Anomaly Detection - 2024-05
Anomaly Detection - 2024-05
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2024-05-30 | Optimizing cnn-Bigru performance: Mish activation and comparative analysis with Relu | Asmaa Benchama et.al. | 2405.20503 | translate | read | null |
| 2024-05-30 | From Zero to Hero: Cold-Start Anomaly Detection | Tal Reiss et.al. | 2405.20341 | translate | read | link |
| 2024-05-30 | The Solar System Notification Alert Processing System (SNAPS): Asteroid Population Outlier Detection | Michael Gowanlock et.al. | 2405.20176 | translate | read | null |
| 2024-05-30 | Deep Reinforcement Learning for Intrusion Detection in IoT: A Survey | Afrah Gueriani et.al. | 2405.20038 | translate | read | null |
| 2024-05-30 | Joint Selective State Space Model and Detrending for Robust Time Series Anomaly Detection | Junqi Chen et.al. | 2405.19823 | translate | read | null |
| 2024-05-30 | Performance Examination of Symbolic Aggregate Approximation in IoT Applications | Suzana Veljanovska et.al. | 2405.19817 | translate | read | null |
| 2024-05-29 | Video Anomaly Detection in 10 Years: A Survey and Outlook | Moshira Abdalla et.al. | 2405.19387 | translate | read | null |
| 2024-05-29 | Comparative Study of Neighbor-based Methods for Local Outlier Detection | Zhuang Qi et.al. | 2405.19247 | translate | read | null |
| 2024-05-29 | Early Detection of Critical Urban Events using Mobile Phone Network Data | Pierre Lemaire et.al. | 2405.19125 | translate | read | null |
| 2024-05-29 | A Mallows-like Criterion for Anomaly Detection with Random Forest Implementation | Gaoxiang Zhao et.al. | 2405.18932 | translate | read | null |
| 2024-05-29 | Deep Positive-Unlabeled Anomaly Detection for Contaminated Unlabeled Data | Hiroshi Takahashi et.al. | 2405.18929 | translate | read | link |
| 2024-05-29 | Anomaly Detection by Context Contrasting | Alain Ryser et.al. | 2405.18848 | translate | read | null |
| 2024-05-28 | When and How Does In-Distribution Label Help Out-of-Distribution Detection? | Xuefeng Du et.al. | 2405.18635 | translate | read | link |
| 2024-05-28 | Enhancing IoT Security with CNN and LSTM-Based Intrusion Detection Systems | Afrah Gueriani et.al. | 2405.18624 | translate | read | null |
| 2024-05-28 | Anomaly detection for the identification of volcanic unrest in satellite imagery | Robert Gabriel Popescu et.al. | 2405.18487 | translate | read | null |
| 2024-05-28 | Long Short-Term Memory Networks for Anomaly Detection in Magnet Power Supplies of Particle Accelerators | Ihar Lobach et.al. | 2405.18321 | translate | read | null |
| 2024-05-28 | Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs | Tim Poštuvan et.al. | 2405.18050 | translate | read | link |
| 2024-05-28 | On Robust Clustering of Temporal Point Process | Yuecheng Zhang et.al. | 2405.17828 | translate | read | null |
| 2024-05-27 | SmoothGNN: Smoothing-based GNN for Unsupervised Node Anomaly Detection | Xiangyu Dong et.al. | 2405.17525 | translate | read | null |
| 2024-05-27 | Survey of Graph Neural Network for Internet of Things and NextG Networks | Sabarish Krishna Moorthy et.al. | 2405.17309 | translate | read | null |
| 2024-05-27 | Hawk: Learning to Understand Open-World Video Anomalies | Jiaqi Tang et.al. | 2405.16886 | translate | read | link |
| 2024-05-27 | ARC: A Generalist Graph Anomaly Detector with In-Context Learning | Yixin Liu et.al. | 2405.16771 | translate | read | null |
| 2024-05-26 | A Study on Unsupervised Anomaly Detection and Defect Localization using Generative Model in Ultrasonic Non-Destructive Testing | Yusaku Ando et.al. | 2405.16580 | translate | read | null |
| 2024-05-26 | KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation | Anantaa Kotal et.al. | 2405.16476 | translate | read | null |
| 2024-05-25 | Qsco: A Quantum Scoring Module for Open-set Supervised Anomaly Detection | Yifeng Peng et.al. | 2405.16368 | translate | read | null |
| 2024-05-25 | Acquiring Better Load Estimates by Combining Anomaly and Change-point Detection in Power Grid Time-series Measurements | Roel Bouman et.al. | 2405.16164 | translate | read | link |
| 2024-05-24 | UnitNorm: Rethinking Normalization for Transformers in Time Series | Nan Huang et.al. | 2405.15903 | translate | read | null |
| 2024-05-24 | Anomalous Change Point Detection Using Probabilistic Predictive Coding | Roelof G. Hup et.al. | 2405.15727 | translate | read | null |
| 2024-05-24 | Large Language Models can Deliver Accurate and Interpretable Time Series Anomaly Detection | Jun Liu et.al. | 2405.15370 | translate | read | null |
| 2024-05-24 | Towards a General Time Series Anomaly Detector with Adaptive Bottlenecks and Dual Adversarial Decoders | Qichao Shentu et.al. | 2405.15273 | translate | read | null |
| 2024-05-23 | Large language models can be zero-shot anomaly detectors for time series? | Sarah Alnegheimish et.al. | 2405.14755 | translate | read | null |
| 2024-05-23 | Applied Machine Learning to Anomaly Detection in Enterprise Purchase Processes | A. Herreros-Martínez et.al. | 2405.14754 | translate | read | null |
| 2024-05-23 | AnomalyDINO: Boosting Patch-based Few-shot Anomaly Detection with DINOv2 | Simon Damm et.al. | 2405.14529 | translate | read | null |
| 2024-05-23 | Dinomaly: The Less Is More Philosophy in Multi-Class Unsupervised Anomaly Detection | Jia Guo et.al. | 2405.14325 | translate | read | link |
| 2024-05-22 | Uncertainty-aware Evaluation of Auxiliary Anomalies with the Expected Anomaly Posterior | Lorenzo Perini et.al. | 2405.13699 | translate | read | null |
| 2024-05-22 | Challenging Gradient Boosted Decision Trees with Tabular Transformers for Fraud Detection at Booking.com | Sergei Krutikov et.al. | 2405.13692 | translate | read | null |
| 2024-05-22 | GNN-based Anomaly Detection for Encoded Network Traffic | Anasuya Chattopadhyay et.al. | 2405.13670 | translate | read | null |
| 2024-05-22 | LogRCA: Log-based Root Cause Analysis for Distributed Services | Thorsten Wittkopp et.al. | 2405.13599 | translate | read | null |
| 2024-05-22 | Cross-Modal Distillation in Industrial Anomaly Detection: Exploring Efficient Multi-Modal IAD | Wenbo Sui et.al. | 2405.13571 | translate | read | null |
| 2024-05-22 | Kinematics of Abdominal Aortic Aneurysms | Mostafa Jamshidian et.al. | 2405.13377 | translate | read | null |
| 2024-05-21 | Strategic Deployment of Honeypots in Blockchain-based IoT Systems | Daniel Commey et.al. | 2405.12951 | translate | read | null |
| 2024-05-21 | Spatial-aware Attention Generative Adversarial Network for Semi-supervised Anomaly Detection in Medical Image | Zerui Zhang et.al. | 2405.12872 | translate | read | null |
| 2024-05-21 | Generative AI and Large Language Models for Cyber Security: All Insights You Need | Mohamed Amine Ferrag et.al. | 2405.12750 | translate | read | null |
| 2024-05-21 | Multimodal video analysis for crowd anomaly detection using open access tourism cameras | Alejandro Dionis-Ros et.al. | 2405.12708 | translate | read | null |
| 2024-05-21 | EntropyStop: Unsupervised Deep Outlier Detection with Loss Entropy | Yihong Huang et.al. | 2405.12502 | translate | read | null |
| 2024-05-20 | Automated Anomaly Detection on European XFEL Klystrons | Antonin Sulc et.al. | 2405.12391 | translate | read | null |
| 2024-05-20 | PATE: Proximity-Aware Time series anomaly Evaluation | Ramin Ghorbani et.al. | 2405.12096 | translate | read | link |
| 2024-05-20 | Position-Guided Prompt Learning for Anomaly Detection in Chest X-Rays | Zhichao Sun et.al. | 2405.11976 | translate | read | link |
| 2024-05-20 | Dynamic classifier auditing by unsupervised anomaly detection methods: an application in packaging industry predictive maintenance | Fernando Mateo et.al. | 2405.11960 | translate | read | null |
| 2024-05-18 | MediCLIP: Adapting CLIP for Few-shot Medical Image Anomaly Detection | Ximiao Zhang et.al. | 2405.11315 | translate | read | link |
| 2024-05-18 | Few-Shot API Attack Detection: Overcoming Data Scarcity with GAN-Inspired Learning | Udi Aharon et.al. | 2405.11258 | translate | read | null |
| 2024-05-18 | Few-Shot API Attack Anomaly Detection in a Classification-by-Retrieval Framework | Udi Aharon et.al. | 2405.11247 | translate | read | null |
| 2024-05-18 | SimAD: A Simple Dissimilarity-based Approach for Time Series Anomaly Detection | Zhijie Zhong et.al. | 2405.11238 | translate | read | link |
| 2024-05-18 | OTLP: Output Thresholding Using Mixed Integer Linear Programming | Baran Koseoglu et.al. | 2405.11230 | translate | read | null |
| 2024-05-18 | Enhancing Automata Learning with Statistical Machine Learning: A Network Security Case Study | Negin Ayoughi et.al. | 2405.11141 | translate | read | null |
| 2024-05-17 | Safety in Graph Machine Learning: Threats and Safeguards | Song Wang et.al. | 2405.11034 | translate | read | null |
| 2024-05-17 | FitNets: An Adaptive Framework to Learn Accurate Traffic Distributions | Alexander Dietmüller et.al. | 2405.10931 | translate | read | null |
| 2024-05-17 | Rethinking Graph Backdoor Attacks: A Distribution-Preserving Perspective | Zhiwei Zhang et.al. | 2405.10757 | translate | read | null |
| 2024-05-17 | Harnessing Collective Structure Knowledge in Data Augmentation for Graph Neural Networks | Rongrong Ma et.al. | 2405.10633 | translate | read | null |
| 2024-05-17 | ECATS: Explainable-by-design concept-based anomaly detection for time series | Irene Ferfoglia et.al. | 2405.10608 | translate | read | null |
| 2024-05-16 | Networking Systems for Video Anomaly Detection: A Tutorial and Survey | Jing Liu et.al. | 2405.10347 | translate | read | link |
| 2024-05-16 | Applications of Quantum Machine Learning for Quantitative Finance | Piotr Mironowicz et.al. | 2405.10119 | translate | read | null |
| 2024-05-16 | MiniMaxAD: A Lightweight Autoencoder for Feature-Rich Anomaly Detection | Fengjie Wang et.al. | 2405.09933 | translate | read | null |
| 2024-05-15 | BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection | Luan Pham et.al. | 2405.09330 | translate | read | link |
| 2024-05-15 | A Hierarchically Feature Reconstructed Autoencoder for Unsupervised Anomaly Detection | Honghui Chen et.al. | 2405.09148 | translate | read | null |
| 2024-05-14 | Self-supervised vision-langage alignment of deep learning representations for bone X-rays analysis | Alexandre Englebert et.al. | 2405.08932 | translate | read | link |
| 2024-05-14 | Incorporating Physical Priors into Weakly-Supervised Anomaly Detection | Chi Lung Cheng et.al. | 2405.08889 | translate | read | null |
| 2024-05-14 | GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles | Murad Mehrab Abrar et.al. | 2405.08359 | translate | read | null |
| 2024-05-14 | Model-Free Unsupervised Anomaly detection framework in multivariate time-series of industrial dynamical systems | Mazen Alamir et.al. | 2405.08349 | translate | read | null |
| 2024-05-14 | Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection | Xuanze Chen et.al. | 2405.08278 | translate | read | null |
| 2024-05-13 | Enhancing Rover Mobility Monitoring: Autoencoder-driven Anomaly Detection for Curiosity | Mielad Sabzehi et.al. | 2405.07982 | translate | read | null |
| 2024-05-13 | IMAFD: An Interpretable Multi-stage Approach to Flood Detection from time series Multispectral Data | Ziyang Zhang et.al. | 2405.07916 | translate | read | null |
| 2024-05-13 | AnoVox: A Benchmark for Multimodal Anomaly Detection in Autonomous Driving | Daniel Bogdoll et.al. | 2405.07865 | translate | read | link |
| 2024-05-13 | DeepHYDRA: Resource-Efficient Time-Series Anomaly Detection in Dynamically-Configured Systems | Franz Kevin Stehle et.al. | 2405.07749 | translate | read | link |
| 2024-05-13 | AnomalyLLM: Few-shot Anomaly Edge Detection for Dynamic Graphs using Large Language Models | Shuo Liu et.al. | 2405.07626 | translate | read | link |
| 2024-05-13 | RESTAD: REconstruction and Similarity based Transformer for time series Anomaly Detection | Ramin Ghorbani et.al. | 2405.07509 | translate | read | link |
| 2024-05-12 | A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection | Raja Giryes et.al. | 2405.07232 | translate | read | null |
| 2024-05-11 | Fractals as Pre-training Datasets for Anomaly Detection and Localization | C. I. Ugwu et.al. | 2405.06980 | translate | read | null |
| 2024-05-11 | Semi-supervised Anomaly Detection via Adaptive Reinforcement Learning-Enabled Method with Causal Inference | Xiangwei Chen et.al. | 2405.06925 | translate | read | null |
| 2024-05-11 | Generation of Granular-Balls for Clustering Based on the Principle of Justifiable Granularity | Zhen Zhang et.al. | 2405.06904 | translate | read | null |
| 2024-05-10 | Continuous-variable Quantum Boltzmann Machine | Shikha Bangar et.al. | 2405.06580 | translate | read | null |
| 2024-05-10 | Attend, Distill, Detect: Attention-aware Entropy Distillation for Anomaly Detection | Sushovan Jena et.al. | 2405.06467 | translate | read | null |
| 2024-05-10 | TS3IM: Unveiling Structural Similarity in Time Series through Image Similarity Assessment Insights | Yuhan Liu et.al. | 2405.06234 | translate | read | null |
| 2024-05-10 | MAPL: Memory Augmentation and Pseudo-Labeling for Semi-Supervised Anomaly Detection | Junzhuo Chen et.al. | 2405.06198 | translate | read | link |
| 2024-05-10 | Anomaly Detection in Graph Structured Data: A Survey | Prabin B Lamichhane et.al. | 2405.06172 | translate | read | null |
| 2024-05-09 | Advancing Anomaly Detection in Computational Workflows with Active Learning | Krishnan Raghavan et.al. | 2405.06133 | translate | read | null |
| 2024-05-09 | Self-Supervised Learning of Time Series Representation via Diffusion Process and Imputation-Interpolation-Forecasting Mask | Zineb Senane et.al. | 2405.05959 | translate | read | link |
| 2024-05-09 | Exploiting Autoencoder’s Weakness to Generate Pseudo Anomalies | Marcella Astrid et.al. | 2405.05886 | translate | read | null |
| 2024-05-09 | PLLM-CS: Pre-trained Large Language Model (LLM) for Cyber Threat Detection in Satellite Networks | Mohammed Hassanin et.al. | 2405.05469 | translate | read | null |
| 2024-05-08 | Anomaly Detection in Certificate Transparency Logs | Richard Ostertág et.al. | 2405.05206 | translate | read | null |
| 2024-05-08 | Discrepancy-based Diffusion Models for Lesion Detection in Brain MRI | Keqiang Fan et.al. | 2405.04974 | translate | read | null |
| 2024-05-08 | Supervised Anomaly Detection for Complex Industrial Images | Aimira Baitieva et.al. | 2405.04953 | translate | read | link |
| 2024-05-08 | Persistent homology of featured time series data and its applications | Eunwoo Heo et.al. | 2405.04796 | translate | read | null |
| 2024-05-08 | Dual-Image Enhanced CLIP for Zero-Shot Anomaly Detection | Zhaoxiang Zhang et.al. | 2405.04782 | translate | read | null |
| 2024-05-09 | Large Language Models for Cyber Security: A Systematic Literature Review | HanXiang Xu et.al. | 2405.04760 | translate | read | null |
| 2024-05-07 | Research on financial fraud algorithm based on federal learning and big data technology | Xinye Sha et.al. | 2405.03992 | translate | read | null |
| 2024-05-06 | On the Influence of Data Resampling for Deep Learning-Based Log Anomaly Detection: Insights and Recommendations | Xiaoxue Ma et.al. | 2405.03489 | translate | read | link |
| 2024-05-07 | A Reliable Framework for Human-in-the-Loop Anomaly Detection in Time Series | Ziquan Deng et.al. | 2405.03234 | translate | read | null |
| 2024-05-06 | Braced Fourier Continuation and Regression for Anomaly Detection | Josef Sabuda et.al. | 2405.03180 | translate | read | link |
| 2024-05-05 | AnoGAN for Tabular Data: A Novel Approach to Anomaly Detection | Aditya Singh et.al. | 2405.03075 | translate | read | null |
| 2024-05-05 | A Model-Free Kullback-Leibler Divergence Filter for Anomaly Detection in Noisy Data Series | Ruikun Zhou et.al. | 2405.03047 | translate | read | null |
| 2024-05-05 | Defense against Joint Poison and Evasion Attacks: A Case Study of DERMS | Zain ul Abdeen et.al. | 2405.02989 | translate | read | null |
| 2024-05-04 | Systematic Review: Anomaly Detection in Connected and Autonomous Vehicles | J. R. V. Solaas et.al. | 2405.02731 | translate | read | null |
| 2024-05-04 | Position Paper: Quo Vadis, Unsupervised Time Series Anomaly Detection? | M. Saquib Sarfraz et.al. | 2405.02678 | translate | read | null |
| 2024-05-04 | Generic Multi-modal Representation Learning for Network Traffic Analysis | Luca Gioacchini et.al. | 2405.02649 | translate | read | null |
| 2024-05-04 | A Data Mining-Based Dynamical Anomaly Detection Method for Integrating with an Advance Metering System | Sarit Maitra et.al. | 2405.02574 | translate | read | null |
| 2024-05-03 | Subgraph2vec: A random walk-based algorithm for embedding knowledge graphs | Elika Bozorgi et.al. | 2405.02240 | translate | read | null |
| 2024-05-03 | Advancing Pre-trained Teacher: Towards Robust Feature Discrepancy for Anomaly Detection | Canhui Tang et.al. | 2405.02068 | translate | read | link |
| 2024-05-03 | Detecting and Deterring Manipulation in a Cognitive Hierarchy | Nitay Alon et.al. | 2405.01870 | translate | read | null |
| 2024-05-02 | Language-Enhanced Latent Representations for Out-of-Distribution Detection in Autonomous Driving | Zhenjiang Mao et.al. | 2405.01691 | translate | read | null |
| 2024-05-02 | GTX: A Transactional Graph Data System For HTAP Workloads | Libin Zhou et.al. | 2405.01448 | translate | read | null |
| 2024-05-02 | A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks | Philipp Meyer et.al. | 2405.01324 | translate | read | null |
| 2024-05-02 | Interpretable Data-driven Anomaly Detection in Industrial Processes with ExIFFI | Davide Frizzo et.al. | 2405.01158 | translate | read | null |
| 2024-05-01 | Quantum algorithms for matrix geometric means | Nana Liu et.al. | 2405.00673 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)