large-Scale Benchmarking and Bias Analysis | Alexander Frotscher et.al. | 2512.01534 | null |
| 2025-12-01 | Winning Solutions for the Rayan AI Contest: Compositional Retrieval, Zero-Shot Anomaly Detection, and Backdoor Detection | Ali Nafisi et.al. | 2512.01498 | null |
| 2025-12-01 | Modeling Wavelet Transformed Quantum Support Vector for Network Intrusion Detection | Swati Kumari et.al. | 2512.01365 | null |
| 2025-12-01 | The Dynamical Model Representation of Convolution-Generated Spatio-Temporal Gaussian Processes and Its Applications | Yutong Zhang et.al. | 2512.01279 | null |
| 2025-11-30 | Opportunities and Challenges for Data Quality in the Era of Quantum Computing | Sven Groppe et.al. | 2512.00870 | null |
| 2025-11-30 | FC-ADL: Efficient Microservice Anomaly Detection and Localisation Through Functional Connectivity | Giles Winchester et.al. | 2512.00844 | null |
| 2025-11-29 | Pushing the Boundaries of Interpretability: Incremental Enhancements to the Explainable Boosting Machine | Isara Liyanage et.al. | 2512.00528 | null |
| 2025-11-29 | Introducing AI-Driven IoT Energy Management Framework | Shivani Mruthyunjaya et.al. | 2512.00321 | null |
| 2025-11-29 | ART-ASyn: Anatomy-aware Realistic Texture-based Anomaly Synthesis Framework for Chest X-Rays | Qinyi Cao et.al. | 2512.00310 | null |
| 2025-11-28 | SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks | Henry Onyeka et.al. | 2512.00251 | null |
| 2025-11-28 | TIE: A Training-Inversion-Exclusion Framework for Visually Interpretable and Uncertainty-Guided Out-of-Distribution Detection | Pirzada Suhail et.al. | 2512.00229 | null |
| 2025-11-28 | A Trainable Centrality Framework for Modern Data | Minh Duc Vu et.al. | 2511.22959 | null |
| 2025-11-27 | An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks | Kanchon Gharami et.al. | 2511.22791 | null |
| 2025-11-27 | AnoRefiner: Anomaly-Aware Group-Wise Refinement for Zero-Shot Industrial Anomaly Detection | Dayou Huang et.al. | 2511.22595 | null |
| 2025-11-27 | ABounD: Adversarial Boundary-Driven Few-Shot Learning for Multi-Class Anomaly Detection | Runzhi Deng et.al. | 2511.22436 | null |
| 2025-11-27 | ARES: Anomaly Recognition Model For Edge Streams | Simone Mungari et.al. | 2511.22078 | null |
| 2025-11-27 | A Catalogue of Mid-infrared Variable Sources from unTimely | Zihan kang et.al. | 2511.22071 | null |
| 2025-11-26 | Modeling Quantum Autoencoder Trainable Kernel for IoT Anomaly Detection | Swathi Chandrasekhar et.al. | 2511.21932 | null |
| 2025-11-26 | New Physics Searches at the LHC through Event-based Anomaly Detection and Development of ADFilter Web-tool | Wasikul Islam et.al. | 2511.21869 | null |
| 2025-11-26 | Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison | Md. Sad Abdullah Sami et.al. | 2511.21842 | null |
| 2025-11-26 | Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach | Aamiruddin Syed et.al. | 2511.21795 | null |
| 2025-11-26 | TAGFN: A Text-Attributed Graph Dataset for Fake News Detection in the Age of LLMs | Kay Liu et.al. | 2511.21624 | null |
| 2025-11-26 | Anomaly Detection with Adaptive and Aggressive Rejection for Contaminated Training Data | Jungi Lee et.al. | 2511.21378 | null |
| 2025-11-26 | Evaluation of Large Language Models for Numeric Anomaly Detection in Power Systems | Yichen Liu et.al. | 2511.21371 | null |
| 2025-11-26 | Hybrid SIFT-SNN for Efficient Anomaly Detection of Traffic Flow-Control Infrastructure | Munish Rathee et.al. | 2511.21337 | null |
| 2025-11-26 | I-GLIDE: Input Groups for Latent Health Indicators in Degradation Estimation | Lucas Thil et.al. | 2511.21208 | null |
| 2025-11-25 | Securing the Model Context Protocol (MCP): Risks, Controls, and Governance | Herman Errico et.al. | 2511.20920 | null |
| 2025-11-25 | Ranking-Enhanced Anomaly Detection Using Active Learning-Assisted Attention Adversarial Dual AutoEncoders | Sidahmed Benabderrahmane et.al. | 2511.20480 | null |
| 2025-11-25 | DRL-Guided Neural Batch Sampling for Semi-Supervised Pixel-Level Anomaly Detection | Amirhossein Khadivi Noghredeh et.al. | 2511.20270 | null |
| 2025-11-25 | ADNet: A Large-Scale and Extensible Multi-Domain Benchmark for Anomaly Detection Across 380 Real-World Categories | Hai Ling et.al. | 2511.20169 | null |
| 2025-11-25 | An experimental study of existing tools for outlier detection and cleaning in trajectories | Mariana M Garcez Duarte et.al. | 2511.20139 | null |
| 2025-11-25 | Explainable Visual Anomaly Detection via Concept Bottleneck Models | Arianna Stropeni et.al. | 2511.20088 | null |
| 2025-11-24 | IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response | Damodar Panigrahi et.al. | 2511.19644 | null |
| 2025-11-23 | The Generalized Proximity Forest | Ben Shaw et.al. | 2511.19487 | null |
| 2025-11-22 | Pistachio: Towards Synthetic, Balanced, and Long-Form Video Anomaly Benchmarks | Jie Li et.al. | 2511.19474 | null |
| 2025-11-24 | Neural Architecture Search for Quantum Autoencoders | Hibah Agha et.al. | 2511.19246 | null |
| 2025-11-24 | Unsupervised Multi-View Visual Anomaly Detection via Progressive Homography-Guided Alignment | Xintao Chen et.al. | 2511.18766 | null |
| 2025-11-24 | Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations | Akila Herath et.al. | 2511.18748 | null |
| 2025-11-24 | A Problem-Oriented Taxonomy of Evaluation Metrics for Time Series Anomaly Detection | Kaixiang Yang et.al. | 2511.18739 | null |
| 2025-11-24 | Multimodal Real-Time Anomaly Detection and Industrial Applications | Aman Verma et.al. | 2511.18698 | null |
| 2025-11-23 | Functional Localization Enforced Deep Anomaly Detection Using Fundus Images | Jan Benedikt Ruhland et.al. | 2511.18627 | null |
| 2025-11-23 | Algorithmic detection of false data injection attacks in cyber-physical systems | Souvik Das et.al. | 2511.18588 | null |
| 2025-11-23 | Carbon-Aware Intrusion Detection: A Comparative Study of Supervised and Unsupervised DRL for Sustainable IoT Edge Gateways | Saeid Jamshidi et.al. | 2511.18240 | null |
| 2025-11-23 | Lightweight Autoencoder-Isolation Forest Anomaly Detection for Green IoT Edge Gateways | Saeid Jamshidi et.al. | 2511.18235 | null |
| 2025-11-23 | Think Fast: Real-Time IoT Intrusion Reasoning Using IDS and LLMs at the Edge Gateway | Saeid Jamshidi et.al. | 2511.18230 | null |
| 2025-11-22 | A Novel and Practical Universal Adversarial Perturbations against Deep Reinforcement Learning based Intrusion Detection Systems | H. Zhang et.al. | 2511.18223 | null |
| 2025-11-22 | MEDIC: a network for monitoring data quality in collider experiments | Juvenal Bassa et.al. | 2511.18172 | null |
| 2025-11-22 | PromptMoE: Generalizable Zero-Shot Anomaly Detection via Visually-Guided Prompt Mixtures | Yuheng Shao et.al. | 2511.18116 | null |
| 2025-11-22 | Federated Anomaly Detection and Mitigation for EV Charging Forecasting Under Cyberattacks | Oluleke Babayomi et.al. | 2511.17978 | null |
| 2025-11-21 | StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS | Manuel Kern et.al. | 2511.17761 | null |
| 2025-11-21 | DelTriC: A Novel Clustering Method with Accurate Outlier | Tomas Javurek et.al. | 2511.17219 | null |
| 2025-11-21 | Modeling Anomaly Detection in Cloud Services: Analysis of the Properties that Impact Latency and Resource Consumption | Gabriel Job Antunes Grabher et.al. | 2511.17119 | null |
| 2025-11-21 | AutoGraphAD: A novel approach using Variational Graph Autoencoders for anomalous network flow detection | Georgios Anyfantis et.al. | 2511.17113 | null |
| 2025-11-21 | Sparse Reasoning is Enough: Biological-Inspired Framework for Video Anomaly Detection with Large Pre-trained Models | He Huang et.al. | 2511.17094 | null |
| 2025-11-21 | CroTad: A Contrastive Reinforcement Learning Framework for Online Trajectory Anomaly Detection | Rui Xue et.al. | 2511.16929 | null |
| 2025-11-20 | A streaming algorithm and hardware accelerator for top-K flow detection in network traffic | Carolina Gallardo-Pavesi et.al. | 2511.16797 | null |
| 2025-11-20 | PersonaDrift: A Benchmark for Temporal Anomaly Detection in Language-Based Dementia Monitoring | Joy Lai et.al. | 2511.16445 | null |
| 2025-11-04 | M2S2L: Mamba-based Multi-Scale Spatial-temporal Learning for Video Anomaly Detection | Yang Liu et.al. | 2511.05564 | null |
| 2025-11-06 | Knowledge-based anomaly detection for identifying network-induced shape artifacts | Rucha Deshpande et.al. | 2511.04729 | null |
| 2025-11-06 | ARETE: an R package for Automated REtrieval from TExt with large language models | Vasco V. Branco et.al. | 2511.04573 | null |
| 2025-11-06 | Large Language Models for Cyber Security | Raunak Somani et.al. | 2511.04508 | null |
| 2025-11-06 | Fraud-Proof Revenue Division on Subscription Platforms | Abheek Ghosh et.al. | 2511.04465 | null |
| 2025-11-06 | PUL-SLAM: Path-Uncertainty Co-Optimization with Lightweight Stagnation Detection for Efficient Robotic Exploration | Yizhen Yin et.al. | 2511.04180 | null |
| 2025-11-06 | Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems | Paul Badu Yakubu et.al. | 2511.04114 | null |
| 2025-11-06 | DeNoise: Learning Robust Graph Representations for Unsupervised Graph-Level Anomaly Detection | Qingfeng Chen et.al. | 2511.04086 | null |
| 2025-11-06 | Detecting Silent Failures in Multi-Agentic AI Trajectories | Divya Pathak et.al. | 2511.04032 | null |
| 2025-11-06 | Multiscale Astrocyte Network Calcium Dynamics for Biologically Plausible Intelligence in Anomaly Detection | Berk Iskar et.al. | 2511.03993 | null |
| 2025-11-06 | Design and Detection of Covert Man-in-the-Middle Cyberattacks on Water Treatment Plants | Victor Mattos et.al. | 2511.03971 | null |
| 2025-11-05 | I Detect What I Don’t Know: Incremental Anomaly Learning with Stochastic Weight Averaging-Gaussian for Oracle-Free Medical Imaging | Nand Kumar Yadav et.al. | 2511.03912 | null |
| 2025-11-05 | Temporal Analysis Framework for Intrusion Detection Systems: A Novel Taxonomy for Time-Aware Cybersecurity | Tatiana S. Parlanti et.al. | 2511.03799 | null |
| 2025-11-05 | Magnetism and Peierls distortion in Dirac semimetal CaMnBi $_2$ | Aashish Sapkota et.al. | 2511.03721 | null |
| 2025-11-05 | SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection | Mahek Desai et.al. | 2511.03661 | null |
| 2025-11-05 | Model order reduction via Lie groups | Yannik P. Wotte et.al. | 2511.03520 | null |
| 2025-11-05 | Analytical Queries for Unstructured Data | Daniel Kang et.al. | 2511.03489 | null |
| 2025-11-05 | Graph Neural AI with Temporal Dynamics for Comprehensive Anomaly Detection in Microservices | Qingyuan Zhang et.al. | 2511.03285 | null |
| 2025-11-05 | IEC3D-AD: A 3D Dataset of Industrial Equipment Components for Unsupervised Point Cloud Anomaly Detection | Bingyang Guo et.al. | 2511.03267 | null |
| 2025-11-05 | RKUM: An R Package for Robust Kernel Unsupervised Methods | Md Ashad Alam et.al. | 2511.03216 | null |
| 2025-11-05 | Who Sees the Risk? Stakeholder Conflicts and Explanatory Policies in LLM-based Risk Assessment | Srishti Yadav et.al. | 2511.03152 | null |
| 2025-11-05 | Sparse, self-organizing ensembles of local kernels detect rare statistical anomalies | Gaia Grosso et.al. | 2511.03095 | null |
| 2025-11-04 | A Collaborative Reasoning Framework for Anomaly Diagnostics in Underwater Robotics | Markus Buchholz et.al. | 2511.03075 | null |
| 2025-11-04 | Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models | W. K. M Mithsara et.al. | 2511.02894 | null |
| 2025-11-04 | AI-Generated Image Detection: An Empirical Study and Future Research Directions | Nusrat Tasnim et.al. | 2511.02791 | null |
| 2025-11-04 | Unsupervised Learning for Industrial Defect Detection: A Case Study on Shearographic Data | Jessica Plassmann et.al. | 2511.02541 | null |
| 2025-11-04 | Anomaly Detection-Based UE-Centric Inter-Cell Interference Suppression | Kwonyeol Park et.al. | 2511.02320 | null |
| 2025-11-04 | Federated Quantum Kernel Learning for Anomaly Detection in Multivariate IoT Time-Series | Kuan-Cheng Chen et.al. | 2511.02301 | null |
| 2025-11-04 | DOD: Detection of outliers in high dimensional data with distance of distances | Seong-ho Lee et.al. | 2511.02199 | null |
| 2025-11-04 | DoFlow: Causal Generative Flows for Interventional and Counterfactual Time-Series Prediction | Dongze Wu et.al. | 2511.02137 | null |
| 2025-11-03 | A short blanket for cosmology: the CMB lensing anomaly behind the preference for a negative neutrino mass | Andrea Cozzumbo et.al. | 2511.01967 | null |
| 2025-10-31 | Rapid Inference of Logic Gate Neural Networks for Anomaly Detection in High Energy Physics | Lino Gerlach et.al. | 2511.01908 | null |
| 2025-11-03 | Machine and Deep Learning for Indoor UWB Jammer Localization | Hamed Fard et.al. | 2511.01819 | null |
| 2025-11-03 | An Open-Access Benchmark of Statistical and Machine-Learning Anomaly Detection Methods for Battery Applications | Mei-Chin Pang et.al. | 2511.01745 | null |
| 2025-11-03 | Detailed spectroscopic and photometric analysis of the remarkable planet-hosting wide binary system HD 202772A/B | Emiliano Jofré et.al. | 2511.01595 | null |
| 2025-11-03 | Example-Based Feature Painting on Textures | Andrei-Timotei Ardelean et.al. | 2511.01513 | null |
| 2025-11-03 | Characterizing Build Compromises Through Vulnerability Disclosure Analysis | Maimouna Tamah Diao et.al. | 2511.01395 | null |
| 2025-11-03 | An Interdisciplinary and Cross-Task Review on Missing Data Imputation | Jicong Fan et.al. | 2511.01196 | null |
| 2025-11-02 | SliceVision-F2I: A Synthetic Feature-to-Image Dataset for Visual Pattern Representation on Network Slices | Md. Abid Hasan Rafi et.al. | 2511.01087 | null |
| 2025-11-02 | Hydra: Dual Exponentiated Memory for Multivariate Time Series Analysis | Asal Meskin et.al. | 2511.00989 | null |
| 2025-11-02 | A Unified Reasoning Framework for Holistic Zero-Shot Video Anomaly Analysis | Dongheng Lin et.al. | 2511.00962 | null |
| 2025-11-02 | Towards Ultra-Low Latency: Binarized Neural Network Architectures for In-Vehicle Network Intrusion Detection | Huiyao Dong et.al. | 2511.00828 | null |
| 2025-11-01 | TRACES: Temporal Recall with Contextual Embeddings for Real-Time Video Anomaly Detection | Yousuf Ahmed Siddiqui et.al. | 2511.00580 | null |
| 2025-11-01 | Real-IAD Variety: Pushing Industrial Anomaly Detection Dataset to a Modern Era | Wenbing Zhu et.al. | 2511.00540 | null |
| 2025-11-01 | Text-guided Fine-Grained Video Anomaly Detection | Jihao Gu et.al. | 2511.00524 | null |
| 2025-11-01 | An Efficient Anomaly Detection Framework for Wireless Sensor Networks Using Markov Process | Rahul Mishra et.al. | 2511.00481 | null |
| 2025-11-01 | Deep Learning Approach to Anomaly Detection in Enterprise ETL Processes with Autoencoders | Xin Chen et.al. | 2511.00462 | null |
| 2025-11-01 | Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector | Adrita Rahman Tory et.al. | 2511.00360 | null |
| 2025-10-31 | Mist-Assisted Federated Learning for Intrusion Detection in Heterogeneous IoT Networks | Saadat Izadi et.al. | 2511.00271 | null |
| 2025-10-31 | Feature Importance Guided Random Forest Learning with Simulated Annealing Based Hyperparameter Tuning | Kowshik Balasubramanian et.al. | 2511.00133 | null |
| 2025-10-30 | A generative adversarial network optimization method for damage detection and digital twinning by deep AI fault learning: Z24 Bridge structural health monitoring benchmark validation | Marios Impraimakis et.al. | 2511.00099 | null |
| 2025-10-28 | Adoption of AI-Driven Fraud Detection System in the Nigerian Banking Sector: An Analysis of Cost, Compliance, and Competency | Stephen Alaba John et.al. | 2511.00061 | null |
| 2025-10-28 | DynBERG: Dynamic BERT-based Graph neural network for financial fraud detection | Omkar Kulkarni et.al. | 2511.00047 | null |
| 2025-10-31 | Rethinking Telemetry Design for Fine-Grained Anomaly Detection in 5G User Planes | Niloy Saha et.al. | 2510.27664 | null |
| 2025-10-31 | Information theory for hypergraph similarity | Helcio Felippe et.al. | 2510.27411 | null |
| 2025-10-31 | Binary Anomaly Detection in Streaming IoT Traffic under Concept Drift | Rodrigo Matos Carnier et.al. | 2510.27304 | null |
| 2025-10-31 | Functional Analysis of Loss-development Patterns in P&C Insurance | Arthur Charpentier et.al. | 2510.27204 | null |
| 2025-10-31 | SERVIMON: AI-Driven Predictive Maintenance and Real-Time Monitoring for Astronomical Observatories | Emilio Mastriani et.al. | 2510.27146 | null |
| 2025-10-31 | Conditional variational autoencoders for cosmological model discrimination and anomaly detection in cosmic microwave background power spectra | Tian-Yang Sun et.al. | 2510.27086 | null |
| 2025-10-30 | Robust fuzzy clustering for high-dimensional multivariate time series with outlier detection | Ziling Ma et.al. | 2510.26982 | null |
| 2025-10-30 | The Impact of Data Compression in Real-Time and Historical Data Acquisition Systems on the Accuracy of Analytical Solutions | Reham Faqehi et.al. | 2510.26868 | null |
| 2025-10-30 | Process Integrated Computer Vision for Real-Time Failure Prediction in Steel Rolling Mill | Vaibhav Kurrey et.al. | 2510.26684 | null |
| 2025-10-30 | MSAD: A Deep Dive into Model Selection for Time series Anomaly Detection | Emmanouil Sylligardos et.al. | 2510.26643 | null |
| 2025-10-30 | Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters | Mustafa Fuad Rifet Ibrahim et.al. | 2510.26501 | null |
| 2025-10-30 | Quantum Gated Recurrent GAN with Gaussian Uncertainty for Network Anomaly Detection | Wajdi Hammami et.al. | 2510.26487 | null |
| 2025-10-30 | Towards Fine-Grained Vision-Language Alignment for Few-Shot Anomaly Detection | Yuanting Fan et.al. | 2510.26464 | null |
| 2025-10-30 | A Survey of Heterogeneous Graph Neural Networks for Cybersecurity Anomaly Detection | Laura Jiang et.al. | 2510.26307 | null |
| 2025-10-30 | Segmentation over Complexity: Evaluating Ensemble and Hybrid Approaches for Anomaly Detection in Industrial Time Series | Emilio Mastriani et.al. | 2510.26159 | null |
| 2025-10-29 | CAVE: Detecting and Explaining Commonsense Anomalies in Visual Environments | Rishika Bhagwatkar et.al. | 2510.26006 | null |
| 2025-10-29 | A Critical Roadmap to Driver Authentication via CAN Bus: Dataset Review, Introduction of the Kidmose CANid Dataset (KCID), and Proof of Concept | Brooke Elizabeth Kidmose et.al. | 2510.25856 | null |
| 2025-10-29 | Flex-GAD : Flexible Graph Anomaly Detection | Apu Chakraborty et.al. | 2510.25809 | null |
| 2025-10-29 | Attention Augmented GNN RNN-Attention Models for Advanced Cybersecurity Intrusion Detection | Jayant Biradar et.al. | 2510.25802 | null |
| 2025-10-29 | Bridging the Divide: End-to-End Sequence-Graph Learning | Yuen Chen et.al. | 2510.25126 | null |
| 2025-10-28 | Semi-supervised and unsupervised learning for health indicator extraction from guided waves in aerospace composite structures | James Josep Perry et.al. | 2510.24614 | null |
| 2025-10-28 | ARIMA_PLUS: Large-scale, Accurate, Automatic and Interpretable In-Database Time Series Forecasting and Anomaly Detection in Google BigQuery | Xi Cheng et.al. | 2510.24452 | null |
| 2025-10-28 | OmniLearned: A Foundation Model Framework for All Tasks Involving Jet Physics | Wahid Bhimji et.al. | 2510.24066 | null |
| 2025-10-28 | Localized Kernel Projection Outlyingness: A Two-Stage Approach for Multi-Modal Outlier Detection | Akira Tamamori et.al. | 2510.24043 | null |
| 2025-10-28 | LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models | Peng Cai et.al. | 2510.24031 | null |
| 2025-10-27 | In Search of the Unknown Unknowns: A Multi-Metric Distance Ensemble for Out of Distribution Anomaly Detection in Astronomical Surveys | Siddharth Chaini et.al. | 2510.23702 | null |
| 2025-10-27 | GRAD: Real-Time Gated Recurrent Anomaly Detection in Autonomous Vehicle Sensors Using Reinforced EMA and Multi-Stage Sliding Window Techniques | Mohammad Hossein Jafari Naeimi et.al. | 2510.23327 | null |
| 2025-10-27 | Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks | Yaokai Feng et.al. | 2510.23313 | null |
| 2025-10-27 | Approaching Domain Generalization with Embeddings for Robust Discrimination and Recognition of RF Communication Signals | Lukas Henneke et.al. | 2510.23186 | null |
| 2025-10-27 | A method for outlier detection based on cluster analysis and visual expert criteria | Juan A. Lara et.al. | 2510.23136 | null |
| 2025-10-27 | Reliable Robotic Task Execution in the Face of Anomalies | Bharath Santhanam et.al. | 2510.23121 | null |
| 2025-10-27 | Sentinel: Dynamic Knowledge Distillation for Personalized Federated Intrusion Detection in Heterogeneous IoT Networks | Gurpreet Singh et.al. | 2510.23019 | null |
| 2025-10-27 | CodeAD: Synthesize Code of Rules for Log-based Anomaly Detection with LLMs | Junjie Huang et.al. | 2510.22986 | null |
| 2025-10-27 | Diffuse to Detect: A Generalizable Framework for Anomaly Detection with Diffusion Models Applications to UAVs and Beyond | Mingze Gong et.al. | 2510.22928 | null |
| 2025-10-26 | A Theory of the Mechanics of Information: Generalization Through Measurement of Uncertainty (Learning is Measuring) | Christopher J. Hazard et.al. | 2510.22809 | null |
| 2025-10-26 | VADTree: Explainable Training-Free Video Anomaly Detection via Hierarchical Granularity-Aware Tree | Wenlong Li et.al. | 2510.22693 | null |
| 2025-10-26 | CLEANet: Robust and Efficient Anomaly Detection in Contaminated Multivariate Time Series | Songhan Zhang et.al. | 2510.22619 | null |
| 2025-10-26 | Doubly Smoothed Density Estimation with Application on Miners’ Unsafe Act Detection | Qianhan Zeng et.al. | 2510.22482 | null |
| 2025-10-25 | Optimal Spatial Anomaly Detection | Baiyu Wang et.al. | 2510.22330 | null |
| 2025-10-25 | Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study | Devon A. Kelly et.al. | 2510.22283 | null |
| 2025-10-24 | Human-Centric Anomaly Detection in Surveillance Videos Using YOLO-World and Spatio-Temporal Deep Learning | Mohammad Ali Etemadi Naeen et.al. | 2510.22056 | null |
| 2025-10-24 | Input Adaptive Bayesian Model Averaging | Yuli Slavutsky et.al. | 2510.22054 | null |
| 2025-10-24 | AutoSciDACT: Automated Scientific Discovery through Contrastive Embedding and Hypothesis Testing | Samuel Bright-Thonney et.al. | 2510.21935 | null |
| 2025-10-22 | Training data membership inference via Gaussian process meta-modeling: a post-hoc analysis approach | Yongchao Huang et.al. | 2510.21846 | null |
| 2025-10-22 | Quantum Autoencoders for Anomaly Detection in Cybersecurity | Rohan Senthil et.al. | 2510.21837 | null |
| 2025-10-24 | Automated Quality Control for Language Documentation: Detecting Phonotactic Inconsistencies in a Kokborok Wordlist | Kellen Parker van Dam et.al. | 2510.21584 | null |
| 2025-10-24 | FrameShield: Adversarially Robust Video Anomaly Detection | Mojtaba Nafez et.al. | 2510.21532 | null |
| 2025-10-24 | Actionable Cybersecurity Notifications for Smart Homes: A User Study on the Role of Length and Complexity | Victor Jüttner et.al. | 2510.21508 | null |
| 2025-10-24 | MoniTor: Exploiting Large Language Models with Instruction for Online Video Anomaly Detection | Shengtian Yang et.al. | 2510.21449 | null |
| 2025-10-24 | REMONI: An Autonomous System Integrating Wearables and Multimodal Large Language Models for Enhanced Remote Health Monitoring | Thanh Cong Ho et.al. | 2510.21445 | null |
| 2025-10-24 | An Evidence-Based Post-Hoc Adjustment Framework for Anomaly Detection Under Data Contamination | Sukanya Patra et.al. | 2510.21296 | null |
| 2025-10-24 | TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection | Qihang Zhou et.al. | 2510.21171 | null |
| 2025-10-23 | Security Logs to ATT&CK Insights: Leveraging LLMs for High-Level Threat Understanding and Cognitive Trait Inference | Soham Hans et.al. | 2510.20930 | null |
| 2025-10-23 | Unsupervised Anomaly Prediction with N-BEATS and Graph Neural Network in Multi-variate Semiconductor Process Time Series | Daniel Sorensen et.al. | 2510.20718 | null |
| 2025-10-23 | Capability of using the normalizing flows for extraction rare gamma events in the TAIGA experiment | A. P. Kryukov et.al. | 2510.20334 | null |
| 2025-10-23 | GMFVAD: Using Grained Multi-modal Feature to Improve Video Anomaly Detection | Guangyu Dai et.al. | 2510.20268 | null |
| 2025-10-23 | Unifying Boxplots: A Multiple Testing Perspective | Bowen Gang et.al. | 2510.20259 | null |
| 2025-10-23 | Physics-Guided Fusion for Robust 3D Tracking of Fast Moving Small Objects | Prithvi Raj Singh et.al. | 2510.20126 | null |
| 2025-10-23 | Human-Centered LLM-Agent System for Detecting Anomalous Digital Asset Transactions | Gyuyeon Na et.al. | 2510.20102 | null |
| 2025-10-22 | The Temporal Graph of Bitcoin Transactions | Vahid Jalili et.al. | 2510.20028 | link |
| 2025-10-22 | Machine Learning-Based Localization Accuracy of RFID Sensor Networks via RSSI Decision Trees and CAD Modeling for Defense Applications | Curtis Lee Shull et.al. | 2510.20019 | null |
| 2025-10-21 | Cyberattack Detection in Critical Infrastructure and Supply Chains | Smita Khapre et.al. | 2510.19859 | null |
| 2025-10-22 | Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems | Mohamed ElShehaby et.al. | 2510.19761 | null |
| 2025-10-22 | Network-Centric Anomaly Filtering and Spoofer localization for 5G-NR Localization in LAWNs | Zexin Fang et.al. | 2510.19521 | null |
| 2025-10-22 | AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on Edge Devices | Zhonghao Zhan et.al. | 2510.19462 | null |
| 2025-10-22 | Neuromorphic computing for anomaly detection in a laser powder bed fusion process | Shreyan Banerjee et.al. | 2510.19309 | null |
| 2025-10-22 | Reliability and Resilience of AI-Driven Critical Network Infrastructure under Cyber-Physical Threats | Konstantinos A. Lizos et.al. | 2510.19295 | null |
| 2025-10-22 | Brain-Inspired Perspective on Configurations: Unsupervised Similarity and Early Cognition | Juntang Wang et.al. | 2510.19229 | null |
| 2025-10-21 | Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method | Behnam Seyedi et.al. | 2510.19121 | null |
| 2025-10-21 | Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things | Behnam Rezaei Bezanjani et.al. | 2510.19026 | null |
| 2025-10-21 | An Encode-then-Decompose Approach to Unsupervised Time Series Anomaly Detection on Contaminated Training Data–Extended Version | Buang Zhang et.al. | 2510.18998 | null |
| 2025-10-21 | Dimensionality Reduction for Remote Sensing Data Analysis: A Systematic Review of Methods and Applications | Nathan Mankovich et.al. | 2510.18935 | null |
| 2025-10-21 | Rebellious Student: A Complementary Learning Framework for Background Feature Enhancement in Hyperspectral Anomaly Detection | Wenping Jin et.al. | 2510.18781 | null |
| 2025-10-21 | Privacy-Preserving Healthcare Data in IoT: A Synergistic Approach with Deep Learning and Blockchain | Behnam Rezaei Bezanjani et.al. | 2510.18568 | null |
| 2025-10-21 | Microsecond Federated SVD on Grassmann Manifold for Real-time IoT Intrusion Detection | Tung-Anh Nguyen et.al. | 2510.18501 | null |
| 2025-10-14 | BeSTAD: Behavior-Aware Spatio-Temporal Anomaly Detection for Human Mobility Data | Junyi Xie et.al. | 2510.12076 | null |
| 2025-10-06 | Interpreting anomaly detection of SDSS spectra | Edgar Ortiz Manrique et.al. | 2510.05235 | null |
| 2025-10-02 | Unlocking Vision-Language Models for Video Anomaly Detection via Fine-Grained Prompting | Shu Zou et.al. | 2510.02155 | null |
| 2025-09-28 | FraudTransformer: Time-Aware GPT for Transaction Fraud Detection | Gholamali Aminian et.al. | 2509.23712 | null |
| 2025-09-16 | LIGHT-HIDS: A Lightweight and Effective Machine Learning-Based Framework for Robust Host Intrusion Detection | Onat Gungor et.al. | 2509.13464 | null |
| 2025-09-01 | An Efficient Intrusion Detection System for Safeguarding Radiation Detection Systems | Nathanael Coolidge et.al. | 2509.01599 | null |
| 2025-08-26 | CITADEL: Continual Anomaly Detection for Enhanced Learning in IoT Intrusion Detection | Elvin Li et.al. | 2508.19450 | null |
| 2025-07-23 | Unsupervised anomaly detection using Bayesian flow networks: application to brain FDG PET in the context of Alzheimer’s disease | Hugues Roy et.al. | 2507.17486 | null |
| 2025-07-23 | HiProbe-VAD: Video Anomaly Detection via Hidden States Probing in Tuning-Free Multimodal LLMs | Zhaolin Cai et.al. | 2507.17394 | null |
| 2025-07-23 | Tabular Diffusion based Actionable Counterfactual Explanations for Network Intrusion Detection | Vinura Galwaduge et.al. | 2507.17161 | null |
| 2025-07-23 | Auto-scaling Approaches for Cloud-native Applications: A Survey and Taxonomy | Minxian Xu et.al. | 2507.17128 | null |
| 2025-07-22 | Evaluating Ensemble and Deep Learning Models for Static Malware Detection with Dimensionality Reduction Using the EMBER Dataset | Md Min-Ha-Zul Abedin et.al. | 2507.16952 | null |
| 2025-07-22 | Toward Long-Tailed Online Anomaly Detection through Class-Agnostic Concepts | Chiao-An Yang et.al. | 2507.16946 | null |
| 2025-07-22 | Improving Predictions on Highly Unbalanced Data Using Open Source Synthetic Data Upsampling | Ivona Krchova et.al. | 2507.16419 | null |
| 2025-07-22 | eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models | Paul R. B. Houssel et.al. | 2507.16241 | null |
| 2025-07-22 | DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT | Baofu Han et.al. | 2507.16134 | null |
| 2025-07-21 | Stop-band Energy Constraint for Orthogonal Tunable Wavelet Units in Convolutional Neural Networks for Computer Vision problems | An D. Le et.al. | 2507.16114 | null |
| 2025-07-21 | RightTyper: Effective and Efficient Type Annotation for Python | Juan Altmayer Pizzorno et.al. | 2507.16051 | null |
| 2025-07-21 | Foundation Models and Transformers for Anomaly Detection: A Survey | Mouïn Ben Ammar et.al. | 2507.15905 | null |
| 2025-07-21 | Explainable Anomaly Detection for Electric Vehicles Charging Stations | Matteo Cederle et.al. | 2507.15718 | null |
| 2025-07-21 | Towards Explainable Anomaly Detection in Shared Mobility Systems | Elnur Isgandarov et.al. | 2507.15643 | null |
| 2025-07-21 | Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems | Andrii Balashov et.al. | 2507.15613 | null |
| 2025-07-21 | We Need to Rethink Benchmarking in Anomaly Detection | Philipp Röchner et.al. | 2507.15584 | null |
| 2025-07-21 | An aerial color image anomaly dataset for search missions in complex forested terrain | Rakesh John Amala Arokia Nathan et.al. | 2507.15492 | null |
| 2025-07-21 | ExDD: Explicit Dual Distribution Learning for Surface Defect Detection via Diffusion Synthesis | Muhammad Aqeel et.al. | 2507.15335 | null |
| 2025-07-20 | Time-RA: Towards Time Series Reasoning for Anomaly with LLM Feedback | Yiyuan Yang et.al. | 2507.15066 | null |
| 2025-07-20 | Deep Generative Models in Condition and Structural Health Monitoring: Opportunities, Limitations and Future Outlook | Xin Yang et.al. | 2507.15026 | null |
| 2025-07-20 | A Comparative Analysis of Statistical and Machine Learning Models for Outlier Detection in Bitcoin Limit Order Books | Ivan Letteri et.al. | 2507.14960 | null |
| 2025-07-20 | Mayura: Exploiting Similarities in Motifs for Temporal Co-Mining | Sanjay Sri Vallabh Singapuram et.al. | 2507.14813 | null |
| 2025-07-18 | Unmasking Performance Gaps: A Comparative Study of Human Anonymization and Its Effects on Video Anomaly Detection | Sara Abdulaziz et.al. | 2507.14083 | null |
| 2025-07-18 | Robust Anomaly Detection with Graph Neural Networks using Controllability | Yifan Wei et.al. | 2507.13954 | null |
| 2025-07-18 | Conformal Data Contamination Tests for Trading or Sharing of Data | Martin V. Vejling et.al. | 2507.13835 | null |
| 2025-07-18 | Efficient and Scalable Self-Healing Databases Using Meta-Learning and Dependency-Driven Recovery | Joydeep Chandra et.al. | 2507.13757 | null |
| 2025-07-18 | Kolmogorov-Arnold Networks-based GRU and LSTM for Loan Default Early Prediction | Yue Yang et.al. | 2507.13685 | null |
| 2025-07-17 | Theory-informed neural networks for particle physics | Barry M. Dillon et.al. | 2507.13447 | null |
| 2025-07-17 | A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models | Chao Feng et.al. | 2507.13313 | null |
| 2025-07-17 | 3DKeyAD: High-Resolution 3D Point Cloud Anomaly Detection via Keypoint-Guided Point Clustering | Zi Wang et.al. | 2507.13110 | null |
| 2025-07-17 | Fault detection and diagnosis for the engine electrical system of a space launcher based on a temporal convolutional autoencoder and calibrated classifiers | Luis Basora et.al. | 2507.13022 | null |
| 2025-07-17 | A Semi-Supervised Learning Method for the Identification of Bad Exposures in Large Imaging Surveys | Yufeng Luo et.al. | 2507.12784 | null |
| 2025-07-16 | Text-ADBench: Text Anomaly Detection Benchmark based on LLMs Embedding | Feng Xiao et.al. | 2507.12295 | null |
| 2025-07-16 | A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy | Xiang Li et.al. | 2507.12098 | null |
| 2025-07-16 | MoViAD: Modular Visual Anomaly Detection | Manuel Barusco et.al. | 2507.12049 | null |
| 2025-07-16 | Can LLMs Find Fraudsters? Multi-level LLM Enhanced Graph Fraud Detection | Tairan Huang et.al. | 2507.11997 | null |
| 2025-07-16 | d-DQIVAR: Data-centric Visual Analytics and Reasoning for Data Quality Improvement | Hyein Hong et.al. | 2507.11960 | null |
| 2025-07-15 | How To Mitigate And Defend Against DDoS Attacks In IoT Devices | Ifiyemi Leigha et.al. | 2507.11772 | null |
| 2025-07-15 | Learning Representations of Event Time Series with Sparse Autoencoders for Anomaly Detection, Similarity Search, and Unsupervised Classification | Steven Dillmann et.al. | 2507.11620 | null |
| 2025-07-15 | FlexCAST: Enabling Flexible Scientific Data Analyses | Benjamin Nachman et.al. | 2507.11528 | null |
| 2025-07-15 | A Mathematical Optimization Approach to Multisphere Support Vector Data Description | Víctor Blanco et.al. | 2507.11106 | null |
| 2025-07-15 | LogTinyLLM: Tiny Large Language Models Based Contextual Log Anomaly Detection | Isaiah Thompson Ocansey et.al. | 2507.11071 | null |
| 2025-07-15 | Bridge Feature Matching and Cross-Modal Alignment with Mutual-filtering for Zero-shot Anomaly Detection | Yuhu Bai et.al. | 2507.11003 | null |
| 2025-07-15 | Class-Proportional Coreset Selection for Difficulty-Separable Data | Elisa Tsai et.al. | 2507.10904 | null |
| 2025-07-15 | From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection | Danyu Sun et.al. | 2507.10873 | null |
| 2025-07-14 | REAL-IoT: Characterizing GNN Intrusion Detection Robustness under Practical Adversarial Attack | Zhonghao Zhan et.al. | 2507.10836 | null |
| 2025-07-14 | Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data | Mohammad Alikhani et.al. | 2507.10808 | null |
| 2025-07-14 | Real-time, Adaptive Radiological Anomaly Detection and Isotope Identification Using Non-negative Matrix Factorization | Chandler Jones et.al. | 2507.10715 | null |
| 2025-07-14 | BenchReAD: A systematic benchmark for retinal anomaly detection | Chenyu Lian et.al. | 2507.10492 | null |
| 2025-07-13 | Causality-informed Anomaly Detection in Partially Observable Sensor Networks: Moving beyond Correlations | Xiaofeng Xiao et.al. | 2507.09742 | null |
| 2025-07-12 | Adversarial Activation Patching: A Framework for Detecting and Mitigating Emergent Deception in Safety-Aligned Transformers | Santhosh Kumar Ravindran et.al. | 2507.09406 | null |
| 2025-07-12 | Credit Card Fraud Detection Using RoFormer Model With Relative Distance Rotating Encoding | Kevin Reyes et.al. | 2507.09385 | null |
| 2025-07-12 | Robust Spatiotemporal Epidemic Modeling with Integrated Adaptive Outlier Detection | Haoming Shi et.al. | 2507.09380 | null |
| 2025-07-12 | Simplifying Traffic Anomaly Detection with Video Foundation Models | Svetlana Orlova et.al. | 2507.09338 | null |
| 2025-07-12 | Stereo-based 3D Anomaly Object Detection for Autonomous Driving: A New Dataset and Baseline | Shiyi Mu et.al. | 2507.09214 | null |
| 2025-07-12 | Proactive AI-and-RAN Workload Orchestration in O-RAN Architectures for 6G Networks | Syed Danial Ali Shah et.al. | 2507.09124 | null |
| 2025-07-11 | RoundaboutHD: High-Resolution Real-World Urban Environment Benchmark for Multi-Camera Vehicle Tracking | Yuqiang Lin et.al. | 2507.08729 | null |
| 2025-07-11 | InferLog: Accelerating LLM Inference for Online Log Parsing via ICL-oriented Prefix Caching | Yilun Wang et.al. | 2507.08523 | null |
| 2025-07-11 | Data Depth as a Risk | Arturo Castellanos et.al. | 2507.08518 | null |
| 2025-07-10 | Rethinking Spatio-Temporal Anomaly Detection: A Vision for Causality-Driven Cybersecurity | Arun Vignesh Malarkkan et.al. | 2507.08177 | null |
| 2025-07-10 | HybridQC: Machine Learning-Augmented Quality Control for Single-Cell RNA-seq Data | Kaitao Lai et.al. | 2507.08058 | null |
| 2025-07-10 | SAGE: A Visual Language Model for Anomaly Detection via Fact Enhancement and Entropy-aware Alignment | Guoxin Zang et.al. | 2507.07939 | null |
| 2025-07-11 | LISTEN: Lightweight Industrial Sound-representable Transformer for Edge Notification | Changheon Han et.al. | 2507.07879 | null |
| 2025-07-10 | 3D-ADAM: A Dataset for 3D Anomaly Detection in Advanced Manufacturing | Paul McHard et.al. | 2507.07838 | null |
| 2025-07-10 | Adaptive Gaussian Mixture Models-based Anomaly Detection for under-constrained Cable-Driven Parallel Robots | Julio Garrido et.al. | 2507.07714 | null |
| 2025-07-10 | NexViTAD: Few-shot Unsupervised Cross-Domain Defect Detection via Vision Foundation Models and Multi-Task Learning | Tianwei Mu et.al. | 2507.07579 | null |
| 2025-07-10 | Real-Time Decorrelation-Based Anomaly Detection for Multivariate Time Series | Amirhossein Sadough et.al. | 2507.07559 | null |
| 2025-07-10 | Towards High-Resolution 3D Anomaly Detection: A Scalable Dataset and Real-Time Framework for Subtle Industrial Defects | Yuqi Cheng et.al. | 2507.07435 | null |
| 2025-07-10 | Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks | Mohammad F. Al-Hammouri et.al. | 2507.07413 | null |
| 2025-07-09 | MADPOT: Medical Anomaly Detection with CLIP Adaptation and Partial Optimal Transport | Mahshid Shiri et.al. | 2507.06733 | null |
| 2025-07-09 | UniOD: A Universal Model for Outlier Detection across Diverse Domains | Dazhi Fu et.al. | 2507.06624 | null |
| 2025-07-09 | IMPACT: Industrial Machine Perception via Acoustic Cognitive Transformer | Changheon Han et.al. | 2507.06481 | null |
| 2025-07-09 | Mitigating Message Imbalance in Fraud Detection with Dual-View Graph Representation Learning | Yudan Song et.al. | 2507.06469 | null |
| 2025-07-08 | seMCD: Sequentially implemented Monte Carlo depth computation with statistical guarantees | Felix Gnettner et.al. | 2507.06227 | null |
| 2025-07-08 | What ZTF Saw Where Rubin Looked: Anomaly Hunting in DR23 | Maria V. Pruzhinskaya et.al. | 2507.06217 | null |
| 2025-07-08 | Universal Embeddings of Tabular Data | Astrid Franz et.al. | 2507.05904 | null |
| 2025-07-08 | Hyperspectral Anomaly Detection Methods: A Survey and Comparative Study | Aayushma Pant et.al. | 2507.05730 | null |
| 2025-07-08 | Area-based epigraph and hypograph indices for functional outlier detection | Belen Pulido et.al. | 2507.05701 | null |
| 2025-07-08 | Graph Learning | Feng Xia et.al. | 2507.05636 | null |
| 2025-07-08 | Quantum Machine Learning for Identifying Transient Events in X-ray Light Curves | Taiki Kawamuro et.al. | 2507.05589 | null |
| 2025-07-08 | iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips | Mehdi Elahi et.al. | 2507.05576 | null |
| 2025-07-07 | PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing | Sara Chennoufi et.al. | 2507.05524 | null |
| 2025-07-09 | Silent Failures in Stateless Systems: Rethinking Anomaly Detection for Serverless Computing | Chanh Nguyen et.al. | 2507.04969 | null |
| 2025-07-07 | Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions | Shuo Yang et.al. | 2507.04752 | null |
| 2025-07-06 | A Data-Driven Novelty Score for Diverse In-Vehicle Data Recording | Philipp Reis et.al. | 2507.04529 | null |
| 2025-07-06 | Dealing with Uncertainty in Contextual Anomaly Detection | Luca Bindini et.al. | 2507.04490 | null |
| 2025-07-06 | Anomalous Decision Discovery using Inverse Reinforcement Learning | Ashish Bastola et.al. | 2507.04464 | null |
| 2025-07-06 | Normalizing Flow to Augmented Posterior: Conditional Density Estimation with Interpretable Dimension Reduction for High Dimensional Data | Cheng Zeng et.al. | 2507.04216 | null |
| 2025-07-06 | ML-Enhanced AES Anomaly Detection for Real-Time Embedded Security | Nishant Chinnasami et.al. | 2507.04197 | null |
| 2025-07-05 | Specific heat and density anomalies in the Hubbard model | M. A. Habitzreuter et.al. | 2507.04041 | null |
| 2025-07-05 | Fast Re-Trainable Attention Autoencoder for Liquid Sensor Anomaly Detection at the Edge | Seongyun Choi et.al. | 2507.03995 | null |
| 2025-07-05 | An Efficient Detector for Faulty GNSS Measurements Detection With Non-Gaussian Noises | Penggao Yan et.al. | 2507.03987 | null |
| 2025-07-03 | Alleviating Attack Data Scarcity: SCANIA’s Experience Towards Enhancing In-Vehicle Cyber Security Measures | Frida Sundfeldt et.al. | 2507.02607 | null |
| 2025-07-03 | CyberRAG: An agentic RAG cyber attack classification and reporting tool | Francesco Blefari et.al. | 2507.02424 | null |
| 2025-07-03 | Evaluating Language Models For Threat Detection in IoT Security Logs | Jorge J. Tejero-Fernández et.al. | 2507.02390 | null |
| 2025-07-02 | Can Artificial Intelligence solve the blockchain oracle problem? Unpacking the Challenges and Possibilities | Giulio Caldarelli et.al. | 2507.02125 | null |
| 2025-07-02 | SpecCLIP: Aligning and Translating Spectroscopic Measurements for Stars | Xiaosheng Zhao et.al. | 2507.01939 | null |
| 2025-07-02 | Exploring a Hybrid Deep Learning Approach for Anomaly Detection in Mental Healthcare Provider Billing: Addressing Label Scarcity through Semi-Supervised Anomaly Detection | Samirah Bakker et.al. | 2507.01924 | null |
| 2025-07-02 | Towards Foundation Auto-Encoders for Time-Series Anomaly Detection | Gastón García González et.al. | 2507.01875 | null |
| 2025-07-02 | Graph Representation-based Model Poisoning on Federated LLMs in CyberEdge Networks | Hanlin Cai et.al. | 2507.01694 | null |
| 2025-07-02 | BioMARS: A Multi-Agent Robotic System for Autonomous Biological Experiments | Yibo Qiu et.al. | 2507.01485 | null |
| 2025-07-02 | OoDDINO:A Multi-level Framework for Anomaly Segmentation on Complex Road Scenes | Yuxing Liu et.al. | 2507.01455 | null |
| 2025-07-02 | Reasoner for Real-World Event Detection: Scaling Reinforcement Learning via Adaptive Perplexity-Aware Sampling Strategy | Xiaoyun Zhang et.al. | 2507.01327 | null |
| 2025-07-01 | Deep Learning-Based Intrusion Detection for Automotive Ethernet: Evaluating & Optimizing Fast Inference Techniques for Deployment on Low-Cost Platform | Pedro R. X. Carmo et.al. | 2507.01208 | null |
| 2025-07-01 | Good Enough to Learn: LLM-based Anomaly Detection in ECU Logs without Reliable Labels | Bogdan Bogdan et.al. | 2507.01077 | null |
| 2025-07-01 | Biorthogonal Tunable Wavelet Unit with Lifting Scheme in Convolutional Neural Network | An Le et.al. | 2507.00739 | null |
| 2025-06-30 | Learning Constraints Directly from Network Data | Hongyu Hè et.al. | 2506.23964 | null |
| 2025-06-30 | MadCLIP: Few-shot Medical Anomaly Detection with CLIP | Mahshid Shiri et.al. | 2506.23810 | null |
| 2025-06-30 | Adaptive Out-of-Control Point Pattern Detection in Sequential Random Finite Set Observations | Konstantinos Bourazas et.al. | 2506.23802 | null |
| 2025-06-30 | MReg: A Novel Regression Model with MoE-based Video Feature Mining for Mitral Regurgitation Diagnosis | Zhe Liu et.al. | 2506.23648 | null |
| 2025-06-30 | StackCLIP: Clustering-Driven Stacked Prompt in Zero-Shot Industrial Anomaly Detection | Yanning Hou et.al. | 2506.23577 | null |
| 2025-06-30 | Reconciling Attribute and Structural Anomalies for Improved Graph Anomaly Detection | Chunjing Xiao et.al. | 2506.23469 | null |
| 2025-06-30 | Enhancing Insider Threat Detection Using User-Based Sequencing and Transformer Encoders | Mohamed Elbasheer et.al. | 2506.23446 | null |
| 2025-06-29 | GaussMaster: An LLM-based Database Copilot System | Wei Zhou et.al. | 2506.23322 | null |
| 2025-06-29 | Autoregressive Denoising Score Matching is a Good Video Anomaly Detector | Hanwen Zhang et.al. | 2506.23282 | null |
| 2025-06-28 | Kernel Outlier Detection | Can Hakan Dağıdır et.al. | 2506.22994 | null |
| 2025-06-27 | Data-Driven Intrusion Detection in Vehicles: Integrating Unscented Kalman Filter (UKF) with Machine Learning | Shuhao Bian et.al. | 2506.22404 | null |
| 2025-06-27 | A Self-scaled Approximate $\ell_0$ Regularization Robust Model for Outlier Detection | Pengyang Song et.al. | 2506.22277 | null |
| 2025-06-27 | Autonomic Microservice Management via Agentic AI and MAPE-K Integration | Matteo Esposito et.al. | 2506.22185 | null |
| 2025-06-27 | Proof-of-Behavior: Behavior-Driven Consensus for Trustworthy Decentralized Finance | Ailiya Borjigin et.al. | 2506.22171 | null |
| 2025-06-27 | Explainable anomaly detection for sound spectrograms using pooling statistics with quantile differences | Nicolas Thewes et.al. | 2506.21921 | null |
| 2025-06-26 | mTSBench: Benchmarking Multivariate Time Series Anomaly Detection and Model Selection at Scale | Xiaona Zhou et.al. | 2506.21550 | null |
| 2025-06-26 | SiM3D: Single-instance Multiview Multimodal and Multisetup 3D Anomaly Detection Benchmark | Alex Costanzino et.al. | 2506.21549 | null |
| 2025-06-26 | Process mining-driven modeling and simulation to enhance fault diagnosis in cyber-physical systems | Francesco Vitale et.al. | 2506.21502 | null |
| 2025-06-26 | IDGraphs: Intrusion Detection and Analysis Using Stream Compositing | Pin Ren et.al. | 2506.21425 | null |
| 2025-06-26 | FastRef:Fast Prototype Refinement for Few-Shot Industrial Anomaly Detection | Long Tian et.al. | 2506.21398 | null |
| 2025-06-26 | Temporal-Aware Graph Attention Network for Cryptocurrency Transaction Fraud Detection | Zhi Zheng et.al. | 2506.21382 | null |
| 2025-06-26 | GANet-Seg: Adversarial Learning for Brain Tumor Segmentation with Hybrid Generative Models | Qifei Cui et.al. | 2506.21245 | null |
| 2025-06-26 | Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks | Deepak Kumar Panda et.al. | 2506.21142 | null |
| 2025-06-25 | Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis | Zhonghao Zhan et.al. | 2506.20806 | null |
| 2025-06-25 | Joint attitude estimation and 3D neural reconstruction of non-cooperative space objects | Clément Forray et.al. | 2506.20638 | null |
| 2025-06-25 | Benchmarking Unsupervised Strategies for Anomaly Detection in Multivariate Time Series | Laura Boggia et.al. | 2506.20574 | null |
| 2025-06-24 | Predicting wide binaries and deviations from standard gravity using machine learning algorithms | Amoy Ashesh et.al. | 2506.19942 | null |
| 2025-06-24 | A Hybrid Intrusion Detection System with a New Approach to Protect the Cybersecurity of Cloud Computing | Maryam Mahdi Al-Husseini et.al. | 2506.19934 | null |
| 2025-06-24 | Graph theory inspired anomaly detection at the LHC | Jack Y. Araz et.al. | 2506.19920 | null |
| 2025-06-24 | Exact Matrix Seriation through Mathematical Optimization: Stress and Effectiveness-Based Models | Víctor Blanco et.al. | 2506.19821 | null |
| 2025-06-24 | KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs | Xin Fan Guo et.al. | 2506.19802 | null |
| 2025-06-24 | UltraAD: Fine-Grained Ultrasound Anomaly Classification via Few-Shot CLIP Adaptation | Yue Zhou et.al. | 2506.19694 | null |
| 2025-06-24 | Experimental Assessment of Neural 3D Reconstruction for Small UAV-based Applications | Genís Castillo Gómez-Raya et.al. | 2506.19491 | null |
| 2025-06-24 | Behavioral Anomaly Detection in Distributed Systems via Federated Contrastive Learning | Renzi Meng et.al. | 2506.19246 | null |
| 2025-06-24 | Quantitative Benchmarking of Anomaly Detection Methods in Digital Pathology | Can Cui et.al. | 2506.19234 | null |
| 2025-06-23 | Multimodal Anomaly Detection with a Mixture-of-Experts | Christoph Willibald et.al. | 2506.19077 | null |
| 2025-06-23 | 3D Arena: An Open Platform for Generative 3D Evaluation | Dylan Ebert et.al. | 2506.18787 | null |
| 2025-06-23 | Trustworthy Prediction with Gaussian Process Knowledge Scores | Kurt Butler et.al. | 2506.18630 | null |
| 2025-06-23 | Normality Prior Guided Multi-Semantic Fusion Network for Unsupervised Image Anomaly Detection | Muhao Xu et.al. | 2506.18544 | null |
| 2025-06-23 | Sequential keypoint density estimator: an overlooked baseline of skeleton-based video anomaly detection | Anja Delić et.al. | 2506.18368 | null |
| 2025-06-23 | Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals | Muhammad Usama et.al. | 2506.18288 | null |
| 2025-06-23 | Cross-Architecture Knowledge Distillation (KD) for Retinal Fundus Image Anomaly Detection on NVIDIA Jetson Nano | Berk Yilmaz et.al. | 2506.18220 | null |
| 2025-06-22 | Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT | Ioannis Panopoulos et.al. | 2506.18114 | null |
| 2025-06-22 | TAB: Unified Benchmarking of Time Series Anomaly Detection Methods | Xiangfei Qiu et.al. | 2506.18046 | null |
| 2025-06-21 | Quantum-Hybrid Support Vector Machines for Anomaly Detection in Industrial Control Systems | Tyler Cultice et.al. | 2506.17824 | null |
| 2025-06-21 | The Blind Spot of BGP Anomaly Detection: Why LSTM Autoencoders Fail on Real-World Outages | Samuel Oluwafemi Adebayo et.al. | 2506.17821 | null |
| 2025-06-20 | Searching for a Hidden Markov Anomaly over Multiple Processes | Levli Citron et.al. | 2506.17108 | null |
| 2025-06-20 | MAWIFlow Benchmark: Realistic Flow-Based Evaluation for Network Intrusion Detection | Joshua Schraven et.al. | 2506.17041 | link |
| 2025-06-20 | Anomaly Detection in Event-triggered Traffic Time Series via Similarity Learning | Shaoyu Dou et.al. | 2506.16855 | null |
| 2025-06-20 | Robust Group Anomaly Detection for Quasi-Periodic Network Time Series | Kai Yang et.al. | 2506.16815 | null |
| 2025-06-19 | Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence | Fei Zuo et.al. | 2506.16626 | null |
| 2025-06-19 | On Continuous Monitoring of Risk Violations under Unknown Shift | Alexander Timans et.al. | 2506.16416 | null |
| 2025-06-19 | Classification of Cattle Behavior and Detection of Heat (Estrus) using Sensor Data | Druva Dhakshinamoorthy et.al. | 2506.16380 | null |
| 2025-06-19 | Signatures to help interpretability of anomalies | Emmanuel Gangler et.al. | 2506.16314 | null |
| 2025-06-19 | On the Efficient Discovery of Maximum $k$ -Defective Biclique | Donghang Cui et.al. | 2506.16121 | null |
| 2025-06-19 | CRIA: A Cross-View Interaction and Instance-Adapted Pre-training Framework for Generalizable EEG Representations | Puchun Liu et.al. | 2506.16056 | null |
| 2025-06-18 | Real-Time Initialization of Unknown Anchors for UWB-aided Navigation | Giulio Delama et.al. | 2506.15518 | null |
| 2025-06-18 | Time-dependent density estimation using binary classifiers | Agnimitra Dasgupta et.al. | 2506.15505 | null |
| 2025-06-18 | Semi-supervised Graph Anomaly Detection via Robust Homophily Learning | Guoguo Ai et.al. | 2506.15448 | null |
| 2025-06-18 | Evaluation Pipeline for systematically searching for Anomaly Detection Systems | Florian Rokohl et.al. | 2506.15388 | null |
| 2025-06-18 | Human-Centred AI in FinTech: Developing a User Experience (UX) Research Point of View (PoV) Playbook | Festus Adedoyin et.al. | 2506.15325 | null |
| 2025-06-17 | Determinação Automática de Limiar de Detecção de Ataques em Redes de Computadores Utilizando Autoencoders | Luan Gonçalves Miranda et.al. | 2506.14937 | null |
| 2025-06-17 | Explain First, Trust Later: LLM-Augmented Explanations for Graph-Based Crypto Anomaly Detection | Adriana Watson et.al. | 2506.14933 | link |
| 2025-06-17 | Latent Anomaly Detection: Masked VQ-GAN for Unsupervised Segmentation in Medical CBCT | Pengwei Wang et.al. | 2506.14209 | null |
| 2025-06-17 | $β$ -integrated local depth and corresponding partitioned local depth representation | Siyi Wang et.al. | 2506.14108 | null |
| 2025-06-16 | Bridging Unsupervised and Semi-Supervised Anomaly Detection: A Theoretically-Grounded and Practical Framework with Synthetic Anomalies | Matthew Lau et.al. | 2506.13955 | null |
| 2025-06-15 | Hybrid Meta-Learning Framework for Anomaly Forecasting in Nonlinear Dynamical Systems via Physics-Inspired Simulation and Deep Ensembles | Abdullah Burkan Bereketoglu et.al. | 2506.13828 | null |
| 2025-06-16 | Anomaly Object Segmentation with Vision-Language Models for Steel Scrap Recycling | Daichi Tanaka et.al. | 2506.13282 | null |
| 2025-06-16 | Polyra Swarms: A Shape-Based Approach to Machine Learning | Simon Klüttermann et.al. | 2506.13217 | null |
| 2025-06-16 | Pro-AD: Learning Comprehensive Prototypes with Prototype-based Constraint for Multi-class Unsupervised Anomaly Detection | Ziqing Zhou et.al. | 2506.13097 | null |
| 2025-06-16 | Learning Event Completeness for Weakly Supervised Video Anomaly Detection | Yu Wang et.al. | 2506.13095 | null |
| 2025-06-16 | Condition Monitoring with Machine Learning: A Data-Driven Framework for Quantifying Wind Turbine Energy Loss | Emil Marcus Buchberg et.al. | 2506.13012 | null |
| 2025-06-15 | SmartHome-Bench: A Comprehensive Benchmark for Video Anomaly Detection in Smart Homes Using Multi-Modal Large Language Models | Xinyi Zhao et.al. | 2506.12992 | null |
| 2025-06-15 | Probing Deep into Temporal Profile Makes the Infrared Small Target Detector Much Better | Ruojing Li et.al. | 2506.12766 | null |
| 2025-06-13 | Temporal cross-validation impacts multivariate time series subsequence anomaly detection evaluation | Steven C. Hespeler et.al. | 2506.12183 | null |
| 2025-06-13 | Diffusion-Based Electrocardiography Noise Quantification via Anomaly Detection | Tae-Seong Han et.al. | 2506.11815 | null |
| 2025-06-13 | A retrospective on DISPEED – Leveraging heterogeneity in a drone swarm for IDS execution | Vincent Lannurien et.al. | 2506.11800 | null |
| 2025-06-13 | Self-supervised Learning of Echocardiographic Video Representations via Online Cluster Distillation | Divyanshu Mishra et.al. | 2506.11777 | null |
| 2025-06-13 | CLIP Meets Diffusion: A Synergistic Approach to Anomaly Detection | Byeongchan Lee et.al. | 2506.11772 | null |
| 2025-06-13 | Deep Symmetric Autoencoders from the Eckart-Young-Schmidt Perspective | Simone Brivio et.al. | 2506.11641 | null |
| 2025-06-13 | FAA Framework: A Large Language Model-Based Approach for Credit Card Fraud Investigations | Shaun Shuster et.al. | 2506.11635 | null |
| 2025-06-13 | Prioritizing Alignment Paradigms over Task-Specific Model Customization in Time-Series LLMs | Wei Li et.al. | 2506.11512 | null |
| 2025-06-12 | Advanced fraud detection using machine learning models: enhancing financial transaction security | Nudrat Fariha et.al. | 2506.10842 | null |
| 2025-06-13 | IQE-CLIP: Instance-aware Query Embedding for Zero-/Few-shot Anomaly Detection in Medical Domain | Hong Huang et.al. | 2506.10730 | link |
| 2025-06-12 | Anomaly Detection for Sensing Security | Stefan Roth et.al. | 2506.10718 | null |
| 2025-06-12 | Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation | Stefano Longari et.al. | 2506.10620 | null |
| 2025-06-12 | Data Driven Diagnosis for Large Cyber-Physical-Systems with Minimal Prior Information | Henrik Sebastian Steude et.al. | 2506.10613 | null |
| 2025-06-11 | Conditional diffusion models for guided anomaly detection in brain images using fluid-driven anomaly randomization | Ana Lawry Aguila et.al. | 2506.10233 | null |
| 2025-06-11 | TrioXpert: An automated incident management framework for microservice system | Yongqian Sun et.al. | 2506.10043 | null |
| 2025-06-11 | Microservices and Real-Time Processing in Retail IT: A Review of Open-Source Toolchains and Deployment Strategies | Aaditaa Vashisht et.al. | 2506.09938 | null |
| 2025-06-11 | Wavelet Scattering Transform and Fourier Representation for Offline Detection of Malicious Clients in Federated Learning | Alessandro Licciardi et.al. | 2506.09674 | null |
| 2025-06-11 | Securing Open RAN: A Survey of Cryptographic Challenges and Emerging Solutions for 5G | Ryan Barker et.al. | 2506.09418 | null |
| 2025-06-11 | Anomaly Detection and Generation with Diffusion Models: A Survey | Yang Liu et.al. | 2506.09368 | null |
| 2025-06-11 | ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection) | Ronal Singh et.al. | 2506.09365 | null |
| 2025-06-10 | PatchGuard: Adversarially Robust Anomaly Detection and Localization through Vision Transformers and Pseudo Anomalies | Mojtaba Nafez et.al. | 2506.09237 | null |
| 2025-06-10 | Integrating Asynchronous AdaBoost into Federated Learning: Five Real World Applications | Arthur Oghlukyan et.al. | 2506.09090 | null |
| 2025-06-10 | HomographyAD: Deep Anomaly Detection Using Self Homography Learning | Jongyub Seok et.al. | 2506.08784 | null |
| 2025-06-10 | EDINET-Bench: Evaluating LLMs on Complex Financial Tasks using Japanese Financial Statements | Issa Sugiura et.al. | 2506.08762 | null |
| 2025-06-10 | MAMBO: High-Resolution Generative Approach for Mammography Images | Milica Škipina et.al. | 2506.08677 | null |
| 2025-06-09 | Evaluating explainable AI for deep learning-based network intrusion detection system alert classification | Rajesh Kalakoti et.al. | 2506.07882 | null |
| 2025-06-09 | Are Trees Really Green? A Detection Approach of IoT Malware Attacks | Silvia Lucia Sanna et.al. | 2506.07836 | null |
| 2025-06-09 | Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain | Bassam Noori Shaker et.al. | 2506.07480 | null |
| 2025-06-09 | Anomaly Detection and Early Warning Mechanism for Intelligent Monitoring Systems in Multi-Cloud Environments Based on LLM | Yihong Jin et.al. | 2506.07407 | null |
| 2025-06-09 | Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly Detection | Thesath Wijayasiri et.al. | 2506.07372 | null |
| 2025-06-08 | Towards Physics-informed Diffusion for Anomaly Detection in Trajectories | Arun Sharma et.al. | 2506.06999 | null |
| 2025-06-07 | ARGOS: Anomaly Recognition and Guarding through O-RAN Sensing | Stavros Dimou et.al. | 2506.06916 | null |
| 2025-06-07 | Harnessing Vision-Language Models for Time Series Anomaly Detection | Zelin He et.al. | 2506.06836 | null |
| 2025-06-07 | Cross-Entropy Games for Language Models: From Implicit Knowledge to General Capability Measures | Clément Hongler et.al. | 2506.06832 | null |
| 2025-06-07 | LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning | Zeyu Yan et.al. | 2506.06742 | null |
| 2025-06-06 | PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems | Yi Huang et.al. | 2506.06226 | null |
| 2025-06-06 | MLOps with Microservices: A Case Study on the Maritime Domain | Renato Cordeiro Ferreira et.al. | 2506.06202 | null |
| 2025-06-06 | Tensor-to-Tensor Models with Fast Iterated Sum Features | Joscha Diehl et.al. | 2506.06041 | null |
| 2025-06-06 | $\text{C}^{2}\text{BNVAE}$ : Dual-Conditional Deep Generation of Network Traffic Data for Network Intrusion Detection System Balancing | Yifan Zeng et.al. | 2506.05844 | null |
| 2025-06-06 | FIST: A Structured Threat Modeling Framework for Fraud Incidents | Yu-Chen Dai et.al. | 2506.05740 | null |
| 2025-06-05 | Track Any Anomalous Object: A Granular Video Anomaly Detection Pipeline | Yuzhi Huang et.al. | 2506.05175 | null |
| 2025-06-05 | Federated Isolation Forest for Efficient Anomaly Detection on Edge IoT Systems | Pavle Vasiljevic et.al. | 2506.05138 | null |
| 2025-06-05 | Noise-Driven AI Sensors: Secure Healthcare Monitoring with PUFs | Christiana Chamon et.al. | 2506.05135 | null |
| 2025-06-05 | Low noise flux estimate and data quality control monitoring in EUCLID-NISP cosmological survey | B. Kubik et.al. | 2506.05024 | null |
| 2025-06-05 | Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection | Gabriele Digregorio et.al. | 2506.04978 | null |
| 2025-06-05 | KPIRoot+: An Efficient Integrated Framework for Anomaly Detection and Root Cause Analysis in Large-Scale Cloud Systems | Wenwei Gu et.al. | 2506.04569 | null |
| 2025-06-04 | Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning | Huynh T. T. Tran et.al. | 2506.04454 | null |
| 2025-06-04 | An AI-Based Public Health Data Monitoring System | Ananya Joshi et.al. | 2506.04429 | null |
| 2025-06-04 | How to Use Graph Data in the Wild to Help Graph Anomaly Detection? | Yuxuan Cao et.al. | 2506.04190 | null |
| 2025-06-04 | Causality-Aware Contrastive Learning for Robust Multivariate Time-Series Anomaly Detection | HyunGi Kim et.al. | 2506.03964 | null |
| 2025-06-04 | Lower Ricci Curvature for Hypergraphs | Shiyi Yang et.al. | 2506.03943 | null |
| 2025-06-04 | INP-Former++: Advancing Universal Anomaly Detection via Intrinsic Normal Prototypes and Residual Learning | Wei Luo et.al. | 2506.03660 | null |
| 2025-06-04 | SubSearch: Robust Estimation and Outlier Detection for Stochastic Block Models via Subgraph Search | Leonardo Martins Bianco et.al. | 2506.03657 | null |
| 2025-06-03 | Investigating Mask-aware Prototype Learning for Tabular Anomaly Detection | Ruiying Lu et.al. | 2506.02757 | null |
| 2025-06-03 | Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies | Khizar Hayat et.al. | 2506.02703 | null |
| 2025-06-04 | MemoryOut: Learning Principal Features via Multimodal Sparse Filtering Network for Semi-supervised Video Anomaly Detection | Juntong Li et.al. | 2506.02535 | link |
| 2025-06-03 | A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges | Sudhanshu Sekhar Tripathy et.al. | 2506.02438 | null |
| 2025-06-02 | RATFM: Retrieval-augmented Time Series Foundation Model for Anomaly Detection | Chihiro Maru et.al. | 2506.02081 | null |
| 2025-06-02 | Enhancing Interpretability of Quantum-Assisted Blockchain Clustering via AI Agent-Based Qualitative Analysis | Yun-Cheng Tsai et.al. | 2506.02068 | null |
| 2025-06-02 | Federated Gaussian Mixture Models | Sophia Zhang Pettersson et.al. | 2506.01780 | null |
| 2025-06-02 | ShaTS: A Shapley-based Explainability Method for Time Series Artificial Intelligence Models applied to Anomaly Detection in Industrial Internet of Things | Manuel Franco de la Peña et.al. | 2506.01450 | null |
| 2025-06-02 | System Calls for Malware Detection and Classification: Methodologies and Applications | Bishwajit Prasad Gond et.al. | 2506.01412 | null |
| 2025-06-01 | Continual-MEGA: A Large-scale Benchmark for Generalizable Continual Anomaly Detection | Geonu Lee et.al. | 2506.00956 | null |
| 2025-05-30 | Harnessing Large Language Models for Scientific Novelty Detection | Yan Liu et.al. | 2505.24615 | null |
| 2025-05-30 | HLSAD: Hodge Laplacian-based Simplicial Anomaly Detection | Florian Frantzen et.al. | 2505.24534 | null |
| 2025-05-30 | Diversify and Conquer: Open-set Disagreement for Robust Semi-supervised Learning with Outliers | Heejo Kong et.al. | 2505.24443 | link |
| 2025-05-30 | Bridging 3D Anomaly Localization and Repair via High-Quality Continuous Geometric Representation | Bozhong Zheng et.al. | 2505.24431 | null |
| 2025-05-30 | Anomaly Detection and Improvement of Clusters using Enhanced K-Means Algorithm | Vardhan Shorewala et.al. | 2505.24365 | null |
| 2025-05-30 | KairosAD: A SAM-Based Model for Industrial Anomaly Detection on Embedded Devices | Uzair Khan et.al. | 2505.24334 | null |
| 2025-05-30 | INSIGHT: A Survey of In-Network Systems for Intelligent, High-Efficiency AI and Topology Optimization | Aleksandr Algazinov et.al. | 2505.24269 | null |
| 2025-05-30 | SentinelAgent: Graph-based Anomaly Detection in Multi-Agent Systems | Xu He et.al. | 2505.24201 | null |
| 2025-05-29 | Machine Learning-Based Anomaly Detection of Correlated Sensor Data: An Integrated Principal Component Analysis-Autoencoder Approach | Tanish Baranwal et.al. | 2505.24044 | null |
| 2025-05-29 | An Advanced Cyber-Physical System Security Testbed for Substation Automation | Akila Herath et.al. | 2505.24021 | null |
| 2025-05-29 | Distributed Federated Learning for Vehicular Network Security: Anomaly Detection Benefits and Multi-Domain Attack Threats | Utku Demir et.al. | 2505.23706 | null |
| 2025-05-29 | VAU-R1: Advancing Video Anomaly Understanding via Reinforcement Fine-Tuning | Liyun Zhu et.al. | 2505.23504 | link |
| 2025-05-29 | Sentinel: Scheduling Live Streams with Proactive Anomaly Detection in Crowdsourced Cloud-Edge Platforms | Yuting Li et.al. | 2505.23347 | null |
| 2025-05-29 | FreRA: A Frequency-Refined Augmentation for Contrastive Learning on Time Series Classification | Tian Tian et.al. | 2505.23181 | link |
| 2025-05-28 | Anomalies by Synthesis: Anomaly Detection using Generative Diffusion Models for Off-Road Navigation | Siddharth Ancha et.al. | 2505.22805 | null |
| 2025-05-28 | Evaluating Supervised Learning Models for Fraud Detection: A Comparative Study of Classical and Deep Architectures on Imbalanced Transaction Data | Chao Wang et.al. | 2505.22521 | null |
| 2025-05-28 | Does Johnny Get the Message? Evaluating Cybersecurity Notifications for Everyday Users | Victor Jüttner et.al. | 2505.22435 | null |
| 2025-05-28 | Domain Adaptation of Attention Heads for Zero-shot Anomaly Detection | Kiyoon Jeong et.al. | 2505.22259 | null |
| 2025-05-28 | OmniAD: Detect and Understand Industrial Anomaly via Multimodal Reasoning | Shifang Zhao et.al. | 2505.22039 | null |
| 2025-05-28 | A2Seek: Towards Reasoning-Centric Benchmark for Aerial Anomaly Understanding | Mengjingcheng Mo et.al. | 2505.21962 | null |
| 2025-05-27 | Mentor3AD: Feature Reconstruction-based 3D Anomaly Detection via Multi-modality Mentor Learning | Jinbao Wang et.al. | 2505.21420 | null |
| 2025-05-27 | Learnable Kernel Density Estimation for Graphs | Xudong Wang et.al. | 2505.21285 | null |
| 2025-05-27 | Is Hyperbolic Space All You Need for Medical Anomaly Detection? | Alvaro Gonzalez-Jimenez et.al. | 2505.21228 | null |
| 2025-05-27 | RoBiS: Robust Binary Segmentation for High-Resolution Industrial Images | Xurui Li et.al. | 2505.21152 | link |
| 2025-05-27 | Robust and Explainable Detector of Time Series Anomaly via Augmenting Multiclass Pseudo-Anomalies | Kohei Obata et.al. | 2505.20765 | null |
| 2025-05-26 | Byzantine-Resilient Distributed P2P Energy Trading via Spatial-Temporal Anomaly Detection | Junhong Liu et.al. | 2505.20567 | null |
| 2025-05-26 | Cellwise and Casewise Robust Covariance in High Dimensions | Fabio Centofanti et.al. | 2505.19925 | null |
| 2025-05-26 | Vad-R1: Towards Video Anomaly Reasoning via Perception-to-Cognition Chain-of-Thought | Chao Huang et.al. | 2505.19877 | link |
| 2025-05-26 | Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications | Christoph R. Landolt et.al. | 2505.19837 | null |
| 2025-05-27 | SuperAD: A Training-free Anomaly Classification and Segmentation Method for CVPR 2025 VAND 3.0 Workshop Challenge Track 1: Adapt & Detect | Huaiyuan Zhang et.al. | 2505.19750 | null |
| 2025-05-26 | ICS for complex data with application to outlier detection for density data | Camille Mondon et.al. | 2505.19403 | link |
| 2025-05-25 | Co-evolutionary Dynamics of Attack and Defence in Cybersecurity | Adeela Bashir et.al. | 2505.19338 | null |
| 2025-05-25 | Rethinking Metrics and Benchmarks of Video Anomaly Detection | Zihao Liu et.al. | 2505.19022 | null |
| 2025-05-25 | Chi-Square Wavelet Graph Neural Networks for Heterogeneous Graph Anomaly Detection | Xiping Li et.al. | 2505.18934 | null |
| 2025-05-25 | Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation | Ross Greer et.al. | 2505.18925 | null |
| 2025-05-24 | Anomaly detection in radio galaxy data with trainable COSFIRE filters | Steven Ndung’u et.al. | 2505.18643 | null |
| 2025-05-23 | Rethinking Contrastive Learning in Graph Anomaly Detection: A Clean-View Perspective | Di Jin et.al. | 2505.18002 | null |
| 2025-05-23 | Hyperspectral Anomaly Detection Fused Unified Nonconvex Tensor Ring Factors Regularization | Wenjin Qin et.al. | 2505.17881 | null |
| 2025-05-23 | ViP $^2$ -CLIP: Visual-Perception Prompting with Unified Alignment for Zero-Shot Anomaly Detection | Ziteng Yang et.al. | 2505.17692 | null |
| 2025-05-23 | Automating Versatile Time-Series Analysis with Tiny Transformers on Embedded FPGAs | Tianheng Ling et.al. | 2505.17662 | null |
| 2025-05-23 | Large Language Models in the IoT Ecosystem – A Survey on Security Challenges and Applications | Kushal Khatiwada et.al. | 2505.17586 | null |
| 2025-05-23 | Center-aware Residual Anomaly Synthesis for Multi-class Industrial Anomaly Detection | Qiyu Chen et.al. | 2505.17551 | null |
| 2025-05-22 | Harnessing EHRs for Diffusion-based Anomaly Detection on Chest X-rays | Harim Kim et.al. | 2505.17311 | null |
| 2025-05-22 | Advancing Security with Digital Twins: A Comprehensive Survey | Blessing Airehenbuwa et.al. | 2505.17310 | null |
| 2025-05-22 | Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation | Yangyang Liu et.al. | 2505.17274 | null |
| 2025-05-22 | A Multi-Step Comparative Framework for Anomaly Detection in IoT Data Streams | Mohammed Al-Qudah et.al. | 2505.16872 | null |
| 2025-05-22 | Zero-Shot Anomaly Detection in Battery Thermal Images Using Visual Question Answering with Prior Knowledge | Marcella Astrid et.al. | 2505.16674 | null |
| 2025-05-22 | SD-MAD: Sign-Driven Few-shot Multi-Anomaly Detection in Medical Images | Kaiyu Guo et.al. | 2505.16659 | null |
| 2025-05-22 | Unsupervised Network Anomaly Detection with Autoencoders and Traffic Images | Michael Neri et.al. | 2505.16650 | link |
| 2025-05-22 | Is Your LLM-Based Multi-Agent a Reliable Real-World Planner? Exploring Fraud Detection in Travel Planning | Junchi Yao et.al. | 2505.16557 | null |
| 2025-05-22 | Privacy-Aware Cyberterrorism Network Analysis using Graph Neural Networks and Federated Learning | Anas Ali et.al. | 2505.16371 | null |
| 2025-05-22 | Learning novel representations of variable sources from multi-modal $\textit{Gaia}$ data via autoencoders | P. Huijse et.al. | 2505.16320 | null |
| 2025-05-22 | Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models | Kalindi Singh et.al. | 2505.16261 | null |
| 2025-05-22 | MADCluster: Model-agnostic Anomaly Detection with Self-supervised Clustering Network | Sangyong Lee et.al. | 2505.16223 | null |
| 2025-05-22 | A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles | Md Ashraf Uddin et.al. | 2505.16215 | null |
| 2025-05-21 | Federated Learning-Enhanced Blockchain Framework for Privacy-Preserving Intrusion Detection in Industrial IoT | Anas Ali et.al. | 2505.15376 | null |
| 2025-05-21 | Flashback: Memory-Driven Zero-shot, Real-time Video Anomaly Detection | Hyogun Lee et.al. | 2505.15205 | null |
| 2025-05-20 | Anomaly Detection Based on Critical Paths for Deep Neural Networks | Fangzhen Zhao et.al. | 2505.14967 | null |
| 2025-05-20 | SecCAN: An Extended CAN Controller with Embedded Intrusion Detection | Shashwat Khandelwal et.al. | 2505.14924 | null |
| 2025-05-20 | Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge | Alexandre Broggi et.al. | 2505.14592 | null |
| 2025-05-20 | AquaSignal: An Integrated Framework for Robust Underwater Acoustic Analysis | Eirini Panteli et.al. | 2505.14285 | null |
| 2025-05-20 | Partition-wise Graph Filtering: A Unified Perspective Through the Lens of Graph Coarsening | Guoming Li et.al. | 2505.14033 | null |
| 2025-05-20 | CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data | Yifan Zeng et.al. | 2505.14027 | null |
| 2025-05-20 | Multimodal RAG-driven Anomaly Detection and Classification in Laser Powder Bed Fusion using Large Language Models | Kiarash Naghavi Khanghah et.al. | 2505.13828 | null |
| 2025-05-19 | Unsupervised anomaly detection in MeV ultrafast electron diffraction | Mariana A. Fazio et.al. | 2505.13702 | null |
| 2025-05-19 | Sensitivity to New Physics Phenomena in Anomaly Detection: A Study of Untunable Hyperparameters | Fernando Abreu de Souza et.al. | 2505.13228 | null |
| 2025-05-19 | Just Dance with $π$ ! A Poly-modal Inductor for Weakly-supervised Video Anomaly Detection | Snehashis Majhi et.al. | 2505.13123 | null |
| 2025-05-19 | TSPulse: Dual Space Tiny Pre-Trained Models for Rapid Time-Series Analysis | Vijay Ekambaram et.al. | 2505.13033 | null |
| 2025-05-19 | Structure-based Anomaly Detection and Clustering | Filippo Leveni et.al. | 2505.12751 | null |
| 2025-05-19 | AD-AGENT: A Multi-agent Framework for End-to-end Anomaly Detection | Tiankai Yang et.al. | 2505.12594 | null |
| 2025-05-18 | Importance Sampling for Nonlinear Models | Prakash Palanivelu Rajmohan et.al. | 2505.12353 | link |
| 2025-05-17 | PyScrew: A Comprehensive Dataset Collection from Industrial Screw Driving Experiments | Nikolai West et.al. | 2505.11925 | null |
| 2025-05-17 | Robust outlier detection for heterogeneous distributions applicable to censoring in functional MRI | Saranjeet Singh Saluja et.al. | 2505.11806 | null |
| 2025-05-17 | Are vision language models robust to uncertain inputs? | Xi Wang et.al. | 2505.11804 | null |
| 2025-05-17 | CL-BioGAN: Biologically-Inspired Cross-Domain Continual Learning for Hyperspectral Anomaly Detection | Jianing Wang et.al. | 2505.11796 | null |
| 2025-05-16 | Anomaly Detection for Non-stationary Time Series using Recurrent Wavelet Probabilistic Neural Network | Pu Yang et.al. | 2505.11321 | null |
| 2025-05-16 | Diffusion Model in Hyperspectral Image Processing and Analysis: A Review | Xing Hu et.al. | 2505.11158 | null |
| 2025-05-16 | Fairness-aware Anomaly Detection via Fair Projection | Feng Xiao et.al. | 2505.11132 | null |
| 2025-05-16 | Visual Anomaly Detection under Complex View-Illumination Interplay: A Large-Scale Benchmark | Yunkang Cao et.al. | 2505.10996 | link |
| 2025-05-16 | Preference Isolation Forest for Structure-based Anomaly Detection | Filippo Leveni et.al. | 2505.10876 | null |
| 2025-05-16 | Hashing for Structure-based Anomaly Detection | Filippo Leveni et.al. | 2505.10873 | null |
| 2025-05-15 | PIF: Anomaly detection via preference embedding | Filippo Leveni et.al. | 2505.10441 | null |
| 2025-05-15 | A Representation Learning Approach to Feature Drift Detection in Wireless Networks | Athanasios Tziouvaras et.al. | 2505.10325 | null |
| 2025-05-15 | Financial Fraud Detection Using Explainable AI and Stacking Ensemble Methods | Fahad Almalki et.al. | 2505.10050 | null |
| 2025-05-15 | AdaptCLIP: Adapting CLIP for Universal Visual Anomaly Detection | Bin-Bin Gao et.al. | 2505.09926 | link |
| 2025-05-15 | Correlating Account on Ethereum Mixing Service via Domain-Invariant feature learning | Zheng Che et.al. | 2505.09892 | null |
| 2025-05-14 | Online Isolation Forest | Filippo Leveni et.al. | 2505.09593 | link |
| 2025-05-14 | CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations | Denis Donadel et.al. | 2505.09384 | null |
| 2025-05-14 | MetaUAS: Universal Anomaly Segmentation with One-Prompt Meta-Learning | Bin-Bin Gao et.al. | 2505.09265 | link |
| 2025-05-14 | Learning to Detect Multi-class Anomalies with Just One Normal Image Prompt | Bin-Bin Gao et.al. | 2505.09264 | link |
| 2025-05-14 | Few-Shot Anomaly-Driven Generation for Anomaly Classification and Segmentation | Guan Gui et.al. | 2505.09263 | link |
| 2025-05-14 | WSCIF: A Weakly-Supervised Color Intelligence Framework for Tactical Anomaly Detection in Surveillance Keyframes | Wei Meng et.al. | 2505.09129 | null |
| 2025-05-13 | Intelligent Road Anomaly Detection with Real-time Notification System for Enhanced Road Safety | Ali Almakhluk et.al. | 2505.08882 | null |
| 2025-05-13 | Exploring Scotogenic Parameter Spaces and Mapping Uncharted Dark Matter Phenomenology with Multi-Objective Search Algorithms | Fernando Abreu de Souza et.al. | 2505.08862 | null |
| 2025-05-13 | Robust Indoor Localization via Conformal Methods and Variational Bayesian Adaptive Filtering | Zhiyi Zhou et.al. | 2505.08639 | null |
| 2025-05-13 | neuralGAM: An R Package for Fitting Generalized Additive Neural Networks | Ines Ortega-Fernandez et.al. | 2505.08610 | null |
| 2025-05-13 | Isolation Forest in Novelty Detection Scenario | Adam Ulrich et.al. | 2505.08489 | null |
| 2025-05-13 | Structural-Temporal Coupling Anomaly Detection with Dynamic Graph Transformer | Chang Zong et.al. | 2505.08330 | null |
| 2025-05-13 | Deep Probabilistic Modeling of User Behavior for Anomaly Detection via Mixture Density Networks | Lu Dai et.al. | 2505.08220 | null |
| 2025-05-13 | Fault Detection Method for Power Conversion Circuits Using Thermal Image and Convolutional Autoencoder | Noboru Katayama et.al. | 2505.08150 | null |
| 2025-05-12 | Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics | Mohammed Alquliti et.al. | 2505.08006 | null |
| 2025-05-12 | Vision Foundation Model Embedding-Based Semantic Anomaly Detection | Max Peter Ronecker et.al. | 2505.07998 | null |
| 2025-05-12 | Simultaneous Intrusion Detection and Localization Using ISAC Network | Usama Shakoor et.al. | 2505.07656 | null |
| 2025-05-12 | Evaluating Modern Visual Anomaly Detection Approaches in Semiconductor Manufacturing: A Comparative Study | Manuel Barusco et.al. | 2505.07576 | null |
| 2025-05-12 | EAGLE: Contrastive Learning for Efficient Graph Anomaly Detection | Jing Ren et.al. | 2505.07508 | null |
| 2025-05-12 | Boosting Global-Local Feature Matching via Anomaly Synthesis for Multi-Class Point Cloud Anomaly Detection | Yuqi Cheng et.al. | 2505.07375 | link |
| 2025-05-12 | GAN-based synthetic FDG PET images from T1 brain MRI can serve to improve performance of deep unsupervised anomaly detection models | Daria Zotova et.al. | 2505.07364 | null |
| 2025-05-11 | Towards Scalable IoT Deployment for Visual Anomaly Detection via Efficient Compression | Arianna Stropeni et.al. | 2505.07119 | null |
| 2025-05-11 | Benign Samples Matter! Fine-tuning On Outlier Benign Samples Severely Breaks Safety | Zihan Guan et.al. | 2505.06843 | null |
| 2025-05-10 | A Contrastive Federated Semi-Supervised Learning Intrusion Detection Framework for Internet of Robotic Things | Yifan Zeng et.al. | 2505.06636 | null |
| 2025-05-10 | AI-Powered Anomaly Detection with Blockchain for Real-Time Security and Reliability in Autonomous Vehicles | Rathin Chandra Shit et.al. | 2505.06632 | null |
| 2025-05-10 | ReplayCAD: Generative Diffusion Replay for Continual Anomaly Detection | Lei Hu et.al. | 2505.06603 | link |
| 2025-05-09 | Mixtures of multivariate linear asymmetric Laplace regressions with multiple asymmetric Laplace covariates | Arnoldus F. Otto et.al. | 2505.05979 | null |
| 2025-05-09 | Adaptive Robot Localization with Ultra-wideband Novelty Detection | Umberto Albertin et.al. | 2505.05903 | null |
| 2025-05-09 | Examining the Source of Defects from a Mechanical Perspective for 3D Anomaly Detection | Hanzhe Liang et.al. | 2505.05901 | link |
| 2025-05-09 | Unsupervised Anomaly Detection for Autonomous Robots via Mahalanobis SVDD with Audio-IMU Fusion | Yizhuo Yang et.al. | 2505.05811 | link |
| 2025-05-09 | Intrusion Detection System Using Deep Learning for Network Security | Soham Chatterjee et.al. | 2505.05810 | null |
| 2025-05-08 | KPI Poisoning: An Attack in Open RAN Near Real-Time Control Loop | Hamed Alimohammadi et.al. | 2505.05537 | null |
| 2025-05-08 | QUIC-Exfil: Exploiting QUIC’s Server Preferred Address Feature to Perform Data Exfiltration Attacks | Thomas Grübl et.al. | 2505.05292 | null |
| 2025-05-08 | Research on Anomaly Detection Methods Based on Diffusion Models | Yi Chen et.al. | 2505.05137 | null |
| 2025-05-08 | Conformal Prediction with Cellwise Outliers: A Detect-then-Impute Approach | Qian Peng et.al. | 2505.04986 | null |
| 2025-05-07 | Comparison of Visual Trackers for Biomechanical Analysis of Running | Luis F. Gomez et.al. | 2505.04713 | null |
| 2025-05-07 | Hierarchical Task Decomposition for Execution Monitoring and Error Recovery: Understanding the Rationale Behind Task Demonstrations | Christoph Willibald et.al. | 2505.04565 | null |
| 2025-05-07 | Detecting Spelling and Grammatical Anomalies in Russian Poetry Texts | Ilya Koziev et.al. | 2505.04507 | null |
| 2025-05-07 | Blockchain Data Analytics: A Scoping Literature Review and Directions for Future Research | Marcel Bühlmann et.al. | 2505.04403 | null |
| 2025-05-07 | Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced Datasets | Mateo Lopez-Ledezma et.al. | 2505.04204 | null |
| 2025-05-06 | Extending Decision Predicate Graphs for Comprehensive Explanation of Isolation Forest | Matteo Ceschin et.al. | 2505.04019 | null |
| 2025-05-06 | Using anomaly detection to search for technosignatures in Breakthrough Listen observations | Snir Pardo et.al. | 2505.03927 | null |
| 2025-05-06 | Explaining Anomalies with Tensor Networks | Hans Hohenfeld et.al. | 2505.03911 | null |
| 2025-05-06 | AnomalyMatch: Discovering Rare Objects of Interest with Semi-supervised and Active Learning | Pablo Gómez et.al. | 2505.03509 | null |
| 2025-05-06 | CXR-AD: Component X-ray Image Dataset for Industrial Anomaly Detection | Haoyu Bai et.al. | 2505.03412 | null |
| 2025-05-06 | Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity | Shahroz Tariq et.al. | 2505.03179 | null |
| 2025-05-06 | Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems | Abdul Mustafa et.al. | 2505.03120 | null |
| 2025-05-05 | An Explainable Anomaly Detection Framework for Monitoring Depression and Anxiety Using Consumer Wearable Devices | Yuezhou Zhang et.al. | 2505.03039 | null |
| 2025-05-05 | Fast and Precise Track Fitting with Machine Learning | Ryan Miller et.al. | 2505.02937 | null |
| 2025-05-05 | A robust neural determination of the source-count distribution of the Fermi-LAT sky at high latitudes | Christopher Eckner et.al. | 2505.02906 | null |
| 2025-05-05 | Detect, Classify, Act: Categorizing Industrial Anomalies with Multi-Modal Large Language Models | Sassan Mokhtar et.al. | 2505.02626 | null |
| 2025-05-05 | Lane-Wise Highway Anomaly Detection | Mei Qiu et.al. | 2505.02613 | null |
| 2025-05-05 | A probabilistic view on Riemannian machine learning models for SPD matrices | Thibault de Surrel et.al. | 2505.02402 | null |
| 2025-05-05 | Uncertainty-Weighted Image-Event Multimodal Fusion for Video Anomaly Detection | Sungheon Jeong et.al. | 2505.02393 | link |
| 2025-05-05 | Quantum-assited anomaly detection with multivariate Gaussian distribution | Chao-Hua Yu et.al. | 2505.02316 | null |
| 2025-05-04 | ProDisc-VAD: An Efficient System for Weakly-Supervised Anomaly Detection in Video Surveillance Applications | Tao Zhu et.al. | 2505.02179 | link |
| 2025-05-04 | Spotting the Unexpected (STU): A 3D LiDAR Dataset for Anomaly Segmentation in Autonomous Driving | Alexey Nekrasov et.al. | 2505.02148 | null |
| 2025-05-04 | MC3D-AD: A Unified Geometry-aware Reconstruction Model for Multi-category 3D Anomaly Detection | Jiayi Cheng et.al. | 2505.01969 | null |
| 2025-05-03 | Runtime Anomaly Detection for Drones: An Integrated Rule-Mining and Unsupervised-Learning Approach | Ivan Tan et.al. | 2505.01947 | null |
| 2025-05-03 | Context-Aware Online Conformal Anomaly Detection with Prediction-Powered Data Acquisition | Amirmohammad Farzaneh et.al. | 2505.01783 | null |
| 2025-05-02 | Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability | Anass Grini et.al. | 2505.01328 | null |
| 2025-05-02 | Secure Cluster-Based Hierarchical Federated Learning in Vehicular Networks | M. Saeid HaghighiFard et.al. | 2505.01186 | null |
| 2025-05-02 | Quantum Support Vector Regression for Robust Anomaly Detection | Kilian Tscharke et.al. | 2505.01012 | null |
| 2025-05-02 | Addressing Noise and Stochasticity in Fraud Detection for Service Networks | Wenxin Zhang et.al. | 2505.00946 | null |
| 2025-05-02 | FreCT: Frequency-augmented Convolutional Transformer for Robust Time Series Anomaly Detection | Wenxin Zhang et.al. | 2505.00941 | null |
| 2025-05-02 | MARS: Defending Unmanned Aerial Vehicles From Attacks on Inertial Sensors with Model-based Anomaly Detection and Recovery | Haocheng Meng et.al. | 2505.00924 | null |
| 2025-05-01 | CICADA: Cross-Domain Interpretable Coding for Anomaly Detection and Adaptation in Multivariate Time Series | Tian Lan et.al. | 2505.00415 | null |
| 2025-05-01 | LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems | Yazan Otoum et.al. | 2505.00240 | null |
| 2025-04-30 | Toward Practical Quantum Machine Learning: A Novel Hybrid Quantum LSTM for Fraud Detection | Rushikesh Ubale et.al. | 2505.00137 | null |
| 2025-04-30 | Anomaly-Driven Approach for Enhanced Prostate Cancer Segmentation | Alessia Hu et.al. | 2504.21789 | null |
| 2025-04-30 | Overlapping data in network protocols: bridging OS and NIDS reassembly gap | Lucas Aubard et.al. | 2504.21618 | null |
| 2025-04-30 | Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation | Bikash Saha et.al. | 2504.21574 | null |
| 2025-04-30 | Enhanced Semi-Supervised Stamping Process Monitoring with Physically-Informed Feature Extraction | Jianyu Zhang et.al. | 2504.21389 | null |
| 2025-04-30 | Are Haicheng and Tangshan Earthquakes Dragon-Kings? | Jiawei Li et.al. | 2504.21310 | null |
| 2025-04-30 | Learning Multi-view Multi-class Anomaly Detection | Qianzi Yu et.al. | 2504.21294 | null |
| 2025-04-30 | Subject Information Extraction for Novelty Detection with Domain Shifts | Yangyang Qu et.al. | 2504.21247 | null |
| 2025-04-29 | Optimized Quantum Embedding: A Universal Minor-Embedding Framework for Large Complete Bipartite Graph | Salvatore Sinno et.al. | 2504.21112 | null |
| 2025-04-29 | On the Potential of Large Language Models to Solve Semantics-Aware Process Mining Tasks | Adrian Rebmann et.al. | 2504.21074 | null |
| 2025-04-29 | Leveraging Generative AI Through Prompt Engineering and Rigorous Validation to Create Comprehensive Synthetic Datasets for AI Training in Healthcare | Polycarp Nalela et.al. | 2504.20921 | null |
| 2025-04-29 | GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In Industrial Control Systems | Sarad Venugopalan et.al. | 2504.20906 | null |
| 2025-04-29 | Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking | Dayananda Herurkar et.al. | 2504.20900 | null |
| 2025-04-29 | Tabular Data Adapters: Improving Outlier Detection for Unlabeled Private Data | Dayananda Herurkar et.al. | 2504.20862 | null |
| 2025-04-29 | Unsupervised Surrogate Anomaly Detection | Simon Klüttermann et.al. | 2504.20733 | null |
| 2025-04-28 | The Dark Side of Digital Twins: Adversarial Attacks on AI-Driven Water Forecasting | Mohammadhossein Homaei et.al. | 2504.20295 | null |
| 2025-04-28 | Smart Water Security with AI and Blockchain-Enhanced Digital Twins | Mohammadhossein Homaei et.al. | 2504.20275 | null |
| 2025-04-28 | A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems | Mohammadhossein Homaei et.al. | 2504.20266 | null |
| 2025-04-28 | Cybersecurity for Autonomous Vehicles | Sai varun reddy Bhemavarapu et.al. | 2504.20180 | null |
| 2025-04-28 | A Novel Multilevel Taxonomical Approach for Describing High-Dimensional Unlabeled Movement Data | Yashat Tavakoli et.al. | 2504.20174 | null |
| 2025-04-28 | Simplified and Secure MCP Gateways for Enterprise AI Integration | Ivo Brett et.al. | 2504.19997 | null |
| 2025-04-28 | Shopformer: Transformer-Based Framework for Detecting Shoplifting via Human Pose | Narges Rashvand et.al. | 2504.19970 | null |
| 2025-04-28 | QFDNN: A Resource-Efficient Variational Quantum Feature Deep Neural Networks for Fraud Detection and Loan Prediction | Subham Das et.al. | 2504.19632 | null |
| 2025-04-28 | LR-IAD:Mask-Free Industrial Anomaly Detection with Logical Reasoning | Peijian Zeng et.al. | 2504.19524 | null |
| 2025-04-27 | Segmenting Objectiveness and Task-awareness Unknown Region for Autonomous Driving | Mi Zheng et.al. | 2504.19183 | null |
| 2025-04-26 | Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization | Abdelaziz Amara korba et.al. | 2504.18814 | null |
| 2025-04-26 | Reservoir-enhanced Segment Anything Model for Subsurface Diagnosis | Xiren Zhou et.al. | 2504.18802 | null |
| 2025-04-26 | ALF: Advertiser Large Foundation Model for Multi-Modal Advertiser Understanding | Santosh Rajagopalan et.al. | 2504.18785 | null |
| 2025-04-26 | Performance of Machine Learning Classifiers for Anomaly Detection in Cyber Security Applications | Markus Haug et.al. | 2504.18771 | null |
| 2025-04-25 | Unsupervised outlier detection to improve bird audio dataset labels | Bruce Collins et.al. | 2504.18650 | null |
| 2025-04-25 | An Unsupervised Machine Learning Approach to Identify Spectral Energy Distribution Outliers: Application to the S-PLUS DR4 data | F. Quispe-Huaynasi et.al. | 2504.18491 | null |
| 2025-04-25 | Time and Frequency Domain-based Anomaly Detection in Smart Meter Data for Distribution Network Studies | Petar Labura et.al. | 2504.18231 | null |
| 2025-04-25 | Bayesian Quantum Orthogonal Neural Networks for Anomaly Detection | Natansh Mathur et.al. | 2504.18103 | null |
| 2025-04-24 | Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly Detection | Prashanth Krishnamurthy et.al. | 2504.17875 | null |
| 2025-04-24 | Fault Diagnosis in New Wind Turbines using Knowledge from Existing Turbines by Generative Domain Adaptation | Stefan Jonas et.al. | 2504.17709 | null |
| 2025-04-24 | MindFlow: A Network Traffic Anomaly Detection Model Based on MindSpore | Qiuyan Xiang et.al. | 2504.17678 | null |
| 2025-04-25 | PTCL: Pseudo-Label Temporal Curriculum Learning for Label-Limited Dynamic Graph | Shengtao Zhang et.al. | 2504.17641 | null |
| 2025-04-24 | Quantum Autoencoder for Multivariate Time Series Anomaly Detection | Kilian Tscharke et.al. | 2504.17548 | null |
| 2025-04-23 | Goodness-of-fit for amplitude analysis with anomaly detection | Huoyi Hou et.al. | 2504.17494 | null |
| 2025-04-24 | Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics | Abdallah Alalem Albustami et.al. | 2504.17211 | null |
| 2025-04-23 | Unsupervised Time-Series Signal Analysis with Autoencoders and Vision Transformers: A Review of Architectures and Applications | Hossein Ahmadi et.al. | 2504.16972 | null |
| 2025-04-23 | CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping | Eric Wagner et.al. | 2504.16695 | null |
| 2025-04-23 | A Collaborative Intrusion Detection System Using Snort IDS Nodes | Tom Davies et.al. | 2504.16550 | null |
| 2025-04-23 | Almost Right: Making First-layer Kernels Nearly Orthogonal Improves Model Generalization | Colton R. Crum et.al. | 2504.16362 | null |
| 2025-04-22 | Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security | Yazan Otoum et.al. | 2504.16226 | null |
| 2025-04-22 | Explainable Unsupervised Anomaly Detection with Random Forest | Joshua S. Harvey et.al. | 2504.16075 | null |
| 2025-04-22 | Adaptive PCA-Based Outlier Detection for Multi-Feature Time Series in Space Missions | Jonah Ekelund et.al. | 2504.15846 | null |
| 2025-04-22 | Bayesian Autoencoder for Medical Anomaly Detection: Uncertainty-Aware Approach for Brain 2 MRI Analysis | Dip Roy et.al. | 2504.15562 | null |
| 2025-04-21 | Application of Deep Generative Models for Anomaly Detection in Complex Financial Transactions | Tengda Tang et.al. | 2504.15491 | null |
| 2025-04-21 | FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection | Bradley Boswell et.al. | 2504.15375 | null |
| 2025-04-21 | M $^2$ AD: Multi-Sensor Multi-System Anomaly Detection through Global Scoring and Calibrated Thresholding | Sarah Alnegheimish et.al. | 2504.15225 | link |
| 2025-04-21 | GenCLIP: Generalizing CLIP Prompts for Zero-shot Anomaly Detection | Donghyeong Kim et.al. | 2504.14919 | null |
| 2025-04-21 | Memory-Augmented Dual-Decoder Networks for Multi-Class Unsupervised Anomaly Detection | Jingyu Xing et.al. | 2504.14884 | null |
| 2025-04-20 | Advancing Video Anomaly Detection: A Bi-Directional Hybrid Framework for Enhanced Single- and Multi-Task Approaches | Guodong Shen et.al. | 2504.14753 | null |
| 2025-04-20 | Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs | Jayanth Bhargav et.al. | 2504.14725 | null |
| 2025-04-20 | Uncovering Issues in the Radio Access Network by Looking at the Neighbors | José Suárez-Varela et.al. | 2504.14686 | null |
| 2025-04-20 | Hierarchical Robust PCA for Scalable Data Quality Monitoring in Multi-level Aggregation Pipelines | Preetam Kumar Ojha et.al. | 2504.14524 | null |
| 2025-04-20 | Application of Deep Reinforcement Learning for Intrusion Detection in Internet of Things: A Systematic Review | Saeid Jamshidia et.al. | 2504.14436 | null |
| 2025-04-19 | Balancing Privacy and Action Performance: A Penalty-Driven Approach to Image Anonymization | Nazia Aslam et.al. | 2504.14301 | null |
| 2025-04-19 | A Pre-Training and Adaptive Fine-Tuning Framework for Graph Anomaly Detection | Yunhui Liu et.al. | 2504.14250 | null |
| 2025-04-18 | Enhancing Pothole Detection and Characterization: Integrated Segmentation and Depth Estimation in Road Anomaly Systems | Uthman Baroudi et.al. | 2504.13648 | null |
| 2025-04-18 | Can Local Representation Alignment RNNs Solve Temporal Tasks? | Nikolay Manchev et.al. | 2504.13531 | null |
| 2025-04-18 | Chain-of-Thought Textual Reasoning for Few-shot Temporal Action Localization | Hongwei Ji et.al. | 2504.13460 | null |
| 2025-04-18 | Towards a Multi-Agent Vision-Language System for Zero-Shot Novel Hazardous Object Detection for Autonomous Driving Safety | Shashank Shriram et.al. | 2504.13399 | null |
| 2025-04-17 | DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks | Jing Chen et.al. | 2504.13301 | null |
| 2025-04-17 | Weakly supervised anomaly detection with event-level variables | Liam Brennan et.al. | 2504.13249 | null |
| 2025-04-17 | Predicting BVD Re-emergence in Irish Cattle From Highly Imbalanced Herd-Level Data Using Machine Learning Algorithms | Niamh Mimnagh et.al. | 2504.13116 | null |
| 2025-04-17 | Quorum: Zero-Training Unsupervised Anomaly Detection using Quantum Autoencoders | Jason Zev Ludmir et.al. | 2504.13113 | link |
| 2025-04-17 | EventVAD: Training-Free Event-Aware Video Anomaly Detection | Yihua Shao et.al. | 2504.13092 | null |
| 2025-04-17 | MathPhys-Guided Coarse-to-Fine Anomaly Synthesis with SQE-Driven Bi-Level Optimization for Anomaly Detection | Long Qian et.al. | 2504.12970 | null |
| 2025-04-17 | Sliced-Wasserstein Distance-based Data Selection | Julien Pallage et.al. | 2504.12918 | null |
| 2025-04-17 | 3D-PNAS: 3D Industrial Surface Anomaly Synthesis with Perlin Noise | Yifeng Cheng et.al. | 2504.12856 | null |
| 2025-04-17 | LAD-Reasoner: Tiny Multimodal Models are Good Reasoners for Logical Anomaly Detection | Weijia Li et.al. | 2504.12749 | null |
| 2025-04-17 | HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset | Qishan Wang et.al. | 2504.12689 | link |
| 2025-04-16 | Enhancing Sensitivity for Di-Higgs Boson Searches Using Anomaly Detection and Supervised Machine Learning Techniques | Sergei V. Chekanov et.al. | 2504.12418 | null |
| 2025-04-16 | AnomalyGen: An Automated Semantic Log Sequence Generation Framework with LLM for Anomaly Detection | Xinyu Li et.al. | 2504.12250 | null |
| 2025-04-16 | LO2: Microservice API Anomaly Dataset of Logs and Metrics | Alexander Bakhtin et.al. | 2504.12067 | null |
| 2025-04-16 | AnomalyR1: A GRPO-based End-to-end MLLM for Industrial Anomaly Detection | Yuhao Chao et.al. | 2504.11914 | null |
| 2025-04-16 | Search is All You Need for Few-shot Anomaly Detection | Qishan Wang et.al. | 2504.11895 | link |
| 2025-04-16 | Federated Spectral Graph Transformers Meet Neural Ordinary Differential Equations for Non-IID Graphs | Kishan Gurumurthy et.al. | 2504.11808 | null |
| 2025-04-16 | ACMamba: Fast Unsupervised Anomaly Detection via An Asymmetrical Consensus State Space Model | Guanchun Wang et.al. | 2504.11781 | null |
| 2025-04-15 | Possibility for Proactive Anomaly Detection | Jinsung Jeon et.al. | 2504.11623 | null |
| 2025-04-15 | Strengthening Anomaly Awareness | Adam Banda et.al. | 2504.11520 | null |
| 2025-04-15 | HeatSense: Intelligent Thermal Anomaly Detection for Securing NoC-Enabled MPSoCs | Mahdi Hasanzadeh et.al. | 2504.11421 | null |
| 2025-04-16 | A Real-time Anomaly Detection Method for Robots based on a Flexible and Sparse Latent Space | Taewook Kang et.al. | 2504.11170 | null |
| 2025-04-15 | Crane: Context-Guided Prompt Learning and Attention Refinement for Zero-Shot Anomaly Detections | Alireza Salehi et.al. | 2504.11055 | null |
| 2025-04-15 | AFiRe: Anatomy-Driven Self-Supervised Learning for Fine-Grained Representation in Radiographic Images | Yihang Liu et.al. | 2504.10972 | null |
| 2025-04-14 | Optimising Intrusion Detection Systems in Cloud-Edge Continuum with Knowledge Distillation for Privacy-Preserving and Efficient Communication | Soad Almabdy et.al. | 2504.10698 | null |
| 2025-04-14 | SlowFastVAD: Video Anomaly Detection via Integrating Simple Detector and RAG-Enhanced Vision-Language Model | Zongcan Ding et.al. | 2504.10320 | null |
| 2025-04-14 | ROSFD: Robust Online Streaming Fraud Detection with Resilience to Concept Drift in Data Streams | Vivek Yelleti et.al. | 2504.10229 | null |
| 2025-04-14 | Investigating the Role of Bilateral Symmetry for Inpainting Brain MRI | Sergey Kuznetsov et.al. | 2504.10039 | null |
| 2025-04-13 | Evaluating Machine Learning-Driven Intrusion Detection Systems in IoT: Performance and Energy Consumption | Saeid Jamshidi et.al. | 2504.09634 | null |
| 2025-04-13 | MADLLM: Multivariate Anomaly Detection via Pre-trained LLMs | Wei Tao et.al. | 2504.09504 | null |
| 2025-04-12 | Dupin: A Parallel Framework for Densest Subgraph Discovery in Fraud Detection on Massive Graphs (Technical Report) | Jiaxin Jiang et.al. | 2504.09311 | null |
| 2025-04-12 | Secure Physical Layer Communications for Low-Altitude Economy Networking: A Survey | Lingyi Cai et.al. | 2504.09153 | null |
| 2025-04-12 | CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift | Jiongchi Yu et.al. | 2504.09115 | null |
| 2025-04-12 | Leveraging Large Self-Supervised Time-Series Models for Transferable Diagnosis in Cross-Aircraft Type Bleed Air System | Yilin Wang et.al. | 2504.09090 | null |
| 2025-04-11 | Toward Realistic Adversarial Attacks in IDS: A Novel Feasibility Metric for Transferability | Sabrine Ennaji et.al. | 2504.08480 | null |
| 2025-04-11 | DaemonSec: Examining the Role of Machine Learning for Daemon Security in Linux Environments | Sheikh Muhammad Farjad et.al. | 2504.08227 | null |
| 2025-04-11 | Detecting Credit Card Fraud via Heterogeneous Graph Neural Networks with Graph Attention | Qiuwu Sha et.al. | 2504.08183 | null |
| 2025-04-10 | Benchmarking Suite for Synthetic Aperture Radar Imagery Anomaly Detection (SARIAD) Algorithms | Lucian Chauvina et.al. | 2504.08115 | null |
| 2025-04-10 | Dataset of artefacts for machine learning applications in astronomy | Sreevarsha Sreejith et.al. | 2504.08053 | null |
| 2025-04-10 | Patch distribution modeling framework adaptive cosine estimator (PaDiM-ACE) for anomaly detection and localization in synthetic aperture radar imagery | Angelina Ibarra et.al. | 2504.08049 | null |
| 2025-04-10 | Deep Learning-based Intrusion Detection Systems: A Survey | Zhiwei Xu et.al. | 2504.07839 | null |
| 2025-04-10 | PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization | Yang Jiao et.al. | 2504.07717 | null |
| 2025-04-10 | Adversarial Subspace Generation for Outlier Detection in High-Dimensional Data | Jose Cribeiro-Ramallo et.al. | 2504.07522 | link |
| 2025-04-10 | Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security | Caroline Panggabean et.al. | 2504.07478 | null |
| 2025-04-09 | Leveraging Machine Learning Techniques in Intrusion Detection Systems for Internet of Things | Saeid Jamshidi et.al. | 2504.07220 | null |
| 2025-04-09 | Weak Signals and Heavy Tails: Machine-learning meets Extreme Value Theory | Stephan Clémençon et.al. | 2504.06984 | null |
| 2025-04-09 | MultiADS: Defect-aware Supervision for Multi-type Anomaly Detection and Segmentation in Zero-Shot Learning | Ylli Sadikaj et.al. | 2504.06740 | null |
| 2025-04-10 | AMAD: AutoMasked Attention for Unsupervised Multivariate Time Series Anomaly Detection | Tiange Huang et.al. | 2504.06643 | null |
| 2025-04-08 | TRIDENT: Tri-modal Real-time Intrusion Detection Engine for New Targets | Ildi Alla et.al. | 2504.06417 | link |
| 2025-04-08 | A Case for Network-wide Orchestration of Host-based Intrusion Detection and Response | Mark Timmons et.al. | 2504.06241 | null |
| 2025-04-08 | A Self-Supervised Framework for Space Object Behaviour Characterisation | Ian Groves et.al. | 2504.06176 | null |
| 2025-04-08 | Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks | Eric Wagner et.al. | 2504.06102 | null |
| 2025-04-08 | MCAT: Visual Query-Based Localization of Standard Anatomical Clips in Fetal Ultrasound Videos Using Multi-Tier Class-Aware Token Transformer | Divyanshu Mishra et.al. | 2504.06088 | null |
| 2025-04-08 | Enhanced Anomaly Detection for Capsule Endoscopy Using Ensemble Learning Strategies | Julia Werner et.al. | 2504.06039 | null |
| 2025-04-08 | Autoencoder-Based Detection of Anomalous Stokes V Spectra in the Flare-Producing Active Region 13663 Using Hinode/SP Observations | Jargalmaa Batmunkh et.al. | 2504.05962 | null |
| 2025-04-08 | Addressing Class Imbalance with Probabilistic Graphical Models and Variational Inference | Yujia Lou et.al. | 2504.05758 | null |
| 2025-04-08 | Reconstruction-Free Anomaly Detection with Diffusion Models via Direct Latent Likelihood Evaluation | Shunsuke Sakai et.al. | 2504.05662 | null |
| 2025-04-07 | Towards Efficient Real-Time Video Motion Transfer via Generative Time Series Modeling | Tasmiah Haque et.al. | 2504.05537 | null |
| 2025-04-07 | On multipolar magnetic anomaly detection: multipolar signal subspaces, an analytical orthonormal basis, multipolar truncature and detection performance | Clément Chenevas-Paule et.al. | 2504.05212 | null |
| 2025-04-07 | IterMask3D: Unsupervised Anomaly Detection and Segmentation with Test-Time Iterative Mask Refinement in 3D Brain MR | Ziyun Liang et.al. | 2504.04911 | null |
| 2025-04-07 | SoK: LLM-based Log Parsing | Viktor Beck et.al. | 2504.04877 | null |
| 2025-04-06 | AVadCLIP: Audio-Visual Collaboration for Robust Video Anomaly Detection | Peng Wu et.al. | 2504.04495 | null |
| 2025-04-06 | iADCPS: Time Series Anomaly Detection for Evolving Cyber-physical Systems via Incremental Meta-learning | Jiyu Tian et.al. | 2504.04374 | null |
| 2025-04-06 | WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems | Sameera K. M. et.al. | 2504.04367 | null |
| 2025-04-06 | AnomalyHybrid: A Domain-agnostic Generative Framework for General Anomaly Detection | Ying Zhao et.al. | 2504.04340 | null |
| 2025-04-05 | AttackLLM: LLM-based Attack Pattern Generation for an Industrial Control System | Chuadhry Mujeeb Ahmed et.al. | 2504.04187 | null |
| 2025-04-05 | Overcoming the Identity Mapping Problem in Self-Supervised Hyperspectral Anomaly Detection | Yongchuan Cui et.al. | 2504.04115 | null |
| 2025-04-05 | Foundation Models for Time Series: A Survey | Siva Rama Krishna Kottapalli et.al. | 2504.04011 | null |
| 2025-04-04 | Pyramid-based Mamba Multi-class Unsupervised Anomaly Detection | Nasar Iqbal et.al. | 2504.03442 | null |
| 2025-04-04 | Multi-Flow: Multi-View-Enriched Normalizing Flows for Industrial Anomaly Detection | Mathis Kruse et.al. | 2504.03306 | null |
| 2025-04-04 | Search for anomalous quartic gauge couplings in the process $μ^+μ^-\to \barννγγ$ with a nested local outlier factor | Ke-Xin Chen et.al. | 2504.03145 | null |
| 2025-04-03 | Anomaly Detection in Time Series Data Using Reinforcement Learning, Variational Autoencoder, and Active Learning | Bahareh Golchin et.al. | 2504.02999 | null |
| 2025-04-03 | Improving log-based anomaly detection through learned adaptive filter | Yiyuan Xiong et.al. | 2504.02994 | null |
| 2025-04-03 | TailedCore: Few-Shot Sampling for Unsupervised Long-Tail Noisy Anomaly Detection | Yoon Gyo Jung et.al. | 2504.02775 | null |
| 2025-04-03 | Analytical Discovery of Manifold with Machine Learning | Yafei Shen et.al. | 2504.02511 | null |
| 2025-04-03 | ZClip: Adaptive Spike Mitigation for LLM Pre-Training | Abhay Kumar et.al. | 2504.02507 | link |
| 2025-04-03 | VISTA: Unsupervised 2D Temporal Dependency Representations for Time Series Anomaly Detection | Sinchee Chin et.al. | 2504.02498 | null |
| 2025-04-03 | Robust Randomized Low-Rank Approximation with Row-Wise Outlier Detection | Aidan Tiruvan et.al. | 2504.02432 | null |
| 2025-04-03 | Distributed Log-driven Anomaly Detection System based on Evolving Decision Making | Zhuoran Tan et.al. | 2504.02322 | null |
| 2025-04-03 | Enhancing Customer Contact Efficiency with Graph Neural Networks in Credit Card Fraud Detection Workflow | Menghao Huo et.al. | 2504.02275 | null |
| 2025-04-03 | CRC-SGAD: Conformal Risk Control for Supervised Graph Anomaly Detection | Songran Bai et.al. | 2504.02248 | null |
| 2025-04-02 | LogLSHD: Fast Log Parsing with Locality-Sensitive Hashing and Dynamic Time Warping | Shu-Wei Huang et.al. | 2504.02172 | null |
| 2025-04-03 | Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries | Furkan Çolhak et.al. | 2504.01905 | null |
| 2025-04-02 | CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat Detection | Diego Cajaraville-Aboy et.al. | 2504.01882 | null |
| 2025-04-02 | What is AI, what is it not, how we use it in physics and how it impacts… you | Claire David et.al. | 2504.01827 | null |
| 2025-04-02 | Anomaly Detection for Hybrid Butterfly Subspecies via Probability Filtering | Bo-Kai Ruan et.al. | 2504.01671 | null |
| 2025-04-02 | The Multifractal IP Address Structure: Physical Explanation and Implications | Chris Misa et.al. | 2504.01374 | null |
| 2025-04-01 | Towards Resilient Federated Learning in CyberEdge Networks: Recent Advances and Future Trends | Kai Li et.al. | 2504.01240 | null |
| 2025-04-01 | Conformal Anomaly Detection for Functional Data with Elastic Distance Metrics | Jason Adams et.al. | 2504.01172 | null |
| 2025-04-01 | Efficient State Estimation of a Networked FlipIt Model | Brandon Collins et.al. | 2504.01096 | null |
| 2025-04-01 | Detection of Anomalous Vehicular Traffic and Sensor Failures Using Data Clustering Techniques | Davide Moretti et.al. | 2504.00881 | null |
| 2025-04-01 | FeatInsight: An Online ML Feature Management System on 4Paradigm Sage-Studio Platform | Xin Tong et.al. | 2504.00786 | null |
| 2025-04-01 | TeleAntiFraud-28k: An Audio-Text Slow-Thinking Dataset for Telecom Fraud Detection | Zhiming Ma et.al. | 2503.24115 | link |
| 2025-03-31 | Federated Structured Sparse PCA for Anomaly Detection in IoT Networks | Chenyi Huang et.al. | 2503.23981 | null |
| 2025-03-31 | Detecting Localized Density Anomalies in Multivariate Data via Coin-Flip Statistics | Sebastian Springer et.al. | 2503.23927 | link |
| 2025-03-31 | Evaluation of (Un-)Supervised Machine Learning Methods for GNSS Interference Classification with Real-World Data Discrepancies | Lucas Heublein et.al. | 2503.23775 | null |
| 2025-03-30 | Beyond Academic Benchmarks: Critical Analysis and Best Practices for Visual Industrial Anomaly Detection | Aimira Baitieva et.al. | 2503.23451 | null |
| 2025-03-29 | Unsupervised Anomaly Detection in Multivariate Time Series across Heterogeneous Domains | Vincent Jacob et.al. | 2503.23060 | link |
| 2025-03-28 | A Dataset for Semantic Segmentation in the Presence of Unknowns | Zakaria Laskar et.al. | 2503.22309 | null |
| 2025-03-28 | Federated Intrusion Detection System Based on Unsupervised Machine Learning | Maxime Gourceyraud et.al. | 2503.22065 | null |
| 2025-03-27 | AssistPDA: An Online Video Surveillance Assistant for Video Anomaly Prediction, Detection, and Analysis | Zhiwei Yang et.al. | 2503.21904 | null |
| 2025-03-27 | VBench-2.0: Advancing Video Generation Benchmark Suite for Intrinsic Faithfulness | Dian Zheng et.al. | 2503.21755 | link |
| 2025-03-27 | The MVTec AD 2 Dataset: Advanced Scenarios for Unsupervised Anomaly Detection | Lars Heckler-Kram et.al. | 2503.21622 | null |
| 2025-03-27 | Advancing CAN Network Security through RBM-Based Synthetic Attack Data Generation for Intrusion Detection Systems | Huacheng Li et.al. | 2503.21496 | link |
| 2025-03-27 | Unveiling Latent Information in Transaction Hashes: Hypergraph Learning for Ethereum Ponzi Scheme Detection | Junhao Wu et.al. | 2503.21463 | null |
| 2025-03-27 | VADMamba: Exploring State Space Models for Fast Video Anomaly Detection | Jiahao Lyu et.al. | 2503.21169 | link |
| 2025-03-27 | A Data Balancing and Ensemble Learning Approach for Credit Card Fraud Detection | Yuhan Wang et.al. | 2503.21160 | null |
| 2025-03-28 | Omni-AD: Learning to Reconstruct Global and Local Features for Multi-class Anomaly Detection | Jiajie Quan et.al. | 2503.21125 | null |
| 2025-03-26 | Channel impulse response peak clustering using neural networks | Petr Horky et.al. | 2503.20838 | null |
| 2025-03-26 | Stabilizing Neural Likelihood Ratio Estimation | Fernando Torales Acosta et.al. | 2503.20753 | null |
| 2025-03-26 | $β$ -GNN: A Robust Ensemble Approach Against Graph Structure Perturbation | Haci Ismail Aslan et.al. | 2503.20630 | null |
| 2025-03-26 | Are We There Yet? Unraveling the State-of-the-Art Graph Network Intrusion Detection Systems | Chenglong Wang et.al. | 2503.20281 | null |
| 2025-03-26 | LogicQA: Logical Anomaly Detection with Vision Language Model Generated Questions | Yejin Kwon et.al. | 2503.20252 | null |
| 2025-03-25 | Video Anomaly Detection with Contours - A Study | Mia Siemon et.al. | 2503.19588 | null |
| 2025-03-25 | Post-Hoc Calibrated Anomaly Detection | Sean Gloumeau et.al. | 2503.19577 | null |
| 2025-03-25 | Bayesian Outlier Detection for Matrix-variate Models | Monica Billio et.al. | 2503.19515 | null |
| 2025-03-25 | Social Network User Profiling for Anomaly Detection Based on Graph Neural Networks | Yiwei Zhang et.al. | 2503.19380 | null |
| 2025-03-25 | Correcting Deviations from Normality: A Reformulated Diffusion Model for Multi-Class Unsupervised Anomaly Detection | Farzad Beizaee et.al. | 2503.19357 | link |
| 2025-03-25 | Efficient IoT Intrusion Detection with an Improved Attention-Based CNN-BiLSTM Architecture | Amna Naeem et.al. | 2503.19339 | null |
| 2025-03-24 | Risk-Based Thresholding for Reliable Anomaly Detection in Concentrated Solar Power Plants | Yorick Estievenart et.al. | 2503.19146 | null |
| 2025-03-24 | Anomaly Detection Using Computer Vision: A Comparative Analysis of Class Distinction and Performance Metrics | Md. Barkat Ullah Tusher et.al. | 2503.19100 | null |
| 2025-03-24 | Unsupervised Detection of Fraudulent Transactions in E-commerce Using Contrastive Learning | Xuan Li et.al. | 2503.18841 | null |
| 2025-03-24 | CRCL: Causal Representation Consistency Learning for Anomaly Detection in Surveillance Videos | Yang Liu et.al. | 2503.18808 | null |
| 2025-03-24 | Oaken: Fast and Efficient LLM Serving with Online-Offline Hybrid KV Cache Quantization | Minsu Kim et.al. | 2503.18599 | null |
| 2025-03-24 | RoCA: Robust Contrastive One-class Time Series Anomaly Detection with Contaminated Data | Xudong Mou et.al. | 2503.18385 | null |
| 2025-03-24 | PS-EIP: Robust Photometric Stereo Based on Event Interval Profile | Kazuma Kitazawa et.al. | 2503.18341 | null |
| 2025-03-24 | Towards Training-free Anomaly Detection with Vision and Language Foundation Models | Jinjin Zhang et.al. | 2503.18325 | link |
| 2025-03-24 | Knowledge Transfer from LLMs to Provenance Analysis: A Semantic-Augmented Method for APT Detection | Fei Zuo et.al. | 2503.18316 | null |
| 2025-03-23 | Enhance GNNs with Reliable Confidence Estimation via Adversarial Calibration Learning | Yilong Wang et.al. | 2503.18235 | null |
| 2025-03-23 | Anomize: Better Open Vocabulary Video Anomaly Detection | Fei Li et.al. | 2503.18094 | null |
| 2025-03-23 | Anomaly Detection and Localization for Speech Deepfakes via Feature Pyramid Matching | Emma Coletta et.al. | 2503.18032 | null |
| 2025-03-21 | ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems | Kai Wang et.al. | 2503.17067 | null |
| 2025-03-21 | TRACE: Time SeRies PArameter EffiCient FinE-tuning | Yuze Li et.al. | 2503.16991 | null |
| 2025-03-20 | Catalog-based detection of unrecognized blends in deep optical ground based catalogs | Shuang Liang et.al. | 2503.16680 | null |
| 2025-03-20 | Benchmarking Visual Language Models on Standardized Visualization Literacy Tests | Saugat Pandey et.al. | 2503.16632 | null |
| 2025-03-20 | A Dataset of Performance Measurements and Alerts from Mozilla (Data Artifact) | Mohamed Bilel Besbes et.al. | 2503.16332 | null |
| 2025-03-20 | Multivariate Time Series Anomaly Detection in Industry 5.0 | Lorenzo Colombi et.al. | 2503.15946 | null |
| 2025-03-20 | A multi-model approach using XAI and anomaly detection to predict asteroid hazards | Amit Kumar Mondal et.al. | 2503.15901 | null |
| 2025-03-20 | WeirdFlows: Anomaly Detection in Financial Transaction Flows | Arthur Capozzi et.al. | 2503.15896 | null |
| 2025-03-19 | Reducing Communication Overhead in Federated Learning for Network Anomaly Detection with Adaptive Client Selection | William Marfo et.al. | 2503.15448 | null |
| 2025-03-19 | Automated Processing of eXplainable Artificial Intelligence Outputs in Deep Learning Models for Fault Diagnostics of Large Infrastructures | Giovanni Floreale et.al. | 2503.15415 | null |
| 2025-03-19 | Euclid Quick Data Release (Q1) Exploring galaxy properties with a multi-modal foundation model | Euclid Collaboration et.al. | 2503.15312 | null |
| 2025-03-19 | Robust Distribution Alignment for Industrial Anomaly Detection under Distribution Shift | Jingyi Liao et.al. | 2503.14910 | null |
| 2025-03-19 | FetalFlex: Anatomy-Guided Diffusion Model for Flexible Control on Fetal Ultrasound Image Synthesis | Yaofei Duan et.al. | 2503.14906 | null |
| 2025-03-19 | LogLLaMA: Transformer-based log anomaly detection with LLaMA | Zhuoyi Yang et.al. | 2503.14849 | null |
| 2025-03-19 | Pruning-Based TinyML Optimization of Machine Learning Models for Anomaly Detection in Electric Vehicle Charging Infrastructure | Fatemeh Dehrouyeh et.al. | 2503.14799 | null |
| 2025-03-18 | Entente: Cross-silo Intrusion Detection on Network Log Graphs with Federated Learning | Jiacen Xu et.al. | 2503.14284 | null |
| 2025-03-18 | EIAD: Explainable Industrial Anomaly Detection Via Multi-Modal Large Language Models | Zongyun Zhang et.al. | 2503.14162 | null |
| 2025-03-18 | Enhancing Kubernetes Resilience through Anomaly Detection and Prediction | V. Anemogiannis et.al. | 2503.14114 | null |
| 2025-03-18 | Scale-Aware Contrastive Reverse Distillation for Unsupervised Medical Anomaly Detection | Chunlei Li et.al. | 2503.13828 | null |
| 2025-03-17 | U2AD: Uncertainty-based Unsupervised Anomaly Detection Framework for Detecting T2 Hyperintensity in MRI Spinal Cord | Qi Zhang et.al. | 2503.13400 | null |
| 2025-03-17 | Highly Efficient Direct Analytics on Semantic-aware Time Series Data Compression | Guoyou Sun et.al. | 2503.13246 | null |
| 2025-03-17 | Deep Learning Advancements in Anomaly Detection: A Comprehensive Survey | Haoqi Huang et.al. | 2503.13195 | null |
| 2025-03-17 | Triad: Empowering LMM-based Anomaly Detection with Vision Expert-guided Visual Tokenizer and Manufacturing Process | Yuanze Li et.al. | 2503.13184 | link |
| 2025-03-17 | Language-guided Open-world Video Anomaly Detection | Zihao Liu et.al. | 2503.13160 | null |
| 2025-03-17 | MFP-CLIP: Exploring the Efficacy of Multi-Form Prompts for Zero-Shot Industrial Anomaly Detection | Jingyi Yuan et.al. | 2503.12910 | null |
| 2025-03-17 | UCF-Crime-DVS: A Novel Event-Based Dataset for Video Anomaly Detection with Spiking Neural Networks | Yuanbin Qian et.al. | 2503.12905 | null |
| 2025-03-16 | GraphEval: A Lightweight Graph-Based LLM Framework for Idea Evaluation | Tao Feng et.al. | 2503.12600 | null |
| 2025-03-16 | Time-EAPCR-T: A Universal Deep Learning Approach for Anomaly Detection in Industrial Equipment | Huajie Liang et.al. | 2503.12534 | null |
| 2025-03-16 | KDSelector: A Knowledge-Enhanced and Data-Efficient Model Selector Learning Framework for Time Series Anomaly Detection | Zhiyu Liang et.al. | 2503.12478 | null |
| 2025-03-14 | Contextual Similarity Distillation: Ensemble Uncertainties with a Single Model | Moritz A. Zanger et.al. | 2503.11339 | null |
| 2025-03-14 | Financial Fraud Detection with Entropy Computing | Babak Emami et.al. | 2503.11273 | null |
| 2025-03-14 | Federated Koopman-Reservoir Learning for Large-Scale Multivariate Time-Series Anomaly Detection | Long Tan Le et.al. | 2503.11255 | null |
| 2025-03-14 | A Novel Decomposed Feature-Oriented Framework for Open-Set Semantic Segmentation on LiDAR Data | Wenbang Deng et.al. | 2503.11097 | null |
| 2025-03-14 | Multi-View Industrial Anomaly Detection with Epipolar Constrained Cross-View Fusion | Yifan Liu et.al. | 2503.11088 | null |
| 2025-03-13 | OuroMamba: A Data-Free Quantization Framework for Vision Mamba Models | Akshat Ramachandran et.al. | 2503.10959 | null |
| 2025-03-13 | Hoi2Anomaly: An Explainable Anomaly Detection Approach Guided by Human-Object Interaction | Yuhan Wang et.al. | 2503.10508 | null |
| 2025-03-13 | An Open-RAN Testbed for Detecting and Mitigating Radio-Access Anomalies | Hanna Bogucka et.al. | 2503.10255 | null |
| 2025-03-13 | G $^{2}$ SF-MIAD: Geometry-Guided Score Fusion for Multimodal Industrial Anomaly Detection | Chengyu Tao et.al. | 2503.10091 | null |
| 2025-03-13 | Bayesian Prompt Flow Learning for Zero-Shot Anomaly Detection | Zhen Qu et.al. | 2503.10080 | link |
| 2025-03-13 | Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions | Jiani Fan et.al. | 2503.10058 | null |
| 2025-03-12 | Anomaly Detection to identify Transients in LSST Time Series Data | Miguel Crispim Romao et.al. | 2503.09699 | link |
| 2025-03-12 | Detecting and Preventing Data Poisoning Attacks on AI Models | Halima I. Kure et.al. | 2503.09302 | null |
| 2025-03-12 | Time-EAPCR: A Deep Learning-Based Novel Approach for Anomaly Detection Applied to the Environmental Field | Lei Liu et.al. | 2503.09200 | null |
| 2025-03-11 | Zero-to-One IDV: A Conceptual Model for AI-Powered Identity Verification | Aniket Vaidya et.al. | 2503.08734 | null |
| 2025-03-11 | A systematic literature review of unsupervised learning algorithms for anomalous traffic detection based on flows | Alberto Miguel-Diez et.al. | 2503.08293 | null |
| 2025-03-11 | Evidential Uncertainty Probes for Graph Neural Networks | Linlin Yu et.al. | 2503.08097 | null |
| 2025-03-11 | Adapting Large Language Models for Parameter-Efficient Log Anomaly Detection | Ying Fu Lim et.al. | 2503.08045 | null |
| 2025-03-11 | STEAD: Spatio-Temporal Efficient Anomaly Detection for Time and Compute Sensitive Applications | Andrew Gao et.al. | 2503.07942 | null |
| 2025-03-10 | Self-supervised Normality Learning and Divergence Vector-guided Model Merging for Zero-shot Congenital Heart Disease Detection in Fetal Ultrasound Videos | Pramit Saha et.al. | 2503.07799 | null |
| 2025-03-10 | A Time Series Multitask Framework Integrating a Large Language Model, Pre-Trained Time Series Model, and Knowledge Graph | Shule Hao et.al. | 2503.07682 | null |
| 2025-03-10 | Open-Set Gait Recognition from Sparse mmWave Radar Point Clouds | Riccardo Mazzieri et.al. | 2503.07435 | null |
| 2025-03-10 | ECNN: A Low-complex, Adjustable CNN for Industrial Pump Monitoring Using Vibration Data | Jonas Ney et.al. | 2503.07401 | null |
| 2025-03-10 | Probabilistic Segmentation for Robust Field of View Estimation | R. Spencer Hallyburton et.al. | 2503.07375 | null |
| 2025-03-11 | AnomalyPainter: Vision-Language-Diffusion Synergy for Zero-Shot Realistic and Diverse Industrial Anomaly Synthesis | Zhangyu Lai et.al. | 2503.07253 | null |
| 2025-03-10 | Learning Decision Trees as Amortized Structure Inference | Mohammed Mahfoud et.al. | 2503.06985 | link |
| 2025-03-09 | Task-Oriented Connectivity for Networked Robotics with Generative AI and Semantic Communications | Peizheng Li et.al. | 2503.06771 | null |
| 2025-03-09 | AA-CLIP: Enhancing Zero-shot Anomaly Detection via Anomaly-Aware CLIP | Wenxin Ma et.al. | 2503.06661 | null |
| 2025-03-09 | FaaSMT: Lightweight Serverless Framework for Intrusion Detection Using Merkle Tree and Task Inlining | Chuang Li et.al. | 2503.06532 | null |
| 2025-03-09 | StructVizor: Interactive Profiling of Semi-Structured Textual Data | Yanwei Huang et.al. | 2503.06500 | null |
| 2025-03-09 | Swift Hydra: Self-Reinforcing Generative Framework for Anomaly Detection with Multiple Mamba Models | Nguyen Do et.al. | 2503.06413 | null |
| 2025-03-07 | Removing Geometric Bias in One-Class Anomaly Detection with Adaptive Feature Perturbation | Romain Hermary et.al. | 2503.05520 | null |
| 2025-03-07 | Robust Intrusion Detection System with Explainable Artificial Intelligence | Betül Güvenç Paltun et.al. | 2503.05303 | null |
| 2025-03-07 | Spectral-Spatial Extraction through Layered Tensor Decomposition for Hyperspectral Anomaly Detection | Quan Yu et.al. | 2503.05183 | null |
| 2025-03-06 | ISP-AD: A Large-Scale Real-World Dataset for Advancing Industrial Anomaly Detection with Synthetic and Real Defects | Paul J. Krassnig et.al. | 2503.04997 | null |
| 2025-03-06 | AnyAnomaly: Zero-Shot Customizable Video Anomaly Detection with LVLM | Sunghyun Ahn et.al. | 2503.04504 | null |
| 2025-03-06 | Temporal Analysis of NetFlow Datasets for Network Intrusion Detection Systems | Majed Luay et.al. | 2503.04404 | null |
| 2025-03-06 | TRANSIT your events into a new mass: Fast background interpolation for weakly-supervised anomaly searches | Ivan Oleksiyuk et.al. | 2503.04342 | null |
| 2025-03-06 | Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset | Evgeniy Eremin et.al. | 2503.04178 | null |
| 2025-03-06 | UniNet: A Unified Multi-granular Traffic Modeling Framework for Network Security | Binghui Wu et.al. | 2503.04174 | null |
| 2025-03-05 | DeepGrav: Anomalous Gravitational-Wave Detection Through Deep Latent Features | Jianqi Yan et.al. | 2503.03799 | null |
| 2025-03-05 | PacketCLIP: Multi-Modal Embedding of Network Traffic and Language for Cybersecurity Reasoning | Ryozo Masukawa et.al. | 2503.03747 | null |
| 2025-03-06 | Towards Visual Discrimination and Reasoning of Real-World Physical Dynamics: Physics-Grounded Anomaly Detection | Wenqiao Li et.al. | 2503.03562 | null |
| 2025-03-05 | AI-Driven Multi-Stage Computer Vision System for Defect Detection in Laser-Engraved Industrial Nameplates | Adhish Anitha Vilasan et.al. | 2503.03395 | null |
| 2025-03-05 | Enhancing Cybersecurity in Critical Infrastructure with LLM-Assisted Explainable IoT Systems | Ashutosh Ghimire et.al. | 2503.03180 | null |
| 2025-03-05 | SoK: Knowledge is All You Need: Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs | Wenrui Cheng et.al. | 2503.03108 | null |
| 2025-03-04 | Intrusion Detection in IoT Networks Using Hyperdimensional Computing: A Case Study on the NSL-KDD Dataset | Ghazal Ghajari et.al. | 2503.03037 | null |
| 2025-03-04 | Network Anomaly Detection for IoT Using Hyperdimensional Computing on NSL-KDD | Ghazal Ghajari et.al. | 2503.03031 | null |
| 2025-03-04 | Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection | Ragini Gupta et.al. | 2503.03022 | null |
| 2025-03-04 | RAAD-LLM: Adaptive Anomaly Detection Using LLMs and RAG Integration | Alicia Russell-Gilbert et.al. | 2503.02800 | null |
| 2025-03-04 | Memory Efficient Continual Learning for Edge-Based Visual Anomaly Detection | Manuel Barusco et.al. | 2503.02691 | null |
| 2025-03-04 | World Models for Anomaly Detection during Model-Based Reinforcement Learning Inference | Fabian Domberg et.al. | 2503.02552 | null |
| 2025-03-04 | A compact unshielded optically-pumped magnetic gradiometer | Hangfei Ye et.al. | 2503.02507 | null |
| 2025-03-04 | Robust Multi-Source Domain Adaptation under Label Shift | Congbin Xu et.al. | 2503.02506 | null |
| 2025-03-04 | Monge-Kantorovich quantiles and ranks for image data | Gauthier Thurin et.al. | 2503.02427 | null |
| 2025-03-04 | Exploring Intrinsic Normal Prototypes within a Single Image for Universal Anomaly Detection | Wei Luo et.al. | 2503.02424 | link |
| 2025-03-04 | Anomaly detection in non-stationary videos using time-recursive differencing network based prediction | Gargi V. Pillai et.al. | 2503.02234 | null |
| 2025-03-03 | Aerial Infrared Health Monitoring of Solar Photovoltaic Farms at Scale | Isaac Corley et.al. | 2503.02128 | null |
| 2025-03-03 | Building Machine Learning Challenges for Anomaly Detection in Science | Elizabeth G. Campolongo et.al. | 2503.02112 | null |
| 2025-02-28 | Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis | Li Yang et.al. | 2502.21286 | null |
| 2025-02-28 | TimesBERT: A BERT-Style Foundation Model for Time Series Understanding | Haoran Zhang et.al. | 2502.21245 | null |
| 2025-02-28 | Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids | Abdallah Alalem Albustami et.al. | 2502.21146 | null |
| 2025-02-28 | Detection of anomalies in cow activity using wavelet transform based features | Valentin Guien et.al. | 2502.21051 | null |
| 2025-02-28 | When Unsupervised Domain Adaptation meets One-class Anomaly Detection: Addressing the Two-fold Unsupervised Curse by Leveraging Anomaly Scarcity | Nesryne Mejri et.al. | 2502.21022 | null |
| 2025-02-28 | FedDyMem: Efficient Federated Learning with Dynamic Memory and Memory-Reduce for Unsupervised Image Anomaly Detection | Silin Chen et.al. | 2502.21012 | null |
| 2025-02-28 | Distribution Prototype Diffusion Learning for Open-set Supervised Anomaly Detection | Fuyun Wang et.al. | 2502.20981 | null |
| 2025-02-28 | Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks | Li Yang et.al. | 2502.20627 | null |
| 2025-02-27 | Discovering Antagonists in Networks of Systems: Robot Deployment | Ingeborg Wenger et.al. | 2502.20125 | link |
| 2025-02-27 | One-for-More: Continual Diffusion Model for Anomaly Detection | Xiaofan Li et.al. | 2502.19848 | link |
| 2025-02-26 | Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without Retraining | Sam Pastoriza et.al. | 2502.19534 | null |
| 2025-02-26 | Anomaly Detection in Complex Dynamical Systems: A Systematic Framework Using Embedding Theory and Physics-Inspired Consistency | Michael Somma et.al. | 2502.19307 | null |
| 2025-02-26 | Corporate Fraud Detection in Rich-yet-Noisy Financial Graph | Shiqi Wang et.al. | 2502.19305 | null |
| 2025-02-26 | HDM: Hybrid Diffusion Model for Unified Image Anomaly Detection | Zekang Weng et.al. | 2502.19200 | null |
| 2025-02-26 | Towards Privacy-Preserving Anomaly-Based Intrusion Detection in Energy Communities | Zeeshan Afzal et.al. | 2502.19154 | null |
| 2025-02-26 | Random Similarity Isolation Forests | Sebastian Chwilczyński et.al. | 2502.19122 | null |
| 2025-02-26 | Sherlock: Towards Multi-scene Video Abnormal Event Extraction and Localization via a Global-local Spatial-sensitive LLM | Junxiao Ma et.al. | 2502.18863 | null |
| 2025-02-25 | Identification and Characterization for Disruptions in the U.S. National Airspace System (NAS) | Jing Xu et.al. | 2502.18687 | null |
| 2025-02-25 | Tighten The Lasso: A Convex Hull Volume-based Anomaly Detection Method | Uri Itai et.al. | 2502.18601 | null |
| 2025-02-25 | Structural Alignment Improves Graph Test-Time Adaptation | Hans Hao-Hsun Hsu et.al. | 2502.18334 | null |
| 2025-02-25 | From Vision to Sound: Advancing Audio Anomaly Detection with Vision-Based Algorithms | Manuel Barusco et.al. | 2502.18328 | link |
| 2025-02-25 | Sequential Outlier Detection in Non-Stationary Time Series | Florian Heinrichs et.al. | 2502.18038 | null |
| 2025-02-25 | Radon-Nikodým Derivative: Re-imagining Anomaly Detection from a Measure Theoretic Perspective | Shlok Mehendale et.al. | 2502.18002 | null |
| 2025-02-25 | Improved YOLOv7x-Based Defect Detection Algorithm for Power Equipment | Jin Hou et.al. | 2502.17961 | null |
| 2025-02-25 | Can Multimodal LLMs Perform Time Series Anomaly Detection? | Xiongxiao Xu et.al. | 2502.17812 | link |
| 2025-02-25 | A digital eye-fixation biomarker using a deep anomaly scheme to classify Parkisonian patterns | Juan Niño et.al. | 2502.17762 | null |
| 2025-02-24 | 1 Particle - 1 Qubit: Particle Physics Data Encoding for Quantum Machine Learning | Aritra Bal et.al. | 2502.17301 | null |
| 2025-02-24 | Using Machine Learning to Detect Fraudulent SMSs in Chichewa | Amelia Taylor et.al. | 2502.16947 | null |
| 2025-02-24 | MAD-AD: Masked Diffusion for Unsupervised Brain Anomaly Detection | Farzad Beizaee et.al. | 2502.16943 | link |
| 2025-02-23 | Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata | Parastou Fahim et.al. | 2502.16753 | null |
| 2025-02-23 | TrustChain: A Blockchain Framework for Auditing and Verifying Aggregators in Decentralized Federated Learning | Ehsan Hallaji et.al. | 2502.16406 | null |
| 2025-02-23 | An Expert Ensemble for Detecting Anomalous Scenes, Interactions, and Behaviors in Autonomous Driving | Tianchen Ji et.al. | 2502.16389 | null |
| 2025-02-22 | Machine Learning-Based Cloud Computing Compliance Process Automation | Yuqing Wang et.al. | 2502.16344 | null |
| 2025-02-22 | DiffFake: Exposing Deepfakes using Differential Anomaly Detection | Sotirios Stamnas et.al. | 2502.16247 | null |
| 2025-02-21 | Anomaly preserving contrastive neural embeddings for end-to-end model-independent searches at the LHC | Kyle Metzger et.al. | 2502.15926 | null |
| 2025-02-21 | ML-Driven Approaches to Combat Medicare Fraud: Advances in Class Imbalance Solutions, Feature Engineering, Adaptive Learning, and Business Impact | Dorsa Farahmandazad et.al. | 2502.15898 | null |
| 2025-02-21 | A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems | Benyamin Tafreshian et.al. | 2502.15561 | null |
| 2025-02-21 | Pub-Guard-LLM: Detecting Fraudulent Biomedical Articles with Reliable Explanations | Lihu Chen et.al. | 2502.15429 | link |
| 2025-02-20 | CyberSentinel: An Emergent Threat Detection System for AI Security | Krti Tallam et.al. | 2502.14966 | null |
| 2025-02-20 | Outlier Detection in Mendelian Randomisation | Maximilian M Mandl et.al. | 2502.14716 | link |
| 2025-02-19 | A Method to Simultaneously Facilitate All Jet Physics Tasks | Vinicius Mikuni et.al. | 2502.14652 | null |
| 2025-02-20 | dtaianomaly: A Python library for time series anomaly detection | Louis Carpentier et.al. | 2502.14381 | link |
| 2025-02-20 | Graph Anomaly Detection via Adaptive Test-time Representation Learning across Out-of-Distribution Domains | Delaram Pirhayati et.al. | 2502.14293 | null |
| 2025-02-20 | Adaptive Sparsified Graph Learning Framework for Vessel Behavior Anomalies | Jeehong Kim et.al. | 2502.14197 | null |
| 2025-02-19 | CND-IDS: Continual Novelty Detection for Intrusion Detection Systems | Sean Fuhrman et.al. | 2502.14094 | null |
| 2025-02-19 | Isolating Unisolated Upsilons with Anomaly Detection in CMS Open Data | Rikab Gambhir et.al. | 2502.14036 | link |
| 2025-02-19 | A Synergy Scoring Filter for Unsupervised Anomaly Detection with Noisy Data | Fengjie Wang et.al. | 2502.13992 | null |
| 2025-02-19 | Unlocking Multimodal Integration in EHRs: A Prompt Learning Framework for Language and Time Series Fusion | Shuai Niu et.al. | 2502.13509 | null |
| 2025-02-19 | Flow-based generative models as iterative algorithms in probability space | Yao Xie et.al. | 2502.13394 | null |
| 2025-02-18 | VUS: Effective and Efficient Accuracy Measures for Time-Series Anomaly Detection | Paul Boniol et.al. | 2502.13318 | link |
| 2025-02-18 | A Label-Free Heterophily-Guided Approach for Unsupervised Graph Fraud Detection | Junjun Pan et.al. | 2502.13308 | null |
| 2025-02-18 | Value Gradient Sampler: Sampling as Sequential Decision Making | Sangwoong Yoon et.al. | 2502.13280 | null |
| 2025-02-18 | A Survey of Anomaly Detection in Cyber-Physical Systems | Danial Abshari et.al. | 2502.13256 | null |
| 2025-02-18 | Statistically Significant $k$ NNAD by Selective Inference | Mizuki Niihori et.al. | 2502.12978 | null |
| 2025-02-18 | Fraud-R1 : A Multi-Round Benchmark for Assessing the Robustness of LLM Against Augmented Fraud and Phishing Inducements | Shu Yang et.al. | 2502.12904 | null |
| 2025-02-18 | Toward Cybersecurity Testing and Monitoring of IoT Ecosystems | Steve Taylor et.al. | 2502.12837 | null |
| 2025-02-18 | Unsupervised Anomaly Detection through Mass Repulsing Optimal Transport | Eduardo Fernandes Montesuma et.al. | 2502.12793 | null |
| 2025-02-17 | Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset | Md Ahnaf Akif et.al. | 2502.12382 | null |
| 2025-02-17 | Positional Encoding in Transformer-Based Time Series Models: A Survey | Habib Irani et.al. | 2502.12370 | link |
| 2025-02-17 | Unifying Explainable Anomaly Detection and Root Cause Analysis in Dynamical Systems | Yue Sun et.al. | 2502.12086 | null |
| 2025-02-17 | Enhanced Anomaly Detection in IoMT Networks using Ensemble AI Models on the CICIoMT2024 Dataset | Prathamesh Chandekar et.al. | 2502.11854 | null |
| 2025-02-17 | Component-aware Unsupervised Logical Anomaly Generation for Industrial Anomaly Detection | Xuan Tong et.al. | 2502.11712 | null |
| 2025-02-17 | Towards a Trustworthy Anomaly Detection for Critical Applications through Approximated Partial AUC Loss | Arnaud Bougaham et.al. | 2502.11570 | null |
| 2025-02-17 | DCAD-2000: A Multilingual Dataset across 2000+ Languages with Data Cleaning as Anomaly Detection | Yingli Shen et.al. | 2502.11546 | link |
| 2025-02-17 | WRT-SAM: Foundation Model-Driven Segmentation for Generalized Weld Radiographic Testing | Yunyi Zhou et.al. | 2502.11338 | null |
| 2025-02-16 | Exploiting Point-Language Models with Dual-Prompts for 3D Anomaly Detection | Jiaxiang Wang et.al. | 2502.11307 | null |
| 2025-02-16 | Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems | Armando Bellante et.al. | 2502.11173 | null |
| 2025-02-16 | Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions | Sahar Lazim et.al. | 2502.11138 | null |
| 2025-02-15 | A Computational Model for Ransomware Detection Using Cross-Domain Entropy Signatures | Michael Mannon et.al. | 2502.10711 | null |
| 2025-02-14 | Dynamic Fraud Proof | Gabriele Picco et.al. | 2502.10321 | null |
| 2025-02-14 | Anomaly Detection with LWE Encrypted Control | Rijad Alisic et.al. | 2502.10283 | null |
| 2025-02-14 | Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction | Francesco Vitale et.al. | 2502.10211 | null |
| 2025-02-14 | Enhancing anomaly detection with topology-aware autoencoders | Vishal S. Ngairangbam et.al. | 2502.10163 | null |
| 2025-02-14 | Robust Anomaly Detection via Tensor Chidori Pseudoskeleton Decomposition | Bowen Su et.al. | 2502.09926 | null |
| 2025-02-13 | Weakly supervised anomaly detection for resonant new physics in the dijet final state using proton-proton collisions at $\sqrt{s}=13$ TeV with the ATLAS detector | ATLAS Collaboration et.al. | 2502.09770 | null |
| 2025-02-13 | APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models | Sidahmed Benabderrahmane et.al. | 2502.09385 | null |
| 2025-02-13 | AnomalyGFM: Graph Foundation Model for Zero/Few-shot Anomaly Detection | Hezhe Qiao et.al. | 2502.09254 | null |
| 2025-02-13 | XAInomaly: Explainable and Interpretable Deep Contractive Autoencoder for O-RAN Traffic Anomaly Detection | Osman Tugay Basaran et.al. | 2502.09194 | null |
| 2025-02-13 | Unsupervised Anomaly Detection on Implicit Shape representations for Sarcopenia Detection | Louise Piecuch et.al. | 2502.09088 | null |
| 2025-02-13 | Privacy-Preserving Hybrid Ensemble Model for Network Anomaly Detection: Balancing Security and Data Protection | Shaobo Liu et.al. | 2502.09001 | null |
| 2025-02-12 | Hierarchical Entropy Disruption for Ransomware Detection: A Computationally-Driven Framework | Hayden Srynn et.al. | 2502.08843 | null |
| 2025-02-12 | Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures | Almuthanna Alageel et.al. | 2502.08830 | null |
| 2025-02-12 | CurvGAD: Leveraging Curvature for Enhanced Graph Anomaly Detection | Karish Grover et.al. | 2502.08605 | null |
| 2025-02-12 | Mapping the Landscape of Generative AI in Network Monitoring and Management | Giampaolo Bovenzi et.al. | 2502.08576 | null |
| 2025-02-12 | GenIAS: Generator for Instantiating Anomalies in time Series | Zahra Zamanzadeh Darban et.al. | 2502.08262 | null |
| 2025-02-12 | Out-of-Distribution Detection on Graphs: A Survey | Tingyi Cai et.al. | 2502.08105 | null |
| 2025-02-11 | MAAT: Mamba Adaptive Anomaly Transformer with association discrepancy for time series | Abdellah Zakaria Sellam et.al. | 2502.07858 | link |
| 2025-02-11 | Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach | Shakil Ahmed et.al. | 2502.07779 | null |
| 2025-02-11 | Advancing climate model interpretability: Feature attribution for Arctic melt anomalies | Tolulope Ale et.al. | 2502.07741 | null |
| 2025-02-11 | Methodology for Identifying Social Groups within a Transactional Graph | Maxence Morin et.al. | 2502.07694 | null |
| 2025-02-11 | Unsupervised Feature Extraction and Reconstruction Using Parameterized Quantum Circuits | Li-An Lo et.al. | 2502.07667 | link |
| 2025-02-11 | Towards Zero-Shot Anomaly Detection and Reasoning with Multimodal Large Language Models | Jiacong Xu et.al. | 2502.07601 | null |
| 2025-02-11 | FADE: Forecasting for Anomaly Detection on ECG | Paula Ruiz-Barroso et.al. | 2502.07389 | null |
| 2025-02-10 | SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection | Elvin Li et.al. | 2502.07119 | null |
| 2025-02-10 | Leveraging GPT-4o Efficiency for Detecting Rework Anomaly in Business Processes | Mohammad Derakhshan et.al. | 2502.06918 | null |
| 2025-02-10 | Network Intrusion Datasets: A Survey, Limitations, and Recommendations | Patrik Goldschmidt et.al. | 2502.06688 | null |
| 2025-02-10 | An Efficient Security Model for Industrial Internet of Things (IIoT) System Based on Machine Learning Principles | Sahar L. Qaddoori et.al. | 2502.06502 | null |
| 2025-02-10 | Multimodal Task Representation Memory Bank vs. Catastrophic Forgetting in Anomaly Detection | You Zhou et.al. | 2502.06194 | null |
| 2025-02-10 | Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT | Robert Akinie et.al. | 2502.06099 | null |
| 2025-02-09 | A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks | Safaa Menssouri et.al. | 2502.06031 | null |
| 2025-02-09 | A 3D Multimodal Feature for Infrastructure Anomaly Detection | Yixiong Jing et.al. | 2502.05779 | link |
| 2025-02-09 | 3CAD: A Large-Scale Real-World 3C Product Dataset for Unsupervised Anomaly | Enquan Yang et.al. | 2502.05761 | link |
| 2025-02-08 | Extended Histogram-based Outlier Score (EHBOS) | Tanvir Islam et.al. | 2502.05719 | null |
| 2025-02-08 | Federated Learning with Reservoir State Analysis for Time Series Anomaly Detection | Keigo Nogami et.al. | 2502.05679 | null |
| 2025-02-08 | Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning | Runhua Xu et.al. | 2502.05547 | null |
| 2025-02-07 | Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks | Yohannis Kifle Telila et.al. | 2502.05041 | null |
| 2025-02-07 | Robust Conformal Outlier Detection under Contaminated Reference Data | Meshi Bashari et.al. | 2502.04807 | null |
| 2025-02-06 | Finding Pegasus: Enhancing Unsupervised Anomaly Detection in High-Dimensional Data using a Manifold-Based Approach | R. P. Nathan et.al. | 2502.04310 | null |
| 2025-02-06 | NLP-Based .NET CLR Event Logs Analyzer | Maxim Stavtsev et.al. | 2502.04219 | null |
| 2025-02-06 | CleanSurvival: Automated data preprocessing for time-to-event models using reinforcement learning | Yousef Koka et.al. | 2502.03946 | null |
| 2025-02-06 | Technical Report: Generating the WEB-IDS23 Dataset | Eric Lanfer et.al. | 2502.03909 | null |
| 2025-02-06 | Hierarchical Entropic Diffusion for Ransomware Detection: A Probabilistic Approach to Behavioral Anomaly Isolation | Vasili Iskorohodov et.al. | 2502.03882 | null |
| 2025-02-06 | Position: Untrained Machine Learning for Anomaly Detection | Juan Du et.al. | 2502.03876 | null |
| 2025-02-05 | The Adoption of Artificial Intelligence in Different Network Security Concepts | Mamoon A. Al Jbaar et.al. | 2502.03398 | null |
| 2025-02-05 | A Structured Reasoning Framework for Unbalanced Data Classification Using Probabilistic Models | Junliang Du et.al. | 2502.03386 | null |
| 2025-02-05 | General Time-series Model for Universal Knowledge Representation of Multivariate Time-Series data | Cheng He et.al. | 2502.03264 | null |
| 2025-02-05 | Calibrated Unsupervised Anomaly Detection in Multivariate Time-series using Reinforcement Learning | Saba Sanami et.al. | 2502.03245 | null |
| 2025-02-05 | SpaceGNN: Multi-Space Graph Neural Network for Node Anomaly Detection with Extremely Limited Labels | Xiangyu Dong et.al. | 2502.03201 | null |
| 2025-02-05 | Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research | Othmane Belarbi et.al. | 2502.03134 | null |
| 2025-02-05 | Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing | Salvatore Sinno et.al. | 2502.03086 | null |
| 2025-02-05 | Time Series Anomaly Detection in the Frequency Domain with Statistical Reliability | Akifumi Yamada et.al. | 2502.03062 | null |
| 2025-02-05 | TopoCL: Topological Contrastive Learning for Time Series | Namwoo Kim et.al. | 2502.02924 | null |
| 2025-02-04 | SHIELD: APT Detection and Intelligent Explanation Using LLM | Parth Atulbhai Gandhi et.al. | 2502.02342 | null |
| 2025-02-04 | FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection | Daniele Lunghi et.al. | 2502.02290 | null |
| 2025-02-04 | LAST SToP For Modeling Asynchronous Time Series | Shubham Gupta et.al. | 2502.01922 | null |
| 2025-02-04 | Anomaly Detection via Autoencoder Composite Features and NCE | Yalin Liao et.al. | 2502.01920 | null |
| 2025-02-03 | A Poisson Process AutoDecoder for X-ray Sources | Yanke Song et.al. | 2502.01627 | null |
| 2025-02-03 | Federated Detection of Open Charge Point Protocol 1.6 Cyberattacks | Christos Dalamagkas et.al. | 2502.01569 | null |
| 2025-02-03 | Unsupervised anomaly detection in large-scale estuarine acoustic telemetry data | Siphendulwe Zaza et.al. | 2502.01543 | null |
| 2025-02-03 | Dense Subgraph Discovery Meets Strong Triadic Closure | Chamalee Wickrama Arachchi et.al. | 2502.01435 | null |
| 2025-02-03 | ConceptVAE: Self-Supervised Fine-Grained Concept Disentanglement from 2D Echocardiographies | Costin F. Ciusdel et.al. | 2502.01335 | null |
| 2025-02-03 | One-to-Normal: Anomaly Personalization for Few-shot Anomaly Detection | Yiyue Li et.al. | 2502.01201 | null |
| 2025-01-31 | Synthetic User Behavior Sequence Generation with Large Language Models for Smart Homes | Zhiyao Xu et.al. | 2501.19298 | null |
| 2025-01-31 | Transformer-Based Financial Fraud Detection with Cloud-Optimized Real-Time Streaming | Tingting Deng et.al. | 2501.19267 | null |
| 2025-01-31 | DINAMO: Dynamic and INterpretable Anomaly MOnitoring for Large-Scale Particle Physics Experiments | Arsenii Gavrikov et.al. | 2501.19237 | link |
| 2025-01-31 | Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS | Taneya Sharma et.al. | 2501.19191 | link |
| 2025-01-31 | An Optimal Cascade Feature-Level Spatiotemporal Fusion Strategy for Anomaly Detection in CAN Bus | Mohammad Fatahi et.al. | 2501.18821 | null |
| 2025-01-30 | CryptoDNA: A Machine Learning Paradigm for DDoS Detection in Healthcare IoT, Inspired by crypto jacking prevention Models | Zag ElSayed et.al. | 2501.18549 | null |
| 2025-02-03 | Real-Time Anomaly Detection with Synthetic Anomaly Monitoring (SAM) | Emanuele Luzio et.al. | 2501.18417 | null |
| 2025-01-30 | GDformer: Going Beyond Subsequence Isolation for Multivariate Time Series Anomaly Detection | Qingxiang Liu et.al. | 2501.18196 | link |
| 2025-01-30 | Conformal novelty detection for replicate point patterns with FDR or FWER control | Christophe A. N. Biscio et.al. | 2501.18195 | link |
| 2025-01-30 | Battery State of Health Estimation Using LLM Framework | Aybars Yunusoglu et.al. | 2501.18123 | null |
| 2025-01-29 | KoopAGRU: A Koopman-based Anomaly Detection in Time-Series using Gated Recurrent Units | Issam Ait Yahia et.al. | 2501.17976 | null |
| 2025-01-29 | Unsupervised Patch-GAN with Targeted Patch Ranking for Fine-Grained Novelty Detection in Medical Imaging | Jingkun Chen et.al. | 2501.17906 | null |
| 2025-01-29 | Free Agent in Agent-Based Mixture-of-Experts Generative AI Framework | Jung-Hua Liu et.al. | 2501.17903 | null |
| 2025-01-29 | Detecting Anomalies Using Rotated Isolation Forest | Vahideh Monemizadeh et.al. | 2501.17787 | null |
| 2025-01-29 | Neural Networks for the Analysis of Traced Particles in Kinetic Plasma Simulations | Gabriel Torralba Paz et.al. | 2501.17537 | null |
| 2025-01-29 | si4onnx: A Python package for Selective Inference in Deep Learning Models | Teruyuki Katsuoka et.al. | 2501.17415 | null |
| 2025-01-28 | Anomaly Detection in Cooperative Vehicle Perception Systems under Imperfect Communication | Ashish Bastola et.al. | 2501.17329 | null |
| 2025-01-28 | A Contrastive Teacher-Student Framework for Novelty Detection under Style Shifts | Hossein Mirzaei et.al. | 2501.17289 | null |
| 2025-01-28 | Goodness of Fit for Bayesian Generative Models with Applications in Population Genetics | Guillaume Le Mailloux et.al. | 2501.17107 | link |
| 2025-01-28 | MAUCell: An Adaptive Multi-Attention Framework for Video Frame Prediction | Shreyam Gupta et.al. | 2501.16997 | null |
| 2025-01-28 | RODEO: Robust Outlier Detection via Exposing Adaptive Out-of-Distribution Samples | Hossein Mirzaei et.al. | 2501.16971 | link |
| 2025-01-28 | Enhancing Web Service Anomaly Detection via Fine-grained Multi-modal Association and Frequency Domain Analysis | Xixuan Yang et.al. | 2501.16875 | null |
| 2025-01-28 | LLM Assisted Anomaly Detection Service for Site Reliability Engineers: Enhancing Cloud Infrastructure Resilience | Nimesh Jha et.al. | 2501.16744 | null |
| 2025-01-28 | Federated Learning for Efficient Condition Monitoring and Anomaly Detection in Industrial Cyber-Physical Systems | William Marfo et.al. | 2501.16666 | null |
| 2025-01-28 | Analysis of Zero Day Attack Detection Using MLP and XAI | Ashim Dahal et.al. | 2501.16638 | null |
| 2025-01-27 | Large Models in Dialogue for Active Perception and Anomaly Detection | Tzoulio Chamiti et.al. | 2501.16300 | null |
| 2025-01-27 | Addressing Out-of-Label Hazard Detection in Dashcam Videos: Insights from the COOOL Challenge | Anh-Kiet Duong et.al. | 2501.16037 | link |
| 2025-01-27 | Can Multimodal Large Language Models be Guided to Improve Industrial Anomaly Detection? | Zhiling Chen et.al. | 2501.15795 | null |
| 2025-01-27 | Investigating Application of Deep Neural Networks in Intrusion Detection System Design | Mofe O. Jeje et.al. | 2501.15760 | null |
| 2025-01-27 | Modeling shared micromobility as a label propagation process for detecting the overlapping communities | Peng Luo et.al. | 2501.15713 | null |
| 2025-01-26 | PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments | Ajesh Koyatan Chathoth et.al. | 2501.15563 | null |
| 2025-01-26 | Mitigating Spurious Negative Pairs for Robust Industrial Anomaly Detection | Hossein Mirzaei et.al. | 2501.15434 | null |
| 2025-01-26 | A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data | Mahshid Rezakhani et.al. | 2501.15365 | null |
| 2025-01-25 | Advanced Real-Time Fraud Detection Using RAG-Based LLMs | Gurjot Singh et.al. | 2501.15290 | null |
| 2025-01-25 | Killing it with Zero-Shot: Adversarially Robust Novelty Detection | Hossein Mirzaei et.al. | 2501.15271 | link |
| 2025-01-24 | Towards Automated Self-Supervised Learning for Truly Unsupervised Graph Anomaly Detection | Zhong Li et.al. | 2501.14694 | link |
| 2025-01-24 | Bi-directional Curriculum Learning for Graph Anomaly Detection: Dual Focus on Homogeneity and Heterogeneity | Yitong Hao et.al. | 2501.14197 | null |
| 2025-01-24 | Argos: Agentic Time-Series Anomaly Detection with Autonomous Rule Generation via Large Language Models | Yile Gu et.al. | 2501.14170 | null |
| 2025-01-23 | Autoencoders for Anomaly Detection are Unreliable | Roel Bouman et.al. | 2501.13864 | null |
| 2025-01-23 | The Lock Generative Adversarial Network for Medical Waveform Anomaly Detection | Wenjie Xu et.al. | 2501.13858 | null |
| 2025-01-23 | Anomaly Detection for Automated Data Quality Monitoring in the CMS Detector | Andrew Brinkerhoff et.al. | 2501.13789 | null |
| 2025-01-23 | GCAD: Anomaly Detection in Multivariate Time Series from the Perspective of Granger Causality | Zehao Liu et.al. | 2501.13493 | null |
| 2025-01-23 | Leveraging Digital Twin and Machine Learning Techniques for Anomaly Detection in Power Electronics Dominated Grid | Ildar N. Idrisov et.al. | 2501.13474 | null |
| 2025-01-23 | Unraveling Normal Anatomy via Fluid-Driven Anomaly Randomization | Peirong Liu et.al. | 2501.13370 | link |
| 2025-01-22 | Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning | Ozlem Ceviz et.al. | 2501.13213 | null |
| 2025-01-22 | Real-Time Multi-Modal Subcomponent-Level Measurements for Trustworthy System Monitoring and Malware Detection | Farshad Khorrami et.al. | 2501.13081 | null |
| 2025-01-22 | Comparison of feature extraction tools for network traffic data | Borys Lypa et.al. | 2501.13004 | null |
| 2025-01-22 | Anomaly Detection in Double-entry Bookkeeping Data by Federated Learning System with Non-model Sharing Approach | Sota Mashiko et.al. | 2501.12723 | null |
| 2025-01-22 | Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable Classification | Sigma Jahan et.al. | 2501.12560 | null |
| 2025-01-21 | Optimizing Blockchain Analysis: Tackling Temporality and Scalability with an Incremental Approach with Metropolis-Hastings Random Walks | Junliang Luo et.al. | 2501.12491 | null |
| 2025-01-21 | SCFCRC: Simultaneously Counteract Feature Camouflage and Relation Camouflage for Fraud Detection | Xiaocheng Zhang et.al. | 2501.12430 | null |
| 2025-01-21 | Towards Accurate Unified Anomaly Segmentation | Wenxin Ma et.al. | 2501.12295 | link |
| 2025-01-21 | Score Combining for Contrastive OOD Detection | Edward T. Reehorst et.al. | 2501.12204 | null |
| 2025-01-21 | Beyond Window-Based Detection: A Graph-Centric Framework for Discrete Log Anomaly Detection | Jiaxing Qi et.al. | 2501.12166 | null |
| 2025-01-22 | Teacher Encoder-Student Decoder Denoising Guided Segmentation Network for Anomaly Detection | Shixuan Song et.al. | 2501.12104 | null |
| 2025-01-21 | Application of Machine Learning Techniques for Secure Traffic in NoC-based Manycores | Geaninne Lopes et.al. | 2501.12034 | null |
| 2025-01-21 | TAD-Bench: A Comprehensive Benchmark for Embedding-Based Text Anomaly Detection | Yang Cao et.al. | 2501.11960 | null |
| 2025-01-21 | Noise-Resilient Point-wise Anomaly Detection in Time Series Using Weak Segment Labels | Yaxuan Wang et.al. | 2501.11959 | link |
| 2025-01-20 | Towards Improving IDS Using CTF Events | Manuel Kern et.al. | 2501.11685 | null |
| 2025-01-20 | Class Imbalance in Anomaly Detection: Learning from an Exactly Solvable Model | F. S. Pezzicoli et.al. | 2501.11638 | null |
| 2025-01-20 | A Survey on Diffusion Models for Anomaly Detection | Jing Liu et.al. | 2501.11430 | null |
| 2025-01-17 | FiLo++: Zero-/Few-Shot Anomaly Detection by Fused Fine-Grained Descriptions and Deformable Localization | Zhaopeng Gu et.al. | 2501.10067 | link |
| 2025-01-16 | Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers | Koen T. W. Teuwen et.al. | 2501.09808 | null |
| 2025-01-16 | ComplexVAD: Detecting Interaction Anomalies in Video | Furkan Mumcu et.al. | 2501.09733 | null |
| 2025-01-16 | Sequential PatchCore: Anomaly Detection for Surface Inspection using Synthetic Impurities | Runzhou Mao et.al. | 2501.09579 | null |
| 2025-01-16 | AI-based Identity Fraud Detection: A Systematic Review | Chuo Jun Zhang et.al. | 2501.09239 | null |
| 2025-01-15 | Attention is All You Need Until You Need Retention | M. Murat Yaslioglu et.al. | 2501.09166 | null |
| 2025-01-15 | When Uncertainty Leads to Unsafety: Empirical Insights into the Role of Uncertainty in Unmanned Aerial Vehicle Safety | Sajad Khatiri et.al. | 2501.08908 | null |
| 2025-01-15 | Transformer-based Multivariate Time Series Anomaly Localization | Charalampos Shimillas et.al. | 2501.08628 | null |
| 2025-01-14 | Detecting Contextual Anomalies by Discovering Consistent Spatial Regions | Zhengye Yang et.al. | 2501.08470 | null |
| 2025-01-14 | Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data | Phai Vu Dinh et.al. | 2501.08149 | null |
| 2025-01-14 | PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning | Marta Andronic et.al. | 2501.08043 | null |
| 2025-01-14 | Unsupervised Feature Construction for Anomaly Detection in Time Series – An Evaluation | Marine Hamon et.al. | 2501.07999 | null |
| 2025-01-14 | STTS-EAD: Improving Spatio-Temporal Learning Based Time Series Prediction via | Yuanyuan Liang et.al. | 2501.07814 | null |
| 2025-01-14 | A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network Security | Osvaldo Arreche et.al. | 2501.07801 | link |
| 2025-01-13 | A Novel Approach to Network Traffic Analysis: the HERA tool | Daniela Pinto et.al. | 2501.07475 | null |
| 2025-01-13 | ADKGD: Anomaly Detection in Knowledge Graphs with Dual-Channel Training | Jiayang Wu et.al. | 2501.07078 | link |
| 2025-01-13 | Detection of AI Deepfake and Fraud in Online Payments Using GAN-Based Models | Zong Ke et.al. | 2501.07033 | null |
| 2025-01-13 | TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph | Wenhan Jiang et.al. | 2501.06997 | null |
| 2025-01-12 | Shake-VLA: Vision-Language-Action Model-Based System for Bimanual Robotic Manipulations and Liquid Mixing | Muhamamd Haris Khan et.al. | 2501.06919 | null |
| 2025-01-12 | Driver Age and Its Effect on Key Driving Metrics: Insights from Dynamic Vehicle Data | Aparna Joshi et.al. | 2501.06918 | null |
| 2025-01-12 | Generative AI Enabled Robust Sensor Placement in Cyber-Physical Power Systems: A Graph Diffusion Approach | Changyuan Zhao et.al. | 2501.06756 | null |
| 2025-01-11 | Exploring Pose-Based Anomaly Detection for Retail Security: A Real-World Shoplifting Dataset and Benchmark | Narges Rashvand et.al. | 2501.06591 | link |
| 2025-01-11 | Active Rule Mining for Multivariate Anomaly Detection in Radio Access Networks | Ebenezer R. H. P. Isaac et.al. | 2501.06571 | null |
| 2025-01-10 | Explaining Deep Learning-based Anomaly Detection in Energy Consumption Data by Focusing on Contextually Relevant Data | Mohammad Noorchenarboo et.al. | 2501.06099 | null |
| 2025-01-10 | Facilitate Collaboration between Large Language Model and Task-specific Model for Time Series Anomaly Detection | Feiyi Chen et.al. | 2501.05675 | null |
| 2025-01-10 | Evidential Deep Learning for Uncertainty Quantification and Out-of-Distribution Detection in Jet Identification using Deep Neural Networks | Ayush Khot et.al. | 2501.05656 | link |
| 2025-01-09 | Outlyingness Scores with Cluster Catch Digraphs | Rui Shi et.al. | 2501.05530 | null |
| 2025-01-09 | EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database | Tianle Tao et.al. | 2501.05223 | null |
| 2025-01-10 | Learning In-Distribution Representations for Anomaly Detection | Willian T. Lunardi et.al. | 2501.05130 | link |
| 2025-01-08 | Back Home: A Machine Learning Approach to Seashell Classification and Ecosystem Restoration | Alexander Valverde et.al. | 2501.04873 | null |
| 2025-01-08 | Quantum Hybrid Support Vector Machines for Stress Detection in Older Adults | Md Saif Hassan Onim et.al. | 2501.04831 | null |
| 2025-01-08 | Planing It by Ear: Convolutional Neural Networks for Acoustic Anomaly Detection in Industrial Wood Planers | Anthony Deschênes et.al. | 2501.04819 | link |
| 2025-01-08 | Leveraging Registers in Vision Transformers for Robust Adaptation | Srikar Yellapragada et.al. | 2501.04784 | null |
| 2025-01-07 | SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory | Arslan Tariq Syed et.al. | 2501.03898 | null |
| 2025-01-07 | KAnoCLIP: Zero-Shot Anomaly Detection through Knowledge-Driven Prompt Learning and Enhanced Cross-Modal Integration | Chengyuan Li et.al. | 2501.03786 | null |
| 2025-01-06 | On the Adversarial Robustness of Benjamini Hochberg | Louis L Chen et.al. | 2501.03402 | null |
| 2025-01-07 | CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks | Atmane Ayoub Mansour Bahar et.al. | 2501.02981 | null |
| 2025-01-06 | Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls | Can Gao et.al. | 2501.02975 | link |
| 2025-01-06 | Unsupervised Tomato Split Anomaly Detection using Hyperspectral Imaging and Variational Autoencoders | Mahmoud Abdulsalam et.al. | 2501.02921 | null |
| 2025-01-06 | GraphDART: Graph Distillation for Efficient Advanced Persistent Threat Detection | Saba Fathi Rabooki et.al. | 2501.02796 | null |
| 2025-01-06 | Full-conformal novelty detection: A powerful and non-random approach | Junu Lee et.al. | 2501.02703 | null |
| 2025-01-04 | Self-Supervised Learning for Detecting AI-Generated Faces as Anomalies | Mian Zou et.al. | 2501.02207 | link |
| 2025-01-03 | Counterfactual Explanation for Auto-Encoder Based Time-Series Anomaly Detection | Abhishek Srinivasan et.al. | 2501.02069 | null |
| 2025-01-03 | Dynamic Feature Fusion: Combining Global Graph Structures and Local Semantics for Blockchain Fraud Detection | Zhang Sheng et.al. | 2501.02032 | null |
| 2025-01-03 | Robust resonant anomaly detection with NPLM | Gaia Grosso et.al. | 2501.01778 | null |
| 2025-01-03 | LogicAD: Explainable Anomaly Detection via VLM-based Text Feature Extraction | Er Jin et.al. | 2501.01767 | null |
| 2025-01-03 | BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction | Alaeddine Diaf et.al. | 2501.01664 | null |
| 2025-01-03 | Multivariate Time Series Anomaly Detection using DiffGAN Model | Guangqiang Wu et.al. | 2501.01591 | null |
| 2025-01-02 | Transfer Neyman-Pearson Algorithm for Outlier Detection | Mohammadreza M. Kalan et.al. | 2501.01525 | null |
| 2025-01-02 | Quantum Computing for Partition Function Estimation of a Markov Random Field in a Radar Anomaly Detection Problem | Timothe Presles et.al. | 2501.01154 | null |
| 2025-01-02 | InDeed: Interpretable image deep decomposition with guaranteed generalizability | Sihan Wang et.al. | 2501.01127 | null |
| 2025-01-02 | SpecPT (Spectroscopy Pre-trained Transformer) Model for Extragalactic Spectroscopy: I. Architecture and Automated Redshift Measurement | Rohan Pattnaik et.al. | 2501.01070 | null |
| 2025-01-02 | An Efficient Outlier Detection Algorithm for Data Streaming | Rui Hu et.al. | 2501.01061 | null |
| 2025-01-01 | LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity | Muhammet Anil Yagiz et.al. | 2501.00790 | null |
| 2024-12-31 | METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift | Jie Ying et.al. | 2501.00438 | null |
| 2024-12-31 | CNC: Cross-modal Normality Constraint for Unsupervised Multi-class Anomaly Detection | Xiaolei Wang et.al. | 2501.00346 | null |
| 2024-12-31 | Q3DE: A fault-tolerant quantum computer architecture for multi-bit burst errors by cosmic rays | Yasunari Suzuki et.al. | 2501.00331 | null |
| 2024-12-31 | Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection | Syed Atif Ali et.al. | 2501.00261 | null |
| 2024-12-30 | An Unsupervised Anomaly Detection in Electricity Consumption Using Reinforcement Learning and Time Series Forest Based Framework | Jihan Ghanim et.al. | 2501.00107 | null |
| 2024-12-30 | Galaxy Spectra Networks (GaSNet). III. Generative pre-trained network for spectrum reconstruction, redshift estimate and anomaly detection | Fucheng Zhong et.al. | 2412.21130 | link |
| 2024-12-30 | SoftPatch+: Fully Unsupervised Anomaly Classification and Segmentation | Chengjie Wang et.al. | 2412.20870 | link |
| 2024-12-30 | Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing | Ervin Moore et.al. | 2412.20674 | null |
| 2024-12-29 | Testing and Improving the Robustness of Amortized Bayesian Inference for Cognitive Models | Yufei Wu et.al. | 2412.20586 | link |
| 2024-12-29 | A Survey on Time-Series Distance Measures | John Paparrizos et.al. | 2412.20574 | null |
| 2024-12-29 | Dive into Time-Series Anomaly Detection: A Decade Review | Paul Boniol et.al. | 2412.20512 | null |
| 2024-12-29 | Cross-Modal Fusion and Attention Mechanism for Weakly Supervised Video Anomaly Detection | Ayush Ghadiya et.al. | 2412.20455 | null |
| 2024-12-29 | Exploring the Magnitude-Shape Plot Framework for Anomaly Detection in Crowded Video Scenes | Zuzheng Wang et.al. | 2412.20363 | null |
| 2024-12-28 | An Anomaly Detection System Based on Generative Classifiers for Controller Area Network | Chunheng Zhao et.al. | 2412.20255 | null |
| 2024-12-28 | Injecting Explainability and Lightweight Design into Weakly Supervised Video Anomaly Detection Systems | Wen-Dong Jiang et.al. | 2412.20201 | null |
| 2024-12-27 | Comparative Performance Analysis of Quantum Machine Learning Architectures for Credit Card Fraud Detection | Mansour El Alami et.al. | 2412.19441 | null |
| 2024-12-26 | Time Series Foundational Models: Their Role in Anomaly Detection and Prediction | Chathurangi Shyalika et.al. | 2412.19286 | link |
| 2024-12-26 | Graph Mixture of Experts and Memory-augmented Routers for Multivariate Time Series Anomaly Detection | Xiaoyu Huang et.al. | 2412.19108 | null |
| 2024-12-26 | Brain Ageing Prediction using Isolation Forest Technique and Residual Neural Network (ResNet) | Saadat Behzadi et.al. | 2412.19017 | null |
| 2024-12-25 | CausalTAD: Causal Implicit Generative Model for Debiased Online Trajectory Anomaly Detection | Wenbin Li et.al. | 2412.18820 | null |
| 2024-12-24 | Unveiling the Threat of Fraud Gangs to Graph Neural Networks: Multi-Target Graph Injection Attacks against GNN-Based Fraud Detectors | Jinhyeok Choi et.al. | 2412.18370 | link |
| 2024-12-24 | Quo Vadis, Anomaly Detection? LLMs and VLMs in the Spotlight | Xi Ding et.al. | 2412.18298 | link |
| 2024-12-24 | Semi-supervised Credit Card Fraud Detection via Attribute-Driven Graph Representation | Sheng Xiang et.al. | 2412.18287 | link |
| 2024-12-24 | PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation | Yan Jiang et.al. | 2412.18103 | null |
| 2024-12-23 | Kernel-Aware Graph Prompt Learning for Few-Shot Anomaly Detection | Fenfang Tao et.al. | 2412.17619 | link |
| 2024-12-23 | Progressive Boundary Guided Anomaly Synthesis for Industrial Anomaly Detection | Qiyu Chen et.al. | 2412.17458 | null |
| 2024-12-23 | A Temporal Convolutional Network-based Approach for Network Intrusion Detection | Rukmini Nazre et.al. | 2412.17452 | null |
| 2024-12-23 | Cech Complex Generation with Homotopy Equivalence Framework for Myocardial Infarction Diagnosis using Electrocardiogram Signals | Srikireddy Dhanunjay Reddy et.al. | 2412.17370 | null |
| 2024-12-23 | Revisiting Multimodal Fusion for 3D Anomaly Detection from an Architectural Perspective | Kaifang Long et.al. | 2412.17297 | null |
| 2024-12-23 | VarAD: Lightweight High-Resolution Image Anomaly Detection via Visual Autoregressive Modeling | Yunkang Cao et.al. | 2412.17263 | link |
| 2024-12-23 | Dual Conditioned Motion Diffusion for Pose-Based Video Anomaly Detection | Andi Xu et.al. | 2412.17210 | link |
| 2024-12-22 | A Parameter-Efficient Quantum Anomaly Detection Method on a Superconducting Quantum Processor | Maida Wang et.al. | 2412.16867 | link |
| 2024-12-21 | DCOR: Anomaly Detection in Attributed Networks via Dual Contrastive Learning Reconstruction | Hossein Rafiee Zade et.al. | 2412.16788 | null |
| 2024-12-21 | CyberSentinel: Efficient Anomaly Detection in Programmable Switch using Knowledge Distillation | Sankalp Mittal et.al. | 2412.16693 | null |
| 2024-12-20 | Applying Predictive Analytics to Occupational Health and Safety in India | Ritwik Raj Saxena et.al. | 2412.16038 | null |
| 2024-12-20 | Detection of Aerial Spoofing Attacks to LEO Satellite Systems via Deep Learning | Jos Wigchert et.al. | 2412.16008 | null |
| 2024-12-20 | Efficient Curation of Invertebrate Image Datasets Using Feature Embeddings and Automatic Size Comparison | Mikko Impiö et.al. | 2412.15844 | link |
| 2024-12-20 | Static and Dynamic Load Tests on the Bridge Vahrendorfer Stadtweg | Martin Köhncke et.al. | 2412.15713 | null |
| 2024-12-20 | A Deep Probabilistic Framework for Continuous Time Dynamic Graph Generation | Ryien Hosseini et.al. | 2412.15582 | null |
| 2024-12-19 | Cross-System Software Log-based Anomaly Detection Using Meta-Learning | Yuqing Wang et.al. | 2412.15445 | null |
| 2024-12-19 | Cruise Control: Dynamic Model Selection for ML-Based Network Traffic Analysis | Johann Hugon et.al. | 2412.15146 | null |
| 2024-12-19 | Tests for model misspecification in simulation-based inference: from local distortions to global model checks | Noemi Anau Montel et.al. | 2412.15100 | null |
| 2024-12-19 | Provably Convergent Plug-and-play Proximal Block Coordinate Descent Method for Hyperspectral Anomaly Detection | Xiaoxia Liu et.al. | 2412.14824 | null |
| 2024-12-19 | Simplicity over Complexity: An ARN-Based Intrusion Detection Method for Industrial Control Network | Ziyi Liu et.al. | 2412.14669 | null |
| 2024-12-19 | Robust PCA Based on Adaptive Weighted Least Squares and Low-Rank Matrix Factorization | Kexin Li et.al. | 2412.14629 | null |
| 2024-12-19 | Multi-Sensor Object Anomaly Detection: Unifying Appearance, Geometry, and Internal Properties | Wenqiao Li et.al. | 2412.14592 | link |
| 2024-12-19 | Global Spatio-Temporal Fusion-based Traffic Prediction Algorithm with Anomaly Aware | Chaoqun Liu et.al. | 2412.14569 | null |
| 2024-12-18 | Flow Exporter Impact on Intelligent Intrusion Detection Systems | Daniela Pinto et.al. | 2412.14021 | null |
| 2024-12-18 | A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures | Shalini Saini et.al. | 2412.13880 | null |
| 2024-12-18 | Do Language Models Understand Time? | Xi Ding et.al. | 2412.13845 | null |
| 2024-12-18 | Quantum Machine Learning in Log-based Anomaly Detection: Challenges and Opportunities | Jiaxing Qi et.al. | 2412.13529 | null |
| 2024-12-18 | Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection | Hanzhe Liang et.al. | 2412.13461 | null |
| 2024-12-17 | BadSAD: Clean-Label Backdoor Attacks against Deep Semi-Supervised Anomaly Detection | He Cheng et.al. | 2412.13324 | null |
| 2024-12-17 | Enhancing Internet of Things Security throughSelf-Supervised Graph Neural Networks | Safa Ben Atitallah et.al. | 2412.13240 | null |
| 2024-12-17 | Synthetic Data Generation for Anomaly Detection on Table Grapes | Ionut Marian Motoi et.al. | 2412.12949 | null |
| 2024-12-17 | Cuckoo Heavy Keeper and the balancing act of maintaining heavy-hitters in stream processing | Vinh Quang Ngo et.al. | 2412.12873 | null |
| 2024-12-17 | Boosting Fine-Grained Visual Anomaly Detection with Coarse-Knowledge-Aware Adversarial Learning | Qingqing Fang et.al. | 2412.12850 | null |
| 2024-12-17 | PO3AD: Predicting Point Offsets toward Better 3D Point Cloud Anomaly Detection | Jianan Ye et.al. | 2412.12617 | null |
| 2024-12-16 | F-RBA: A Federated Learning-based Framework for Risk-based Authentication | Hamidreza Fereidouni et.al. | 2412.12324 | null |
| 2024-12-16 | Are Large Language Models Useful for Time Series Data Analysis? | Francis Tang et.al. | 2412.12219 | null |
| 2024-12-16 | Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies | Li Li et.al. | 2412.12217 | null |
| 2024-12-16 | AMI-Net: Adaptive Mask Inpainting Network for Industrial Anomaly Detection and Localization | Wei Luo et.al. | 2412.11802 | link |
| 2024-12-16 | Counting Butterflies over Streaming Bipartite Graphs with Duplicate Edges | Lingkai Meng et.al. | 2412.11488 | null |
| 2024-12-16 | Unsupervised Anomaly Detection for Tabular Data Using Noise Evaluation | Wei Dai et.al. | 2412.11461 | null |
| 2024-12-15 | Learning Set Functions with Implicit Differentiation | Gözde Özcan et.al. | 2412.11239 | null |
| 2024-12-15 | Redefining Normal: A Novel Object-Level Approach for Multi-Object Novelty Detection | Mohammadreza Salehi et.al. | 2412.11148 | link |
| 2024-12-15 | AD-LLM: Benchmarking Large Language Models for Anomaly Detection | Tiankai Yang et.al. | 2412.11142 | link |
| 2024-12-14 | Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models | Nir Daniel et.al. | 2412.10978 | null |
| 2024-12-14 | Know Unreported Roadway Incidents in Real-time: A Deep Learning Framework for Early Traffic Anomaly Detection | Haocheng Duan et.al. | 2412.10892 | null |
| 2024-12-14 | Audio-based Anomaly Detection in Industrial Machines Using Deep One-Class Support Vector Data Description | Sertac Kilickaya et.al. | 2412.10792 | null |
| 2024-12-14 | Diagnosing Unknown Attacks in Smart Homes Using Abductive Reasoning | Kushal Ramkumar et.al. | 2412.10738 | null |
| 2024-12-13 | Copy-Move Detection in Optical Microscopy: A Segmentation Network and A Dataset | Hao-Chiang Shao et.al. | 2412.10258 | null |
| 2024-12-13 | Filter or Compensate: Towards Invariant Representation from Distribution Shift for Anomaly Detection | Zining Chen et.al. | 2412.10115 | null |
| 2024-12-13 | FDM-Bench: A Comprehensive Benchmark for Evaluating Large Language Models in Additive Manufacturing Tasks | Ahmadreza Eslaminia et.al. | 2412.09819 | link |
| 2024-12-12 | Video Anomaly Detection with Motion and Appearance Guided Patch Diffusion Model | Hang Zhou et.al. | 2412.09026 | null |
| 2024-12-12 | Multimodal Industrial Anomaly Detection by Crossmodal Reverse Distillation | Xinyue Liu et.al. | 2412.08949 | link |
| 2024-12-12 | Federated Foundation Models on Heterogeneous Time Series | Shengchao Chen et.al. | 2412.08906 | link |
| 2024-12-11 | GradStop: Exploring Training Dynamics in Unsupervised Outlier Detection through Gradient Cohesion | Yuang Zhang et.al. | 2412.08501 | link |
| 2024-12-11 | Backdoor attacks on DNN and GBDT – A Case Study from the insurance domain | Robin Kühlem et.al. | 2412.08366 | null |
| 2024-12-11 | Enhancing Cybersecurity in IoT Networks: A Deep Learning Approach to Anomaly Detection | Yining Pang et.al. | 2412.08301 | null |
| 2024-12-11 | Breaking the Bias: Recalibrating the Attention of Industrial Anomaly Detection | Xin Chen et.al. | 2412.08189 | null |
| 2024-12-11 | Unsupervised Detection of Anomalous Driving Patterns Using High Resolution Telematics Time Series Data | Ian Weng Chan et.al. | 2412.08106 | null |
| 2024-12-10 | Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid | Sathya Narayana Mohan et.al. | 2412.07917 | null |
| 2024-12-10 | Unlocking the Potential of Reverse Distillation for Anomaly Detection | Xinyue Liu et.al. | 2412.07579 | link |
| 2024-12-10 | Boundary anomaly detection in two-dimensional subsystem symmetry-protected topological phases | Ke Ding et.al. | 2412.07563 | null |
| 2024-12-10 | Anomaly detection using Diffusion-based methods | Aryan Bhosale et.al. | 2412.07539 | null |
| 2024-12-10 | Impact of Sampling Techniques and Data Leakage on XGBoost Performance in Credit Card Fraud Detection | Siyaxolisa Kabane et.al. | 2412.07437 | null |
| 2024-12-09 | Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection | Alex Kantchelian et.al. | 2412.06700 | null |
| 2024-12-09 | Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids | Omer Sen et.al. | 2412.06255 | null |
| 2024-12-09 | Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity | Robert Dilworth et.al. | 2412.06203 | null |
| 2024-12-09 | Holmes-VAU: Towards Long-term Video Anomaly Understanding at Any Granularity | Huaxin Zhang et.al. | 2412.06171 | link |
| 2024-12-08 | siForest: Detecting Network Anomalies with Set-Structured Isolation Forest | Christie Djidjev et.al. | 2412.06015 | null |
| 2024-12-07 | Leveraging Time-Series Foundation Model for Subsurface Well Logs Prediction and Anomaly Detection | Ardiansyah Koeshidayatullah et.al. | 2412.05681 | null |
| 2024-12-07 | Detecting outliers by clustering algorithms | Qi Li et.al. | 2412.05669 | null |
| 2024-12-07 | Hyperedge Anomaly Detection with Hypergraph Neural Network | Md. Tanvir Alam et.al. | 2412.05641 | null |
| 2024-12-07 | Self-Supervised Masked Mesh Learning for Unsupervised Anomaly Detection on 3D Cortical Surfaces | Hao-Chun Yang et.al. | 2412.05580 | null |
| 2024-12-07 | A New Perspective on Time Series Anomaly Detection: Faster Patch-based Broad Learning System | Pengyu Li et.al. | 2412.05498 | null |
| 2024-12-06 | Automated, Unsupervised, and Auto-parameterized Inference of Data Patterns and Anomaly Detection | Qiaolin Qin et.al. | 2412.05240 | null |
| 2024-12-06 | Backdooring Outlier Detection Methods: A Novel Attack Approach | ZeinabSadat Taghavi et.al. | 2412.05010 | null |
| 2024-12-06 | ETLNet: An Efficient TCN-BiLSTM Network for Road Anomaly Detection Using Smartphone Sensors | Mohd Faiz Ansari et.al. | 2412.04990 | null |
| 2024-12-06 | On Process Awareness in Detecting Multi-stage Cyberattacks in Smart Grids | Omer Sen et.al. | 2412.04902 | null |
| 2024-12-06 | Encryption-Aware Anomaly Detection in Power Grid Communication Networks | Omer Sen et.al. | 2412.04901 | null |
| 2024-12-06 | MANTA: A Large-Scale Multi-View and Visual-Text Anomaly Detection Dataset for Tiny Objects | Lei Fan et.al. | 2412.04867 | null |
| 2024-12-06 | NLP-ADBench: NLP Anomaly Detection Benchmark | Yuangang Li et.al. | 2412.04784 | link |
| 2024-12-06 | DPGIIL: Dirichlet Process-Deep Generative Model-Integrated Incremental Learning for Clustering in Transmissibility-based Online Structural Anomaly Detection | Lin-Feng Mei et.al. | 2412.04781 | null |
| 2024-12-06 | Anomaly Detection and Classification in Knowledge Graphs | Asara Senaratne et.al. | 2412.04780 | null |
| 2024-12-06 | Revitalizing Reconstruction Models for Multi-class Anomaly Detection via Class-Aware Contrastive Learning | Lei Fan et.al. | 2412.04769 | null |
| 2024-12-05 | Towards Zero-shot 3D Anomaly Localization | Yizhou Wang et.al. | 2412.04304 | null |
| 2024-12-05 | SCADE: Scalable Command-line Anomaly Detection Engine | Vaishali Vinay et.al. | 2412.04259 | null |
| 2024-12-05 | DistB-VNET: Distributed Cluster-based Blockchain Vehicular Ad-Hoc Networks through SDN-NFV for Smart City | Anichur Rahman et.al. | 2412.04222 | null |
| 2024-12-05 | ONER: Online Experience Replay for Incremental Anomaly Detection | Yizhou Jin et.al. | 2412.03907 | null |
| 2024-12-05 | Machine Learning-based Android Intrusion Detection System | Madiha Tahreem et.al. | 2412.03894 | null |
| 2024-12-05 | Transferring self-supervised pre-trained models for SHM data anomaly detection with scarce labeled data | Mingyuan Zhou et.al. | 2412.03880 | null |
| 2024-12-05 | Training MLPs on Graphs without Supervision | Zehong Wang et.al. | 2412.03864 | link |
| 2024-12-05 | CLIP-FSAC++: Few-Shot Anomaly Classification with Anomaly Descriptor Based on CLIP | Zuo Zuo et.al. | 2412.03829 | null |
| 2024-12-04 | Model-agnostic search for dijet resonances with anomalous jet substructure in proton-proton collisions at $\sqrt{s}$ = 13 TeV | CMS Collaboration et.al. | 2412.03747 | null |
| 2024-12-04 | Convolutional Neural Networks and Mixture of Experts for Intrusion Detection in 5G Networks and beyond | Loukas Ilias et.al. | 2412.03483 | null |
| 2024-12-04 | Sifting through the haystack – efficiently finding rare animal behaviors in large-scale datasets | Shir Bar et.al. | 2412.03452 | link |
| 2024-12-04 | State Frequency Estimation for Anomaly Detection | Clinton Cao et.al. | 2412.03442 | null |
| 2024-12-04 | UniVAD: A Training-free Unified Model for Few-shot Visual Anomaly Detection | Zhaopeng Gu et.al. | 2412.03342 | null |
| 2024-12-04 | The bcc coating of Lennard-Jones crystal nuclei vanishes with a change of local structure detection algorithm | Willem Gispen et.al. | 2412.03276 | null |
| 2024-12-04 | Frequency-Guided Diffusion Model with Perturbation Training for Skeleton-Based Video Anomaly Detection | Xiaofeng Tan et.al. | 2412.03044 | link |
| 2024-12-03 | Optimized IoT Intrusion Detection using Machine Learning Technique | Muhammad Zawad Mahmud et.al. | 2412.02845 | null |
| 2024-12-03 | Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles | Reek Majumder et.al. | 2412.02539 | null |
| 2024-12-03 | F-SE-LSTM: A Time Series Anomaly Detection Method with Frequency Domain Information | Yi-Xiang Lu et.al. | 2412.02474 | null |
| 2024-12-03 | Leveraging Ensemble-Based Semi-Supervised Learning for Illicit Account Detection in Ethereum DeFi Transactions | Shabnam Fazliani et.al. | 2412.02408 | null |
| 2024-12-03 | An Automated Data Mining Framework Using Autoencoders for Feature Extraction and Dimensionality Reduction | Yaxin Liang et.al. | 2412.02211 | null |
| 2024-12-03 | Deep Learning, Machine Learning, Advancing Big Data Analytics and Management | Weiche Hsieh et.al. | 2412.02187 | null |
| 2024-12-02 | Network Simulation with Complex Cyber-attack Scenarios | Tiago Dias et.al. | 2412.01421 | null |
| 2024-12-02 | Representation Learning for Time-Domain High-Energy Astrophysics: Discovery of Extragalactic Fast X-ray Transient XRT 200515 | Steven Dillmann et.al. | 2412.01150 | null |
| 2024-12-02 | VERA: Explainable Video Anomaly Detection via Verbalized Learning of Vision-Language Models | Muchao Ye et.al. | 2412.01095 | null |
| 2024-12-02 | Practitioners’ Expectations on Log Anomaly Detection | Xiaoxue Ma et.al. | 2412.01066 | null |
| 2024-12-01 | TGTOD: A Global Temporal Graph Transformer for Outlier Detection at Scale | Kay Liu et.al. | 2412.00984 | link |
| 2024-11-29 | Enhanced anomaly detection in well log data through the application of ensemble GANs | Abdulrahman Al-Fakih et.al. | 2411.19875 | link |
| 2024-11-29 | Real-Time Anomaly Detection in Video Streams | Fabien Poirier et.al. | 2411.19731 | null |
| 2024-11-29 | Real-time Anomaly Detection at the L1 Trigger of CMS Experiment | Abhijith Gandrakota et.al. | 2411.19506 | null |
| 2024-11-29 | Multi-task CNN Behavioral Embedding Model For Transaction Fraud Detection | Bo Qu et.al. | 2411.19457 | null |
| 2024-11-29 | Unsupervised Learning Approach to Anomaly Detection in Gravitational Wave Data | Ammar Fayad et.al. | 2411.19450 | null |
| 2024-11-28 | Automatic Prompt Generation and Grounding Object Detection for Zero-Shot Image Anomaly Detection | Tsun-Hin Cheung et.al. | 2411.19220 | null |
| 2024-11-28 | Swarm Intelligence-Driven Client Selection for Federated Learning in Cybersecurity applications | Koffka Khan et.al. | 2411.18877 | null |
| 2024-11-27 | Optimal In-Network Distribution of Learning Functions for a Secure-by-Design Programmable Data Plane of Next-Generation Networks | Mattia Giovanni Spina et.al. | 2411.18384 | null |
| 2024-11-27 | P4-NIDS: High-Performance Network Monitoring and Intrusion Detection in P4 | Yaying Chen et.al. | 2411.17987 | null |
| 2024-11-26 | Rock the KASBA: Blazingly Fast and Accurate Time Series Clustering | Christopher Holder et.al. | 2411.17838 | null |
| 2024-11-26 | A Machine Learning-based Anomaly Detection Framework in Life Insurance Contracts | Andreas Groll et.al. | 2411.17495 | null |
| 2024-11-26 | GraphSubDetector: Time Series Subsequence Anomaly Detection via Density-Aware Adaptive Graph Neural Network | Weiqi Chen et.al. | 2411.17218 | null |
| 2024-11-25 | Unsupervised Quantum Anomaly Detection on Noisy Quantum Processors | Daniel Pranjić et.al. | 2411.16970 | null |
| 2024-11-25 | Spectroscopic Quasar Anomaly Detection (SQuAD) I: Rest-Frame UV Spectra from SDSS DR16 | Arihant Tiwari et.al. | 2411.16858 | null |
| 2024-11-25 | Revisiting DDIM Inversion for Controlling Defect Generation by Disentangling the Background | Youngjae Cho et.al. | 2411.16767 | null |
| 2024-11-25 | Anomaly Detection and RFI Classification with Unsupervised Learning in Narrowband Radio Technosignature Searches | Ben Jacobson-Bell et.al. | 2411.16556 | null |
| 2024-11-25 | Unsupervised Event Outlier Detection in Continuous Time | Somjit Nath et.al. | 2411.16427 | null |
| 2024-11-25 | FUN-AD: Fully Unsupervised Learning for Anomaly Detection with Noisy Training Data | Jiin Im et.al. | 2411.16110 | link |
| 2024-11-25 | ROADS: Robust Prompt-driven Multi-Class Anomaly Detection under Domain Shift | Hossein Kashiani et.al. | 2411.16049 | null |
| 2024-11-24 | An AutoML-based approach for Network Intrusion Detection | Nana Kankam Gyimah et.al. | 2411.15920 | null |
| 2024-11-24 | Streaming SQL Multi-Way Join Method for Long State Streams | Jinlong Hu et.al. | 2411.15835 | null |
| 2024-11-24 | Runtime-optimized Multi-way Stream Join Operator for Large-scale Streaming data | Jinlong Hu et.al. | 2411.15827 | null |
| 2024-11-23 | Circuit design in biology and machine learning. II. Anomaly detection | Steven A. Frank et.al. | 2411.15647 | null |
| 2024-11-25 | Information Extraction from Heterogeneous Documents without Ground Truth Labels using Synthetic Label Generation and Knowledge Distillation | Aniket Bhattacharyya et.al. | 2411.14957 | null |
| 2024-11-22 | Evaluating Vision Transformer Models for Visual Quality Control in Industrial Manufacturing | Miriam Alber et.al. | 2411.14953 | link |
| 2024-11-22 | Physical and Software Based Fault Injection Attacks Against TEEs in Mobile Devices: A Systemisation of Knowledge | Aaron Joy et.al. | 2411.14878 | null |
| 2024-11-22 | A Lightweight Edge-CNN-Transformer Model for Detecting Coordinated Cyber and Digital Twin Attacks in Cooperative Smart Farming | Lopamudra Praharaj et.al. | 2411.14729 | null |
| 2024-11-21 | Privacy-Preserving Video Anomaly Detection: A Survey | Jing Liu et.al. | 2411.14565 | null |
| 2024-11-21 | The importance of the clustering model to detect new types of intrusion in data traffic | Noor Saud Abd et.al. | 2411.14550 | null |
| 2024-11-21 | Are Anomaly Scores Telling the Whole Story? A Benchmark for Multilevel Anomaly Detection | Tri Cao et.al. | 2411.14515 | null |
| 2024-11-21 | End-to-End Convolutional Activation Anomaly Analysis for Anomaly Detection | Aleksander Kozłowski et.al. | 2411.14509 | null |
| 2024-11-21 | Lower Dimensional Spherical Representation of Medium Voltage Load Profiles for Visualization, Outlier Detection, and Generative Modelling | Edgar Mauricio Salazar Duque et.al. | 2411.14346 | null |
| 2024-11-21 | Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review | Pablo Moriano et.al. | 2411.14278 | null |
| 2024-11-21 | A Dataset for Evaluating Online Anomaly Detection Approaches for Discrete Multivariate Time Series | Lucas Correia et.al. | 2411.13951 | link |
| 2024-11-20 | Demonstrating the Suitability of Neuromorphic, Event-Based, Dynamic Vision Sensors for In Process Monitoring of Metallic Additive Manufacturing and Welding | David Mascareñas et.al. | 2411.13108 | null |
| 2024-11-19 | AI Guided Early Screening of Cervical Cancer | Dharanidharan S I et.al. | 2411.12681 | null |
| 2024-11-19 | UMGAD: Unsupervised Multiplex Graph Anomaly Detection | Xiang Li et.al. | 2411.12556 | null |
| 2024-11-20 | TSINR: Capturing Temporal Continuity via Implicit Neural Representations for Time Series Anomaly Detection | Mengxuan Li et.al. | 2411.11641 | link |
| 2024-11-18 | Feature Selection for Network Intrusion Detection | Charles Westphal et.al. | 2411.11603 | null |
| 2024-11-18 | SADDE: Semi-supervised Anomaly Detection with Dependable Explanations | Yachao Yuan et.al. | 2411.11293 | link |
| 2024-11-17 | Digital Twin for Advanced Network Planning: Tackling Interference | Juan Carlos Estrada-Jimenez et.al. | 2411.11034 | null |
| 2024-11-17 | TeG: Temporal-Granularity Method for Anomaly Detection with Attention in Smart City Surveillance | Erkut Akdag et.al. | 2411.11003 | null |
| 2024-11-17 | Anomaly Detection for People with Visual Impairments Using an Egocentric 360-Degree Camera | Inpyo Song et.al. | 2411.10945 | null |
| 2024-11-17 | LLM-assisted Physical Invariant Extraction for Cyber-Physical Systems Anomaly Detection | Danial Abshari et.al. | 2411.10918 | null |
| 2024-11-16 | Steam Turbine Anomaly Detection: An Unsupervised Learning Approach Using Enhanced Long Short-Term Memory Variational Autoencoder | Weiming Xu et.al. | 2411.10765 | null |
| 2024-11-16 | On-device Anomaly Detection in Conveyor Belt Operations | Luciano S. Martinez-Rau et.al. | 2411.10729 | null |
| 2024-11-15 | Systematically Constructing the Likelihood for Boosted $H\to gg$ Decays | Andrew J. Larkoski et.al. | 2411.10539 | null |
| 2024-11-15 | Uncertainty in Supply Chain Digital Twins: A Quantum-Classical Hybrid Approach | Abdullah Abdullah et.al. | 2411.10254 | null |
| 2024-11-15 | Outliers resistant image classification by anomaly detection | Anton Sergeev et.al. | 2411.10150 | null |
| 2024-11-15 | Early Detection of Multiwavelength Blazar Variability | Hermann Stolte et.al. | 2411.10140 | null |
| 2024-11-15 | Quantum similarity learning for anomaly detection | A. Hammad et.al. | 2411.09927 | null |
| 2024-11-14 | Deep Autoencoders for Unsupervised Anomaly Detection in Wildfire Prediction | İrem Üstek et.al. | 2411.09844 | null |
| 2024-11-14 | Adaptive Deviation Learning for Visual Anomaly Detection with Data Contamination | Anindya Sundar Das et.al. | 2411.09558 | link |
| 2024-11-14 | Exploring Zero-Shot Anomaly Detection with CLIP in Medical Imaging: Are We There Yet? | Aldo Marzullo et.al. | 2411.09310 | null |
| 2024-11-14 | Advancing Software Security and Reliability in Cloud Platforms through AI-based Anomaly Detection | Sabbir M. Saleh et.al. | 2411.09200 | null |
| 2024-11-13 | Continuous GNN-based Anomaly Detection on Edge using Efficient Adaptive Knowledge Graph Learning | Sanggeon Yun et.al. | 2411.09072 | null |
| 2024-11-13 | Anomaly Detection in Large-Scale Cloud Systems: An Industry Case and Dataset | Mohammad Saiful Islam et.al. | 2411.09047 | null |
| 2024-11-13 | Unsupervised Parameter-free Outlier Detection using HDBSCAN* Outlier Profiles | Kushankur Ghosh et.al. | 2411.08867 | null |
| 2024-11-13 | AstroM $^3$ : A self-supervised multimodal model for astronomy | Mariia Rizhko et.al. | 2411.08842 | null |
| 2024-11-13 | AI-Enhanced Inverter Fault and Anomaly Detection System for Distributed Energy Resources in Microgrids | Swetha Rani Kasimalla et.al. | 2411.08761 | null |
| 2024-11-13 | Weakly-Supervised Anomaly Detection in Surveillance Videos Based on Two-Stream I3D Convolution Network | Sareh Soltani Nejad et.al. | 2411.08755 | null |
| 2024-11-13 | LogLLM: Log-based Anomaly Detection Using Large Language Models | Wei Guan et.al. | 2411.08561 | link |
| 2024-11-13 | Graph Neural Networks in Supply Chain Analytics and Optimization: Concepts, Perspectives, Dataset and Benchmarks | Azmine Toushik Wasi et.al. | 2411.08550 | null |
| 2024-11-13 | A Fuzzy Reinforcement LSTM-based Long-term Prediction Model for Fault Conditions in Nuclear Power Plants | Siwei Li et.al. | 2411.08370 | null |
| 2024-11-12 | EAPCR: A Universal Feature Extractor for Scientific Data without Explicit Feature Relation Patterns | Zhuohang Yu et.al. | 2411.08164 | null |
| 2024-11-12 | Spatially Regularized Graph Attention Autoencoder Framework for Detecting Rainfall Extremes | Mihir Agarwal et.al. | 2411.07753 | null |
| 2024-11-12 | Disentangling Tabular Data towards Better One-Class Anomaly Detection | Jianan Ye et.al. | 2411.07574 | null |
| 2024-11-12 | Contrastive Language Prompting to Ease False Positives in Medical Anomaly Detection | YeongHyeon Park et.al. | 2411.07546 | null |
| 2024-11-11 | SDN-Based Smart Cyber Switching (SCS) for Cyber Restoration of a Digital Substation | Mansi Girdhar et.al. | 2411.07433 | null |
| 2024-11-11 | Anomaly Detection in OKTA Logs using Autoencoders | Jericho Cain et.al. | 2411.07314 | null |
| 2024-11-10 | ASTD Patterns for Integrated Continuous Anomaly Detection In Data Logs | Chaymae El Jabri et.al. | 2411.07272 | null |
| 2024-11-11 | Enhancing Predictive Maintenance in Mining Mobile Machinery through a TinyML-enabled Hierarchical Inference Network | Raúl de la Fuente et.al. | 2411.07168 | null |
| 2024-11-11 | A neural-network based anomaly detection system and a safety protocol to protect vehicular network | Marco Franceschini et.al. | 2411.07013 | null |
| 2024-11-10 | UniGAD: Unifying Multi-level Graph Anomaly Detection | Yiqing Lin et.al. | 2411.06427 | link |
| 2024-11-10 | Locally Adaptive One-Class Classifier Fusion with Dynamic $\ell$ p-Norm Constraints for Robust Anomaly Detection | Sepehr Nourmohammadi et.al. | 2411.06406 | null |
| 2024-11-09 | Early Prediction of Natural Gas Pipeline Leaks Using the MKTCN Model | Xuguang Li et.al. | 2411.06214 | null |
| 2024-11-09 | IDU-Detector: A Synergistic Framework for Robust Masquerader Attack Detection | Zilin Huang et.al. | 2411.06172 | null |
| 2024-11-09 | GlocalCLIP: Object-agnostic Global-Local Prompt Learning for Zero-shot Anomaly Detection | Jiyul Ham et.al. | 2411.06071 | null |
| 2024-11-08 | Sdn Intrusion Detection Using Machine Learning Method | Muhammad Zawad Mahmud et.al. | 2411.05888 | null |
| 2024-11-08 | Differential Privacy Under Class Imbalance: Methods and Empirical Insights | Lucas Rosenblatt et.al. | 2411.05733 | null |
| 2024-11-08 | Machine learning-driven Anomaly Detection and Forecasting for Euclid Space Telescope Operations | Pablo Gómez et.al. | 2411.05596 | null |
| 2024-11-07 | Interpretable Measurement of CNN Deep Feature Density using Copula and the Generalized Characteristic Function | David Chapman et.al. | 2411.05183 | null |
| 2024-11-07 | MISGUIDE: Security-Aware Attack Analytics for Smart Grid Load Frequency Control | Nur Imtiazul Haque et.al. | 2411.04731 | null |
| 2024-11-08 | From CNN to ConvRNN: Adapting Visualization Techniques for Time-Series Anomaly Detection | Fabien Poirier et.al. | 2411.04707 | null |
| 2024-11-07 | Peri-midFormer: Periodic Pyramid Transformer for Time Series Analysis | Qiang Wu et.al. | 2411.04554 | link |
| 2024-11-07 | GPT-Guided Monte Carlo Tree Search for Symbolic Regression in Financial Fraud Detection | Prashank Kadam et.al. | 2411.04459 | null |
| 2024-11-06 | Astronomaly Protege: Discovery Through Human-Machine Collaboration | Michelle Lochner et.al. | 2411.04188 | link |
| 2024-11-06 | Synomaly Noise and Multi-Stage Diffusion: A Novel Approach for Unsupervised Anomaly Detection in Ultrasound Imaging | Yuan Bi et.al. | 2411.04004 | null |
| 2024-11-06 | Towards Resource-Efficient Federated Learning in Industrial IoT for Multivariate Time Series Analysis | Alexandros Gkillas et.al. | 2411.03996 | null |
| 2024-11-05 | Enhanced Real-Time Threat Detection in 5G Networks: A Self-Attention RNN Autoencoder Approach for Spectral Intrusion Analysis | Mohammadreza Kouchaki et.al. | 2411.03365 | null |
| 2024-11-04 | LLM-based Continuous Intrusion Detection Framework for Next-Gen Networks | Frederic Adjewa et.al. | 2411.03354 | null |
| 2024-11-05 | iAnomaly: A Toolkit for Generating Performance Anomaly Datasets in Edge-Cloud Integrated Computing Environments | Duneesha Fernando et.al. | 2411.02868 | null |
| 2024-11-05 | Brewing Vodka: Distilling Pure Knowledge for Lightweight Threat Detection in Audit Logs | Weiheng Wu et.al. | 2411.02775 | null |
| 2024-11-05 | JEL: Applying End-to-End Neural Entity Linking in JPMorgan Chase | Wanying Ding et.al. | 2411.02695 | null |
| 2024-11-04 | Visually Analyze SHAP Plots to Diagnose Misclassifications in ML-based Intrusion Detection | Maraz Mia et.al. | 2411.02670 | null |
| 2024-11-04 | See it, Think it, Sorted: Large Multimodal Models are Few-shot Time Series Anomaly Analyzers | Jiaxin Zhuang et.al. | 2411.02465 | null |
| 2024-11-04 | Advancing Cyber-Attack Detection in Power Systems: A Comparative Study of Machine Learning and Graph Neural Network Approaches | Tianzhixi Yin et.al. | 2411.02248 | null |
| 2024-11-04 | HACD: Harnessing Attribute Semantics and Mesoscopic Structure for Community Detection | Anran Zhang et.al. | 2411.01947 | link |
| 2024-11-04 | High-Pass Graph Convolutional Network for Enhanced Anomaly Detection: A Novel Approach | Shelei Li et.al. | 2411.01817 | null |
| 2024-11-04 | TabSec: A Collaborative Framework for Novel Insider Threat Detection | Zilin Huang et.al. | 2411.01779 | null |
| 2024-11-03 | Anomalous Client Detection in Federated Learning | Dipanwita Thakur et.al. | 2411.01490 | null |
| 2024-11-02 | Autoencoders for At-Source Data Reduction and Anomaly Detection in High Energy Particle Detectors | Alexander Yue et.al. | 2411.01118 | null |
| 2024-11-01 | Identify Backdoored Model in Federated Learning via Individual Unlearning | Jiahao Xu et.al. | 2411.01040 | null |
| 2024-11-01 | AAD-LLM: Adaptive Anomaly Detection Using Large Language Models | Alicia Russell-Gilbert et.al. | 2411.00914 | null |
| 2024-11-01 | PedSleepMAE: Generative Model for Multimodal Pediatric Sleep Signals | Saurav R. Pandey et.al. | 2411.00718 | null |
| 2024-11-01 | Integrating Fuzzy Logic into Deep Symbolic Regression | Wout Gerdes et.al. | 2411.00431 | null |
| 2024-10-31 | AR-Pro: Counterfactual Explanations for Anomaly Repair with Formal Properties | Xiayan Ji et.al. | 2410.24178 | null |
| 2024-10-31 | Distributing Intelligence in 6G Programmable Data Planes for Effective In-Network Deployment of an Active Intrusion Detection System | Mattia G. Spina et.al. | 2410.24013 | null |
| 2024-10-31 | Towards Convexity in Anomaly Detection: A New Formulation of SSLM with Unique Optimal Solutions | Hongying Liu et.al. | 2410.23774 | null |
| 2024-10-30 | Partial Channel Dependence with Channel Masks for Time Series Foundation Models | Seunghan Lee et.al. | 2410.23222 | null |
| 2024-10-30 | Directional anomaly detection | Oliver Urs Lenz et.al. | 2410.23158 | null |
| 2024-10-30 | Dynamic Threshold-based Two-layer Online Unsupervised Anomaly Detector | Yachao Yuan et.al. | 2410.22967 | link |
| 2024-10-30 | MIXAD: Memory-Induced Explainable Time Series Anomaly Detection | Minha Kim et.al. | 2410.22735 | link |
| 2024-10-30 | PV-VTT: A Privacy-Centric Dataset for Mission-Specific Anomaly Detection and Natural Language Interpretation | Ryozo Masukawa et.al. | 2410.22623 | null |
| 2024-10-29 | Unsupervised Multimodal Fusion of In-process Sensor Data for Advanced Manufacturing Process Monitoring | Matthew McKinney et.al. | 2410.22558 | null |
| 2024-10-29 | Hypergraph-based multi-scale spatio-temporal graph convolution network for Time-Series anomaly detection | Hongyi Xu et.al. | 2410.22256 | null |
| 2024-10-29 | A Survey on RGB, 3D, and Multimodal Approaches for Unsupervised Industrial Anomaly Detection | Yuxuan Lin et.al. | 2410.21982 | link |
| 2024-10-29 | LogSHIELD: A Graph-based Real-time Anomaly Detection Framework using Frequency Analysis | Krishna Chandra Roy et.al. | 2410.21936 | null |
| 2024-10-29 | Differentiable Inductive Logic Programming for Fraud Detection | Boris Wolfson et.al. | 2410.21928 | null |
| 2024-10-29 | SCGNet-Stacked Convolution with Gated Recurrent Unit Network for Cyber Network Intrusion Detection and Intrusion Type Classification | Rajana Akter et.al. | 2410.21873 | null |
| 2024-10-29 | Representational learning for an anomalous sound detection system with source separation model | Seunghyeon Shin et.al. | 2410.21797 | null |
| 2024-10-29 | Sliced-Wasserstein-based Anomaly Detection and Open Dataset for Localized Critical Peak Rebates | Julien Pallage et.al. | 2410.21712 | null |
| 2024-10-28 | A Generative Model Based Honeypot for Industrial OPC UA Communication | Olaf Sassnick et.al. | 2410.21574 | link |
| 2024-10-28 | A Systematic Review of Machine Learning in Sports Betting: Techniques, Challenges, and Future Directions | René Manassé Galekwa et.al. | 2410.21484 | null |
| 2024-10-28 | Topological Identification of Agent Status in Information Contagions: Application to Financial Markets | Anubha Goel et.al. | 2410.21104 | null |
| 2024-10-28 | A Review of Graph-Powered Data Quality Applications for IoT Monitoring Sensor Networks | Pau Ferrer-Cid et.al. | 2410.21006 | null |
| 2024-10-27 | SIGMA: Single Interpolated Generative Model for Anomalies | Ranit Das et.al. | 2410.20537 | null |
| 2024-10-27 | Causal Modeling in Multi-Context Systems: Distinguishing Multiple Context-Specific Causal Graphs which Account for Observational Support | Martin Rabel et.al. | 2410.20405 | null |
| 2024-10-27 | Rethinking Reconstruction-based Graph-Level Anomaly Detection: Limitations and a Simple Remedy | Sunwoo Kim et.al. | 2410.20366 | null |
| 2024-10-27 | ANOMIX: A Simple yet Effective Hard Negative Generation via Mixing for Graph Anomaly Detection | Hwan Kim et.al. | 2410.20310 | link |
| 2024-10-26 | Proactive Fraud Defense: Machine Learning’s Evolving Role in Protecting Against Online Fraud | Md Kamrul Hasan Chy et.al. | 2410.20281 | null |
| 2024-10-26 | ResAD: A Simple Framework for Class Generalizable Anomaly Detection | Xincheng Yao et.al. | 2410.20047 | link |
| 2024-10-25 | Federated Anomaly Detection for Early-Stage Diagnosis of Autism Spectrum Disorders using Serious Game Data | Nikolaos Pavlidis et.al. | 2410.20003 | null |
| 2024-10-25 | Temporal Convolution-based Hybrid Model Approach with Representation Learning for Real-Time Acoustic Anomaly Detection | Sahan Dissanayaka et.al. | 2410.19722 | null |
| 2024-10-25 | Enhanced Anomaly Detection in Industrial Control Systems aided by Machine Learning | Vegard Berge et.al. | 2410.19717 | null |
| 2024-10-25 | Neuromorphic IoT Architecture for Efficient Water Management: A Smart Village Case Study | Mugdim Bublin et.al. | 2410.19562 | null |
| 2024-10-25 | Detection of Emerging Infectious Diseases in Lung CT based on Spatial Anomaly Patterns | Branko Mitic et.al. | 2410.19535 | null |
| 2024-10-24 | Context-Aware Trajectory Anomaly Detection | Haoji Hu et.al. | 2410.19136 | null |
| 2024-10-24 | Exploring the Universe with SNAD: Anomaly Detection in Astronomy | Alina A. Volnova et.al. | 2410.18875 | null |
| 2024-10-24 | Low-Latency Video Anonymization for Crowd Anomaly Detection: Privacy vs. Performance | Mulugeta Weldezgina Asres et.al. | 2410.18717 | link |
| 2024-10-25 | NIDS Neural Networks Using Sliding Time Window Data Processing with Trainable Activations and its Generalization Capability | Anton Raskovalov et.al. | 2410.18658 | null |
| 2024-10-24 | Graph Pre-Training Models Are Strong Anomaly Detectors | Jiashun Cheng et.al. | 2410.18487 | null |
| 2024-10-24 | Harnessing PU Learning for Enhanced Cloud-based DDoS Detection: A Comparative Analysis | Robert Dilworth et.al. | 2410.18380 | null |
| 2024-10-23 | Advancing Network Security: A Comprehensive Testbed and Dataset for Machine Learning-Based Intrusion Detection | Talaya Farasat et.al. | 2410.18332 | null |
| 2024-10-23 | Real time anomalies detection on video | Fabien Poirier et.al. | 2410.18051 | null |
| 2024-10-22 | Data Obfuscation through Latent Space Projection (LSP) for Privacy-Preserving AI Governance: Case Studies in Medical Diagnosis and Finance Fraud Detection | Mahesh Vaijainthymala Krishnamoorthy et.al. | 2410.17459 | null |
| 2024-10-22 | Coniferest: a complete active anomaly detection framework | M. V. Kornilov et.al. | 2410.17142 | null |
| 2024-10-22 | OMLog: Online Log Anomaly Detection for Evolving System with Meta-learning | Jiyu Tian et.al. | 2410.16612 | null |
| 2024-10-22 | Generative AI for Overall Mission Effectiveness at the Habitable Worlds Observatory | Megan Shabram et.al. | 2410.16609 | null |
| 2024-10-21 | Spatio-temporal Multivariate Cluster Evolution Analysis for Detecting and Tracking Climate Impacts | Warren L. Davis IV et.al. | 2410.16544 | null |
| 2024-10-21 | LLM-TS Integrator: Integrating LLM for Enhanced Time Series Modeling | Can Chen et.al. | 2410.16489 | null |
| 2024-10-21 | Revisiting Deep Feature Reconstruction for Logical and Structural Industrial Anomaly Detection | Sukanya Patra et.al. | 2410.16255 | link |
| 2024-10-21 | TimeMixer++: A General Time Series Pattern Machine for Universal Predictive Analysis | Shiyu Wang et.al. | 2410.16032 | null |
| 2024-10-21 | MultiRC: Joint Learning for Time Series Anomaly Prediction and Detection with Multi-scale Reconstructive Contrast | Shiyan Hu et.al. | 2410.15997 | null |
| 2024-10-21 | Redefining Finance: The Influence of Artificial Intelligence (AI) and Machine Learning (ML) | Animesh Kumar et.al. | 2410.15951 | null |
| 2024-10-21 | Hybrid Architecture for Real-Time Video Anomaly Detection: Integrating Spatial and Temporal Analysis | Fabien Poirier et.al. | 2410.15909 | null |
| 2024-10-21 | A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection Systems | Ismail Bibers et.al. | 2410.15597 | null |
| 2024-10-20 | MedDiff-FM: A Diffusion-based Foundation Model for Versatile Medical Image Applications | Yongrui Yu et.al. | 2410.15432 | null |
| 2024-10-20 | XAI-based Feature Ensemble for Enhanced Anomaly Detection in Autonomous Driving Systems | Sazid Nazat et.al. | 2410.15405 | null |
| 2024-10-19 | Controllable RANSAC-based Anomaly Detection via Hypothesis Testing | Le Hong Phong et.al. | 2410.15133 | null |
| 2024-10-19 | ReeFRAME: Reeb Graph based Trajectory Analysis Framework to Capture Top-Down and Bottom-Up Patterns of Life | Chandrakanth Gudavalli et.al. | 2410.14913 | null |
| 2024-10-18 | Towards Unsupervised Validation of Anomaly-Detection Models | Lihi Idan et.al. | 2410.14579 | null |
| 2024-10-18 | AnomalyNCD: Towards Novel Anomaly Class Discovery in Industrial Scenarios | Ziming Huang et.al. | 2410.14379 | link |
| 2024-10-18 | FedMSE: Federated learning for IoT network intrusion detection | Van Tuan Nguyen et.al. | 2410.14121 | link |
| 2024-10-17 | A Physics-Based Context-Aware Approach for Anomaly Detection in Teleoperated Driving Operations Under False Data Injection Attacks | Subhadip Ghosh et.al. | 2410.13962 | null |
| 2024-10-17 | Statistical testing on generative AI anomaly detection tools in Alzheimer’s Disease diagnosis | Rosemary He et.al. | 2410.13363 | null |
| 2024-10-17 | A Comprehensive Analysis of Routing Vulnerabilities and Defense Strategies in IoT Networks | Kim Jae-Dong et.al. | 2410.13214 | null |
| 2024-10-16 | FedCAP: Robust Federated Learning via Customized Aggregation and Personalization | Youpeng Li et.al. | 2410.13083 | link |
| 2024-10-16 | Semi-supervised Learning for Detecting Inverse Compton Emission in Galaxy Clusters | Sheng-Chieh Lin et.al. | 2410.12943 | null |
| 2024-10-17 | Automatic Mapping of Anatomical Landmarks from Free-Text Using Large Language Models: Insights from Llama-2 | Mohamad Abdi et.al. | 2410.12686 | null |
| 2024-10-16 | Improved Anomaly Detection through Conditional Latent Space VAE Ensembles | Oskar Åström et.al. | 2410.12328 | link |
| 2024-10-16 | Revisited Large Language Model for Time Series Analysis through Modality Alignment | Liangwei Nathan Zheng et.al. | 2410.12326 | null |
| 2024-10-16 | CATCH: Channel-Aware multivariate Time Series Anomaly Detection via Frequency Patching | Xingjian Wu et.al. | 2410.12261 | link |
| 2024-10-15 | SplatPose+: Real-time Image-Based Pose-Agnostic 3D Anomaly Detection | Yizhe Liu et.al. | 2410.12080 | null |
| 2024-10-15 | Federated Learning framework for LoRaWAN-enabled IIoT communication: A case study | Oscar Torres Sanchez et.al. | 2410.11612 | null |
| 2024-10-15 | PaSTe: Improving the Efficiency of Visual Anomaly Detection at the Edge | Manuel Barusco et.al. | 2410.11591 | link |
| 2024-10-15 | CONSULT: Contrastive Self-Supervised Learning for Few-shot Tumor Detection | Sin Chee Chin et.al. | 2410.11307 | null |
| 2024-10-14 | ASTM :Autonomous Smart Traffic Management System Using Artificial Intelligence CNN and LSTM | Christofel Rio Goenawan et.al. | 2410.10929 | null |
| 2024-10-14 | AI-based particle track identification in scintillating fibres read out with imaging sensors | Noemi Bührer et.al. | 2410.10519 | null |
| 2024-10-14 | WT-CFormer: High-Performance Web Traffic Anomaly Detection Using CNN and Transformer Networks | Yundi He et.al. | 2410.10327 | null |
| 2024-10-14 | Fine-grained Abnormality Prompt Learning for Zero-shot Anomaly Detection | Jiawen Zhu et.al. | 2410.10289 | link |
| 2024-10-14 | LADMIM: Logical Anomaly Detection with Masked Image Modeling in Discrete Latent Space | Shunsuke Sakai et.al. | 2410.10234 | null |
| 2024-10-14 | XAI-based Feature Selection for Improved Network Intrusion Detection Systems | Osvaldo Arreche et.al. | 2410.10050 | link |
| 2024-10-13 | Point Cloud Novelty Detection Based on Latent Representations of a General Feature Extractor | Shizuka Akahori et.al. | 2410.09861 | null |
| 2024-10-13 | DAS3D: Dual-modality Anomaly Synthesis for 3D Anomaly Detection | Kecen Li et.al. | 2410.09821 | null |
| 2024-10-12 | Timeseria: an object-oriented time series processing library | Stefano Alberto Russo et.al. | 2410.09567 | null |
| 2024-10-12 | Anomaly Detection and Inlet Pressure Prediction in Water Distribution Systems Using Machine Learning | Tran Dang Khoa et.al. | 2410.09530 | null |
| 2024-10-12 | MMAD: The First-Ever Comprehensive Benchmark for Multimodal Large Language Models in Industrial Anomaly Detection | Xi Jiang et.al. | 2410.09453 | link |
| 2024-10-11 | Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI | Muhammet Anil Yagiz et.al. | 2410.09043 | null |
| 2024-10-11 | Lifted Coefficient of Determination: Fast model-free prediction intervals and likelihood-free model comparison | Daniel Salnikov et.al. | 2410.08958 | null |
| 2024-10-11 | Low-complexity Attention-based Unsupervised Anomalous Sound Detection exploiting Separable Convolutions and Angular Loss | Michael Neri et.al. | 2410.08919 | null |
| 2024-10-11 | Interdependency Matters: Graph Alignment for Multivariate Time Series Anomaly Detection | Yuanyi Wang et.al. | 2410.08877 | null |
| 2024-10-11 | Towards Cross-domain Few-shot Graph Anomaly Detection | Jiazhen Chen et.al. | 2410.08629 | null |
| 2024-10-11 | A Theoretical Framework for AI-driven data quality monitoring in high-volume data environments | Nikhil Bangad et.al. | 2410.08576 | null |
| 2024-10-10 | KnowGraph: Knowledge-Enabled Anomaly Detection via Logical Reasoning on Graph Data | Andy Zhou et.al. | 2410.08390 | null |
| 2024-10-10 | Heterogeneous Graph Auto-Encoder for CreditCard Fraud Detection | Moirangthem Tiken Singh et.al. | 2410.08121 | null |
| 2024-10-09 | Spatiotemporal Modeling and Forecasting at Scale with Dynamic Generalized Linear Models | Pranay Pherwani et.al. | 2410.07161 | null |
| 2024-10-09 | Efficient Distribution Matching of Representations via Noise-Injected Deep InfoMax | Ivan Butakov et.al. | 2410.06993 | null |
| 2024-10-09 | Revisiting Multi-Permutation Equivariance through the Lens of Irreducible Representations | Yonatan Sverdlov et.al. | 2410.06665 | link |
| 2024-10-10 | Task-oriented Time Series Imputation Evaluation via Generalized Representers | Zhixian Wang et.al. | 2410.06652 | link |
| 2024-10-09 | On The Relationship between Visual Anomaly-free and Anomalous Representations | Riya Sadrani et.al. | 2410.06576 | null |
| 2024-10-09 | DiffGAD: A Diffusion-based Unsupervised Graph Anomaly Detector | Jinghan Li et.al. | 2410.06549 | link |
| 2024-10-08 | MTFL: Multi-Timescale Feature Learning for Weakly-Supervised Anomaly Detection in Surveillance Videos | Yiling Zhang et.al. | 2410.05900 | null |
| 2024-10-08 | Extreme Value Modelling of Feature Residuals for Anomaly Detection in Dynamic Graphs | Sevvandi Kandanaarachchi et.al. | 2410.05687 | null |
| 2024-10-07 | Can LLMs Understand Time Series Anomalies? | Zihao Zhou et.al. | 2410.05440 | link |
| 2024-10-07 | Neural Fourier Modelling: A Highly Compact Approach to Time-Series Analysis | Minjung Kim et.al. | 2410.04703 | link |
| 2024-10-06 | Fast Area-Weighted Peeling of Convex Hulls for Outlier Detection | Vinesh Sridhar et.al. | 2410.04544 | null |
| 2024-10-06 | Data Distribution Valuation | Xinyi Xu et.al. | 2410.04386 | link |
| 2024-10-06 | Multi Armed Bandit Algorithms Based Virtual Machine Allocation Policy for Security in Multi-Tenant Distributed Systems | Pravin Patil et.al. | 2410.04363 | null |
| 2024-10-05 | Self-Supervised Anomaly Detection in the Wild: Favor Joint Embeddings Methods | Daniel Otero et.al. | 2410.04289 | null |
| 2024-10-05 | Applying Quantum Autoencoders for Time Series Anomaly Detection | Robin Frehner et.al. | 2410.04154 | null |
| 2024-10-05 | Beyond Forecasting: Compositional Time Series Reasoning for End-to-End Task Execution | Wen Ye et.al. | 2410.04047 | null |
| 2024-10-05 | BlockFound: Customized blockchain foundation model for anomaly detection | Jiahao Yu et.al. | 2410.04039 | null |
| 2024-10-04 | Did You Hear That? Introducing AADG: A Framework for Generating Benchmark Data in Audio Anomaly Detection | Ksheeraja Raghavan et.al. | 2410.03904 | null |
| 2024-10-04 | Identification of Anomalous Geospatial Trajectories via Persistent Homology | Kyle Evans-Lee et.al. | 2410.03889 | null |
| 2024-10-04 | Selective Test-Time Adaptation for Unsupervised Anomaly Detection using Neural Implicit Representations | Sameer Ambekar et.al. | 2410.03306 | null |
| 2024-10-03 | Domain-Specific Retrieval-Augmented Generation Using Vector Stores, Knowledge Graphs, and Tensor Factorization | Ryan C. Barron et.al. | 2410.02721 | null |
| 2024-10-02 | HyperBrain: Anomaly Detection for Temporal Hypergraph Brain Networks | Sadaf Sadeghian et.al. | 2410.02087 | link |
| 2024-10-02 | RADAR: Robust Two-stage Modality-incomplete Industrial Anomaly Detection | Bingchen Miao et.al. | 2410.01737 | null |
| 2024-10-03 | LEGO: Learnable Expansion of Graph Operators for Multi-Modal Feature Fusion | Dexuan Ding et.al. | 2410.01506 | null |
| 2024-10-02 | Uncertainty-aware Human Mobility Modeling and Anomaly Detection | Haomin Wen et.al. | 2410.01281 | null |
| 2024-10-01 | Finding radio transients with anomaly detection and active learning based on volunteer classifications | Alex Andersson et.al. | 2410.01034 | null |
| 2024-10-01 | Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security | Mona Esmaeili et.al. | 2410.01016 | null |
| 2024-10-03 | Back to Bayesics: Uncovering Human Mobility Distributions and Anomalies with an Integrated Statistical and Neural Framework | Minxuan Duan et.al. | 2410.01011 | null |
| 2024-10-01 | Review of blockchain application with Graph Neural Networks, Graph Convolutional Networks and Convolutional Neural Networks | Amy Ancelotti et.al. | 2410.00875 | null |
| 2024-10-02 | Show Me What’s Wrong!: Combining Charts and Text to Guide Data Analysis | Beatriz Feliciano et.al. | 2410.00727 | null |
| 2024-10-01 | RAD: A Dataset and Benchmark for Real-Life Anomaly Detection with Robotic Observations | Kaichen Zhou et.al. | 2410.00713 | link |
| 2024-10-01 | ECORS: An Ensembled Clustering Approach to Eradicate The Local And Global Outlier In Collaborative Filtering Recommender System | Mahamudul Hasan et.al. | 2410.00408 | null |
| 2024-09-30 | What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach | Xingfang Wu et.al. | 2409.20503 | link |
| 2024-09-30 | ALLO: A Photorealistic Dataset and Data Generation Pipeline for Anomaly Detection During Robotic Proximity Operations in Lunar Orbit | Selina Leveugle et.al. | 2409.20435 | link |
| 2024-09-30 | Novel machine learning applications at the LHC | Javier M. Duarte et.al. | 2409.20413 | null |
| 2024-09-30 | CableInspect-AD: An Expert-Annotated Anomaly Detection Dataset | Akshatha Arodi et.al. | 2409.20353 | link |
| 2024-09-30 | Constraining Anomaly Detection with Anomaly-Free Regions | Maximilian Toller et.al. | 2409.20208 | null |
| 2024-09-30 | VMAD: Visual-enhanced Multimodal Large Language Model for Zero-Shot Anomaly Detection | Huilin Deng et.al. | 2409.20146 | null |
| 2024-09-29 | MCDDPM: Multichannel Conditional Denoising Diffusion Model for Unsupervised Anomaly Detection in Brain MRI | Vivek Kumar Trivedi et.al. | 2409.19623 | link |
| 2024-09-28 | Efficient Federated Intrusion Detection in 5G ecosystem using optimized BERT-based model | Frederic Adjewa et.al. | 2409.19390 | null |
| 2024-09-28 | Sparse Modelling for Feature Learning in High Dimensional Data | Harish Neelam et.al. | 2409.19361 | null |
| 2024-09-27 | Semi-Supervised Bone Marrow Lesion Detection from Knee MRI Segmentation Using Mask Inpainting Models | Shihua Qin et.al. | 2409.19185 | null |
| 2024-09-27 | CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting | Josef Koumar et.al. | 2409.18874 | null |
| 2024-09-27 | Adversarial Challenges in Network Intrusion Detection Systems: Research Insights and Future Prospects | Sabrine Ennaji et.al. | 2409.18736 | null |
| 2024-09-27 | Enhanced Convolution Neural Network with Optimized Pooling and Hyperparameter Tuning for Network Intrusion Detection | Ayush Kumar Sharma et.al. | 2409.18642 | link |
| 2024-09-27 | MIMII-Gen: Generative Modeling Approach for Simulated Evaluation of Anomalous Sound Detection System | Harsh Purohit et.al. | 2409.18542 | null |
| 2024-09-27 | Improved Approximation Algorithms for Relational Clustering | Aryan Esmailpour et.al. | 2409.18498 | null |
| 2024-09-27 | Review of Digital Asset Development with Graph Neural Network Unlearning | Zara Lisbon et.al. | 2409.18455 | null |
| 2024-09-27 | Neural Collaborative Filtering to Detect Anomalies in Human Semantic Trajectories | Yueyang Liu et.al. | 2409.18427 | null |
| 2024-09-26 | Machine Learning-based vs Deep Learning-based Anomaly Detection in Multivariate Time Series for Spacecraft Attitude Sensors | R. Gallon et.al. | 2409.17841 | null |
| 2024-09-26 | Invariant Coordinate Selection and Fisher discriminant subspace beyond the case of two groups | Colombe Becquart et.al. | 2409.17631 | null |
| 2024-09-26 | Appearance Blur-driven AutoEncoder and Motion-guided Memory Module for Video Anomaly Detection | Jiahao Lyu et.al. | 2409.17608 | null |
| 2024-09-26 | Revisiting Deep Ensemble Uncertainty for Enhanced Medical Anomaly Detection | Yi Gu et.al. | 2409.17485 | link |
| 2024-09-25 | VL4AD: Vision-Language Models Improve Pixel-wise Anomaly Detection | Liangyu Zhong et.al. | 2409.17330 | null |
| 2024-09-25 | Scalable quality control on processing of large diffusion-weighted and structural magnetic resonance imaging datasets | Michael E. Kim et.al. | 2409.17286 | null |
| 2024-09-25 | Conditional Testing based on Localized Conformal p-values | Xiaoyang Wu et.al. | 2409.16829 | null |
| 2024-09-25 | XAI-guided Insulator Anomaly Detection for Imbalanced Datasets | Maximilian Andreas Hoefler et.al. | 2409.16821 | null |
| 2024-09-26 | VideoPatchCore: An Effective Method to Memorize Normality for Video Anomaly Detection | Sunghyun Ahn et.al. | 2409.16225 | link |
| 2024-09-24 | Exploring the Impact of Outlier Variability on Anomaly Detection Evaluation Metrics | Minjae Ok et.al. | 2409.15986 | null |
| 2024-09-24 | Leveraging Unsupervised Learning for Cost-Effective Visual Anomaly Detection | Yunbo Long et.al. | 2409.15980 | null |
| 2024-09-24 | A sparsified Christoffel function for high-dimensional inference | Jean-Bernard Lasserre et.al. | 2409.15965 | null |
| 2024-09-24 | A Multi-Level Approach for Class Imbalance Problem in Federated Learning for Remote Industry 4.0 Applications | Razin Farhan Hussain et.al. | 2409.15802 | null |
| 2024-09-24 | Identified-and-Targeted: The First Early Evidence of the Privacy-Invasive Use of Browser Fingerprinting for Online Tracking | Zengrui Liu et.al. | 2409.15656 | null |
| 2024-09-23 | MotifDisco: Motif Causal Discovery For Time Series Motifs | Josephine Lamp et.al. | 2409.15219 | null |
| 2024-09-23 | Anomaly Detection from a Tensor Train Perspective | Alejandro Mata Ali et.al. | 2409.15030 | null |
| 2024-09-23 | VARADE: a Variational-based AutoRegressive model for Anomaly Detection on the Edge | Alessio Mascolini et.al. | 2409.14816 | null |
| 2024-09-23 | Research on Dynamic Data Flow Anomaly Detection based on Machine Learning | Liyang Wang et.al. | 2409.14796 | null |
| 2024-09-18 | Asymptotics for conformal inference | Ulysse Gazin et.al. | 2409.12019 | null |
| 2024-09-18 | Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction | Caihong Wang et.al. | 2409.11890 | null |
| 2024-09-18 | QUBO-based SVM for credit card fraud detection on a real QPU | Ettore Canonici et.al. | 2409.11876 | null |
| 2024-09-18 | Constraint Guided AutoEncoders for Joint Optimization of Condition Indicator Estimation and Anomaly Detection in Machine Condition Monitoring | Maarten Meire et.al. | 2409.11807 | null |
| 2024-09-18 | PieClam: A Universal Graph Autoencoder Based on Overlapping Inclusive and Exclusive Communities | Daniel Zilberg et.al. | 2409.11618 | null |
| 2024-09-17 | Outlier Detection with Cluster Catch Digraphs | Rui Shi et.al. | 2409.11596 | null |
| 2024-09-17 | Unsupervised Hybrid framework for ANomaly Detection (HAND) – applied to Screening Mammogram | Zhemin Zhang et.al. | 2409.11534 | link |
| 2024-09-17 | Adaptive Anomaly Detection in Network Flows with Low-Rank Tensor Decompositions and Deep Unrolling | Lukas Schynol et.al. | 2409.11529 | null |
| 2024-09-17 | An Empirical Study of Sensitive Information in Logs | Roozbeh Aghili et.al. | 2409.11313 | null |
| 2024-09-17 | Multimodal Attention-Enhanced Feature Fusion-based Weekly Supervised Anomaly Violence Detection | Yuta Kaneko et.al. | 2409.11223 | null |
| 2024-09-17 | Fair Anomaly Detection For Imbalanced Groups | Ziwei Wu et.al. | 2409.10951 | null |
| 2024-09-16 | Real-bogus scores for active anomaly detection | T. A. Semenikhin et.al. | 2409.10256 | null |
| 2024-09-16 | Evaluating the Efficacy of Instance Incremental vs. Batch Learning in Delayed Label Environments: An Empirical Study on Tabular Data Streaming for Fraud Detection | Kodjo Mawuena Amekoe et.al. | 2409.10111 | link |
| 2024-09-16 | Enhancing Anomaly Detection via Generating Diversified and Hard-to-distinguish Synthetic Anomalies | Hyuntae Kim et.al. | 2409.10069 | null |
| 2024-09-16 | Deep Graph Anomaly Detection: A Survey and New Perspectives | Hezhe Qiao et.al. | 2409.09957 | link |
| 2024-09-15 | Dynamic Fraud Detection: Integrating Reinforcement Learning into Graph Neural Networks | Yuxin Dong et.al. | 2409.09892 | null |
| 2024-09-15 | Abnormal Event Detection In Videos Using Deep Embedding | Darshan Venkatrayappa et.al. | 2409.09804 | null |
| 2024-09-15 | Federated Learning in Adversarial Environments: Testbed Design and Poisoning Resilience in Cybersecurity | Hao Jian Huang et.al. | 2409.09794 | null |
| 2024-09-15 | Enhancing Data Quality through Self-learning on Imbalanced Financial Risk Data | Xu Sun et.al. | 2409.09792 | null |
| 2024-09-15 | Towards Multi-view Graph Anomaly Detection with Similarity-Guided Contrastive Clustering | Lecheng Zheng et.al. | 2409.09770 | null |
| 2024-09-15 | OML-AD: Online Machine Learning for Anomaly Detection in Time Series Data | Sebastian Wette et.al. | 2409.09742 | null |
| 2024-09-13 | 1D-CNN-IDS: 1D CNN-based Intrusion Detection System for IIoT | Muhammad Arslan et.al. | 2409.08529 | null |
| 2024-09-13 | Optimal Classification-based Anomaly Detection with Neural Networks: Theory and Practice | Tian-Yi Zhou et.al. | 2409.08521 | null |
| 2024-09-12 | Towards a graph-based foundation model for network traffic analysis | Louis Van Langendonck et.al. | 2409.08111 | null |
| 2024-09-12 | Cellwise outlier detection in heterogeneous populations | Giorgia Zaccaria et.al. | 2409.07881 | null |
| 2024-09-11 | Unsupervised anomaly detection in spatio-temporal stream network sensor data | Edgar Santos-Fernandez et.al. | 2409.07667 | null |
| 2024-09-11 | Ensemble Methods for Sequence Classification with Hidden Markov Models | Maxime Kawawa-Beaudan et.al. | 2409.07619 | null |
| 2024-09-11 | A Survey of Anomaly Detection in In-Vehicle Networks | Övgü Özdemir et.al. | 2409.07505 | null |
| 2024-09-11 | Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS | Mohamed elShehaby et.al. | 2409.07448 | null |
| 2024-09-11 | Unsupervised Novelty Detection Methods Benchmarking with Wavelet Decomposition | Ariel Priarone et.al. | 2409.07135 | link |
| 2024-09-11 | A Continual and Incremental Learning Approach for TinyML On-device Training Using Dataset Distillation and Model Size Adaption | Marcus Rüb et.al. | 2409.07114 | null |
| 2024-09-11 | Detect anomalous quartic gauge couplings at muon colliders with quantum kernel k-means | Shuai Zhang et.al. | 2409.07010 | null |
| 2024-09-10 | Atom dimension adaptation for infinite set dictionary learning | Andra Băltoiu et.al. | 2409.06831 | null |
| 2024-09-09 | Kramnik vs Nakamura: A Chess Scandal | Shiva Maharaj et.al. | 2409.06739 | null |
| 2024-09-10 | GeMuCo: Generalized Multisensory Correlational Model for Body Schema Learning | Kento Kawaharazuka et.al. | 2409.06427 | null |
| 2024-09-10 | Texture-AD: An Anomaly Detection Dataset and Benchmark for Real Algorithm Development | Tianwu Lei et.al. | 2409.06367 | null |
| 2024-09-10 | Context Enhancement with Reconstruction as Sequence for Unified Unsupervised Anomaly Detection | Hui-Yue Yang et.al. | 2409.06285 | link |
| 2024-09-09 | DetoxBench: Benchmarking Large Language Models for Multitask Fraud & Abuse Detection | Joymallya Chakraborty et.al. | 2409.06072 | null |
| 2024-09-09 | Zero-shot Outlier Detection via Prior-data Fitted Networks: Model Selection Bygone! | Yuchen Shen et.al. | 2409.05672 | link |
| 2024-09-09 | Adapted-MoE: Mixture of Experts with Test-Time Adaption for Anomaly Detection | Tianwu Lei et.al. | 2409.05611 | null |
| 2024-09-09 | A Novel Representation of Periodic Pattern and Its Application to Untrained Anomaly Detection | Peng Ye et.al. | 2409.05389 | null |
| 2024-09-09 | Deep Learning for Video Anomaly Detection: A Review | Peng Wu et.al. | 2409.05383 | null |
| 2024-09-09 | Memoryless Multimodal Anomaly Detection via Student-Teacher Network and Signed Distance Learning | Zhongbin Sun et.al. | 2409.05378 | null |
| 2024-09-09 | GDFlow: Anomaly Detection with NCDE-based Normalizing Flow for Advanced Driver Assistance System | Kangjun Lee et.al. | 2409.05346 | null |
| 2024-09-08 | NetDPSyn: Synthesizing Network Traces under Differential Privacy | Danyu Sun et.al. | 2409.05249 | null |
| 2024-09-08 | Lung-DETR: Deformable Detection Transformer for Sparse Lung Nodule Anomaly Detection | Hooman Ramezani et.al. | 2409.05200 | null |
| 2024-09-08 | 2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures | Xinheng Xie et.al. | 2409.04982 | null |
| 2024-09-08 | Anomaly Detection for Real-World Cyber-Physical Security using Quantum Hybrid Support Vector Machines | Tyler Cultice et.al. | 2409.04935 | null |
| 2024-09-06 | Evaluating Fairness in Transaction Fraud Models: Fairness Metrics, Bias Audits, and Challenges | Parameswaran Kamalaruban et.al. | 2409.04373 | null |
| 2024-09-06 | Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems | Ahmad Mohammad Saber et.al. | 2409.04242 | null |
| 2024-09-06 | Ultra-imbalanced classification guided by statistical information | Yin Jin et.al. | 2409.04101 | null |
| 2024-09-05 | Unsupervised Anomaly Detection and Localization with Generative Adversarial Networks | Khouloud Abdelli et.al. | 2409.03657 | null |
| 2024-09-05 | A Dual-Path Framework with Frequency-and-Time Excited Network for Anomalous Sound Detection | Yucong Zhang et.al. | 2409.03610 | null |
| 2024-09-05 | CTMBIDS: Convolutional Tsetlin Machine Based Intrusion Detection System for DDoS attacks in an SDN environment | Rasoul Jafari Gohari et.al. | 2409.03544 | null |
| 2024-09-05 | Unveiling Context-Related Anomalies: Knowledge Graph Empowered Decoupling of Scene and Action for Human-Related Video Anomaly Detection | Chenglizhao Chen et.al. | 2409.03236 | link |
| 2024-09-05 | Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection | Li Yang et.al. | 2409.03141 | link |
| 2024-09-04 | ADFilter – A Web Tool for New Physics Searches With Autoencoder-Based Anomaly Detection Using Deep Unsupervised Neural Networks | Sergei V. Chekanov et.al. | 2409.03065 | null |
| 2024-09-04 | Oddballness: universal anomaly detection with language models | Filip Graliński et.al. | 2409.03046 | null |
| 2024-09-04 | NUMOSIM: A Synthetic Mobility Dataset with Anomaly Detection Benchmarks | Chris Stanford et.al. | 2409.03024 | null |
| 2024-09-04 | SDOoop: Capturing Periodical Patterns and Out-of-phase Anomalies in Streaming Data Analysis | Alexander Hartl et.al. | 2409.02973 | link |
| 2024-09-04 | Anomaly Detection in Offshore Open Radio Access Network Using Long Short-Term Memory Models on a Novel Artificial Intelligence-Driven Cloud-Native Data Platform | Abdelrahim Ahmad et.al. | 2409.02849 | null |
| 2024-09-03 | TimeDiT: General-purpose Diffusion Transformers for Time Series Foundation Model | Defu Cao et.al. | 2409.02322 | null |
| 2024-09-03 | Generalized implementation of invariant coordinate selection with positive semi-definite scatter matrices | Aurore Archimbaud et.al. | 2409.02258 | null |
| 2024-09-02 | AutoEncoder Convolutional Neural Network for Pneumonia Detection | Michael Nosa-Omoruyi et.al. | 2409.02142 | null |
| 2024-09-02 | The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Review | Tianxu Liu et.al. | 2409.02139 | null |
| 2024-09-03 | Synthetic Data Generation and Automated Multidimensional Data Labeling for AI/ML in General and Circular Coordinates | Alice Williams et.al. | 2409.02079 | null |
| 2024-09-03 | Activity-Guided Industrial Anomalous Sound Detection against Interferences | Yunjoo Lee et.al. | 2409.01885 | null |
| 2024-09-03 | Interpreting Outliers in Time Series Data through Decoding Autoencoder | Patrick Knab et.al. | 2409.01713 | null |
| 2024-09-03 | Improving Robustness of Spectrogram Classifiers with Neural Stochastic Differential Equations | Joel Brogan et.al. | 2409.01532 | null |
| 2024-09-02 | VQ-Flow: Taming Normalizing Flows for Multi-Class Anomaly Detection via Hierarchical Vector Quantization | Yixuan Zhou et.al. | 2409.00942 | link |
| 2024-08-30 | Semi-supervised permutation invariant particle-level anomaly detection | Gabriel Matos et.al. | 2408.17409 | null |
| 2024-08-30 | C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks | Osama Mustafa et.al. | 2408.17356 | null |
| 2024-08-30 | AASIST3: KAN-Enhanced AASIST Speech Deepfake Detection using SSL Features and Additional Regularization for the ASVspoof 2024 Challenge | Kirill Borodin et.al. | 2408.17352 | null |
| 2024-08-30 | AI-Driven Intrusion Detection Systems (IDS) on the ROAD dataset: A Comparative Analysis for automotive Controller Area Network (CAN) | Lorenzo Guerra et.al. | 2408.17235 | null |
| 2024-08-30 | Self-supervised Anomaly Detection Pretraining Enhances Long-tail ECG Diagnosis | Aofan Jiang et.al. | 2408.17154 | link |
| 2024-08-30 | Meta-UAD: A Meta-Learning Scheme for User-level Network Traffic Anomaly Detection | Tongtong Feng et.al. | 2408.17031 | null |
| 2024-08-29 | HLogformer: A Hierarchical Transformer for Representing Log Data | Zhichao Hou et.al. | 2408.16803 | null |
| 2024-08-30 | ARINC 429 Cyber-vulnerabilities and Voltage Data in a Hardware-in-the-Loop Simulator | Connor Trask et.al. | 2408.16714 | null |
| 2024-08-29 | Data Quality Monitoring through Transfer Learning on Anomaly Detection for the Hadron Calorimeters | Mulugeta Weldezgina Asres et.al. | 2408.16612 | null |
| 2024-08-29 | Multitask learning for improved scour detection: A dynamic wave tank study | Simon M. Brealy et.al. | 2408.16527 | link |
| 2024-08-29 | Uni-3DAD: GAN-Inversion Aided Universal 3D Anomaly Detection on Model-free Products | Jiayu Liu et.al. | 2408.16201 | null |
| 2024-08-29 | Real-Time Energy Pricing in New Zealand: An Evolving Stream Analysis | Yibin Sun et.al. | 2408.16187 | null |
| 2024-08-28 | Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic | Maximilian Wolf et.al. | 2408.16034 | null |
| 2024-08-28 | Efficient Slice Anomaly Detection Network for 3D Brain MRI Volume | Zeduo Zhang et.al. | 2408.15958 | null |
| 2024-08-29 | Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks | Amar Amouri et.al. | 2408.15886 | null |
| 2024-08-28 | Robust Statistical Scaling of Outlier Scores: Improving the Quality of Outlier Probabilities for Outliers (Extended Version) | Philipp Röchner et.al. | 2408.15874 | null |
| 2024-08-28 | CSAD: Unsupervised Component Segmentation for Logical Anomaly Detection | Yu-Hsuan Hsieh et.al. | 2408.15628 | link |
| 2024-08-29 | VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification | Yungi Cho et.al. | 2408.15591 | link |
| 2024-08-27 | PoseWatch: A Transformer-based Architecture for Human-centric Video Anomaly Detection Using Spatio-temporal Pose Tokenization | Ghazal Alinezhad Noghre et.al. | 2408.15185 | null |
| 2024-08-28 | AnomalousPatchCore: Exploring the Use of Anomalous Samples in Industrial Anomaly Detection | Mykhailo Koshil et.al. | 2408.15113 | null |
| 2024-08-27 | ERX: A Fast Real-Time Anomaly Detection Algorithm for Hyperspectral Line-Scanning | Samuel Garske et.al. | 2408.14947 | link |
| 2024-08-28 | User-level Social Multimedia Traffic Anomaly Detection with Meta-Learning | Tongtong Feng et.al. | 2408.14884 | null |
| 2024-08-27 | Channel-wise Influence: Estimating Data Influence for Multivariate Time Series | Muyao Wang et.al. | 2408.14763 | null |
| 2024-08-27 | Training-Free Time-Series Anomaly Detection: Leveraging Image Foundation Models | Nobuo Namura et.al. | 2408.14756 | null |
| 2024-08-26 | Anomaly Detection Within Mission-Critical Call Processing | Sean Doris et.al. | 2408.14599 | null |
| 2024-08-26 | Aiding Humans in Financial Fraud Decision Making: Toward an XAI-Visualization Framework | Angelos Chatzimparmpas et.al. | 2408.14552 | null |
| 2024-08-26 | PHEVA: A Privacy-preserving Human-centric Video Anomaly Detection Dataset | Ghazal Alinezhad Noghre et.al. | 2408.14329 | link |
| 2024-08-26 | Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks | Alaeddine Diaf et.al. | 2408.14045 | null |
| 2024-08-26 | Evaluating The Explainability of State-of-the-Art Machine Learning-based IoT Network Intrusion Detection Systems | Ayush Kumar et.al. | 2408.14040 | null |
| 2024-08-25 | Time Series Analysis for Education: Methods, Applications, and Future Directions | Shengzhong Mao et.al. | 2408.13960 | link |
| 2024-08-24 | Outlier Detection Bias Busted: Understanding Sources of Algorithmic Bias through Data-centric Factors | Xueying Ding et.al. | 2408.13667 | null |
| 2024-08-24 | Temporal Divide-and-Conquer Anomaly Actions Localization in Semi-Supervised Videos with Hierarchical Transformer | Nada Osman et.al. | 2408.13643 | null |
| 2024-08-24 | Robust Principal Components by Casewise and Cellwise Weighting | Fabio Centofanti et.al. | 2408.13596 | null |
| 2024-08-24 | Variational Autoencoder for Anomaly Detection: A Comparative Study | Huy Hoang Nguyen et.al. | 2408.13561 | link |
| 2024-08-24 | AnoPLe: Few-Shot Anomaly Detection via Bi-directional Prompt Learning with Only Normal Samples | Yujin Lee et.al. | 2408.13516 | link |
| 2024-08-24 | DualAnoDiff: Dual-Interrelated Diffusion Model for Few-Shot Anomaly Image Generation | Ying Jin et.al. | 2408.13509 | null |
| 2024-08-23 | Multivariate Time-Series Anomaly Detection based on Enhancing Graph Attention Networks with Topological Analysis | Zhe Liu et.al. | 2408.13082 | link |
| 2024-08-23 | RIFF: Inducing Rules for Fraud Detection from Decision Trees | João Lucas Martins et.al. | 2408.12989 | null |
| 2024-08-23 | Efficient Training Approaches for Performance Anomaly Detection Models in Edge Computing Environments | Duneesha Fernando et.al. | 2408.12855 | null |
| 2024-08-22 | UMAD: University of Macau Anomaly Detection Benchmark Dataset | Dong Li et.al. | 2408.12527 | link |
| 2024-08-22 | Multimodal Foundational Models for Unsupervised 3D General Obstacle Detection | Tamás Matuszka et.al. | 2408.12322 | null |
| 2024-08-23 | Enhanced Fine-Tuning of Lightweight Domain-Specific Q&A Model Based on Large Language Models | Shenglin Zhang et.al. | 2408.12247 | link |
| 2024-08-21 | Explainable Anomaly Detection: Counterfactual driven What-If Analysis | Logan Cummins et.al. | 2408.11935 | null |
| 2024-08-21 | RODEM Jet Datasets | Knut Zoch et.al. | 2408.11616 | null |
| 2024-08-21 | Self-Supervised Iterative Refinement for Anomaly Detection in Industrial Quality Control | Muhammad Aqeel et.al. | 2408.11561 | null |
| 2024-08-21 | Hypergraph Learning based Recommender System for Anomaly Detection, Control and Optimization | Sakhinana Sagar Srinivas et.al. | 2408.11359 | null |
| 2024-08-20 | Quantum Machine Learning Algorithms for Anomaly Detection: a Survey | Sebastiano Corli et.al. | 2408.11047 | null |
| 2024-08-20 | Universal Novelty Detection Through Adaptive Contrastive Learning | Hossein Mirzaei et.al. | 2408.10798 | link |
| 2024-08-20 | Physics-Driven AI Correction in Laser Absorption Sensing Quantification | Ruiyuan Kang et.al. | 2408.10714 | null |
| 2024-08-19 | Forecasting Attacker Actions using Alert-driven Attack Graphs | Ion Băbălău et.al. | 2408.09888 | null |
| 2024-08-19 | ALTBI: Constructing Improved Outlier Detection Models via Optimization of Inlier-Memorization Effect | Seoyoung Cho et.al. | 2408.09791 | null |
| 2024-08-19 | Simplicial complexes in network intrusion profiling | Mandala von Westenholz et.al. | 2408.09788 | null |
| 2024-08-18 | Federated Graph Learning with Structure Proxy Alignment | Xingbo Fu et.al. | 2408.09393 | link |
| 2024-08-16 | Deep Generative Classification of Blood Cell Morphology | Simon Deltadahl et.al. | 2408.08982 | link |
| 2024-08-16 | A Novel Buffered Federated Learning Framework for Privacy-Driven Anomaly Detection in IIoT | Samira Kamali Poorazad et.al. | 2408.08722 | null |
| 2024-08-15 | Efficient Data-Sketches and Fine-Tuning for Early Detection of Distributional Drift in Medical Imaging | Yusen Wu et.al. | 2408.08456 | null |
| 2024-08-15 | A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning | Muzun Althunayyan et.al. | 2408.08433 | null |
| 2024-08-15 | HELP: Hierarchical Embeddings-based Log Parsing | Andy Xu et.al. | 2408.08300 | null |
| 2024-08-15 | Rethinking Medical Anomaly Detection in Brain MRI: An Image Quality Assessment Perspective | Zixuan Pan et.al. | 2408.08228 | link |
| 2024-08-15 | Impact of Comprehensive Data Preprocessing on Predictive Modelling of COVID-19 Mortality | Sangita Das et.al. | 2408.08142 | link |
| 2024-08-15 | Detection and Impact of Debit/Credit Card Fraud: Victims’ Experiences | Eman Alashwali et.al. | 2408.08131 | null |
| 2024-08-14 | How Industry Tackles Anomalies during Runtime: Approaches and Key Monitoring Parameters | Monika Steidl et.al. | 2408.07816 | null |
| 2024-08-14 | MedTsLLM: Leveraging LLMs for Multimodal Medical Time Series Analysis | Nimeesha Chan et.al. | 2408.07773 | link |
| 2024-08-14 | Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques | Surasit Songma et.al. | 2408.07729 | null |
| 2024-08-14 | Latent Anomaly Detection Through Density Matrices | Joseph Gallego-Mejia et.al. | 2408.07623 | null |
| 2024-08-14 | Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey | Hamza Kheddar et.al. | 2408.07583 | null |
| 2024-08-14 | Attention-Guided Perturbation for Unsupervised Image Anomaly Detection | Tingfeng Huang et.al. | 2408.07490 | null |
| 2024-08-14 | A novel framework for quantifying nominal outlyingness | Efthymios Costa et.al. | 2408.07463 | null |
| 2024-08-13 | FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method | Shihua Sun et.al. | 2408.07152 | null |
| 2024-08-13 | Investigation of unsupervised and supervised hyperspectral anomaly detection | Mazharul Hossain et.al. | 2408.07114 | null |
| 2024-08-13 | RW-NSGCN: A Robust Approach to Structural Attacks via Negative Sampling | Shuqi He et.al. | 2408.06665 | null |
| 2024-08-13 | Unveiling the Flaws: A Critical Analysis of Initialization Effect on Time Series Anomaly Detection | Alex Koran et.al. | 2408.06620 | null |
| 2024-08-12 | Hi-SAM: A high-scalable authentication model for satellite-ground Zero-Trust system using mean field game | Xuesong Wu et.al. | 2408.06185 | null |
| 2024-08-12 | A Methodological Report on Anomaly Detection on Dynamic Knowledge Graphs | Xiaohua Lu et.al. | 2408.06121 | null |
| 2024-08-13 | Weakly Supervised Video Anomaly Detection and Localization with Spatio-Temporal Prompts | Peng Wu et.al. | 2408.05905 | null |
| 2024-08-10 | What Matters in Autonomous Driving Anomaly Detection: A Weakly Supervised Horizon | Utkarsh Tiwari et.al. | 2408.05562 | link |
| 2024-08-10 | Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning | William Marfo et.al. | 2408.05427 | link |
| 2024-08-09 | Hybrid Efficient Unsupervised Anomaly Detection for Early Pandemic Case Identification | Ghazal Ghajari et.al. | 2408.05347 | null |
| 2024-08-09 | Audio-visual cross-modality knowledge transfer for machine learning-based in-situ monitoring in laser additive manufacturing | Jiarui Xie et.al. | 2408.05307 | null |
| 2024-08-09 | Cross-Domain Learning for Video Anomaly Detection with Limited Supervision | Yashika Jain et.al. | 2408.05191 | null |
| 2024-08-09 | Adversarially Robust Industrial Anomaly Detection Through Diffusion Model | Yuanpu Cao et.al. | 2408.04839 | null |
| 2024-08-09 | Performance Metric for Multiple Anomaly Score Distributions with Discrete Severity Levels | Wonjun Yi et.al. | 2408.04817 | link |
| 2024-08-08 | Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era | Saleh Darzi et.al. | 2408.04725 | null |
| 2024-08-08 | Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning | Hongze Zhu et.al. | 2408.04604 | null |
| 2024-08-08 | FedAD-Bench: A Unified Benchmark for Federated Unsupervised Anomaly Detection in Tabular Data | Ahmed Anwar et.al. | 2408.04442 | null |
| 2024-08-09 | Anomaly Prediction: A Novel Approach with Explicit Delay and Horizon | Jiang You et.al. | 2408.04377 | null |
| 2024-08-08 | Towards Explainable Network Intrusion Detection using Large Language Models | Paul R. B. Houssel et.al. | 2408.04342 | null |
| 2024-08-08 | Self-Supervised Contrastive Graph Clustering Network via Structural Information Fusion | Xiaoyang Ji et.al. | 2408.04339 | null |
| 2024-08-08 | AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent | Mugheez Asif et.al. | 2408.04281 | null |
| 2024-08-08 | Generating Fine-Grained Causality in Climate Time Series Data for Forecasting and Anomaly Detection | Dongqi Fu et.al. | 2408.04254 | null |
| 2024-08-08 | Cluster-Wide Task Slowdown Detection in Cloud System | Feiyi Chen et.al. | 2408.04236 | null |
| 2024-08-07 | Programmable Dataflows: Abstraction and Programming Model for Data Sharing | Siyuan Xia et.al. | 2408.04092 | null |
| 2024-08-07 | Dual-Modeling Decouple Distillation for Unsupervised Anomaly Detection | Xinyue Liu et.al. | 2408.03888 | null |
| 2024-08-09 | Online Model-based Anomaly Detection in Multivariate Time Series: Taxonomy, Survey, Research Challenges and Future Directions | Lucas Correia et.al. | 2408.03747 | null |
| 2024-08-07 | Unsupervised Detection of Fetal Brain Anomalies using Denoising Diffusion Models | Markus Ditlev Sjøgren Olsen et.al. | 2408.03654 | null |
| 2024-08-07 | Minimum Enclosing Ball Synthetic Minority Oversampling Technique from a Geometric Perspective | Yi-Yang Shangguan et.al. | 2408.03526 | null |
| 2024-08-06 | Can LLMs Serve As Time Series Anomaly Detectors? | Manqing Dong et.al. | 2408.03475 | null |
| 2024-08-06 | CKNN: Cleansed k-Nearest Neighbor for Unsupervised Video Anomaly Detection | Jihun Yi et.al. | 2408.03014 | null |
| 2024-08-05 | Operational range bounding of spectroscopy models with anomaly detection | Luís F. Simões et.al. | 2408.02581 | null |
| 2024-08-05 | Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets | Philipp Bönninghausen et.al. | 2408.02521 | null |
| 2024-08-05 | AssemAI: Interpretable Image-Based Anomaly Detection for Manufacturing Pipelines | Renjith Prasad et.al. | 2408.02181 | null |
| 2024-08-04 | EOL: Transductive Few-Shot Open-Set Recognition by Enhancing Outlier Logits | Mateusz Ochal et.al. | 2408.02052 | null |
| 2024-08-04 | Individualized multi-horizon MRI trajectory prediction for Alzheimer’s Disease | Rosemary He et.al. | 2408.02018 | null |
| 2024-08-04 | SR-CIS: Self-Reflective Incremental System with Decoupled Memory and Reasoning | Biqing Qi et.al. | 2408.01970 | null |
| 2024-08-04 | AnomalySD: Few-Shot Multi-Class Anomaly Detection with Stable Diffusion Model | Zhenyu Yan et.al. | 2408.01960 | null |
| 2024-08-03 | Optimizing Intrusion Detection System Performance Through Synergistic Hyperparameter Tuning and Advanced Data Processing | Samia Saidane et.al. | 2408.01792 | null |
| 2024-08-03 | IDNet: A Novel Dataset for Identity Document Analysis and Fraud Detection | Hong Guan et.al. | 2408.01690 | null |
| 2024-08-02 | Interplay of Traditional Methods and Machine Learning Algorithms for Tagging Boosted Objects | Camellia Bose et.al. | 2408.01138 | null |
| 2024-08-01 | Online Detection of Anomalies in Temporal Knowledge Graphs with Interpretability | Jiasheng Zhang et.al. | 2408.00872 | null |
| 2024-08-01 | Token Interdependency Parsing (Tipping) – Fast and Accurate Log Parsing | Shayan Hashemi et.al. | 2408.00645 | null |
| 2024-08-01 | Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-supervision | Chenxiang Jin et.al. | 2408.00641 | null |
| 2024-08-01 | VecAug: Unveiling Camouflaged Frauds with Cohort Augmentation for Enhanced Detection | Fei Xiao et.al. | 2408.00513 | null |
| 2024-08-01 | Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment through Feature Engineering and Employing an Ensemble Technique | Abdulelah Al Hanif et.al. | 2408.00480 | null |
| 2024-07-31 | CT-based Anomaly Detection of Liver Tumors Using Generative Diffusion Prior | Yongyi Shi et.al. | 2408.00092 | null |
| 2024-07-31 | Generalized Out-of-Distribution Detection and Beyond in Vision Language Model Era: A Survey | Atsuyuki Miyai et.al. | 2407.21794 | null |
| 2024-07-31 | Artificial Intelligence Approaches for Energy Efficiency: A Review | Alberto Pasqualetto et.al. | 2407.21726 | null |
| 2024-07-31 | Small Object Few-shot Segmentation for Vision-based Industrial Inspection | Zilong Zhang et.al. | 2407.21351 | null |
| 2024-08-01 | Outlier Detection in Large Radiological Datasets using UMAP | Mohammad Tariqul Islam et.al. | 2407.21263 | null |
| 2024-07-30 | FCN4Flare: Fully Convolution Neural Networks for Flare Detection | Ming-Hui Jia et.al. | 2407.21240 | link |
| 2024-07-30 | Efficient Quantum One-Class Support Vector Machines for Anomaly Detection Using Randomized Measurements and Variable Subsampling | Michael Kölle et.al. | 2407.20753 | null |
| 2024-07-30 | Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT | Mirza Akhi Khatun et.al. | 2407.20695 | null |
| 2024-07-30 | DocXPand-25k: a large and diverse benchmark dataset for identity documents analysis | Julien Lerouge et.al. | 2407.20662 | link |
| 2024-07-29 | Can I trust my anomaly detection system? A case study based on explainable AI | Muhammad Rashid et.al. | 2407.19951 | link |
| 2024-07-29 | Anomalous State Sequence Modeling to Enhance Safety in Reinforcement Learning | Leen Kweider et.al. | 2407.19860 | null |
| 2024-07-29 | Normality Addition via Normality Detection in Industrial Image Anomaly Detection Models | Jihun Yi et.al. | 2407.19849 | null |
| 2024-07-29 | Detecting Unsafe Behavior in Neural Network Imitation Policies for Caregiving Robotics | Andrii Tytarenko et.al. | 2407.19819 | null |
| 2024-07-29 | Accelerating template generation in resonant anomaly detection searches with optimal transport | Matthew Leigh et.al. | 2407.19818 | null |
| 2024-07-29 | Application of Computer Technology in Financial Investment | Xinye Sha et.al. | 2407.19684 | null |
| 2024-07-29 | Foundations for Unfairness in Anomaly Detection – Case Studies in Facial Imaging Data | Michael Livanos et.al. | 2407.19646 | null |
| 2024-07-26 | HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics | Qi Liu et.al. | 2407.18858 | null |
| 2024-07-26 | Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks | Bui Duc Manh et.al. | 2407.18503 | null |
| 2024-07-26 | Textile Anomaly Detection: Evaluation of the State-of-the-Art for Automated Quality Inspection of Carpet | Briony Forsberg et.al. | 2407.18450 | null |
| 2024-07-26 | Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-time Lightweight Time Series Anomaly Detection | Ming-Chang Lee et.al. | 2407.18439 | null |
| 2024-07-25 | Separating Novel Features for Logical Anomaly Detection: A Straightforward yet Effective Approach | Kangil Lee et.al. | 2407.17909 | null |
| 2024-07-24 | Large Language Models for Anomaly Detection in Computational Workflows: from Supervised Fine-Tuning to In-Context Learning | Hongwei Jin et.al. | 2407.17545 | link |
| 2024-07-23 | On the Relationship between $Λ$ -poisedness in Derivative-Free Optimization and Outliers in Local Outlier Factor | Qi Zhang et.al. | 2407.17529 | null |
| 2024-07-25 | Looking at Model Debiasing through the Lens of Anomaly Detection | Vito Paolo Pastore et.al. | 2407.17449 | null |
| 2024-07-24 | Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets | Aleksander Ogonowski et.al. | 2407.17339 | null |
| 2024-07-24 | Global and Local Confidence Based Fraud Detection Graph Neural Network | Jiaxun Liu et.al. | 2407.17333 | null |
| 2024-07-24 | When Text and Images Don’t Mix: Bias-Correcting Language-Image Similarity Scores for Anomaly Detection | Adam Goodge et.al. | 2407.17083 | null |
| 2024-07-23 | Securing Tomorrow’s Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies | Ridhi Jain et.al. | 2407.16410 | null |
| 2024-07-22 | AdaCLIP: Adapting CLIP with Hybrid Learnable Prompts for Zero-Shot Anomaly Detection | Yunkang Cao et.al. | 2407.15795 | link |
| 2024-07-22 | STAMP: Outlier-Aware Test-Time Adaptation with Stable Memory Replay | Yongcan Yu et.al. | 2407.15773 | link |
| 2024-07-22 | Towards Open-World Object-based Anomaly Detection via Self-Supervised Outlier Synthesis | Brian K. S. Isaac-Medina et.al. | 2407.15763 | null |
| 2024-07-22 | A Life-long Learning Intrusion Detection System for 6G-Enabled IoV | Abdelaziz Amara korba et.al. | 2407.15700 | null |
| 2024-07-22 | Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains | Do Hai Son et.al. | 2407.15603 | link |
| 2024-07-23 | Bidirectional skip-frame prediction for video anomaly detection with intra-domain disparity-driven attention | Jiahao Lyu et.al. | 2407.15424 | null |
| 2024-07-21 | LSM-GNN: Large-scale Storage-based Multi-GPU GNN Training by Optimizing Data Transfer Scheme | Jeongmin Brian Park et.al. | 2407.15264 | null |
| 2024-07-21 | Diffusion Models for Unsupervised Anomaly Detection in Fetal Brain Ultrasound | Hanna Mykula et.al. | 2407.15119 | null |
| 2024-07-20 | Efficient Intrusion Detection: Combining $χ^2$ Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset | Mohammed Jouhari et.al. | 2407.14945 | null |
| 2024-07-20 | A Two-Phase Visualization System for Continuous Human-AI Collaboration in Sequelae Analysis and Modeling | Yang Ouyang et.al. | 2407.14769 | null |
| 2024-07-19 | Evaluation of Provenance Serialisations for Astronomical Provenance | Michael A. C. Johnson et.al. | 2407.14290 | null |
| 2024-07-18 | Motif-Consistent Counterfactuals with Adversarial Refinement for Graph-Level Anomaly Detection | Chunjing Xiao et.al. | 2407.13251 | null |
| 2024-07-17 | INTELLECT: Adapting Cyber Threat Detection to Heterogeneous Computing Environments | Simone Magnani et.al. | 2407.13043 | null |
| 2024-07-17 | In-Situ Infrared Camera Monitoring for Defect and Anomaly Detection in Laser Powder Bed Fusion: Calibration, Data Mapping, and Feature Extraction | Shawn Hinnebusch et.al. | 2407.12682 | null |
| 2024-07-17 | A Brief Review of Quantum Machine Learning for Financial Services | Mina Doosti et.al. | 2407.12618 | null |
| 2024-07-17 | SigDLA: A Deep Learning Accelerator Extension for Signal Processing | Fangfa Fu et.al. | 2407.12565 | null |
| 2024-07-17 | Leveraging the Mahalanobis Distance to enhance Unsupervised Brain MRI Anomaly Detection | Finn Behrendt et.al. | 2407.12474 | link |
| 2024-07-17 | GraphGuard: Contrastive Self-Supervised Learning for Credit-Card Fraud Detection in Multi-Relational Dynamic Graphs | Kristófer Reynisson et.al. | 2407.12440 | null |
| 2024-07-17 | GeneralAD: Anomaly Detection Across Domains by Attending to Distorted Features | Luc P. J. Sträter et.al. | 2407.12427 | link |
| 2024-07-16 | The object detection method aids in image reconstruction evaluation and clinical interpretation of meniscal abnormalities | Natalia Konovalova et.al. | 2407.12184 | null |
| 2024-07-16 | Agglomerative Clustering of Simulation Output Distributions Using Regularized Wasserstein Distance | Mohammadmahdi Ghasemloo et.al. | 2407.12100 | null |
| 2024-07-16 | Learning Multi-view Anomaly Detection | Haoyang He et.al. | 2407.11935 | null |
| 2024-07-16 | Variance Norms for Kernelized Anomaly Detection | Thomas Cass et.al. | 2407.11873 | link |
| 2024-07-16 | An AI System for Continuous Knee Osteoarthritis Severity Grading Using Self-Supervised Anomaly Detection with Limited Data | Niamh Belton et.al. | 2407.11500 | link |
| 2024-07-16 | Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication | Hideya Ochiai et.al. | 2407.11308 | null |
| 2024-07-15 | CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment | Erfan Ghiasvand et.al. | 2407.11278 | null |
| 2024-07-15 | Impacts of Data Preprocessing and Hyperparameter Optimization on the Performance of Machine Learning Models Applied to Intrusion Detection Systems | Mateus Guimarães Lima et.al. | 2407.11105 | null |
| 2024-07-15 | R3D-AD: Reconstruction via Diffusion for 3D Anomaly Detection | Zheyuan Zhou et.al. | 2407.10862 | link |
| 2024-07-15 | An Autonomous Drone Swarm for Detecting and Tracking Anomalies among Dense Vegetation | Rakesh John Amala Arokia Nathan et.al. | 2407.10754 | null |
| 2024-07-15 | Omni-Dimensional Frequency Learner for General Time Series Analysis | Xianing Chen. Hanting Chen et.al. | 2407.10419 | null |
| 2024-07-14 | Follow the Rules: Reasoning for Video Anomaly Detection with Large Language Models | Yuchen Yang et.al. | 2407.10299 | link |
| 2024-07-14 | Harnessing Feature Clustering For Enhanced Anomaly Detection With Variational Autoencoder And Dynamic Threshold | Tolulope Ale et.al. | 2407.10042 | null |
| 2024-07-12 | BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning | Ning Wang et.al. | 2407.09658 | null |
| 2024-07-12 | Unsupervised Anomaly Detection Using Diffusion Trend Analysis | Eunwoo Kim et.al. | 2407.09578 | null |
| 2024-07-12 | A Unified Anomaly Synthesis Strategy with Gradient Ascent for Industrial Anomaly Detection and Localization | Qiyu Chen et.al. | 2407.09359 | link |
| 2024-07-12 | Temporal M-quantile models and robust bias-corrected small area predictors | María Bugallo Porto et.al. | 2407.09062 | null |
| 2024-07-12 | Challenges of Anomaly Detection in the Object-Centric Setting: Dimensions and the Role of Domain Knowledge | Alessandro Berti et.al. | 2407.09023 | null |
| 2024-07-11 | A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes | Md Mashrur Arifin et.al. | 2407.08839 | null |
| 2024-07-11 | Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation | D’Jeff K. Nkashama et.al. | 2407.08838 | null |
| 2024-07-11 | Real-Time Anomaly Detection and Reactive Planning with Large Language Models | Rohan Sinha et.al. | 2407.08735 | null |
| 2024-07-10 | Estimation and Control of Motor Core Temperature with Online Learning of Thermal Model Parameters: Application to Musculoskeletal Humanoids | Kento Kawaharazuka et.al. | 2407.08055 | null |
| 2024-07-10 | Unsupervised Beyond-Standard-Model Event Discovery at the LHC with a Novel Quantum Autoencoder | Callum Duffy et.al. | 2407.07961 | null |
| 2024-07-10 | GothX: a generator of customizable, legitimate and malicious IoT network traffic | Manuel Poisson et.al. | 2407.07456 | null |
| 2024-07-10 | Federated PCA on Grassmann Manifold for IoT Anomaly Detection | Tung-Anh Nguyen et.al. | 2407.07421 | link |
| 2024-07-09 | Integrating Ontology Design with the CRISP-DM in the context of Cyber-Physical Systems Maintenance | Milapji Singh Gill et.al. | 2407.06930 | null |
| 2024-07-09 | TeVAE: A Variational Autoencoder Approach for Discrete Online Anomaly Detection in Variable-state Multivariate Time-series Data | Lucas Correia et.al. | 2407.06849 | link |
| 2024-07-09 | PSPU: Enhanced Positive and Unlabeled Learning by Leveraging Pseudo Supervision | Chengjie Wang et.al. | 2407.06698 | null |
| 2024-07-09 | Ensembled Cold-Diffusion Restorations for Unsupervised Anomaly Detection | Sergio Naval Marimont et.al. | 2407.06635 | link |
| 2024-07-09 | Comparison of Optimizers for Fault Isolation and Diagnostics of Control Rod Drives | Ark Ifeanyi et.al. | 2407.06557 | null |
| 2024-07-09 | Advanced Financial Fraud Detection Using GNN-CL Model | Yu Cheng et.al. | 2407.06529 | null |
| 2024-07-09 | F2PAD: A General Optimization Framework for Feature-Level to Pixel-Level Anomaly Detection | Chengyu Tao et.al. | 2407.06519 | null |
| 2024-07-08 | Non-Robust Features are Not Always Useful in One-Class Classification | Matthew Lau et.al. | 2407.06372 | null |
| 2024-07-08 | Bounding Boxes and Probabilistic Graphical Models: Video Anomaly Detection Simplified | Mia Siemon et.al. | 2407.06000 | null |
| 2024-07-08 | Graph Anomaly Detection with Noisy Labels by Reinforcement Learning | Zhu Wang et.al. | 2407.05934 | null |
| 2024-07-08 | Multi-agent Reinforcement Learning-based Network Intrusion Detection System | Amine Tellache et.al. | 2407.05766 | null |
| 2024-07-08 | Deep Learning-based Anomaly Detection and Log Analysis for Computer Networks | Shuzhan Wang et.al. | 2407.05639 | null |
| 2024-07-08 | New User Event Prediction Through the Lens of Causal Inference | Henry Shaowu Yuchi et.al. | 2407.05625 | null |
| 2024-07-07 | CAV-AD: A Robust Framework for Detection of Anomalous Data and Malicious Sensors in CAV Networks | Md Sazedur Rahman et.al. | 2407.05461 | null |
| 2024-07-07 | Rethinking Unsupervised Outlier Detection via Multiple Thresholding | Zhonghang Liu et.al. | 2407.05382 | link |
| 2024-07-05 | SPINEX: Similarity-based Predictions with Explainable Neighbors Exploration for Anomaly and Outlier Detection | MZ Naser et.al. | 2407.04760 | null |
| 2024-07-05 | Feature Attenuation of Defective Representation Can Resolve Incomplete Masking on Anomaly Detection | YeongHyeon Park et.al. | 2407.04597 | null |
| 2024-07-05 | Machine Learning for Complex Systems with Abnormal Pattern by Exception Maximization Outlier Detection Method | Zhikun Zhang et.al. | 2407.04248 | null |
| 2024-07-04 | An Autoencoder Architecture for L-band Passive Microwave Retrieval of Landscape Freeze-Thaw Cycle | Divya Kumawat et.al. | 2407.04119 | link |
| 2024-07-04 | Looking for Tiny Defects via Forward-Backward Feature Transfer | Alex Costanzino et.al. | 2407.04092 | link |
| 2024-07-04 | A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection | Omer Subasi et.al. | 2407.04009 | null |
| 2024-07-04 | Support Vector Based Anomaly Detection in Federated Learning | Massimo Frasson et.al. | 2407.03920 | null |
| 2024-07-04 | Seamless Monitoring of Stress Levels Leveraging a Universal Model for Time Sequences | Davide Gabrielli et.al. | 2407.03821 | null |
| 2024-07-04 | M $\mathbf5$ – A Diverse Benchmark to Assess the Performance of Large Multimodal Models Across Multilingual and Multicultural Vision-Language Tasks | Florian Schneider et.al. | 2407.03791 | null |
| 2024-07-04 | Charging Ahead: A Hierarchical Adversarial Framework for Counteracting Advanced Cyber Threats in EV Charging Stations | Mohammed Al-Mehdhar et.al. | 2407.03729 | null |
| 2024-07-04 | SOWA: Adapting Hierarchical Frozen Window Self-Attention to Visual-Language Models for Better Anomaly Detection | Zongxiang Hu et.al. | 2407.03634 | link |
| 2024-07-03 | Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI | Abdelaziz Amara Korba et.al. | 2407.03264 | null |
| 2024-07-03 | Towards Efficient Pixel Labeling for Industrial Anomaly Detection and Localization | Hanxi Li et.al. | 2407.03130 | null |
| 2024-07-03 | Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks | Abdelaziz Amara korba et.al. | 2407.03070 | null |
| 2024-07-03 | Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV | Abdelaziz Amara korba et.al. | 2407.02969 | null |
| 2024-07-03 | Unified Anomaly Detection methods on Edge Device using Knowledge Distillation and Quantization | Sushovan Jena et.al. | 2407.02968 | null |
| 2024-07-03 | Efficient IoT Devices Localization Through Wi-Fi CSI Feature Fusion and Anomaly Detection | Yan Li et.al. | 2407.02919 | null |
| 2024-07-03 | Domain-independent detection of known anomalies | Jonas Bühler et.al. | 2407.02910 | null |
| 2024-07-03 | Early-Stage Anomaly Detection: A Study of Model Performance on Complete vs. Partial Flows | Adrian Pekar et.al. | 2407.02856 | null |
| 2024-07-03 | FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks | Abdullatif Albaseer et.al. | 2407.02845 | null |
| 2024-07-03 | A Radiometric Correction based Optical Modeling Approach to Removing Reflection Noise in TLS Point Clouds of Urban Scenes | Li Fang et.al. | 2407.02830 | null |
| 2024-07-02 | Evaluating the Ability of LLMs to Solve Semantics-Aware Process Mining Tasks | Adrian Rebmann et.al. | 2407.02310 | link |
| 2024-07-02 | Counterfactual Data Augmentation with Denoising Diffusion for Graph Anomaly Detection | Chunjing Xiao et.al. | 2407.02143 | null |
| 2024-07-02 | HC-GLAD: Dual Hyperbolic Contrastive Learning for Unsupervised Graph-Level Anomaly Detection | Yali Fu et.al. | 2407.02057 | link |
| 2024-07-02 | Enhancing Multi-Class Anomaly Detection via Diffusion Refinement with Dual Conditioning | Jiawei Zhan et.al. | 2407.01905 | null |
| 2024-07-02 | LogEval: A Comprehensive Benchmark Suite for Large Language Models In Log Analysis | Tianyu Cui et.al. | 2407.01896 | link |
| 2024-07-01 | Science DMZ Networks: How Different are They Really? | Emily Mutter et.al. | 2407.01822 | null |
| 2024-07-01 | Optimization of Retrieval-Augmented Generation Context with Outlier Detection | Vitaly Bulgakov et.al. | 2407.01403 | null |
| 2024-07-01 | ToCoAD: Two-Stage Contrastive Learning for Industrial Anomaly Detection | Yun Liang et.al. | 2407.01312 | null |
| 2024-06-30 | Maximum Entropy Inverse Reinforcement Learning of Diffusion Models with Energy-Based Models | Sangwoong Yoon et.al. | 2407.00626 | null |
| 2024-06-29 | Infrared Computer Vision for Utility-Scale Photovoltaic Array Inspection | David F. Ramirez et.al. | 2407.00544 | null |
| 2024-06-28 | Odd-One-Out: Anomaly Detection by Comparing with Neighbors | Ankan Bhunia et.al. | 2406.20099 | link |
| 2024-06-28 | HAITCH: A Framework for Distortion and Motion Correction in Fetal Multi-Shell Diffusion-Weighted MRI | Haykel Snoussi et.al. | 2406.20042 | null |
| 2024-06-28 | NetNN: Neural Intrusion Detection System in Programmable Networks | Kamran Razavi et.al. | 2406.19990 | null |
| 2024-06-28 | Self-Supervised Spatial-Temporal Normality Learning for Time Series Anomaly Detection | Yutong Chen et.al. | 2406.19770 | null |
| 2024-06-28 | xSemAD: Explainable Semantic Anomaly Detection in Event Logs Using Sequence-to-Sequence Models | Kiran Busch et.al. | 2406.19763 | null |
| 2024-06-28 | CHASE: A Causal Heterogeneous Graph based Framework for Root Cause Analysis in Multimodal Microservice Systems | Ziming Zhao et.al. | 2406.19711 | null |
| 2024-06-27 | Looking 3D: Anomaly Detection with 2D-3D Alignment | Ankan Bhunia et.al. | 2406.19393 | link |
| 2024-06-27 | Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data | Sidahmed Benabderrahmane et.al. | 2406.19220 | link |
| 2024-06-27 | QSketch: An Efficient Sketch for Weighted Cardinality Estimation in Streams | Yiyan Qi et.al. | 2406.19143 | null |
| 2024-06-27 | CLIP3D-AD: Extending CLIP for 3D Few-Shot Anomaly Detection with Multi-View Images Generation | Zuo Zuo et.al. | 2406.18941 | null |
| 2024-06-27 | Statistical Test for Data Analysis Pipeline by Selective Inference | Tomohiro Shiraishi et.al. | 2406.18902 | link |
| 2024-06-27 | MissionGNN: Hierarchical Multimodal GNN-based Weakly Supervised Video Anomaly Recognition with Mission-Specific Knowledge Graph Generation | Sanggeon Yun et.al. | 2406.18815 | null |
| 2024-06-26 | Universal Anomaly Detection at the LHC: Transforming Optimal Classifiers and the DDD Method | Sascha Caron et.al. | 2406.18469 | null |
| 2024-06-26 | Human-free Prompted Based Anomaly Detection: prompt optimization with Meta-guiding prompt scheme | Pi-Wei Chen et.al. | 2406.18197 | null |
| 2024-06-26 | View-Invariant Pixelwise Anomaly Detection in Multi-object Scenes with Adaptive View Synthesis | Subin Varghese et.al. | 2406.18012 | null |
| 2024-06-25 | European Space Agency Benchmark for Anomaly Detection in Satellite Telemetry | Krzysztof Kotowski et.al. | 2406.17826 | null |
| 2024-06-25 | Diffusion-based Adversarial Purification for Intrusion Detection | Mohamed Amine Merzouk et.al. | 2406.17606 | null |
| 2024-06-25 | SincVAE: a New Approach to Improve Anomaly Detection on EEG Data Using SincNet and Variational Autoencoder | Andrea Pollastro et.al. | 2406.17537 | null |
| 2024-06-24 | Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework | Shiva Raj Pokhrel et.al. | 2406.17172 | null |
| 2024-06-24 | Integrating Generative AI with Network Digital Twins for Enhanced Network Operations | Kassi Muhammad et.al. | 2406.17112 | null |
| 2024-06-24 | Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption | Bharath V Nair et.al. | 2406.16792 | null |
| 2024-06-25 | Anomaly Detection based on Markov Data: A Statistical Depth Approach | Carlos Fernández et.al. | 2406.16759 | null |
| 2024-06-24 | Machine Learning with Real-time and Small Footprint Anomaly Detection System for In-Vehicle Gateway | Yi Wang et.al. | 2406.16369 | null |
| 2024-06-24 | Anomaly Detection of Tabular Data Using LLMs | Aodong Li et.al. | 2406.16308 | null |
| 2024-06-23 | Detecting Abnormal Operations in Concentrated Solar Power Plants from Irregular Sequences of Thermal Images | Sukanya Patra et.al. | 2406.16077 | null |
| 2024-06-22 | DABL: Detecting Semantic Anomalies in Business Processes Using Large Language Models | Wei Guan et.al. | 2406.15781 | null |
| 2024-06-21 | GenSQL: A Probabilistic Programming System for Querying Generative Models of Database Tables | Mathieu Huot et.al. | 2406.15652 | null |
| 2024-06-21 | Root Cause Analysis of Anomalies in 5G RAN Using Graph Neural Network and Transformer | Antor Hasan et.al. | 2406.15638 | null |
| 2024-06-24 | FT-AED: Benchmark Dataset for Early Freeway Traffic Anomalous Event Detection | Austin Coursey et.al. | 2406.15283 | null |
| 2024-06-21 | AI-based Anomaly Detection for Clinical-Grade Histopathological Diagnostics | Jonas Dippel et.al. | 2406.14866 | null |
| 2024-06-20 | Energy Mapping of Existing Building Stock in Cambridge using Energy Performance Certificates and Thermal Infrared Imagery | Yinglong He et.al. | 2406.14520 | null |
| 2024-06-20 | Rule-based outlier detection of AI-generated anatomy segmentations | Deepa Krishnaswamy et.al. | 2406.14486 | null |
| 2024-06-20 | ATAC-Net: Zoomed view works better for Anomaly Detection | Shaurya Gupta et.al. | 2406.14398 | null |
| 2024-06-20 | aeon: a Python toolkit for learning from time series | Matthew Middlehurst et.al. | 2406.14231 | link |
| 2024-06-21 | Image anomaly detection and prediction scheme based on SSA optimized ResNet50-BiGRU model | Qianhui Wan et.al. | 2406.13987 | null |
| 2024-06-19 | Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN | Pablo Moriano et.al. | 2406.13778 | link |
| 2024-06-19 | PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security | Louis Van Langendonck et.al. | 2406.13365 | null |
| 2024-06-19 | Enhancing supply chain security with automated machine learning | Haibo Wang et.al. | 2406.13166 | null |
| 2024-06-18 | Feasibility of Non-Line-of-Sight Integrated Sensing and Communication at mmWave | Paolo Tosi et.al. | 2406.12828 | null |
| 2024-06-18 | Online-Adaptive Anomaly Detection for Defect Identification in Aircraft Assembly | Siddhant Shete et.al. | 2406.12698 | null |
| 2024-06-18 | Tracking Real-time Anomalies in Cyber-Physical Systems Through Dynamic Behavioral Analysis | Prashanth Krishnamurthy et.al. | 2406.12438 | null |
| 2024-06-18 | A Cutting-Edge Deep Learning Method For Enhancing IoT Security | Nadia Ansar et.al. | 2406.12400 | null |
| 2024-06-18 | Self-Supervised Time-Series Anomaly Detection Using Learnable Data Augmentation | Kukjin Choi et.al. | 2406.12260 | null |
| 2024-06-18 | Holmes-VAD: Towards Unbiased and Explainable Video Anomaly Detection via Multi-modal LLM | Huaxin Zhang et.al. | 2406.12235 | link |
| 2024-06-17 | Prior Normality Prompt Transformer for Multi-class Industrial Image Anomaly Detection | Haiming Yao et.al. | 2406.11507 | null |
| 2024-06-17 | SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask Learning | Kaidi Li et.al. | 2406.11389 | null |
| 2024-06-17 | VideoVista: A Versatile Benchmark for Video Understanding and Reasoning | Yunxin Li et.al. | 2406.11303 | null |
| 2024-06-18 | Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask | Jingyu Xiao et.al. | 2406.10928 | link |
| 2024-06-15 | Enhancing Anomaly Detection Generalization through Knowledge Exposure: The Dual Effects of Augmentation | Mohammad Akhavan Anvari et.al. | 2406.10617 | null |
| 2024-06-14 | Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks | Safaa Menssouri et.al. | 2406.10417 | null |
| 2024-06-14 | VANE-Bench: Video Anomaly Evaluation Benchmark for Conversational LMMs | Rohit Bharadwaj et.al. | 2406.10326 | link |
| 2024-06-14 | Outlier detection in maritime environments using AIS data and deep recurrent architectures | Constantine Maganaris et.al. | 2406.09966 | null |
| 2024-06-14 | Unraveling Anomalies in Time: Unsupervised Discovery and Isolation of Anomalous Behavior in Bio-regenerative Life Support System Telemetry | Ferdinand Rewicki et.al. | 2406.09825 | link |
| 2024-06-14 | Explainable AI for Comparative Analysis of Intrusion Detection Models | Pap M. Corea et.al. | 2406.09684 | link |
| 2024-06-13 | Comparison Visual Instruction Tuning | Wei Lin et.al. | 2406.09240 | null |
| 2024-06-13 | Detection-Rate-Emphasized Multi-objective Evolutionary Feature Selection for Network Intrusion Detection | Zi-Hang Cheng et.al. | 2406.09180 | null |
| 2024-06-13 | Weakly-supervised anomaly detection for multimodal data distributions | Xu Tan et.al. | 2406.09147 | null |
| 2024-06-13 | Cross-Modal Learning for Anomaly Detection in Fused Magnesium Smelting Process: Methodology and Benchmark | Gaochang Wu et.al. | 2406.09016 | null |
| 2024-06-13 | Few-Shot Anomaly Detection via Category-Agnostic Registration Learning | Chaoqin Huang et.al. | 2406.08810 | link |
| 2024-06-12 | Large Language Model(LLM) assisted End-to-End Network Health Management based on Multi-Scale Semanticization | Fengxiao Tang et.al. | 2406.08305 | null |
| 2024-06-12 | Efficient Network Traffic Feature Sets for IoT Intrusion Detection | Miguel Silva et.al. | 2406.08042 | null |
| 2024-06-12 | Multivariate Log-based Anomaly Detection for Distributed Database | Lingzhe Zhang et.al. | 2406.07976 | null |
| 2024-06-11 | GLAD: Towards Better Reconstruction with Global and Local Adaptive Diffusion Models for Unsupervised Anomaly Detection | Hang Yao et.al. | 2406.07487 | null |
| 2024-06-11 | Anomaly Detection on Unstable Logs with GPT Models | Fatemeh Hadadi et.al. | 2406.07467 | null |
| 2024-06-11 | Global-Regularized Neighborhood Regression for Efficient Zero-Shot Texture Anomaly Detection | Haiming Yao et.al. | 2406.07333 | null |
| 2024-06-11 | Description and Discussion on DCASE 2024 Challenge Task 2: First-Shot Unsupervised Anomalous Sound Detection for Machine Condition Monitoring | Tomoya Nishida et.al. | 2406.07250 | null |
| 2024-06-11 | RAD: A Comprehensive Dataset for Benchmarking the Robustness of Image Anomaly Detection | Yuqi Cheng et.al. | 2406.07176 | null |
| 2024-06-11 | CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation | Sadek Misto Kirdi et.al. | 2406.07125 | null |
| 2024-06-10 | Hybrid Video Anomaly Detection for Anomalous Scenarios in Autonomous Driving | Daniel Bogdoll et.al. | 2406.06423 | null |
| 2024-06-10 | UMAD: Unsupervised Mask-Level Anomaly Detection for Autonomous Driving | Daniel Bogdoll et.al. | 2406.06370 | null |
| 2024-06-10 | Federated learning in food research | Zuzanna Fendor et.al. | 2406.06202 | null |
| 2024-06-10 | Sequential Binary Classification for Intrusion Detection in Software Defined Networks | Ishan Chokshi et.al. | 2406.06099 | null |
| 2024-06-10 | fSEAD: a Composable FPGA-based Streaming Ensemble Anomaly Detection Library | Binglei Lou et.al. | 2406.05999 | link |
| 2024-06-08 | A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications | Aydin Zaboli et.al. | 2406.05472 | null |
| 2024-06-08 | Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions | Asmaa Benchama et.al. | 2406.05443 | null |
| 2024-06-08 | RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning | Yonatan Amaru et.al. | 2406.05362 | null |
| 2024-06-07 | GANetic Loss for Generative Adversarial Networks with a Focus on Medical Applications | Shakhnaz Akhmedova et.al. | 2406.05023 | link |
| 2024-06-07 | PolyLUT-Add: FPGA-based LUT Inference with Wide Inputs | Binglei Lou et.al. | 2406.04910 | link |
| 2024-06-07 | Higher-order Structure Based Anomaly Detection on Attributed Networks | Xu Yuan et.al. | 2406.04690 | null |
| 2024-06-07 | LogiCode: an LLM-Driven Framework for Logical Anomaly Detection | Yiheng Zhang et.al. | 2406.04687 | null |
| 2024-06-07 | A Recover-then-Discriminate Framework for Robust Anomaly Detection | Peng Xing et.al. | 2406.04608 | null |
| 2024-06-07 | Boosting Large-scale Parallel Training Efficiency with C4: A Communication-Driven Approach | Jianbo Dong et.al. | 2406.04594 | null |
| 2024-06-07 | Attention Fusion Reverse Distillation for Multi-Lighting Image Anomaly Detection | Yiheng Zhang et.al. | 2406.04573 | null |
| 2024-06-06 | Chimera: Effectively Modeling Multivariate Time Series with 2-Dimensional State Space Models | Ali Behrouz et.al. | 2406.04320 | null |
| 2024-06-06 | Generative AI-in-the-loop: Integrating LLMs and GPTs into the Next Generation Networks | Han Zhang et.al. | 2406.04276 | null |
| 2024-06-06 | Credit Card Fraud Detection Using Advanced Transformer Model | Chang Yu et.al. | 2406.03733 | null |
| 2024-06-06 | Meta-learning for Positive-unlabeled Classification | Atsutoshi Kumagai et.al. | 2406.03680 | null |
| 2024-06-05 | Advancing Anomaly Detection: Non-Semantic Financial Data Encoding with LLMs | Alexander Bakumenko et.al. | 2406.03614 | null |
| 2024-06-05 | Robust Prediction Model for Multidimensional and Unbalanced Datasets | Pooja Thakar et.al. | 2406.03507 | null |
| 2024-06-06 | ADer: A Comprehensive Benchmark for Multi-class Visual Anomaly Detection | Jiangning Zhang et.al. | 2406.03262 | link |
| 2024-06-05 | DA-Flow: Dual Attention Normalizing Flow for Skeleton-based Video Anomaly Detection | Ruituo Wu et.al. | 2406.02976 | null |
| 2024-06-05 | Multivariate Physics-Informed Convolutional Autoencoder for Anomaly Detection in Power Distribution Systems with High Penetration of DERs | Mehdi Jabbari Zideh et.al. | 2406.02927 | null |
| 2024-06-05 | Distilling Aggregated Knowledge for Weakly-Supervised Video Anomaly Detection | Jash Dalvi et.al. | 2406.02831 | null |
| 2024-06-04 | Feasibility of State Space Models for Network Traffic Generation | Andrew Chu et.al. | 2406.02784 | null |
| 2024-06-04 | Diagnostic Digital Twin for Anomaly Detection in Floating Offshore Wind Energy | Florian Stadtmann et.al. | 2406.02775 | null |
| 2024-06-04 | Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices | Mohammed Jouhari et.al. | 2406.02768 | null |
| 2024-06-04 | Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models | Reza Babaei et.al. | 2406.02653 | null |
| 2024-06-04 | PeFAD: A Parameter-Efficient Federated Framework for Time Series Anomaly Detection | Ronghui Xu et.al. | 2406.02318 | null |
| 2024-06-04 | M3DM-NR: RGB-3D Noisy-Resistant Industrial Anomaly Detection via Multimodal Denoising | Chengjie Wang et.al. | 2406.02263 | null |
| 2024-06-04 | Review of searches for new physics at CMS | Anne-Mazarine Lyon et.al. | 2406.02010 | null |
| 2024-06-04 | Can Dense Connectivity Benefit Outlier Detection? An Odyssey with NAS | Hao Fu et.al. | 2406.01975 | null |
| 2024-06-03 | Diffusion Boosted Trees | Xizewen Han et.al. | 2406.01813 | null |
| 2024-06-03 | An Origami-Inspired Endoscopic Capsule with Tactile Perception for Early Tissue Anomaly Detection | Yukun Ge et.al. | 2406.01371 | null |
| 2024-06-03 | CUT: A Controllable, Universal, and Training-Free Visual Anomaly Generation Framework | Han Sun et.al. | 2406.01078 | null |
| 2024-06-03 | Enhancing Fairness in Unsupervised Graph Anomaly Detection through Disentanglement | Wenjing Chang et.al. | 2406.00987 | null |
| 2024-06-03 | A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI | Alice Bizzarri et.al. | 2406.00938 | null |
| 2024-06-02 | Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol | Hwejae Lee et.al. | 2406.00810 | null |
| 2024-05-30 | Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu | Asmaa Benchama et.al. | 2405.20503 | null |
| 2024-05-30 | From Zero to Hero: Cold-Start Anomaly Detection | Tal Reiss et.al. | 2405.20341 | link |
| 2024-05-30 | The Solar System Notification Alert Processing System (SNAPS): Asteroid Population Outlier Detection | Michael Gowanlock et.al. | 2405.20176 | null |
| 2024-05-30 | Deep Reinforcement Learning for Intrusion Detection in IoT: A Survey | Afrah Gueriani et.al. | 2405.20038 | null |
| 2024-05-30 | Joint Selective State Space Model and Detrending for Robust Time Series Anomaly Detection | Junqi Chen et.al. | 2405.19823 | null |
| 2024-05-30 | Performance Examination of Symbolic Aggregate Approximation in IoT Applications | Suzana Veljanovska et.al. | 2405.19817 | null |
| 2024-05-29 | Video Anomaly Detection in 10 Years: A Survey and Outlook | Moshira Abdalla et.al. | 2405.19387 | null |
| 2024-05-29 | Comparative Study of Neighbor-based Methods for Local Outlier Detection | Zhuang Qi et.al. | 2405.19247 | null |
| 2024-05-29 | Early Detection of Critical Urban Events using Mobile Phone Network Data | Pierre Lemaire et.al. | 2405.19125 | null |
| 2024-05-29 | A Mallows-like Criterion for Anomaly Detection with Random Forest Implementation | Gaoxiang Zhao et.al. | 2405.18932 | null |
| 2024-05-29 | Deep Positive-Unlabeled Anomaly Detection for Contaminated Unlabeled Data | Hiroshi Takahashi et.al. | 2405.18929 | link |
| 2024-05-29 | Anomaly Detection by Context Contrasting | Alain Ryser et.al. | 2405.18848 | null |
| 2024-05-28 | When and How Does In-Distribution Label Help Out-of-Distribution Detection? | Xuefeng Du et.al. | 2405.18635 | link |
| 2024-05-28 | Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems | Afrah Gueriani et.al. | 2405.18624 | null |
| 2024-05-28 | Anomaly detection for the identification of volcanic unrest in satellite imagery | Robert Gabriel Popescu et.al. | 2405.18487 | null |
| 2024-05-28 | Long Short-Term Memory Networks for Anomaly Detection in Magnet Power Supplies of Particle Accelerators | Ihar Lobach et.al. | 2405.18321 | null |
| 2024-05-28 | Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs | Tim Poštuvan et.al. | 2405.18050 | link |
| 2024-05-28 | On Robust Clustering of Temporal Point Process | Yuecheng Zhang et.al. | 2405.17828 | null |
| 2024-05-27 | SmoothGNN: Smoothing-based GNN for Unsupervised Node Anomaly Detection | Xiangyu Dong et.al. | 2405.17525 | null |
| 2024-05-27 | Survey of Graph Neural Network for Internet of Things and NextG Networks | Sabarish Krishna Moorthy et.al. | 2405.17309 | null |
| 2024-05-27 | Hawk: Learning to Understand Open-World Video Anomalies | Jiaqi Tang et.al. | 2405.16886 | link |
| 2024-05-27 | ARC: A Generalist Graph Anomaly Detector with In-Context Learning | Yixin Liu et.al. | 2405.16771 | null |
| 2024-05-26 | A Study on Unsupervised Anomaly Detection and Defect Localization using Generative Model in Ultrasonic Non-Destructive Testing | Yusaku Ando et.al. | 2405.16580 | null |
| 2024-05-26 | KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation | Anantaa Kotal et.al. | 2405.16476 | null |
| 2024-05-25 | Qsco: A Quantum Scoring Module for Open-set Supervised Anomaly Detection | Yifeng Peng et.al. | 2405.16368 | null |
| 2024-05-25 | Acquiring Better Load Estimates by Combining Anomaly and Change-point Detection in Power Grid Time-series Measurements | Roel Bouman et.al. | 2405.16164 | link |
| 2024-05-24 | UnitNorm: Rethinking Normalization for Transformers in Time Series | Nan Huang et.al. | 2405.15903 | null |
| 2024-05-24 | Anomalous Change Point Detection Using Probabilistic Predictive Coding | Roelof G. Hup et.al. | 2405.15727 | null |
| 2024-05-24 | Large Language Models can Deliver Accurate and Interpretable Time Series Anomaly Detection | Jun Liu et.al. | 2405.15370 | null |
| 2024-05-24 | Towards a General Time Series Anomaly Detector with Adaptive Bottlenecks and Dual Adversarial Decoders | Qichao Shentu et.al. | 2405.15273 | null |
| 2024-05-23 | Large language models can be zero-shot anomaly detectors for time series? | Sarah Alnegheimish et.al. | 2405.14755 | null |
| 2024-05-23 | Applied Machine Learning to Anomaly Detection in Enterprise Purchase Processes | A. Herreros-Martínez et.al. | 2405.14754 | null |
| 2024-05-23 | AnomalyDINO: Boosting Patch-based Few-shot Anomaly Detection with DINOv2 | Simon Damm et.al. | 2405.14529 | null |
| 2024-05-23 | Dinomaly: The Less Is More Philosophy in Multi-Class Unsupervised Anomaly Detection | Jia Guo et.al. | 2405.14325 | link |
| 2024-05-22 | Uncertainty-aware Evaluation of Auxiliary Anomalies with the Expected Anomaly Posterior | Lorenzo Perini et.al. | 2405.13699 | null |
| 2024-05-22 | Challenging Gradient Boosted Decision Trees with Tabular Transformers for Fraud Detection at Booking.com | Sergei Krutikov et.al. | 2405.13692 | null |
| 2024-05-22 | GNN-based Anomaly Detection for Encoded Network Traffic | Anasuya Chattopadhyay et.al. | 2405.13670 | null |
| 2024-05-22 | LogRCA: Log-based Root Cause Analysis for Distributed Services | Thorsten Wittkopp et.al. | 2405.13599 | null |
| 2024-05-22 | Cross-Modal Distillation in Industrial Anomaly Detection: Exploring Efficient Multi-Modal IAD | Wenbo Sui et.al. | 2405.13571 | null |
| 2024-05-22 | Kinematics of Abdominal Aortic Aneurysms | Mostafa Jamshidian et.al. | 2405.13377 | null |
| 2024-05-21 | Strategic Deployment of Honeypots in Blockchain-based IoT Systems | Daniel Commey et.al. | 2405.12951 | null |
| 2024-05-21 | Spatial-aware Attention Generative Adversarial Network for Semi-supervised Anomaly Detection in Medical Image | Zerui Zhang et.al. | 2405.12872 | null |
| 2024-05-21 | Generative AI and Large Language Models for Cyber Security: All Insights You Need | Mohamed Amine Ferrag et.al. | 2405.12750 | null |
| 2024-05-21 | Multimodal video analysis for crowd anomaly detection using open access tourism cameras | Alejandro Dionis-Ros et.al. | 2405.12708 | null |
| 2024-05-21 | EntropyStop: Unsupervised Deep Outlier Detection with Loss Entropy | Yihong Huang et.al. | 2405.12502 | null |
| 2024-05-20 | Automated Anomaly Detection on European XFEL Klystrons | Antonin Sulc et.al. | 2405.12391 | null |
| 2024-05-20 | PATE: Proximity-Aware Time series anomaly Evaluation | Ramin Ghorbani et.al. | 2405.12096 | link |
| 2024-05-20 | Position-Guided Prompt Learning for Anomaly Detection in Chest X-Rays | Zhichao Sun et.al. | 2405.11976 | link |
| 2024-05-20 | Dynamic classifier auditing by unsupervised anomaly detection methods: an application in packaging industry predictive maintenance | Fernando Mateo et.al. | 2405.11960 | null |
| 2024-05-18 | MediCLIP: Adapting CLIP for Few-shot Medical Image Anomaly Detection | Ximiao Zhang et.al. | 2405.11315 | link |
| 2024-05-18 | Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning | Udi Aharon et.al. | 2405.11258 | null |
| 2024-05-18 | Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework | Udi Aharon et.al. | 2405.11247 | null |
| 2024-05-18 | SimAD: A Simple Dissimilarity-based Approach for Time Series Anomaly Detection | Zhijie Zhong et.al. | 2405.11238 | link |
| 2024-05-18 | OTLP: Output Thresholding Using Mixed Integer Linear Programming | Baran Koseoglu et.al. | 2405.11230 | null |
| 2024-05-18 | Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study | Negin Ayoughi et.al. | 2405.11141 | null |
| 2024-05-17 | Safety in Graph Machine Learning: Threats and Safeguards | Song Wang et.al. | 2405.11034 | null |
| 2024-05-17 | FitNets: An Adaptive Framework to Learn Accurate Traffic Distributions | Alexander Dietmüller et.al. | 2405.10931 | null |
| 2024-05-17 | Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective | Zhiwei Zhang et.al. | 2405.10757 | null |
| 2024-05-17 | Harnessing Collective Structure Knowledge in Data Augmentation for Graph Neural Networks | Rongrong Ma et.al. | 2405.10633 | null |
| 2024-05-17 | ECATS: Explainable-by-design concept-based anomaly detection for time series | Irene Ferfoglia et.al. | 2405.10608 | null |
| 2024-05-16 | Networking Systems for Video Anomaly Detection: A Tutorial and Survey | Jing Liu et.al. | 2405.10347 | link |
| 2024-05-16 | Applications of Quantum Machine Learning for Quantitative Finance | Piotr Mironowicz et.al. | 2405.10119 | null |
| 2024-05-16 | MiniMaxAD: A Lightweight Autoencoder for Feature-Rich Anomaly Detection | Fengjie Wang et.al. | 2405.09933 | null |
| 2024-05-15 | BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection | Luan Pham et.al. | 2405.09330 | link |
| 2024-05-15 | A Hierarchically Feature Reconstructed Autoencoder for Unsupervised Anomaly Detection | Honghui Chen et.al. | 2405.09148 | null |
| 2024-05-14 | Self-supervised vision-langage alignment of deep learning representations for bone X-rays analysis | Alexandre Englebert et.al. | 2405.08932 | link |
| 2024-05-14 | Incorporating Physical Priors into Weakly-Supervised Anomaly Detection | Chi Lung Cheng et.al. | 2405.08889 | null |
| 2024-05-14 | GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles | Murad Mehrab Abrar et.al. | 2405.08359 | null |
| 2024-05-14 | Model-Free Unsupervised Anomaly detection framework in multivariate time-series of industrial dynamical systems | Mazen Alamir et.al. | 2405.08349 | null |
| 2024-05-14 | Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection | Xuanze Chen et.al. | 2405.08278 | null |
| 2024-05-13 | Enhancing Rover Mobility Monitoring: Autoencoder-driven Anomaly Detection for Curiosity | Mielad Sabzehi et.al. | 2405.07982 | null |
| 2024-05-13 | IMAFD: An Interpretable Multi-stage Approach to Flood Detection from time series Multispectral Data | Ziyang Zhang et.al. | 2405.07916 | null |
| 2024-05-13 | AnoVox: A Benchmark for Multimodal Anomaly Detection in Autonomous Driving | Daniel Bogdoll et.al. | 2405.07865 | link |
| 2024-05-13 | DeepHYDRA: Resource-Efficient Time-Series Anomaly Detection in Dynamically-Configured Systems | Franz Kevin Stehle et.al. | 2405.07749 | link |
| 2024-05-13 | AnomalyLLM: Few-shot Anomaly Edge Detection for Dynamic Graphs using Large Language Models | Shuo Liu et.al. | 2405.07626 | link |
| 2024-05-13 | RESTAD: REconstruction and Similarity based Transformer for time series Anomaly Detection | Ramin Ghorbani et.al. | 2405.07509 | link |
| 2024-05-12 | A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection | Raja Giryes et.al. | 2405.07232 | null |
| 2024-05-11 | Fractals as Pre-training Datasets for Anomaly Detection and Localization | C. I. Ugwu et.al. | 2405.06980 | null |
| 2024-05-11 | Semi-supervised Anomaly Detection via Adaptive Reinforcement Learning-Enabled Method with Causal Inference | Xiangwei Chen et.al. | 2405.06925 | null |
| 2024-05-11 | Generation of Granular-Balls for Clustering Based on the Principle of Justifiable Granularity | Zhen Zhang et.al. | 2405.06904 | null |
| 2024-05-10 | Continuous-variable Quantum Boltzmann Machine | Shikha Bangar et.al. | 2405.06580 | null |
| 2024-05-10 | Attend, Distill, Detect: Attention-aware Entropy Distillation for Anomaly Detection | Sushovan Jena et.al. | 2405.06467 | null |
| 2024-05-10 | TS3IM: Unveiling Structural Similarity in Time Series through Image Similarity Assessment Insights | Yuhan Liu et.al. | 2405.06234 | null |
| 2024-05-10 | MAPL: Memory Augmentation and Pseudo-Labeling for Semi-Supervised Anomaly Detection | Junzhuo Chen et.al. | 2405.06198 | link |
| 2024-05-10 | Anomaly Detection in Graph Structured Data: A Survey | Prabin B Lamichhane et.al. | 2405.06172 | null |
| 2024-05-09 | Advancing Anomaly Detection in Computational Workflows with Active Learning | Krishnan Raghavan et.al. | 2405.06133 | null |
| 2024-05-09 | Self-Supervised Learning of Time Series Representation via Diffusion Process and Imputation-Interpolation-Forecasting Mask | Zineb Senane et.al. | 2405.05959 | link |
| 2024-05-09 | Exploiting Autoencoder’s Weakness to Generate Pseudo Anomalies | Marcella Astrid et.al. | 2405.05886 | null |
| 2024-05-09 | PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks | Mohammed Hassanin et.al. | 2405.05469 | null |
| 2024-05-08 | Anomaly Detection in Certificate Transparency Logs | Richard Ostertág et.al. | 2405.05206 | null |
| 2024-05-08 | Discrepancy-based Diffusion Models for Lesion Detection in Brain MRI | Keqiang Fan et.al. | 2405.04974 | null |
| 2024-05-08 | Supervised Anomaly Detection for Complex Industrial Images | Aimira Baitieva et.al. | 2405.04953 | link |
| 2024-05-08 | Persistent homology of featured time series data and its applications | Eunwoo Heo et.al. | 2405.04796 | null |
| 2024-05-08 | Dual-Image Enhanced CLIP for Zero-Shot Anomaly Detection | Zhaoxiang Zhang et.al. | 2405.04782 | null |
| 2024-05-09 | Large Language Models for Cyber Security: A Systematic Literature Review | HanXiang Xu et.al. | 2405.04760 | null |
| 2024-05-07 | Research on financial fraud algorithm based on federal learning and big data technology | Xinye Sha et.al. | 2405.03992 | null |
| 2024-05-06 | On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations | Xiaoxue Ma et.al. | 2405.03489 | link |
| 2024-05-07 | A Reliable Framework for Human-in-the-Loop Anomaly Detection in Time Series | Ziquan Deng et.al. | 2405.03234 | null |
| 2024-05-06 | Braced Fourier Continuation and Regression for Anomaly Detection | Josef Sabuda et.al. | 2405.03180 | link |
| 2024-05-05 | AnoGAN for Tabular Data: A Novel Approach to Anomaly Detection | Aditya Singh et.al. | 2405.03075 | null |
| 2024-05-05 | A Model-Free Kullback-Leibler Divergence Filter for Anomaly Detection in Noisy Data Series | Ruikun Zhou et.al. | 2405.03047 | null |
| 2024-05-05 | Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS | Zain ul Abdeen et.al. | 2405.02989 | null |
| 2024-05-04 | Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles | J. R. V. Solaas et.al. | 2405.02731 | null |
| 2024-05-04 | Position Paper: Quo Vadis, Unsupervised Time Series Anomaly Detection? | M. Saquib Sarfraz et.al. | 2405.02678 | null |
| 2024-05-04 | Generic Multi-modal Representation Learning for Network Traffic Analysis | Luca Gioacchini et.al. | 2405.02649 | null |
| 2024-05-04 | A Data Mining-Based Dynamical Anomaly Detection Method for Integrating with an Advance Metering System | Sarit Maitra et.al. | 2405.02574 | null |
| 2024-05-03 | Subgraph2vec: A random walk-based algorithm for embedding knowledge graphs | Elika Bozorgi et.al. | 2405.02240 | null |
| 2024-05-03 | Advancing Pre-trained Teacher: Towards Robust Feature Discrepancy for Anomaly Detection | Canhui Tang et.al. | 2405.02068 | link |
| 2024-05-03 | Detecting and Deterring Manipulation in a Cognitive Hierarchy | Nitay Alon et.al. | 2405.01870 | null |
| 2024-05-02 | Language-Enhanced Latent Representations for Out-of-Distribution Detection in Autonomous Driving | Zhenjiang Mao et.al. | 2405.01691 | null |
| 2024-05-02 | GTX: A Transactional Graph Data System For HTAP Workloads | Libin Zhou et.al. | 2405.01448 | null |
| 2024-05-02 | A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks | Philipp Meyer et.al. | 2405.01324 | null |
| 2024-05-02 | Interpretable Data-driven Anomaly Detection in Industrial Processes with ExIFFI | Davide Frizzo et.al. | 2405.01158 | null |
| 2024-05-01 | Quantum algorithms for matrix geometric means | Nana Liu et.al. | 2405.00673 | null |
| 2024-04-30 | IgCONDA-PET: Implicitly-Guided Counterfactual Diffusion for Detecting Anomalies in PET Images | Shadab Ahamed et.al. | 2405.00239 | link |
| 2024-04-30 | Uncovering What, Why and How: A Comprehensive Benchmark for Causation Understanding of Video Anomaly | Hang Du et.al. | 2405.00181 | link |
| 2024-04-30 | Rockafellian Relaxation for PDE-Constrained Optimization with Distributional Uncertainty | Harbir Antil et.al. | 2405.00176 | null |
| 2024-04-30 | Improved AutoEncoder with LSTM module and KL divergence | Wei Huang et.al. | 2404.19247 | null |
| 2024-04-29 | Enhancing IoT Security: A Novel Feature Engineering Approach for ML-Based Intrusion Detection Systems | Afsaneh Mahanipour et.al. | 2404.19114 | null |
| 2024-04-29 | A Survey on Diffusion Models for Time Series and Spatio-Temporal Data | Yiyuan Yang et.al. | 2404.18886 | link |
| 2024-04-29 | Evaluating the Effectiveness of Video Anomaly Detection in the Wild: Online Learning and Inference for Real-world Deployment | Shanle Yao et.al. | 2404.18747 | null |
| 2024-04-29 | Self-supervised learning for classifying paranasal anomalies in the maxillary sinus | Debayan Bhattacharya et.al. | 2404.18599 | link |
| 2024-04-29 | Enabling Efficient and Flexible Interpretability of Data-driven Anomaly Detection in Industrial Processes with AcME-AD | Valentina Zaccaria et.al. | 2404.18525 | link |
| 2024-04-29 | Self-supervised contrastive learning of radio data for source detection, classification and peculiar object discovery | S. Riggi et.al. | 2404.18462 | null |
| 2024-04-28 | Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study | Hamdi Friji et.al. | 2404.18328 | null |
| 2024-04-27 | A Method of Moments Embedding Constraint and its Application to Semi-Supervised Learning | Michael Majurski et.al. | 2404.17978 | null |
| 2024-04-27 | Accurate and fast anomaly detection in industrial processes and IoT environments | Simone Tonini et.al. | 2404.17925 | null |
| 2024-04-27 | Unsupervised Anomaly Detection via Masked Diffusion Posterior Sampling | Di Wu et.al. | 2404.17900 | null |
| 2024-04-29 | Domain Adaptive and Fine-grained Anomaly Detection for Single-cell Sequencing Data and Beyond | Kaichen Xu et.al. | 2404.17454 | link |
| 2024-04-26 | Frequency-Guided Multi-Level Human Action Anomaly Detection with Normalizing Flows | Shun Maeda et.al. | 2404.17381 | null |
| 2024-04-26 | Synchronized Stepwise Control of Firing and Learning Thresholds in a Spiking Randomly Connected Neural Network toward Hardware Implementation | Kumiko Nomura et.al. | 2404.17241 | null |
| 2024-04-25 | Dr-SAM: An End-to-End Framework for Vascular Segmentation, Diameter Estimation, and Anomaly Detection on Angiography Images | Vazgen Zohranyan et.al. | 2404.17029 | null |
| 2024-04-24 | Anomaly Detection for Incident Response at Scale | Hanzhang Wang et.al. | 2404.16887 | null |
| 2024-04-25 | Guarding Graph Neural Networks for Unsupervised Graph Anomaly Detection | Yuanchen Bei et.al. | 2404.16366 | null |
| 2024-04-24 | ABCD: Trust enhanced Attention based Convolutional Autoencoder for Risk Assessment | Sarala Naidu et.al. | 2404.16183 | null |
| 2024-04-24 | S2DEVFMAP: Self-Supervised Learning Framework with Dual Ensemble Voting Fusion for Maximizing Anomaly Prediction in Timeseries | Sarala Naidu et.al. | 2404.16179 | null |
| 2024-04-24 | OmniLearn: A Method to Simultaneously Facilitate All Jet Physics Tasks | Vinicius Mikuni et.al. | 2404.16091 | link |
| 2024-04-23 | Feature Distribution Shift Mitigation with Contrastive Pretraining for Intrusion Detection | Weixing Wang et.al. | 2404.15382 | null |
| 2024-04-23 | IPAD: Industrial Process Anomaly Detection Dataset | Jinfan Liu et.al. | 2404.15033 | null |
| 2024-04-23 | Fin-Fed-OD: Federated Outlier Detection on Financial Tabular Data | Dayananda Herurkar et.al. | 2404.14933 | null |
| 2024-04-23 | A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation | Phoebe Jing et.al. | 2404.14746 | null |
| 2024-04-23 | Incorporating Gradients to Rules: Towards Lightweight, Adaptive Provenance-based Intrusion Detection | Lingzhi Wang et.al. | 2404.14720 | null |
| 2024-04-23 | Deep Overlapping Community Search via Subspace Embedding | Qing Sima et.al. | 2404.14692 | null |
| 2024-04-21 | A Neuro-Symbolic Explainer for Rare Events: A Case Study on Predictive Maintenance | João Gama et.al. | 2404.14455 | null |
| 2024-04-20 | Generative Subspace Adversarial Active Learning for Outlier Detection in Multiple Views of High-dimensional Data | Jose Cribeiro-Ramallo et.al. | 2404.14451 | null |
| 2024-04-22 | Explaining Arguments’ Strength: Unveiling the Role of Attacks and Supports (Technical Report) | Xiang Yin et.al. | 2404.14304 | null |
| 2024-04-21 | Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing | Md Mainuddin et.al. | 2404.13690 | null |
| 2024-04-21 | FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization | Zhaopeng Gu et.al. | 2404.13671 | null |
| 2024-04-20 | Intrusion Detection at Scale with the Assistance of a Command-line Language Model | Jiongliang Lin et.al. | 2404.13402 | null |
| 2024-04-20 | Hyperspectral Anomaly Detection with Self-Supervised Anomaly Prior | Yidan Liu et.al. | 2404.13342 | null |
| 2024-04-20 | Multi-feature Reconstruction Network using Crossed-mask Restoration for Unsupervised Anomaly Detection | Junpu Wang et.al. | 2404.13273 | null |
| 2024-04-19 | uTRAND: Unsupervised Anomaly Detection in Traffic Trajectories | Giacomo D’Amicantonio et.al. | 2404.12712 | null |
| 2024-04-19 | Detecting Out-Of-Distribution Earth Observation Images with Diffusion Models | Georges Le Bellier et.al. | 2404.12667 | null |
| 2024-04-18 | Blind Localization and Clustering of Anomalies in Textures | Andrei-Timotei Ardelean et.al. | 2404.12246 | null |
| 2024-04-18 | Warped Time Series Anomaly Detection | Charlotte Lacoquelle et.al. | 2404.12134 | null |
| 2024-04-17 | Simulating Cloud Environments of Connected Vehicles for Anomaly Detection | M. Weiß et.al. | 2404.11740 | null |
| 2024-04-17 | Uncertainty estimation and anomaly detection in chiral effective field theory studies of key nuclear electroweak processes | Bijaya Acharya et.al. | 2404.11522 | null |
| 2024-04-19 | LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking | Yongzheng Xie et.al. | 2404.11294 | null |
| 2024-04-17 | DACAD: Domain Adaptation Contrastive Learning for Anomaly Detection in Multivariate Time Series | Zahra Zamanzadeh Darban et.al. | 2404.11269 | null |
| 2024-04-16 | Unsupervised machine learning for the detection of exotic phases in skyrmion phase diagrams | F. A. Gómez Albarracín et.al. | 2404.10943 | null |
| 2024-04-16 | Advancing Network Intrusion Detection: Integrating Graph Neural Networks with Scattering Transform and Node2Vec for Enhanced Anomaly Detection | Abdeljalil Zoubir et.al. | 2404.10800 | null |
| 2024-04-16 | Learning Feature Inversion for Multi-class Anomaly Detection under General-purpose COCO-AD Benchmark | Jiangning Zhang et.al. | 2404.10760 | link |
| 2024-04-16 | A Calibrated and Automated Simulator for Innovations in 5G | Conrado Boeira et.al. | 2404.10643 | null |
| 2024-04-16 | Community detection and anomaly prediction in dynamic networks | Hadiseh Safdari et.al. | 2404.10468 | null |
| 2024-04-16 | CARE to Compare: A real-world dataset for anomaly detection in wind turbine data | Christian Gück et.al. | 2404.10320 | null |
| 2024-04-16 | Anomaly Correction of Business Processes Using Transformer Autoencoder | Ziyou Gong et.al. | 2404.10211 | null |
| 2024-04-15 | Explainable Online Unsupervised Anomaly Detection for Cyber-Physical Systems via Causal Discovery from Time Series | Daniele Meli et.al. | 2404.09871 | null |
| 2024-04-15 | Do LLMs Understand Visual Anomalies? Uncovering LLM Capabilities in Zero-shot Anomaly Detection | Jiaqi Zhu et.al. | 2404.09654 | null |
| 2024-04-15 | Privacy-Preserving Intrusion Detection using Convolutional Neural Networks | Martin Kodys et.al. | 2404.09625 | null |
| 2024-04-14 | Machine learning-based identification of Gaia astrometric exoplanet orbits | Johannes Sahlmann et.al. | 2404.09350 | null |
| 2024-04-14 | Reap the Wild Wind: Detecting Media Storms in Large-Scale News Corpora | Dror K. Markus et.al. | 2404.09299 | null |
| 2024-04-14 | Fault Detection in Mobile Networks Using Diffusion Models | Mohamad Nabeel et.al. | 2404.09240 | null |
| 2024-04-13 | Label-free Anomaly Detection in Aerial Agricultural Images with Masked Image Modeling | Sambal Shikhar et.al. | 2404.08931 | null |
| 2024-04-12 | FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination | Yifei Lin et.al. | 2404.08750 | link |
| 2024-04-12 | Text Prompt with Normality Guidance for Weakly Supervised Video Anomaly Detection | Zhiwei Yang et.al. | 2404.08531 | null |
| 2024-04-12 | TSLANet: Rethinking Transformers for Time Series Representation Learning | Emadeldeen Eldele et.al. | 2404.08472 | null |
| 2024-04-12 | Adaptive Anomaly Detection Disruption Prediction Starting from First Discharge | Xinkun Ai et.al. | 2404.08241 | null |
| 2024-04-12 | HCL-MTSAD: Hierarchical Contrastive Consistency Learning for Accurate Detection of Industrial Multivariate Time Series Anomalies | Haili Sun et.al. | 2404.08224 | null |
| 2024-04-11 | Anomaly Detection in Power Grids via Context-Agnostic Learning | SangWoo Park et.al. | 2404.07898 | null |
| 2024-04-11 | Context-aware Video Anomaly Detection in Long-Term Datasets | Zhengye Yang et.al. | 2404.07887 | null |
| 2024-04-11 | M-dwarf flares in the Zwicky Transient Facility data and what we can learn from them | A. S. Voloshina et.al. | 2404.07812 | null |
| 2024-04-11 | 3D-CSAD: Untrained 3D Anomaly Detection for Complex Manufacturing Surfaces | Xuanming Cao et.al. | 2404.07748 | null |
| 2024-04-11 | Multi-Image Visual Question Answering for Unsupervised Anomaly Detection | Jun Li et.al. | 2404.07622 | null |
| 2024-04-11 | Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks | Xinxing Zhao et.al. | 2404.07464 | null |
| 2024-04-10 | Complete Optimal Non-Resonant Anomaly Detection | Gregor Kasieczka et.al. | 2404.07258 | null |
| 2024-04-10 | SplatPose & Detect: Pose-Agnostic 3D Anomaly Detection | Mathis Kruse et.al. | 2404.06832 | link |
| 2024-04-11 | MambaAD: Exploring State Space Models for Multi-class Unsupervised Anomaly Detection | Haoyang He et.al. | 2404.06564 | null |
| 2024-04-09 | Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning | Emre Ozfatura et.al. | 2404.06230 | null |
| 2024-04-09 | Differential Privacy for Anomaly Detection: Analyzing the Trade-off Between Privacy and Explainability | Fatima Ezzeddine et.al. | 2404.06144 | null |
| 2024-04-09 | Supervised Contamination Detection, with Flow Cytometry Application | Solenne Gaucher et.al. | 2404.06093 | link |
| 2024-04-10 | AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments | Mohammed Ashfaaq M. Farzaan et.al. | 2404.05602 | null |
| 2024-04-08 | Semi-Supervised Novelty Detection for Precise Ultra-Wideband Error Signal Prediction | Umberto Albertin et.al. | 2404.05351 | null |
| 2024-04-08 | PromptAD: Learning Prompts with only Normal Samples for Few-Shot Anomaly Detection | Xiaofan Li et.al. | 2404.05231 | link |
| 2024-04-08 | Out-of-Distribution Data: An Acquaintance of Adversarial Examples – A Survey | Naveen Karunanayake et.al. | 2404.05219 | null |
| 2024-04-07 | TimeCSL: Unsupervised Contrastive Learning of General Shapelets for Explorable Time Series Analysis | Zhiyu Liang et.al. | 2404.05057 | null |
| 2024-04-07 | Dynamic Distinction Learning: Adaptive Pseudo Anomalies for Video Anomaly Detection | Demetris Lappas et.al. | 2404.04986 | link |
| 2024-04-07 | Anomaly Detection in Electrocardiograms: Advancing Clinical Diagnosis Through Self-Supervised Learning | Aofan Jiang et.al. | 2404.04935 | null |
| 2024-04-06 | CANEDERLI: On The Impact of Adversarial Training and Transferability on CAN Intrusion Detection Systems | Francesco Marchiori et.al. | 2404.04648 | null |
| 2024-04-06 | MedIAnomaly: A comparative study of anomaly detection in medical images | Yu Cai et.al. | 2404.04518 | link |
| 2024-04-06 | Beyond the Known: Adversarial Autoencoders in Novelty Detection | Muhammad Asad et.al. | 2404.04456 | null |
| 2024-04-05 | Fusing Dictionary Learning and Support Vector Machines for Unsupervised Anomaly Detection | Paul Irofti et.al. | 2404.04064 | link |
| 2024-04-04 | A Systems Theoretic Approach to Online Machine Learning | Anli du Preez et.al. | 2404.03775 | null |
| 2024-04-04 | Test Time Training for Industrial Anomaly Segmentation | Alex Costanzino et.al. | 2404.03743 | null |
| 2024-04-04 | About Test-time training for outlier detection | Simon Klüttermann et.al. | 2404.03495 | null |
| 2024-04-03 | Transfer learning applications for anomaly detection in wind turbines | Cyriana M. A. Roelofs et.al. | 2404.03011 | null |
| 2024-04-03 | Foundation Models for Structural Health Monitoring | Luca Benfenati et.al. | 2404.02944 | link |
| 2024-04-03 | End-To-End Self-tuning Self-supervised Time Series Anomaly Detection | Boje Deforce et.al. | 2404.02865 | null |
| 2024-04-03 | QFNN-FFD: Quantum Federated Neural Network for Financial Fraud Detection | Nouhaila Innan et.al. | 2404.02595 | null |
| 2024-04-03 | Learning with errors based dynamic encryption that discloses residue signal for anomaly detection | Yeongjun Jang et.al. | 2404.02574 | null |
| 2024-04-02 | Deep Learning for AGILE Anticoincidence System’s Background Prediction from Orbital and Attitude Parameters | N. Parmiggiani et.al. | 2404.02107 | null |
| 2024-04-02 | Enhancing Functional Safety in Automotive AMS Circuits through Unsupervised Machine Learning | Ayush Arunachalam et.al. | 2404.01632 | null |
| 2024-04-02 | FLEXIS: FLEXible Frequent Subgraph Mining using Maximal Independent Sets | Akshit Sharma et.al. | 2404.01585 | null |
| 2024-04-01 | Decentralized Collaborative Learning Framework with External Privacy Leakage Analysis | Tsuyoshi Idé et.al. | 2404.01270 | null |
| 2024-04-01 | Anomaly Detection and Approximate Similarity Searches of Transients in Real-time Data Streams | P. D. Aleo et.al. | 2404.01235 | null |
| 2024-04-01 | An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks | Abdullah H Alqahtani et.al. | 2404.01109 | null |
| 2024-04-01 | Harnessing Large Language Models for Training-free Video Anomaly Detection | Luca Zanella et.al. | 2404.01014 | null |
| 2024-04-01 | Collaborative Learning of Anomalies with Privacy (CLAP) for Unsupervised Video Anomaly Detection: A New Baseline | Anas Al-lahham et.al. | 2404.00847 | null |
| 2024-03-31 | On the True Distribution Approximation of Minimum Bayes-Risk Decoding | Atsumoto Ohashi et.al. | 2404.00752 | link |
| 2024-03-31 | Absolute-Unified Multi-Class Anomaly Detection via Class-Agnostic Distribution Alignment | Jia Guo et.al. | 2404.00724 | null |
| 2024-03-29 | Long-Tailed Anomaly Detection with Learnable Class Names | Chih-Hui Ho et.al. | 2403.20236 | null |
| 2024-03-29 | MTMMC: A Large-Scale Real-World Multi-Modal Camera Tracking Benchmark | Sanghyun Woo et.al. | 2403.20225 | null |
| 2024-03-28 | Enhancing Anomaly Detection in Financial Markets with an LLM-based Multi-Agent Framework | Taejin Park et.al. | 2403.19735 | null |
| 2024-03-28 | Quantitatively rating galaxy simulations against real observations with anomaly detection | Zehao Jin et.al. | 2403.19464 | link |
| 2024-03-28 | Genos: General In-Network Unsupervised Intrusion Detection by Rule Extraction | Ruoyu Li et.al. | 2403.19248 | link |
| 2024-03-28 | Patch Spatio-Temporal Relation Prediction for Video Anomaly Detection | Hao Shen et.al. | 2403.19111 | null |
| 2024-03-31 | Few-Shot Cross-System Anomaly Trace Classification for Microservice-based systems | Yuqing Wang et.al. | 2403.18998 | null |
| 2024-03-27 | Dealing with Imbalanced Classes in Bot-IoT Dataset | Jesse Atuhurra et.al. | 2403.18989 | null |
| 2024-03-27 | A Data-Driven Search For Mid-Infrared Excesses Among Five Million Main-Sequence FGK Stars | Gabriella Contardo et.al. | 2403.18941 | link |
| 2024-03-27 | A Transformer-Based Framework for Payload Malware Detection and Classification | Kyle Stein et.al. | 2403.18223 | null |
| 2024-03-27 | Road Obstacle Detection based on Unknown Objectness Scores | Chihiro Noguchi et.al. | 2403.18207 | null |
| 2024-03-27 | Few-shot Online Anomaly Detection and Segmentation | Shenxing Wei et.al. | 2403.18201 | null |
| 2024-03-24 | EG-ConMix: An Intrusion Detection Method based on Graph Contrastive Learning | Lijin Wu et.al. | 2403.17980 | null |
| 2024-03-26 | Practical Applications of Advanced Cloud Services and Generative AI Systems in Medical Image Analysis | Jingyu Xu et.al. | 2403.17549 | null |
| 2024-03-26 | FaultGuard: A Generative Approach to Resilient Fault Prediction in Smart Electrical Grids | Emad Efatinasab et.al. | 2403.17494 | null |
| 2024-03-27 | Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice | Jake Hesford et.al. | 2403.17458 | null |
| 2024-03-25 | The pretty bad measurement | Caleb McIrvin et.al. | 2403.17252 | null |
| 2024-03-25 | XAV: A High-Performance Regular Expression Matching Engine for Packet Processing | Jincheng Zhong et.al. | 2403.16533 | null |
| 2024-03-24 | Constricting Normal Latent Space for Anomaly Detection with Normal-only Training Data | Marcella Astrid et.al. | 2403.16270 | null |
| 2024-03-22 | Multiple-Input Auto-Encoder Guided Feature Selection for IoT Intrusion Detection Systems | Phai Vu Dinh et.al. | 2403.15511 | null |
| 2024-03-22 | Hyperbolic Metric Learning for Visual Outlier Detection | Alvaro Gonzalez-Jimenez et.al. | 2403.15260 | null |
| 2024-03-21 | A Classifier-Based Approach to Multi-Class Anomaly Detection for Astronomical Transients | Rithwik Gupta et.al. | 2403.14742 | null |
| 2024-03-21 | A task of anomaly detection for a smart satellite Internet of things system | Zilong Shao et.al. | 2403.14738 | null |
| 2024-03-21 | MULDE: Multiscale Log-Density Estimation via Denoising Score Matching for Video Anomaly Detection | Jakub Micorek et.al. | 2403.14497 | null |
| 2024-03-24 | Large Language Models for Blockchain Security: A Systematic Literature Review | Zheyuan He et.al. | 2403.14280 | null |
| 2024-03-21 | Diffusion Models with Ensembled Structure-Based Anomaly Scoring for Unsupervised Anomaly Detection | Finn Behrendt et.al. | 2403.14262 | link |
| 2024-03-21 | SoftPatch: Unsupervised Anomaly Detection with Noisy Data | Xi Jiang et.al. | 2403.14233 | link |
| 2024-03-21 | Toward Multi-class Anomaly Detection: Exploring Class-aware Unified Model against Inter-class Interference | Xi Jiang et.al. | 2403.14213 | null |
| 2024-03-21 | Deep Learning for Trajectory Data Management and Mining: A Survey and Beyond | Wei Chen et.al. | 2403.14151 | link |
| 2024-03-21 | Automatic Outlier Rectification via Optimal Transport | Jose Blanchet et.al. | 2403.14067 | null |
| 2024-03-21 | Hypothesis-Driven Deep Learning for Out of Distribution Detection | Yasith Jayawardana et.al. | 2403.14058 | null |
| 2024-03-20 | Unsupervised learning in particle physics | Jai Bardhan et.al. | 2403.13676 | null |
| 2024-03-20 | Hierarchical Gaussian Mixture Normalizing Flow Modeling for Unified Anomaly Detection | Xincheng Yao et.al. | 2403.13349 | null |
| 2024-03-19 | Wildfire danger prediction optimization with transfer learning | Spiros Maggioros et.al. | 2403.12871 | link |
| 2024-03-19 | A Comparison of Deep Learning Architectures for Spacecraft Anomaly Detection | Daniel Lakey et.al. | 2403.12864 | null |
| 2024-03-19 | Improving Interpretability of Scores in Anomaly Detection Based on Gaussian-Bernoulli Restricted Boltzmann Machine | Kaiji Sekimoto et.al. | 2403.12672 | null |
| 2024-03-19 | Real-IAD: A Real-World Multi-View Dataset for Benchmarking Versatile Industrial Anomaly Detection | Chengjie Wang et.al. | 2403.12580 | null |
| 2024-03-19 | Adapting Visual-Language Models for Generalizable Anomaly Detection in Medical Images | Chaoqin Huang et.al. | 2403.12570 | link |
| 2024-03-19 | TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events | Zhenyuan Li et.al. | 2403.12541 | null |
| 2024-03-19 | VisionGPT: LLM-Assisted Real-Time Anomaly Detection for Safe Visual Navigation | Hao Wang et.al. | 2403.12415 | null |
| 2024-03-19 | DMAD: Dual Memory Bank for Real-World Anomaly Detection | Jianlong Hu et.al. | 2403.12362 | null |
| 2024-03-18 | Graph-Jigsaw Conditioned Diffusion Model for Skeleton-based Video Anomaly Detection | Ali Karami et.al. | 2403.12172 | null |
| 2024-03-18 | Problem space structural adversarial attacks for Network Intrusion Detection Systems based on Graph Neural Networks | Andrea Venturi et.al. | 2403.11830 | null |
| 2024-03-18 | Binary Noise for Binary Tasks: Masked Bernoulli Diffusion for Unsupervised Anomaly Detection | Julia Wolleb et.al. | 2403.11667 | null |
| 2024-03-18 | Learning Unified Reference Representation for Unsupervised Multi-class Anomaly Detection | Liren He et.al. | 2403.11561 | null |
| 2024-03-18 | Out-of-Distribution Detection Should Use Conformal Prediction (and Vice-versa?) | Paul Novello et.al. | 2403.11532 | null |
| 2024-03-17 | Causality from Bottom to Top: A Survey | Abraham Itzhak Weinberg et.al. | 2403.11219 | null |
| 2024-03-17 | usfAD Based Effective Unknown Attack Detection Focused IDS Framework | Md. Ashraf Uddin et.al. | 2403.11180 | null |
| 2024-03-17 | Customizing Visual-Language Foundation Models for Multi-modal Anomaly Detection and Reasoning | Xiaohao Xu et.al. | 2403.11083 | link |
| 2024-03-16 | An Open-Source Experimentation Framework for the Edge Cloud Continuum | Georgios Koukis et.al. | 2403.10977 | null |
| 2024-03-16 | DTOR: Decision Tree Outlier Regressor to explain anomalies | Riccardo Crupi et.al. | 2403.10903 | link |
| 2024-03-16 | Anomaly Detection Based on Isolation Mechanisms: A Survey | Yang Cao et.al. | 2403.10802 | null |
| 2024-03-16 | Bayesian Design for Sampling Anomalous Spatio-Temporal Data | Katie Buchhorn et.al. | 2403.10791 | null |
| 2024-03-14 | Code Revert Prediction with Graph Neural Networks: A Case Study at J.P. Morgan Chase | Yulong Pei et.al. | 2403.09507 | null |
| 2024-03-14 | Anomaly Detection by Adapting a pre-trained Vision Language Model | Yuxuan Cai et.al. | 2403.09493 | null |
| 2024-03-14 | Detecting the third family of compact stars with normalizing flows | Valéria Carvalho et.al. | 2403.09398 | null |
| 2024-03-14 | Privacy Preserving Anomaly Detection on Homomorphic Encrypted Data from IoT Sensors | Anca Hangan et.al. | 2403.09322 | null |
| 2024-03-14 | Rethinking Autoencoders for Medical Anomaly Detection from A Theoretical Perspective | Yu Cai et.al. | 2403.09303 | null |
| 2024-03-14 | LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection | Xiangrui Cai et.al. | 2403.09209 | link |
| 2024-03-14 | Spatial-temporal Memories Enhanced Graph Autoencoder for Anomaly Detection in Dynamic Graphs | Jie Liu et.al. | 2403.09039 | null |
| 2024-03-13 | Exploiting Structural Consistency of Chest Anatomy for Unsupervised Anomaly Detection in Radiography Images | Tiange Xiang et.al. | 2403.08689 | null |
| 2024-03-13 | Extracting Explanations, Justification, and Uncertainty from Black-Box Deep Neural Networks | Paul Ardis et.al. | 2403.08652 | null |
| 2024-03-13 | Caformer: Rethinking Time Series Analysis from Causal Perspective | Kexuan Zhang et.al. | 2403.08572 | null |
| 2024-03-13 | Diffusion Models with Implicit Guidance for Medical Anomaly Detection | Cosmin I. Bercea et.al. | 2403.08464 | null |
| 2024-03-13 | Validating and Exploring Large Geographic Corpora | Jonathan Dunn et.al. | 2403.08198 | null |
| 2024-03-12 | Supervised Time Series Classification for Anomaly Detection in Subsea Engineering | Ergys Çokaj et.al. | 2403.08013 | null |
| 2024-03-12 | An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques | Hao-Ting Pai et.al. | 2403.07959 | null |
| 2024-03-12 | A robust SVM-based approach with feature selection and outliers detection for classification problems | Marta Baldomero-Naranjo et.al. | 2403.07753 | null |
| 2024-03-11 | Study of the Impact of the Big Data Era on Accounting and Auditing | Yuxiang Sun et.al. | 2403.07180 | null |
| 2024-03-11 | Cost-Sensitive Learning to Defer to Multiple Experts with Workload Constraints | Jean V. Alves et.al. | 2403.06906 | null |
| 2024-03-11 | Detection of Object Throwing Behavior in Surveillance Videos | Ivo P. C. Kersten et.al. | 2403.06552 | null |
| 2024-03-12 | Toward Generalist Anomaly Detection via In-context Residual Learning with Few-shot Sample Prompts | Jiawen Zhu et.al. | 2403.06495 | link |
| 2024-03-11 | When Crypto Economics Meet Graph Analytics and Learning | Bingqiao Luo et.al. | 2403.06454 | null |
| 2024-03-11 | Accelerating Sparse Tensor Decomposition Using Adaptive Linearized Representation | Jan Laukemann et.al. | 2403.06348 | null |
| 2024-03-10 | Text-Guided Variational Image Generation for Industrial Anomaly Detection and Segmentation | Mingyu Lee et.al. | 2403.06247 | null |
| 2024-03-12 | GlanceVAD: Exploring Glance Supervision for Label-efficient Video Anomaly Detection | Huaxin Zhang et.al. | 2403.06154 | link |
| 2024-03-09 | RealNet: A Feature Selection Network with Realistic Synthetic Anomaly for Anomaly Detection | Ximiao Zhang et.al. | 2403.05897 | link |
| 2024-03-08 | Learning Expressive And Generalizable Motion Features For Face Forgery Detection | Jingyi Zhang et.al. | 2403.05172 | null |
| 2024-03-08 | Simulating Battery-Powered TinyML Systems Optimised using Reinforcement Learning in Image-Based Anomaly Detection | Jared M. Ping et.al. | 2403.05106 | null |
| 2024-03-07 | Divide and Conquer: High-Resolution Industrial Anomaly Detection via Memory Efficient Tiled Ensemble | Blaž Rolih et.al. | 2403.04932 | link |
| 2024-03-07 | A Survey of Graph Neural Networks in Real world: Imbalance, Noise, Privacy and OOD Challenges | Wei Ju et.al. | 2403.04468 | null |
| 2024-03-07 | Exploring the Influence of Dimensionality Reduction on Anomaly Detection Performance in Multivariate Time Series | Mahsun Altin et.al. | 2403.04429 | link |
| 2024-03-07 | Signature Isolation Forest | Guillaume Staerman et.al. | 2403.04405 | null |
| 2024-03-07 | Effectiveness Assessment of Recent Large Vision-Language Models | Yao Jiang et.al. | 2403.04306 | null |
| 2024-03-07 | MKF-ADS: A Multi-Knowledge Fused Anomaly Detection System for Automotive | Pengzhou Cheng et.al. | 2403.04293 | null |
| 2024-03-07 | VAEMax: Open-Set Intrusion Detection based on OpenMax and Variational Autoencoder | Zhiyin Qiu et.al. | 2403.04193 | null |
| 2024-03-07 | Dual-path Frequency Discriminators for Few-shot Anomaly Detection | Yuhu Bai et.al. | 2403.04151 | null |
| 2024-03-06 | ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments | Aly S. Abdalla et.al. | 2403.04113 | null |
| 2024-03-06 | Three Revisits to Node-Level Graph Anomaly Detection: Outliers, Message Passing and Hyperbolic Neural Networks | Jing Gu et.al. | 2403.04010 | link |
| 2024-03-06 | Robust covariance estimation and explainable outlier detection for matrix-valued data | Marcus Mayrhofer et.al. | 2403.03975 | null |
| 2024-03-06 | Portraying the Need for Temporal Data in Flood Detection via Sentinel-1 | Xavier Bou et.al. | 2403.03671 | null |
| 2024-03-06 | Unsupervised Incremental Learning with Dual Concept Drift Detection for Identifying Anomalous Sequences | Jin Li et.al. | 2403.03576 | null |
| 2024-03-06 | Multimodal Anomaly Detection based on Deep Auto-Encoder for Object Slip Perception of Mobile Manipulation Robots | Youngjae Yoo et.al. | 2403.03563 | null |
| 2024-03-05 | Improved LiDAR Odometry and Mapping using Deep Semantic Segmentation and Novel Outliers Detection | Mohamed Afifi et.al. | 2403.03111 | null |
| 2024-03-05 | On-demand Mobility Services for Urban Resilience: A Review Towards Human-Machine Collaborative Future | Jiangbo Yu et.al. | 2403.03107 | null |
| 2024-03-05 | Self-adaptive Traffic Anomaly Detection System for IoT Smart Home Environments | Naoto Watanabe et.al. | 2403.02744 | null |
| 2024-03-05 | Interactive Continual Learning: Fast and Slow Thinking | Biqing Qi et.al. | 2403.02628 | null |
| 2024-03-04 | Towards efficient deep autoencoders for multivariate time series anomaly detection | Marcin Pietroń et.al. | 2403.02429 | null |
| 2024-03-04 | Unsupervised Distance Metric Learning for Anomaly Detection Over Multivariate Time Series | Hanyang Yuan et.al. | 2403.01895 | null |
| 2024-03-04 | CSE: Surface Anomaly Detection with Contrastively Selected Embedding | Simon Thomine et.al. | 2403.01859 | link |
| 2024-03-04 | Deployment Challenges of Industrial Intrusion Detection Systems | Konrad Wolsing et.al. | 2403.01809 | null |
| 2024-03-04 | PointCore: Efficient Unsupervised Point Cloud Anomaly Detector Using Local-Global Features | Baozhu Zhao et.al. | 2403.01804 | null |
| 2024-03-03 | Applying Self-supervised Learning to Network Intrusion Detection for Network Flows with Graph Neural Network | Renjie Xu et.al. | 2403.01501 | link |
| 2024-03-02 | AcME-AD: Accelerated Model Explanations for Anomaly Detection | Valentina Zaccaria et.al. | 2403.01245 | null |
| 2024-03-02 | Shaping Multi-Robot Patrol Performance with Heterogeneity in Individual Learning Behavior | Connor York et.al. | 2403.01181 | null |
| 2024-03-02 | Learn Suspected Anomalies from Event Prompts for Video Anomaly Detection | Chenchen Tao et.al. | 2403.01169 | null |
| 2024-03-01 | Dimensionality reduction techniques to support insider trading detection | Adele Ravagnani et.al. | 2403.00707 | null |
| 2024-03-01 | The Impact of Frequency Bands on Acoustic Anomaly Detection of Machines using Deep Learning Based Model | Tin Nguyen et.al. | 2403.00379 | null |
| 2024-03-01 | WindGP: Efficient Graph Partitioning on Heterogenous Machines | Li Zeng et.al. | 2403.00331 | null |
| 2024-02-29 | UniTS: Building a Unified Time Series Model | Shanghua Gao et.al. | 2403.00131 | link |
| 2024-02-29 | A Novel Approach to Industrial Defect Generation through Blended Latent Diffusion Model with Online Adaptation | Hanxi Li et.al. | 2402.19330 | null |
| 2024-02-29 | Anomaly Detection in Offshore Wind Turbine Structures using Hierarchical Bayesian Modelling | S. M. Smith et.al. | 2402.19295 | null |
| 2024-02-29 | A SAM-guided Two-stream Lightweight Model for Anomaly Detection | Chenghao Li et.al. | 2402.19145 | link |
| 2024-02-29 | COFT-AD: COntrastive Fine-Tuning for Few-Shot Anomaly Detection | Jingyi Liao et.al. | 2402.18998 | null |
| 2024-02-29 | Always be Pre-Training: Representation Learning for Network Intrusion Detection with GNNs | Zhengyao Gu et.al. | 2402.18986 | null |
| 2024-02-28 | Objective and Interpretable Breast Cosmesis Evaluation with Attention Guided Denoising Diffusion Anomaly Detection Model | Sangjoon Park et.al. | 2402.18362 | null |
| 2024-02-28 | Grid-Based Continuous Normal Representation for Anomaly Detection | Joo Chan Lee et.al. | 2402.18293 | link |
| 2024-02-28 | A Compact Anomaly Detection Solution for Science Instruments | Alfonso Lagares de Toledo et.al. | 2402.17961 | null |
| 2024-02-27 | Outlier-Detection for Reactive Machine Learned Potential Energy Surfaces | Luis Itza Vazquez-Salazar et.al. | 2402.17686 | null |
| 2024-02-27 | Fraud Detection with Binding Global and Local Relational Interaction | Haolin Li et.al. | 2402.17472 | null |
| 2024-02-27 | CGGM: A conditional graph generation model with adaptive sparsity for node anomaly detection in IoT networks | Xianshi Su et.al. | 2402.17363 | null |
| 2024-02-27 | Structural Teacher-Student Normality Learning for Multi-Class Anomaly Detection and Localization | Hanqiu Deng et.al. | 2402.17091 | null |
| 2024-02-26 | Deep Learning Algorithms Used in Intrusion Detection Systems – A Review | Richard Kimanzi et.al. | 2402.17020 | null |
| 2024-02-25 | An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection | João Vitorino et.al. | 2402.16912 | null |
| 2024-02-26 | Uncertainty Quantification in Anomaly Detection with Cross-Conformal $p$ -Values | Oliver Hennhöfer et.al. | 2402.16388 | null |
(<a href=../README.md>back to main</a>)