Anomaly Detection - 2024-06
Anomaly Detection - 2024-06
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2024-06-30 | Maximum Entropy Inverse Reinforcement Learning of Diffusion Models with Energy-Based Models | Sangwoong Yoon et.al. | 2407.00626 | translate | read | null |
| 2024-06-29 | Infrared Computer Vision for Utility-Scale Photovoltaic Array Inspection | David F. Ramirez et.al. | 2407.00544 | translate | read | null |
| 2024-06-28 | Odd-One-Out: Anomaly Detection by Comparing with Neighbors | Ankan Bhunia et.al. | 2406.20099 | translate | read | link |
| 2024-06-28 | HAITCH: A Framework for Distortion and Motion Correction in Fetal Multi-Shell Diffusion-Weighted MRI | Haykel Snoussi et.al. | 2406.20042 | translate | read | null |
| 2024-06-28 | NetNN: Neural Intrusion Detection System in Programmable Networks | Kamran Razavi et.al. | 2406.19990 | translate | read | null |
| 2024-06-28 | Self-Supervised Spatial-Temporal Normality Learning for Time Series Anomaly Detection | Yutong Chen et.al. | 2406.19770 | translate | read | null |
| 2024-06-28 | xSemAD: Explainable Semantic Anomaly Detection in Event Logs Using Sequence-to-Sequence Models | Kiran Busch et.al. | 2406.19763 | translate | read | null |
| 2024-06-28 | CHASE: A Causal Heterogeneous Graph based Framework for Root Cause Analysis in Multimodal Microservice Systems | Ziming Zhao et.al. | 2406.19711 | translate | read | null |
| 2024-06-27 | Looking 3D: Anomaly Detection with 2D-3D Alignment | Ankan Bhunia et.al. | 2406.19393 | translate | read | link |
| 2024-06-27 | Hack Me If You Can: Aggregating AutoEncoders for Countering Persistent Access Threats Within Highly Imbalanced Data | Sidahmed Benabderrahmane et.al. | 2406.19220 | translate | read | link |
| 2024-06-27 | QSketch: An Efficient Sketch for Weighted Cardinality Estimation in Streams | Yiyan Qi et.al. | 2406.19143 | translate | read | null |
| 2024-06-27 | CLIP3D-AD: Extending CLIP for 3D Few-Shot Anomaly Detection with Multi-View Images Generation | Zuo Zuo et.al. | 2406.18941 | translate | read | null |
| 2024-06-27 | Statistical Test for Data Analysis Pipeline by Selective Inference | Tomohiro Shiraishi et.al. | 2406.18902 | translate | read | link |
| 2024-06-27 | MissionGNN: Hierarchical Multimodal GNN-based Weakly Supervised Video Anomaly Recognition with Mission-Specific Knowledge Graph Generation | Sanggeon Yun et.al. | 2406.18815 | translate | read | null |
| 2024-06-26 | Universal Anomaly Detection at the LHC: Transforming Optimal Classifiers and the DDD Method | Sascha Caron et.al. | 2406.18469 | translate | read | null |
| 2024-06-26 | Human-free Prompted Based Anomaly Detection: prompt optimization with Meta-guiding prompt scheme | Pi-Wei Chen et.al. | 2406.18197 | translate | read | null |
| 2024-06-26 | View-Invariant Pixelwise Anomaly Detection in Multi-object Scenes with Adaptive View Synthesis | Subin Varghese et.al. | 2406.18012 | translate | read | null |
| 2024-06-25 | European Space Agency Benchmark for Anomaly Detection in Satellite Telemetry | Krzysztof Kotowski et.al. | 2406.17826 | translate | read | null |
| 2024-06-25 | Diffusion-based Adversarial Purification for Intrusion Detection | Mohamed Amine Merzouk et.al. | 2406.17606 | translate | read | null |
| 2024-06-25 | SincVAE: a New Approach to Improve Anomaly Detection on EEG Data Using SincNet and Variational Autoencoder | Andrea Pollastro et.al. | 2406.17537 | translate | read | null |
| 2024-06-24 | Robust Zero Trust Architecture: Joint Blockchain based Federated learning and Anomaly Detection based Framework | Shiva Raj Pokhrel et.al. | 2406.17172 | translate | read | null |
| 2024-06-24 | Integrating Generative AI with Network Digital Twins for Enhanced Network Operations | Kassi Muhammad et.al. | 2406.17112 | translate | read | null |
| 2024-06-24 | Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption | Bharath V Nair et.al. | 2406.16792 | translate | read | null |
| 2024-06-25 | Anomaly Detection based on Markov Data: A Statistical Depth Approach | Carlos Fernández et.al. | 2406.16759 | translate | read | null |
| 2024-06-24 | Machine Learning with Real-time and Small Footprint Anomaly Detection System for In-Vehicle Gateway | Yi Wang et.al. | 2406.16369 | translate | read | null |
| 2024-06-24 | Anomaly Detection of Tabular Data Using LLMs | Aodong Li et.al. | 2406.16308 | translate | read | null |
| 2024-06-23 | Detecting Abnormal Operations in Concentrated Solar Power Plants from Irregular Sequences of Thermal Images | Sukanya Patra et.al. | 2406.16077 | translate | read | null |
| 2024-06-22 | DABL: Detecting Semantic Anomalies in Business Processes Using Large Language Models | Wei Guan et.al. | 2406.15781 | translate | read | null |
| 2024-06-21 | GenSQL: A Probabilistic Programming System for Querying Generative Models of Database Tables | Mathieu Huot et.al. | 2406.15652 | translate | read | null |
| 2024-06-21 | Root Cause Analysis of Anomalies in 5G RAN Using Graph Neural Network and Transformer | Antor Hasan et.al. | 2406.15638 | translate | read | null |
| 2024-06-24 | FT-AED: Benchmark Dataset for Early Freeway Traffic Anomalous Event Detection | Austin Coursey et.al. | 2406.15283 | translate | read | null |
| 2024-06-21 | AI-based Anomaly Detection for Clinical-Grade Histopathological Diagnostics | Jonas Dippel et.al. | 2406.14866 | translate | read | null |
| 2024-06-20 | Energy Mapping of Existing Building Stock in Cambridge using Energy Performance Certificates and Thermal Infrared Imagery | Yinglong He et.al. | 2406.14520 | translate | read | null |
| 2024-06-20 | Rule-based outlier detection of AI-generated anatomy segmentations | Deepa Krishnaswamy et.al. | 2406.14486 | translate | read | null |
| 2024-06-20 | ATAC-Net: Zoomed view works better for Anomaly Detection | Shaurya Gupta et.al. | 2406.14398 | translate | read | null |
| 2024-06-20 | aeon: a Python toolkit for learning from time series | Matthew Middlehurst et.al. | 2406.14231 | translate | read | link |
| 2024-06-21 | Image anomaly detection and prediction scheme based on SSA optimized ResNet50-BiGRU model | Qianhui Wan et.al. | 2406.13987 | translate | read | null |
| 2024-06-19 | Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN | Pablo Moriano et.al. | 2406.13778 | translate | read | link |
| 2024-06-19 | PPT-GNN: A Practical Pre-Trained Spatio-Temporal Graph Neural Network for Network Security | Louis Van Langendonck et.al. | 2406.13365 | translate | read | null |
| 2024-06-19 | Enhancing supply chain security with automated machine learning | Haibo Wang et.al. | 2406.13166 | translate | read | null |
| 2024-06-18 | Feasibility of Non-Line-of-Sight Integrated Sensing and Communication at mmWave | Paolo Tosi et.al. | 2406.12828 | translate | read | null |
| 2024-06-18 | Online-Adaptive Anomaly Detection for Defect Identification in Aircraft Assembly | Siddhant Shete et.al. | 2406.12698 | translate | read | null |
| 2024-06-18 | Tracking Real-time Anomalies in Cyber-Physical Systems Through Dynamic Behavioral Analysis | Prashanth Krishnamurthy et.al. | 2406.12438 | translate | read | null |
| 2024-06-18 | A Cutting-Edge Deep Learning Method For Enhancing IoT Security | Nadia Ansar et.al. | 2406.12400 | translate | read | null |
| 2024-06-18 | Self-Supervised Time-Series Anomaly Detection Using Learnable Data Augmentation | Kukjin Choi et.al. | 2406.12260 | translate | read | null |
| 2024-06-18 | Holmes-VAD: Towards Unbiased and Explainable Video Anomaly Detection via Multi-modal LLM | Huaxin Zhang et.al. | 2406.12235 | translate | read | link |
| 2024-06-17 | Prior Normality Prompt Transformer for Multi-class Industrial Image Anomaly Detection | Haiming Yao et.al. | 2406.11507 | translate | read | null |
| 2024-06-17 | SEFraud: Graph-based Self-Explainable Fraud Detection via Interpretative Mask Learning | Kaidi Li et.al. | 2406.11389 | translate | read | null |
| 2024-06-17 | VideoVista: A Versatile Benchmark for Video Understanding and Reasoning | Yunxin Li et.al. | 2406.11303 | translate | read | null |
| 2024-06-18 | Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided Mask | Jingyu Xiao et.al. | 2406.10928 | translate | read | link |
| 2024-06-15 | Enhancing Anomaly Detection Generalization through Knowledge Exposure: The Dual Effects of Augmentation | Mohammad Akhavan Anvari et.al. | 2406.10617 | translate | read | null |
| 2024-06-14 | Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks | Safaa Menssouri et.al. | 2406.10417 | translate | read | null |
| 2024-06-14 | VANE-Bench: Video Anomaly Evaluation Benchmark for Conversational LMMs | Rohit Bharadwaj et.al. | 2406.10326 | translate | read | link |
| 2024-06-14 | Outlier detection in maritime environments using AIS data and deep recurrent architectures | Constantine Maganaris et.al. | 2406.09966 | translate | read | null |
| 2024-06-14 | Unraveling Anomalies in Time: Unsupervised Discovery and Isolation of Anomalous Behavior in Bio-regenerative Life Support System Telemetry | Ferdinand Rewicki et.al. | 2406.09825 | translate | read | link |
| 2024-06-14 | Explainable AI for Comparative Analysis of Intrusion Detection Models | Pap M. Corea et.al. | 2406.09684 | translate | read | link |
| 2024-06-13 | Comparison Visual Instruction Tuning | Wei Lin et.al. | 2406.09240 | translate | read | null |
| 2024-06-13 | Detection-Rate-Emphasized Multi-objective Evolutionary Feature Selection for Network Intrusion Detection | Zi-Hang Cheng et.al. | 2406.09180 | translate | read | null |
| 2024-06-13 | Weakly-supervised anomaly detection for multimodal data distributions | Xu Tan et.al. | 2406.09147 | translate | read | null |
| 2024-06-13 | Cross-Modal Learning for Anomaly Detection in Fused Magnesium Smelting Process: Methodology and Benchmark | Gaochang Wu et.al. | 2406.09016 | translate | read | null |
| 2024-06-13 | Few-Shot Anomaly Detection via Category-Agnostic Registration Learning | Chaoqin Huang et.al. | 2406.08810 | translate | read | link |
| 2024-06-12 | Large Language Model(LLM) assisted End-to-End Network Health Management based on Multi-Scale Semanticization | Fengxiao Tang et.al. | 2406.08305 | translate | read | null |
| 2024-06-12 | Efficient Network Traffic Feature Sets for IoT Intrusion Detection | Miguel Silva et.al. | 2406.08042 | translate | read | null |
| 2024-06-12 | Multivariate Log-based Anomaly Detection for Distributed Database | Lingzhe Zhang et.al. | 2406.07976 | translate | read | null |
| 2024-06-11 | GLAD: Towards Better Reconstruction with Global and Local Adaptive Diffusion Models for Unsupervised Anomaly Detection | Hang Yao et.al. | 2406.07487 | translate | read | null |
| 2024-06-11 | Anomaly Detection on Unstable Logs with GPT Models | Fatemeh Hadadi et.al. | 2406.07467 | translate | read | null |
| 2024-06-11 | Global-Regularized Neighborhood Regression for Efficient Zero-Shot Texture Anomaly Detection | Haiming Yao et.al. | 2406.07333 | translate | read | null |
| 2024-06-11 | Description and Discussion on DCASE 2024 Challenge Task 2: First-Shot Unsupervised Anomalous Sound Detection for Machine Condition Monitoring | Tomoya Nishida et.al. | 2406.07250 | translate | read | null |
| 2024-06-11 | RAD: A Comprehensive Dataset for Benchmarking the Robustness of Image Anomaly Detection | Yuqi Cheng et.al. | 2406.07176 | translate | read | null |
| 2024-06-11 | CARACAS: vehiCular ArchitectuRe for detAiled Can Attacks Simulation | Sadek Misto Kirdi et.al. | 2406.07125 | translate | read | null |
| 2024-06-10 | Hybrid Video Anomaly Detection for Anomalous Scenarios in Autonomous Driving | Daniel Bogdoll et.al. | 2406.06423 | translate | read | null |
| 2024-06-10 | UMAD: Unsupervised Mask-Level Anomaly Detection for Autonomous Driving | Daniel Bogdoll et.al. | 2406.06370 | translate | read | null |
| 2024-06-10 | Federated learning in food research | Zuzanna Fendor et.al. | 2406.06202 | translate | read | null |
| 2024-06-10 | Sequential Binary Classification for Intrusion Detection in Software Defined Networks | Ishan Chokshi et.al. | 2406.06099 | translate | read | null |
| 2024-06-10 | fSEAD: a Composable FPGA-based Streaming Ensemble Anomaly Detection Library | Binglei Lou et.al. | 2406.05999 | translate | read | link |
| 2024-06-08 | A Novel Generative AI-Based Framework for Anomaly Detection in Multicast Messages in Smart Grid Communications | Aydin Zaboli et.al. | 2406.05472 | translate | read | null |
| 2024-06-08 | Novel Approach to Intrusion Detection: Introducing GAN-MSCNN-BILSTM with LIME Predictions | Asmaa Benchama et.al. | 2406.05443 | translate | read | null |
| 2024-06-08 | RAPID: Robust APT Detection and Investigation Using Context-Aware Deep Learning | Yonatan Amaru et.al. | 2406.05362 | translate | read | null |
| 2024-06-07 | GANetic Loss for Generative Adversarial Networks with a Focus on Medical Applications | Shakhnaz Akhmedova et.al. | 2406.05023 | translate | read | link |
| 2024-06-07 | PolyLUT-Add: FPGA-based LUT Inference with Wide Inputs | Binglei Lou et.al. | 2406.04910 | translate | read | link |
| 2024-06-07 | Higher-order Structure Based Anomaly Detection on Attributed Networks | Xu Yuan et.al. | 2406.04690 | translate | read | null |
| 2024-06-07 | LogiCode: an LLM-Driven Framework for Logical Anomaly Detection | Yiheng Zhang et.al. | 2406.04687 | translate | read | null |
| 2024-06-07 | A Recover-then-Discriminate Framework for Robust Anomaly Detection | Peng Xing et.al. | 2406.04608 | translate | read | null |
| 2024-06-07 | Boosting Large-scale Parallel Training Efficiency with C4: A Communication-Driven Approach | Jianbo Dong et.al. | 2406.04594 | translate | read | null |
| 2024-06-07 | Attention Fusion Reverse Distillation for Multi-Lighting Image Anomaly Detection | Yiheng Zhang et.al. | 2406.04573 | translate | read | null |
| 2024-06-06 | Chimera: Effectively Modeling Multivariate Time Series with 2-Dimensional State Space Models | Ali Behrouz et.al. | 2406.04320 | translate | read | null |
| 2024-06-06 | Generative AI-in-the-loop: Integrating LLMs and GPTs into the Next Generation Networks | Han Zhang et.al. | 2406.04276 | translate | read | null |
| 2024-06-06 | Credit Card Fraud Detection Using Advanced Transformer Model | Chang Yu et.al. | 2406.03733 | translate | read | null |
| 2024-06-06 | Meta-learning for Positive-unlabeled Classification | Atsutoshi Kumagai et.al. | 2406.03680 | translate | read | null |
| 2024-06-05 | Advancing Anomaly Detection: Non-Semantic Financial Data Encoding with LLMs | Alexander Bakumenko et.al. | 2406.03614 | translate | read | null |
| 2024-06-05 | Robust Prediction Model for Multidimensional and Unbalanced Datasets | Pooja Thakar et.al. | 2406.03507 | translate | read | null |
| 2024-06-06 | ADer: A Comprehensive Benchmark for Multi-class Visual Anomaly Detection | Jiangning Zhang et.al. | 2406.03262 | translate | read | link |
| 2024-06-05 | DA-Flow: Dual Attention Normalizing Flow for Skeleton-based Video Anomaly Detection | Ruituo Wu et.al. | 2406.02976 | translate | read | null |
| 2024-06-05 | Multivariate Physics-Informed Convolutional Autoencoder for Anomaly Detection in Power Distribution Systems with High Penetration of DERs | Mehdi Jabbari Zideh et.al. | 2406.02927 | translate | read | null |
| 2024-06-05 | Distilling Aggregated Knowledge for Weakly-Supervised Video Anomaly Detection | Jash Dalvi et.al. | 2406.02831 | translate | read | null |
| 2024-06-04 | Feasibility of State Space Models for Network Traffic Generation | Andrew Chu et.al. | 2406.02784 | translate | read | null |
| 2024-06-04 | Diagnostic Digital Twin for Anomaly Detection in Floating Offshore Wind Energy | Florian Stadtmann et.al. | 2406.02775 | translate | read | null |
| 2024-06-04 | Lightweight CNN-BiLSTM based Intrusion Detection Systems for Resource-Constrained IoT Devices | Mohammed Jouhari et.al. | 2406.02768 | translate | read | null |
| 2024-06-04 | Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models | Reza Babaei et.al. | 2406.02653 | translate | read | null |
| 2024-06-04 | PeFAD: A Parameter-Efficient Federated Framework for Time Series Anomaly Detection | Ronghui Xu et.al. | 2406.02318 | translate | read | null |
| 2024-06-04 | M3DM-NR: RGB-3D Noisy-Resistant Industrial Anomaly Detection via Multimodal Denoising | Chengjie Wang et.al. | 2406.02263 | translate | read | null |
| 2024-06-04 | Review of searches for new physics at CMS | Anne-Mazarine Lyon et.al. | 2406.02010 | translate | read | null |
| 2024-06-04 | Can Dense Connectivity Benefit Outlier Detection? An Odyssey with NAS | Hao Fu et.al. | 2406.01975 | translate | read | null |
| 2024-06-03 | Diffusion Boosted Trees | Xizewen Han et.al. | 2406.01813 | translate | read | null |
| 2024-06-03 | An Origami-Inspired Endoscopic Capsule with Tactile Perception for Early Tissue Anomaly Detection | Yukun Ge et.al. | 2406.01371 | translate | read | null |
| 2024-06-03 | CUT: A Controllable, Universal, and Training-Free Visual Anomaly Generation Framework | Han Sun et.al. | 2406.01078 | translate | read | null |
| 2024-06-03 | Enhancing Fairness in Unsupervised Graph Anomaly Detection through Disentanglement | Wenjing Chang et.al. | 2406.00987 | translate | read | null |
| 2024-06-03 | A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI | Alice Bizzarri et.al. | 2406.00938 | translate | read | null |
| 2024-06-02 | Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol | Hwejae Lee et.al. | 2406.00810 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)