Anomaly Detection - 2024-07
Anomaly Detection - 2024-07
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2024-07-31 | CT-based Anomaly Detection of Liver Tumors Using Generative Diffusion Prior | Yongyi Shi et.al. | 2408.00092 | translate | read | null |
| 2024-07-31 | Generalized Out-of-Distribution Detection and Beyond in Vision Language Model Era: A Survey | Atsuyuki Miyai et.al. | 2407.21794 | translate | read | null |
| 2024-07-31 | Artificial Intelligence Approaches for Energy Efficiency: A Review | Alberto Pasqualetto et.al. | 2407.21726 | translate | read | null |
| 2024-07-31 | Small Object Few-shot Segmentation for Vision-based Industrial Inspection | Zilong Zhang et.al. | 2407.21351 | translate | read | null |
| 2024-07-30 | FCN4Flare: Fully Convolution Neural Networks for Flare Detection | Ming-Hui Jia et.al. | 2407.21240 | translate | read | link |
| 2024-07-30 | Efficient Quantum One-Class Support Vector Machines for Anomaly Detection Using Randomized Measurements and Variable Subsampling | Michael Kölle et.al. | 2407.20753 | translate | read | null |
| 2024-07-30 | Time Series Anomaly Detection with CNN for Environmental Sensors in Healthcare-IoT | Mirza Akhi Khatun et.al. | 2407.20695 | translate | read | null |
| 2024-07-30 | DocXPand-25k: a large and diverse benchmark dataset for identity documents analysis | Julien Lerouge et.al. | 2407.20662 | translate | read | link |
| 2024-07-29 | Can I trust my anomaly detection system? A case study based on explainable AI | Muhammad Rashid et.al. | 2407.19951 | translate | read | link |
| 2024-07-29 | Anomalous State Sequence Modeling to Enhance Safety in Reinforcement Learning | Leen Kweider et.al. | 2407.19860 | translate | read | null |
| 2024-07-29 | Normality Addition via Normality Detection in Industrial Image Anomaly Detection Models | Jihun Yi et.al. | 2407.19849 | translate | read | null |
| 2024-07-29 | Detecting Unsafe Behavior in Neural Network Imitation Policies for Caregiving Robotics | Andrii Tytarenko et.al. | 2407.19819 | translate | read | null |
| 2024-07-29 | Accelerating template generation in resonant anomaly detection searches with optimal transport | Matthew Leigh et.al. | 2407.19818 | translate | read | null |
| 2024-07-29 | Application of Computer Technology in Financial Investment | Xinye Sha et.al. | 2407.19684 | translate | read | null |
| 2024-07-29 | Foundations for Unfairness in Anomaly Detection – Case Studies in Facial Imaging Data | Michael Livanos et.al. | 2407.19646 | translate | read | null |
| 2024-07-26 | HADES: Detecting Active Directory Attacks via Whole Network Provenance Analytics | Qi Liu et.al. | 2407.18858 | translate | read | null |
| 2024-07-26 | Homomorphic Encryption-Enabled Federated Learning for Privacy-Preserving Intrusion Detection in Resource-Constrained IoV Networks | Bui Duc Manh et.al. | 2407.18503 | translate | read | null |
| 2024-07-26 | Textile Anomaly Detection: Evaluation of the State-of-the-Art for Automated Quality Inspection of Carpet | Briony Forsberg et.al. | 2407.18450 | translate | read | null |
| 2024-07-26 | Impact of Recurrent Neural Networks and Deep Learning Frameworks on Real-time Lightweight Time Series Anomaly Detection | Ming-Chang Lee et.al. | 2407.18439 | translate | read | null |
| 2024-07-25 | Separating Novel Features for Logical Anomaly Detection: A Straightforward yet Effective Approach | Kangil Lee et.al. | 2407.17909 | translate | read | null |
| 2024-07-24 | Large Language Models for Anomaly Detection in Computational Workflows: from Supervised Fine-Tuning to In-Context Learning | Hongwei Jin et.al. | 2407.17545 | translate | read | link |
| 2024-07-23 | On the Relationship between $Λ$ -poisedness in Derivative-Free Optimization and Outliers in Local Outlier Factor | Qi Zhang et.al. | 2407.17529 | translate | read | null |
| 2024-07-25 | Looking at Model Debiasing through the Lens of Anomaly Detection | Vito Paolo Pastore et.al. | 2407.17449 | translate | read | null |
| 2024-07-24 | Preliminary study on artificial intelligence methods for cybersecurity threat detection in computer networks based on raw data packets | Aleksander Ogonowski et.al. | 2407.17339 | translate | read | null |
| 2024-07-24 | Global and Local Confidence Based Fraud Detection Graph Neural Network | Jiaxun Liu et.al. | 2407.17333 | translate | read | null |
| 2024-07-24 | When Text and Images Don’t Mix: Bias-Correcting Language-Image Similarity Scores for Anomaly Detection | Adam Goodge et.al. | 2407.17083 | translate | read | null |
| 2024-07-23 | Securing Tomorrow’s Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies | Ridhi Jain et.al. | 2407.16410 | translate | read | null |
| 2024-07-22 | AdaCLIP: Adapting CLIP with Hybrid Learnable Prompts for Zero-Shot Anomaly Detection | Yunkang Cao et.al. | 2407.15795 | translate | read | link |
| 2024-07-22 | STAMP: Outlier-Aware Test-Time Adaptation with Stable Memory Replay | Yongcan Yu et.al. | 2407.15773 | translate | read | link |
| 2024-07-22 | Towards Open-World Object-based Anomaly Detection via Self-Supervised Outlier Synthesis | Brian K. S. Isaac-Medina et.al. | 2407.15763 | translate | read | null |
| 2024-07-22 | A Life-long Learning Intrusion Detection System for 6G-Enabled IoV | Abdelaziz Amara korba et.al. | 2407.15700 | translate | read | null |
| 2024-07-22 | Semi-Supervised Learning for Anomaly Detection in Blockchain-based Supply Chains | Do Hai Son et.al. | 2407.15603 | translate | read | link |
| 2024-07-23 | Bidirectional skip-frame prediction for video anomaly detection with intra-domain disparity-driven attention | Jiahao Lyu et.al. | 2407.15424 | translate | read | null |
| 2024-07-21 | LSM-GNN: Large-scale Storage-based Multi-GPU GNN Training by Optimizing Data Transfer Scheme | Jeongmin Brian Park et.al. | 2407.15264 | translate | read | null |
| 2024-07-21 | Diffusion Models for Unsupervised Anomaly Detection in Fetal Brain Ultrasound | Hanna Mykula et.al. | 2407.15119 | translate | read | null |
| 2024-07-20 | Efficient Intrusion Detection: Combining $χ^2$ Feature Selection with CNN-BiLSTM on the UNSW-NB15 Dataset | Mohammed Jouhari et.al. | 2407.14945 | translate | read | null |
| 2024-07-20 | A Two-Phase Visualization System for Continuous Human-AI Collaboration in Sequelae Analysis and Modeling | Yang Ouyang et.al. | 2407.14769 | translate | read | null |
| 2024-07-19 | Evaluation of Provenance Serialisations for Astronomical Provenance | Michael A. C. Johnson et.al. | 2407.14290 | translate | read | null |
| 2024-07-18 | Motif-Consistent Counterfactuals with Adversarial Refinement for Graph-Level Anomaly Detection | Chunjing Xiao et.al. | 2407.13251 | translate | read | null |
| 2024-07-17 | INTELLECT: Adapting Cyber Threat Detection to Heterogeneous Computing Environments | Simone Magnani et.al. | 2407.13043 | translate | read | null |
| 2024-07-17 | In-Situ Infrared Camera Monitoring for Defect and Anomaly Detection in Laser Powder Bed Fusion: Calibration, Data Mapping, and Feature Extraction | Shawn Hinnebusch et.al. | 2407.12682 | translate | read | null |
| 2024-07-17 | A Brief Review of Quantum Machine Learning for Financial Services | Mina Doosti et.al. | 2407.12618 | translate | read | null |
| 2024-07-17 | SigDLA: A Deep Learning Accelerator Extension for Signal Processing | Fangfa Fu et.al. | 2407.12565 | translate | read | null |
| 2024-07-17 | Leveraging the Mahalanobis Distance to enhance Unsupervised Brain MRI Anomaly Detection | Finn Behrendt et.al. | 2407.12474 | translate | read | link |
| 2024-07-17 | GraphGuard: Contrastive Self-Supervised Learning for Credit-Card Fraud Detection in Multi-Relational Dynamic Graphs | Kristófer Reynisson et.al. | 2407.12440 | translate | read | null |
| 2024-07-17 | GeneralAD: Anomaly Detection Across Domains by Attending to Distorted Features | Luc P. J. Sträter et.al. | 2407.12427 | translate | read | link |
| 2024-07-16 | The object detection method aids in image reconstruction evaluation and clinical interpretation of meniscal abnormalities | Natalia Konovalova et.al. | 2407.12184 | translate | read | null |
| 2024-07-16 | Agglomerative Clustering of Simulation Output Distributions Using Regularized Wasserstein Distance | Mohammadmahdi Ghasemloo et.al. | 2407.12100 | translate | read | null |
| 2024-07-16 | Learning Multi-view Anomaly Detection | Haoyang He et.al. | 2407.11935 | translate | read | null |
| 2024-07-16 | Variance Norms for Kernelized Anomaly Detection | Thomas Cass et.al. | 2407.11873 | translate | read | link |
| 2024-07-16 | An AI System for Continuous Knee Osteoarthritis Severity Grading Using Self-Supervised Anomaly Detection with Limited Data | Niamh Belton et.al. | 2407.11500 | translate | read | link |
| 2024-07-16 | Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication | Hideya Ochiai et.al. | 2407.11308 | translate | read | null |
| 2024-07-15 | CICAPT-IIOT: A provenance-based APT attack dataset for IIoT environment | Erfan Ghiasvand et.al. | 2407.11278 | translate | read | null |
| 2024-07-15 | Impacts of Data Preprocessing and Hyperparameter Optimization on the Performance of Machine Learning Models Applied to Intrusion Detection Systems | Mateus Guimarães Lima et.al. | 2407.11105 | translate | read | null |
| 2024-07-15 | R3D-AD: Reconstruction via Diffusion for 3D Anomaly Detection | Zheyuan Zhou et.al. | 2407.10862 | translate | read | link |
| 2024-07-15 | An Autonomous Drone Swarm for Detecting and Tracking Anomalies among Dense Vegetation | Rakesh John Amala Arokia Nathan et.al. | 2407.10754 | translate | read | null |
| 2024-07-15 | Omni-Dimensional Frequency Learner for General Time Series Analysis | Xianing Chen. Hanting Chen et.al. | 2407.10419 | translate | read | null |
| 2024-07-14 | Follow the Rules: Reasoning for Video Anomaly Detection with Large Language Models | Yuchen Yang et.al. | 2407.10299 | translate | read | link |
| 2024-07-14 | Harnessing Feature Clustering For Enhanced Anomaly Detection With Variational Autoencoder And Dynamic Threshold | Tolulope Ale et.al. | 2407.10042 | translate | read | null |
| 2024-07-12 | BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning | Ning Wang et.al. | 2407.09658 | translate | read | null |
| 2024-07-12 | Unsupervised Anomaly Detection Using Diffusion Trend Analysis | Eunwoo Kim et.al. | 2407.09578 | translate | read | null |
| 2024-07-12 | A Unified Anomaly Synthesis Strategy with Gradient Ascent for Industrial Anomaly Detection and Localization | Qiyu Chen et.al. | 2407.09359 | translate | read | link |
| 2024-07-12 | Temporal M-quantile models and robust bias-corrected small area predictors | María Bugallo Porto et.al. | 2407.09062 | translate | read | null |
| 2024-07-12 | Challenges of Anomaly Detection in the Object-Centric Setting: Dimensions and the Role of Domain Knowledge | Alessandro Berti et.al. | 2407.09023 | translate | read | null |
| 2024-07-11 | A Survey on the Application of Generative Adversarial Networks in Cybersecurity: Prospective, Direction and Open Research Scopes | Md Mashrur Arifin et.al. | 2407.08839 | translate | read | null |
| 2024-07-11 | Deep Learning for Network Anomaly Detection under Data Contamination: Evaluating Robustness and Mitigating Performance Degradation | D’Jeff K. Nkashama et.al. | 2407.08838 | translate | read | null |
| 2024-07-11 | Real-Time Anomaly Detection and Reactive Planning with Large Language Models | Rohan Sinha et.al. | 2407.08735 | translate | read | null |
| 2024-07-10 | Estimation and Control of Motor Core Temperature with Online Learning of Thermal Model Parameters: Application to Musculoskeletal Humanoids | Kento Kawaharazuka et.al. | 2407.08055 | translate | read | null |
| 2024-07-10 | Unsupervised Beyond-Standard-Model Event Discovery at the LHC with a Novel Quantum Autoencoder | Callum Duffy et.al. | 2407.07961 | translate | read | null |
| 2024-07-10 | GothX: a generator of customizable, legitimate and malicious IoT network traffic | Manuel Poisson et.al. | 2407.07456 | translate | read | null |
| 2024-07-10 | Federated PCA on Grassmann Manifold for IoT Anomaly Detection | Tung-Anh Nguyen et.al. | 2407.07421 | translate | read | link |
| 2024-07-09 | Integrating Ontology Design with the CRISP-DM in the context of Cyber-Physical Systems Maintenance | Milapji Singh Gill et.al. | 2407.06930 | translate | read | null |
| 2024-07-09 | TeVAE: A Variational Autoencoder Approach for Discrete Online Anomaly Detection in Variable-state Multivariate Time-series Data | Lucas Correia et.al. | 2407.06849 | translate | read | link |
| 2024-07-09 | PSPU: Enhanced Positive and Unlabeled Learning by Leveraging Pseudo Supervision | Chengjie Wang et.al. | 2407.06698 | translate | read | null |
| 2024-07-09 | Ensembled Cold-Diffusion Restorations for Unsupervised Anomaly Detection | Sergio Naval Marimont et.al. | 2407.06635 | translate | read | link |
| 2024-07-09 | Comparison of Optimizers for Fault Isolation and Diagnostics of Control Rod Drives | Ark Ifeanyi et.al. | 2407.06557 | translate | read | null |
| 2024-07-09 | Advanced Financial Fraud Detection Using GNN-CL Model | Yu Cheng et.al. | 2407.06529 | translate | read | null |
| 2024-07-09 | F2PAD: A General Optimization Framework for Feature-Level to Pixel-Level Anomaly Detection | Chengyu Tao et.al. | 2407.06519 | translate | read | null |
| 2024-07-08 | Non-Robust Features are Not Always Useful in One-Class Classification | Matthew Lau et.al. | 2407.06372 | translate | read | null |
| 2024-07-08 | Bounding Boxes and Probabilistic Graphical Models: Video Anomaly Detection Simplified | Mia Siemon et.al. | 2407.06000 | translate | read | null |
| 2024-07-08 | Graph Anomaly Detection with Noisy Labels by Reinforcement Learning | Zhu Wang et.al. | 2407.05934 | translate | read | null |
| 2024-07-08 | Multi-agent Reinforcement Learning-based Network Intrusion Detection System | Amine Tellache et.al. | 2407.05766 | translate | read | null |
| 2024-07-08 | Deep Learning-based Anomaly Detection and Log Analysis for Computer Networks | Shuzhan Wang et.al. | 2407.05639 | translate | read | null |
| 2024-07-08 | New User Event Prediction Through the Lens of Causal Inference | Henry Shaowu Yuchi et.al. | 2407.05625 | translate | read | null |
| 2024-07-07 | CAV-AD: A Robust Framework for Detection of Anomalous Data and Malicious Sensors in CAV Networks | Md Sazedur Rahman et.al. | 2407.05461 | translate | read | null |
| 2024-07-07 | Rethinking Unsupervised Outlier Detection via Multiple Thresholding | Zhonghang Liu et.al. | 2407.05382 | translate | read | link |
| 2024-07-05 | SPINEX: Similarity-based Predictions with Explainable Neighbors Exploration for Anomaly and Outlier Detection | MZ Naser et.al. | 2407.04760 | translate | read | null |
| 2024-07-05 | Feature Attenuation of Defective Representation Can Resolve Incomplete Masking on Anomaly Detection | YeongHyeon Park et.al. | 2407.04597 | translate | read | null |
| 2024-07-05 | Machine Learning for Complex Systems with Abnormal Pattern by Exception Maximization Outlier Detection Method | Zhikun Zhang et.al. | 2407.04248 | translate | read | null |
| 2024-07-04 | An Autoencoder Architecture for L-band Passive Microwave Retrieval of Landscape Freeze-Thaw Cycle | Divya Kumawat et.al. | 2407.04119 | translate | read | link |
| 2024-07-04 | Looking for Tiny Defects via Forward-Backward Feature Transfer | Alex Costanzino et.al. | 2407.04092 | translate | read | link |
| 2024-07-04 | A Critical Assessment of Interpretable and Explainable Machine Learning for Intrusion Detection | Omer Subasi et.al. | 2407.04009 | translate | read | null |
| 2024-07-04 | Support Vector Based Anomaly Detection in Federated Learning | Massimo Frasson et.al. | 2407.03920 | translate | read | null |
| 2024-07-04 | Seamless Monitoring of Stress Levels Leveraging a Universal Model for Time Sequences | Davide Gabrielli et.al. | 2407.03821 | translate | read | null |
| 2024-07-04 | M $\mathbf5$ – A Diverse Benchmark to Assess the Performance of Large Multimodal Models Across Multilingual and Multicultural Vision-Language Tasks | Florian Schneider et.al. | 2407.03791 | translate | read | null |
| 2024-07-04 | Charging Ahead: A Hierarchical Adversarial Framework for Counteracting Advanced Cyber Threats in EV Charging Stations | Mohammed Al-Mehdhar et.al. | 2407.03729 | translate | read | null |
| 2024-07-04 | SOWA: Adapting Hierarchical Frozen Window Self-Attention to Visual-Language Models for Better Anomaly Detection | Zongxiang Hu et.al. | 2407.03634 | translate | read | link |
| 2024-07-03 | Anomaly-based Framework for Detecting Power Overloading Cyberattacks in Smart Grid AMI | Abdelaziz Amara Korba et.al. | 2407.03264 | translate | read | null |
| 2024-07-03 | Towards Efficient Pixel Labeling for Industrial Anomaly Detection and Localization | Hanxi Li et.al. | 2407.03130 | translate | read | null |
| 2024-07-03 | Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks | Abdelaziz Amara korba et.al. | 2407.03070 | translate | read | null |
| 2024-07-03 | Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV | Abdelaziz Amara korba et.al. | 2407.02969 | translate | read | null |
| 2024-07-03 | Unified Anomaly Detection methods on Edge Device using Knowledge Distillation and Quantization | Sushovan Jena et.al. | 2407.02968 | translate | read | null |
| 2024-07-03 | Efficient IoT Devices Localization Through Wi-Fi CSI Feature Fusion and Anomaly Detection | Yan Li et.al. | 2407.02919 | translate | read | null |
| 2024-07-03 | Domain-independent detection of known anomalies | Jonas Bühler et.al. | 2407.02910 | translate | read | null |
| 2024-07-03 | Early-Stage Anomaly Detection: A Study of Model Performance on Complete vs. Partial Flows | Adrian Pekar et.al. | 2407.02856 | translate | read | null |
| 2024-07-03 | FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks | Abdullatif Albaseer et.al. | 2407.02845 | translate | read | null |
| 2024-07-03 | A Radiometric Correction based Optical Modeling Approach to Removing Reflection Noise in TLS Point Clouds of Urban Scenes | Li Fang et.al. | 2407.02830 | translate | read | null |
| 2024-07-02 | Evaluating the Ability of LLMs to Solve Semantics-Aware Process Mining Tasks | Adrian Rebmann et.al. | 2407.02310 | translate | read | link |
| 2024-07-02 | Counterfactual Data Augmentation with Denoising Diffusion for Graph Anomaly Detection | Chunjing Xiao et.al. | 2407.02143 | translate | read | null |
| 2024-07-02 | HC-GLAD: Dual Hyperbolic Contrastive Learning for Unsupervised Graph-Level Anomaly Detection | Yali Fu et.al. | 2407.02057 | translate | read | link |
| 2024-07-02 | Enhancing Multi-Class Anomaly Detection via Diffusion Refinement with Dual Conditioning | Jiawei Zhan et.al. | 2407.01905 | translate | read | null |
| 2024-07-02 | LogEval: A Comprehensive Benchmark Suite for Large Language Models In Log Analysis | Tianyu Cui et.al. | 2407.01896 | translate | read | link |
| 2024-07-01 | Science DMZ Networks: How Different are They Really? | Emily Mutter et.al. | 2407.01822 | translate | read | null |
| 2024-07-01 | Optimization of Retrieval-Augmented Generation Context with Outlier Detection | Vitaly Bulgakov et.al. | 2407.01403 | translate | read | null |
| 2024-07-01 | ToCoAD: Two-Stage Contrastive Learning for Industrial Anomaly Detection | Yun Liang et.al. | 2407.01312 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)