Anomaly Detection - 2024-08
Anomaly Detection - 2024-08
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2024-08-30 | Semi-supervised permutation invariant particle-level anomaly detection | Gabriel Matos et.al. | 2408.17409 | translate | read | null |
| 2024-08-30 | C-RADAR: A Centralized Deep Learning System for Intrusion Detection in Software Defined Networks | Osama Mustafa et.al. | 2408.17356 | translate | read | null |
| 2024-08-30 | AASIST3: KAN-Enhanced AASIST Speech Deepfake Detection using SSL Features and Additional Regularization for the ASVspoof 2024 Challenge | Kirill Borodin et.al. | 2408.17352 | translate | read | null |
| 2024-08-30 | AI-Driven Intrusion Detection Systems (IDS) on the ROAD dataset: A Comparative Analysis for automotive Controller Area Network (CAN) | Lorenzo Guerra et.al. | 2408.17235 | translate | read | null |
| 2024-08-30 | Self-supervised Anomaly Detection Pretraining Enhances Long-tail ECG Diagnosis | Aofan Jiang et.al. | 2408.17154 | translate | read | link |
| 2024-08-30 | Meta-UAD: A Meta-Learning Scheme for User-level Network Traffic Anomaly Detection | Tongtong Feng et.al. | 2408.17031 | translate | read | null |
| 2024-08-29 | HLogformer: A Hierarchical Transformer for Representing Log Data | Zhichao Hou et.al. | 2408.16803 | translate | read | null |
| 2024-08-30 | ARINC 429 Cyber-vulnerabilities and Voltage Data in a Hardware-in-the-Loop Simulator | Connor Trask et.al. | 2408.16714 | translate | read | null |
| 2024-08-29 | Data Quality Monitoring through Transfer Learning on Anomaly Detection for the Hadron Calorimeters | Mulugeta Weldezgina Asres et.al. | 2408.16612 | translate | read | null |
| 2024-08-29 | Multitask learning for improved scour detection: A dynamic wave tank study | Simon M. Brealy et.al. | 2408.16527 | translate | read | link |
| 2024-08-29 | Uni-3DAD: GAN-Inversion Aided Universal 3D Anomaly Detection on Model-free Products | Jiayu Liu et.al. | 2408.16201 | translate | read | null |
| 2024-08-29 | Real-Time Energy Pricing in New Zealand: An Evolving Stream Analysis | Yibin Sun et.al. | 2408.16187 | translate | read | null |
| 2024-08-28 | Systematic Evaluation of Synthetic Data Augmentation for Multi-class NetFlow Traffic | Maximilian Wolf et.al. | 2408.16034 | translate | read | null |
| 2024-08-28 | Efficient Slice Anomaly Detection Network for 3D Brain MRI Volume | Zeduo Zhang et.al. | 2408.15958 | translate | read | null |
| 2024-08-29 | Enhancing Intrusion Detection in IoT Environments: An Advanced Ensemble Approach Using Kolmogorov-Arnold Networks | Amar Amouri et.al. | 2408.15886 | translate | read | null |
| 2024-08-28 | Robust Statistical Scaling of Outlier Scores: Improving the Quality of Outlier Probabilities for Outliers (Extended Version) | Philipp Röchner et.al. | 2408.15874 | translate | read | null |
| 2024-08-28 | CSAD: Unsupervised Component Segmentation for Logical Anomaly Detection | Yu-Hsuan Hsieh et.al. | 2408.15628 | translate | read | link |
| 2024-08-29 | VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification | Yungi Cho et.al. | 2408.15591 | translate | read | link |
| 2024-08-27 | PoseWatch: A Transformer-based Architecture for Human-centric Video Anomaly Detection Using Spatio-temporal Pose Tokenization | Ghazal Alinezhad Noghre et.al. | 2408.15185 | translate | read | null |
| 2024-08-28 | AnomalousPatchCore: Exploring the Use of Anomalous Samples in Industrial Anomaly Detection | Mykhailo Koshil et.al. | 2408.15113 | translate | read | null |
| 2024-08-27 | ERX: A Fast Real-Time Anomaly Detection Algorithm for Hyperspectral Line-Scanning | Samuel Garske et.al. | 2408.14947 | translate | read | link |
| 2024-08-28 | User-level Social Multimedia Traffic Anomaly Detection with Meta-Learning | Tongtong Feng et.al. | 2408.14884 | translate | read | null |
| 2024-08-27 | Channel-wise Influence: Estimating Data Influence for Multivariate Time Series | Muyao Wang et.al. | 2408.14763 | translate | read | null |
| 2024-08-27 | Training-Free Time-Series Anomaly Detection: Leveraging Image Foundation Models | Nobuo Namura et.al. | 2408.14756 | translate | read | null |
| 2024-08-26 | Anomaly Detection Within Mission-Critical Call Processing | Sean Doris et.al. | 2408.14599 | translate | read | null |
| 2024-08-26 | Aiding Humans in Financial Fraud Decision Making: Toward an XAI-Visualization Framework | Angelos Chatzimparmpas et.al. | 2408.14552 | translate | read | null |
| 2024-08-26 | PHEVA: A Privacy-preserving Human-centric Video Anomaly Detection Dataset | Ghazal Alinezhad Noghre et.al. | 2408.14329 | translate | read | link |
| 2024-08-26 | Beyond Detection: Leveraging Large Language Models for Cyber Attack Prediction in IoT Networks | Alaeddine Diaf et.al. | 2408.14045 | translate | read | null |
| 2024-08-26 | Evaluating The Explainability of State-of-the-Art Machine Learning-based IoT Network Intrusion Detection Systems | Ayush Kumar et.al. | 2408.14040 | translate | read | null |
| 2024-08-25 | Time Series Analysis for Education: Methods, Applications, and Future Directions | Shengzhong Mao et.al. | 2408.13960 | translate | read | link |
| 2024-08-24 | Outlier Detection Bias Busted: Understanding Sources of Algorithmic Bias through Data-centric Factors | Xueying Ding et.al. | 2408.13667 | translate | read | null |
| 2024-08-24 | Temporal Divide-and-Conquer Anomaly Actions Localization in Semi-Supervised Videos with Hierarchical Transformer | Nada Osman et.al. | 2408.13643 | translate | read | null |
| 2024-08-24 | Robust Principal Components by Casewise and Cellwise Weighting | Fabio Centofanti et.al. | 2408.13596 | translate | read | null |
| 2024-08-24 | Variational Autoencoder for Anomaly Detection: A Comparative Study | Huy Hoang Nguyen et.al. | 2408.13561 | translate | read | link |
| 2024-08-24 | AnoPLe: Few-Shot Anomaly Detection via Bi-directional Prompt Learning with Only Normal Samples | Yujin Lee et.al. | 2408.13516 | translate | read | link |
| 2024-08-24 | DualAnoDiff: Dual-Interrelated Diffusion Model for Few-Shot Anomaly Image Generation | Ying Jin et.al. | 2408.13509 | translate | read | null |
| 2024-08-23 | Multivariate Time-Series Anomaly Detection based on Enhancing Graph Attention Networks with Topological Analysis | Zhe Liu et.al. | 2408.13082 | translate | read | link |
| 2024-08-23 | RIFF: Inducing Rules for Fraud Detection from Decision Trees | João Lucas Martins et.al. | 2408.12989 | translate | read | null |
| 2024-08-23 | Efficient Training Approaches for Performance Anomaly Detection Models in Edge Computing Environments | Duneesha Fernando et.al. | 2408.12855 | translate | read | null |
| 2024-08-22 | UMAD: University of Macau Anomaly Detection Benchmark Dataset | Dong Li et.al. | 2408.12527 | translate | read | link |
| 2024-08-22 | Multimodal Foundational Models for Unsupervised 3D General Obstacle Detection | Tamás Matuszka et.al. | 2408.12322 | translate | read | null |
| 2024-08-23 | Enhanced Fine-Tuning of Lightweight Domain-Specific Q&A Model Based on Large Language Models | Shenglin Zhang et.al. | 2408.12247 | translate | read | link |
| 2024-08-21 | Explainable Anomaly Detection: Counterfactual driven What-If Analysis | Logan Cummins et.al. | 2408.11935 | translate | read | null |
| 2024-08-21 | RODEM Jet Datasets | Knut Zoch et.al. | 2408.11616 | translate | read | null |
| 2024-08-21 | Self-Supervised Iterative Refinement for Anomaly Detection in Industrial Quality Control | Muhammad Aqeel et.al. | 2408.11561 | translate | read | null |
| 2024-08-21 | Hypergraph Learning based Recommender System for Anomaly Detection, Control and Optimization | Sakhinana Sagar Srinivas et.al. | 2408.11359 | translate | read | null |
| 2024-08-20 | Quantum Machine Learning Algorithms for Anomaly Detection: a Survey | Sebastiano Corli et.al. | 2408.11047 | translate | read | null |
| 2024-08-20 | Universal Novelty Detection Through Adaptive Contrastive Learning | Hossein Mirzaei et.al. | 2408.10798 | translate | read | link |
| 2024-08-20 | Physics-Driven AI Correction in Laser Absorption Sensing Quantification | Ruiyuan Kang et.al. | 2408.10714 | translate | read | null |
| 2024-08-19 | Forecasting Attacker Actions using Alert-driven Attack Graphs | Ion Băbălău et.al. | 2408.09888 | translate | read | null |
| 2024-08-19 | ALTBI: Constructing Improved Outlier Detection Models via Optimization of Inlier-Memorization Effect | Seoyoung Cho et.al. | 2408.09791 | translate | read | null |
| 2024-08-19 | Simplicial complexes in network intrusion profiling | Mandala von Westenholz et.al. | 2408.09788 | translate | read | null |
| 2024-08-18 | Federated Graph Learning with Structure Proxy Alignment | Xingbo Fu et.al. | 2408.09393 | translate | read | link |
| 2024-08-16 | Deep Generative Classification of Blood Cell Morphology | Simon Deltadahl et.al. | 2408.08982 | translate | read | link |
| 2024-08-16 | A Novel Buffered Federated Learning Framework for Privacy-Driven Anomaly Detection in IIoT | Samira Kamali Poorazad et.al. | 2408.08722 | translate | read | null |
| 2024-08-15 | Efficient Data-Sketches and Fine-Tuning for Early Detection of Distributional Drift in Medical Imaging | Yusen Wu et.al. | 2408.08456 | translate | read | null |
| 2024-08-15 | A Robust Multi-Stage Intrusion Detection System for In-Vehicle Network Security using Hierarchical Federated Learning | Muzun Althunayyan et.al. | 2408.08433 | translate | read | null |
| 2024-08-15 | HELP: Hierarchical Embeddings-based Log Parsing | Andy Xu et.al. | 2408.08300 | translate | read | null |
| 2024-08-15 | Rethinking Medical Anomaly Detection in Brain MRI: An Image Quality Assessment Perspective | Zixuan Pan et.al. | 2408.08228 | translate | read | link |
| 2024-08-15 | Impact of Comprehensive Data Preprocessing on Predictive Modelling of COVID-19 Mortality | Sangita Das et.al. | 2408.08142 | translate | read | link |
| 2024-08-15 | Detection and Impact of Debit/Credit Card Fraud: Victims’ Experiences | Eman Alashwali et.al. | 2408.08131 | translate | read | null |
| 2024-08-14 | How Industry Tackles Anomalies during Runtime: Approaches and Key Monitoring Parameters | Monika Steidl et.al. | 2408.07816 | translate | read | null |
| 2024-08-14 | MedTsLLM: Leveraging LLMs for Multimodal Medical Time Series Analysis | Nimeesha Chan et.al. | 2408.07773 | translate | read | link |
| 2024-08-14 | Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques | Surasit Songma et.al. | 2408.07729 | translate | read | null |
| 2024-08-14 | Latent Anomaly Detection Through Density Matrices | Joseph Gallego-Mejia et.al. | 2408.07623 | translate | read | null |
| 2024-08-14 | Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey | Hamza Kheddar et.al. | 2408.07583 | translate | read | null |
| 2024-08-14 | Attention-Guided Perturbation for Unsupervised Image Anomaly Detection | Tingfeng Huang et.al. | 2408.07490 | translate | read | null |
| 2024-08-14 | A novel framework for quantifying nominal outlyingness | Efthymios Costa et.al. | 2408.07463 | translate | read | null |
| 2024-08-13 | FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method | Shihua Sun et.al. | 2408.07152 | translate | read | null |
| 2024-08-13 | Investigation of unsupervised and supervised hyperspectral anomaly detection | Mazharul Hossain et.al. | 2408.07114 | translate | read | null |
| 2024-08-13 | RW-NSGCN: A Robust Approach to Structural Attacks via Negative Sampling | Shuqi He et.al. | 2408.06665 | translate | read | null |
| 2024-08-13 | Unveiling the Flaws: A Critical Analysis of Initialization Effect on Time Series Anomaly Detection | Alex Koran et.al. | 2408.06620 | translate | read | null |
| 2024-08-12 | Hi-SAM: A high-scalable authentication model for satellite-ground Zero-Trust system using mean field game | Xuesong Wu et.al. | 2408.06185 | translate | read | null |
| 2024-08-12 | A Methodological Report on Anomaly Detection on Dynamic Knowledge Graphs | Xiaohua Lu et.al. | 2408.06121 | translate | read | null |
| 2024-08-13 | Weakly Supervised Video Anomaly Detection and Localization with Spatio-Temporal Prompts | Peng Wu et.al. | 2408.05905 | translate | read | null |
| 2024-08-10 | What Matters in Autonomous Driving Anomaly Detection: A Weakly Supervised Horizon | Utkarsh Tiwari et.al. | 2408.05562 | translate | read | link |
| 2024-08-10 | Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning | William Marfo et.al. | 2408.05427 | translate | read | link |
| 2024-08-09 | Hybrid Efficient Unsupervised Anomaly Detection for Early Pandemic Case Identification | Ghazal Ghajari et.al. | 2408.05347 | translate | read | null |
| 2024-08-09 | Audio-visual cross-modality knowledge transfer for machine learning-based in-situ monitoring in laser additive manufacturing | Jiarui Xie et.al. | 2408.05307 | translate | read | null |
| 2024-08-09 | Cross-Domain Learning for Video Anomaly Detection with Limited Supervision | Yashika Jain et.al. | 2408.05191 | translate | read | null |
| 2024-08-09 | Adversarially Robust Industrial Anomaly Detection Through Diffusion Model | Yuanpu Cao et.al. | 2408.04839 | translate | read | null |
| 2024-08-09 | Performance Metric for Multiple Anomaly Score Distributions with Discrete Severity Levels | Wonjun Yi et.al. | 2408.04817 | translate | read | link |
| 2024-08-08 | Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era | Saleh Darzi et.al. | 2408.04725 | translate | read | null |
| 2024-08-08 | Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning | Hongze Zhu et.al. | 2408.04604 | translate | read | null |
| 2024-08-08 | FedAD-Bench: A Unified Benchmark for Federated Unsupervised Anomaly Detection in Tabular Data | Ahmed Anwar et.al. | 2408.04442 | translate | read | null |
| 2024-08-09 | Anomaly Prediction: A Novel Approach with Explicit Delay and Horizon | Jiang You et.al. | 2408.04377 | translate | read | null |
| 2024-08-08 | Towards Explainable Network Intrusion Detection using Large Language Models | Paul R. B. Houssel et.al. | 2408.04342 | translate | read | null |
| 2024-08-08 | Self-Supervised Contrastive Graph Clustering Network via Structural Information Fusion | Xiaoyang Ji et.al. | 2408.04339 | translate | read | null |
| 2024-08-08 | AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent | Mugheez Asif et.al. | 2408.04281 | translate | read | null |
| 2024-08-08 | Generating Fine-Grained Causality in Climate Time Series Data for Forecasting and Anomaly Detection | Dongqi Fu et.al. | 2408.04254 | translate | read | null |
| 2024-08-08 | Cluster-Wide Task Slowdown Detection in Cloud System | Feiyi Chen et.al. | 2408.04236 | translate | read | null |
| 2024-08-07 | Programmable Dataflows: Abstraction and Programming Model for Data Sharing | Siyuan Xia et.al. | 2408.04092 | translate | read | null |
| 2024-08-07 | Dual-Modeling Decouple Distillation for Unsupervised Anomaly Detection | Xinyue Liu et.al. | 2408.03888 | translate | read | null |
| 2024-08-09 | Online Model-based Anomaly Detection in Multivariate Time Series: Taxonomy, Survey, Research Challenges and Future Directions | Lucas Correia et.al. | 2408.03747 | translate | read | null |
| 2024-08-07 | Unsupervised Detection of Fetal Brain Anomalies using Denoising Diffusion Models | Markus Ditlev Sjøgren Olsen et.al. | 2408.03654 | translate | read | null |
| 2024-08-07 | Minimum Enclosing Ball Synthetic Minority Oversampling Technique from a Geometric Perspective | Yi-Yang Shangguan et.al. | 2408.03526 | translate | read | null |
| 2024-08-06 | Can LLMs Serve As Time Series Anomaly Detectors? | Manqing Dong et.al. | 2408.03475 | translate | read | null |
| 2024-08-06 | CKNN: Cleansed k-Nearest Neighbor for Unsupervised Video Anomaly Detection | Jihun Yi et.al. | 2408.03014 | translate | read | null |
| 2024-08-05 | Operational range bounding of spectroscopy models with anomaly detection | Luís F. Simões et.al. | 2408.02581 | translate | read | null |
| 2024-08-05 | Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets | Philipp Bönninghausen et.al. | 2408.02521 | translate | read | null |
| 2024-08-05 | AssemAI: Interpretable Image-Based Anomaly Detection for Manufacturing Pipelines | Renjith Prasad et.al. | 2408.02181 | translate | read | null |
| 2024-08-04 | EOL: Transductive Few-Shot Open-Set Recognition by Enhancing Outlier Logits | Mateusz Ochal et.al. | 2408.02052 | translate | read | null |
| 2024-08-04 | Individualized multi-horizon MRI trajectory prediction for Alzheimer’s Disease | Rosemary He et.al. | 2408.02018 | translate | read | null |
| 2024-08-04 | SR-CIS: Self-Reflective Incremental System with Decoupled Memory and Reasoning | Biqing Qi et.al. | 2408.01970 | translate | read | null |
| 2024-08-04 | AnomalySD: Few-Shot Multi-Class Anomaly Detection with Stable Diffusion Model | Zhenyu Yan et.al. | 2408.01960 | translate | read | null |
| 2024-08-03 | Optimizing Intrusion Detection System Performance Through Synergistic Hyperparameter Tuning and Advanced Data Processing | Samia Saidane et.al. | 2408.01792 | translate | read | null |
| 2024-08-03 | IDNet: A Novel Dataset for Identity Document Analysis and Fraud Detection | Hong Guan et.al. | 2408.01690 | translate | read | null |
| 2024-08-02 | Interplay of Traditional Methods and Machine Learning Algorithms for Tagging Boosted Objects | Camellia Bose et.al. | 2408.01138 | translate | read | null |
| 2024-08-01 | Online Detection of Anomalies in Temporal Knowledge Graphs with Interpretability | Jiasheng Zhang et.al. | 2408.00872 | translate | read | null |
| 2024-08-01 | Token Interdependency Parsing (Tipping) – Fast and Accurate Log Parsing | Shayan Hashemi et.al. | 2408.00645 | translate | read | null |
| 2024-08-01 | Enhancing Ethereum Fraud Detection via Generative and Contrastive Self-supervision | Chenxiang Jin et.al. | 2408.00641 | translate | read | null |
| 2024-08-01 | VecAug: Unveiling Camouflaged Frauds with Cohort Augmentation for Enhanced Detection | Fei Xiao et.al. | 2408.00513 | translate | read | null |
| 2024-08-01 | Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment through Feature Engineering and Employing an Ensemble Technique | Abdulelah Al Hanif et.al. | 2408.00480 | translate | read | null |
| 2024-08-01 | Outlier Detection in Large Radiological Datasets using UMAP | Mohammad Tariqul Islam et.al. | 2407.21263 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)