Anomaly Detection - 2024-12
Anomaly Detection - 2024-12
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2024-12-31 | METANOIA: A Lifelong Intrusion Detection and Investigation System for Mitigating Concept Drift | Jie Ying et.al. | 2501.00438 | translate | read | null |
| 2024-12-31 | CNC: Cross-modal Normality Constraint for Unsupervised Multi-class Anomaly Detection | Xiaolei Wang et.al. | 2501.00346 | translate | read | null |
| 2024-12-31 | Q3DE: A fault-tolerant quantum computer architecture for multi-bit burst errors by cosmic rays | Yasunari Suzuki et.al. | 2501.00331 | translate | read | null |
| 2024-12-31 | Collaborative Approaches to Enhancing Smart Vehicle Cybersecurity by AI-Driven Threat Detection | Syed Atif Ali et.al. | 2501.00261 | translate | read | null |
| 2024-12-30 | An Unsupervised Anomaly Detection in Electricity Consumption Using Reinforcement Learning and Time Series Forest Based Framework | Jihan Ghanim et.al. | 2501.00107 | translate | read | null |
| 2024-12-30 | Galaxy Spectra Networks (GaSNet). III. Generative pre-trained network for spectrum reconstruction, redshift estimate and anomaly detection | Fucheng Zhong et.al. | 2412.21130 | translate | read | link |
| 2024-12-30 | SoftPatch+: Fully Unsupervised Anomaly Classification and Segmentation | Chengjie Wang et.al. | 2412.20870 | translate | read | link |
| 2024-12-30 | Blockchain-Empowered Cyber-Secure Federated Learning for Trustworthy Edge Computing | Ervin Moore et.al. | 2412.20674 | translate | read | null |
| 2024-12-29 | Testing and Improving the Robustness of Amortized Bayesian Inference for Cognitive Models | Yufei Wu et.al. | 2412.20586 | translate | read | link |
| 2024-12-29 | A Survey on Time-Series Distance Measures | John Paparrizos et.al. | 2412.20574 | translate | read | null |
| 2024-12-29 | Dive into Time-Series Anomaly Detection: A Decade Review | Paul Boniol et.al. | 2412.20512 | translate | read | null |
| 2024-12-29 | Cross-Modal Fusion and Attention Mechanism for Weakly Supervised Video Anomaly Detection | Ayush Ghadiya et.al. | 2412.20455 | translate | read | null |
| 2024-12-29 | Exploring the Magnitude-Shape Plot Framework for Anomaly Detection in Crowded Video Scenes | Zuzheng Wang et.al. | 2412.20363 | translate | read | null |
| 2024-12-28 | An Anomaly Detection System Based on Generative Classifiers for Controller Area Network | Chunheng Zhao et.al. | 2412.20255 | translate | read | null |
| 2024-12-28 | Injecting Explainability and Lightweight Design into Weakly Supervised Video Anomaly Detection Systems | Wen-Dong Jiang et.al. | 2412.20201 | translate | read | null |
| 2024-12-27 | Comparative Performance Analysis of Quantum Machine Learning Architectures for Credit Card Fraud Detection | Mansour El Alami et.al. | 2412.19441 | translate | read | null |
| 2024-12-26 | Time Series Foundational Models: Their Role in Anomaly Detection and Prediction | Chathurangi Shyalika et.al. | 2412.19286 | translate | read | link |
| 2024-12-26 | Graph Mixture of Experts and Memory-augmented Routers for Multivariate Time Series Anomaly Detection | Xiaoyu Huang et.al. | 2412.19108 | translate | read | null |
| 2024-12-26 | Brain Ageing Prediction using Isolation Forest Technique and Residual Neural Network (ResNet) | Saadat Behzadi et.al. | 2412.19017 | translate | read | null |
| 2024-12-25 | CausalTAD: Causal Implicit Generative Model for Debiased Online Trajectory Anomaly Detection | Wenbin Li et.al. | 2412.18820 | translate | read | null |
| 2024-12-24 | Unveiling the Threat of Fraud Gangs to Graph Neural Networks: Multi-Target Graph Injection Attacks against GNN-Based Fraud Detectors | Jinhyeok Choi et.al. | 2412.18370 | translate | read | link |
| 2024-12-24 | Quo Vadis, Anomaly Detection? LLMs and VLMs in the Spotlight | Xi Ding et.al. | 2412.18298 | translate | read | link |
| 2024-12-24 | Semi-supervised Credit Card Fraud Detection via Attribute-Driven Graph Representation | Sheng Xiang et.al. | 2412.18287 | translate | read | link |
| 2024-12-24 | PowerRadio: Manipulate Sensor Measurementvia Power GND Radiation | Yan Jiang et.al. | 2412.18103 | translate | read | null |
| 2024-12-23 | Kernel-Aware Graph Prompt Learning for Few-Shot Anomaly Detection | Fenfang Tao et.al. | 2412.17619 | translate | read | link |
| 2024-12-23 | Progressive Boundary Guided Anomaly Synthesis for Industrial Anomaly Detection | Qiyu Chen et.al. | 2412.17458 | translate | read | null |
| 2024-12-23 | A Temporal Convolutional Network-based Approach for Network Intrusion Detection | Rukmini Nazre et.al. | 2412.17452 | translate | read | null |
| 2024-12-23 | Cech Complex Generation with Homotopy Equivalence Framework for Myocardial Infarction Diagnosis using Electrocardiogram Signals | Srikireddy Dhanunjay Reddy et.al. | 2412.17370 | translate | read | null |
| 2024-12-23 | Revisiting Multimodal Fusion for 3D Anomaly Detection from an Architectural Perspective | Kaifang Long et.al. | 2412.17297 | translate | read | null |
| 2024-12-23 | VarAD: Lightweight High-Resolution Image Anomaly Detection via Visual Autoregressive Modeling | Yunkang Cao et.al. | 2412.17263 | translate | read | link |
| 2024-12-23 | Dual Conditioned Motion Diffusion for Pose-Based Video Anomaly Detection | Andi Xu et.al. | 2412.17210 | translate | read | link |
| 2024-12-22 | A Parameter-Efficient Quantum Anomaly Detection Method on a Superconducting Quantum Processor | Maida Wang et.al. | 2412.16867 | translate | read | link |
| 2024-12-21 | DCOR: Anomaly Detection in Attributed Networks via Dual Contrastive Learning Reconstruction | Hossein Rafiee Zade et.al. | 2412.16788 | translate | read | null |
| 2024-12-21 | CyberSentinel: Efficient Anomaly Detection in Programmable Switch using Knowledge Distillation | Sankalp Mittal et.al. | 2412.16693 | translate | read | null |
| 2024-12-20 | Applying Predictive Analytics to Occupational Health and Safety in India | Ritwik Raj Saxena et.al. | 2412.16038 | translate | read | null |
| 2024-12-20 | Detection of Aerial Spoofing Attacks to LEO Satellite Systems via Deep Learning | Jos Wigchert et.al. | 2412.16008 | translate | read | null |
| 2024-12-20 | Efficient Curation of Invertebrate Image Datasets Using Feature Embeddings and Automatic Size Comparison | Mikko Impiö et.al. | 2412.15844 | translate | read | link |
| 2024-12-20 | Static and Dynamic Load Tests on the Bridge Vahrendorfer Stadtweg | Martin Köhncke et.al. | 2412.15713 | translate | read | null |
| 2024-12-20 | A Deep Probabilistic Framework for Continuous Time Dynamic Graph Generation | Ryien Hosseini et.al. | 2412.15582 | translate | read | null |
| 2024-12-19 | Cross-System Software Log-based Anomaly Detection Using Meta-Learning | Yuqing Wang et.al. | 2412.15445 | translate | read | null |
| 2024-12-19 | Cruise Control: Dynamic Model Selection for ML-Based Network Traffic Analysis | Johann Hugon et.al. | 2412.15146 | translate | read | null |
| 2024-12-19 | Tests for model misspecification in simulation-based inference: from local distortions to global model checks | Noemi Anau Montel et.al. | 2412.15100 | translate | read | null |
| 2024-12-19 | Provably Convergent Plug-and-play Proximal Block Coordinate Descent Method for Hyperspectral Anomaly Detection | Xiaoxia Liu et.al. | 2412.14824 | translate | read | null |
| 2024-12-19 | Simplicity over Complexity: An ARN-Based Intrusion Detection Method for Industrial Control Network | Ziyi Liu et.al. | 2412.14669 | translate | read | null |
| 2024-12-19 | Robust PCA Based on Adaptive Weighted Least Squares and Low-Rank Matrix Factorization | Kexin Li et.al. | 2412.14629 | translate | read | null |
| 2024-12-19 | Multi-Sensor Object Anomaly Detection: Unifying Appearance, Geometry, and Internal Properties | Wenqiao Li et.al. | 2412.14592 | translate | read | link |
| 2024-12-19 | Global Spatio-Temporal Fusion-based Traffic Prediction Algorithm with Anomaly Aware | Chaoqun Liu et.al. | 2412.14569 | translate | read | null |
| 2024-12-18 | Flow Exporter Impact on Intelligent Intrusion Detection Systems | Daniela Pinto et.al. | 2412.14021 | translate | read | null |
| 2024-12-18 | A Review of the Duality of Adversarial Learning in Network Intrusion: Attacks and Countermeasures | Shalini Saini et.al. | 2412.13880 | translate | read | null |
| 2024-12-18 | Do Language Models Understand Time? | Xi Ding et.al. | 2412.13845 | translate | read | null |
| 2024-12-18 | Quantum Machine Learning in Log-based Anomaly Detection: Challenges and Opportunities | Jiaxing Qi et.al. | 2412.13529 | translate | read | null |
| 2024-12-18 | Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection | Hanzhe Liang et.al. | 2412.13461 | translate | read | null |
| 2024-12-17 | BadSAD: Clean-Label Backdoor Attacks against Deep Semi-Supervised Anomaly Detection | He Cheng et.al. | 2412.13324 | translate | read | null |
| 2024-12-17 | Enhancing Internet of Things Security throughSelf-Supervised Graph Neural Networks | Safa Ben Atitallah et.al. | 2412.13240 | translate | read | null |
| 2024-12-17 | Synthetic Data Generation for Anomaly Detection on Table Grapes | Ionut Marian Motoi et.al. | 2412.12949 | translate | read | null |
| 2024-12-17 | Cuckoo Heavy Keeper and the balancing act of maintaining heavy-hitters in stream processing | Vinh Quang Ngo et.al. | 2412.12873 | translate | read | null |
| 2024-12-17 | Boosting Fine-Grained Visual Anomaly Detection with Coarse-Knowledge-Aware Adversarial Learning | Qingqing Fang et.al. | 2412.12850 | translate | read | null |
| 2024-12-17 | PO3AD: Predicting Point Offsets toward Better 3D Point Cloud Anomaly Detection | Jianan Ye et.al. | 2412.12617 | translate | read | null |
| 2024-12-16 | F-RBA: A Federated Learning-based Framework for Risk-based Authentication | Hamidreza Fereidouni et.al. | 2412.12324 | translate | read | null |
| 2024-12-16 | Are Large Language Models Useful for Time Series Data Analysis? | Francis Tang et.al. | 2412.12219 | translate | read | null |
| 2024-12-16 | Comprehensive Survey on Adversarial Examples in Cybersecurity: Impacts, Challenges, and Mitigation Strategies | Li Li et.al. | 2412.12217 | translate | read | null |
| 2024-12-16 | AMI-Net: Adaptive Mask Inpainting Network for Industrial Anomaly Detection and Localization | Wei Luo et.al. | 2412.11802 | translate | read | link |
| 2024-12-16 | Counting Butterflies over Streaming Bipartite Graphs with Duplicate Edges | Lingkai Meng et.al. | 2412.11488 | translate | read | null |
| 2024-12-16 | Unsupervised Anomaly Detection for Tabular Data Using Noise Evaluation | Wei Dai et.al. | 2412.11461 | translate | read | null |
| 2024-12-15 | Learning Set Functions with Implicit Differentiation | Gözde Özcan et.al. | 2412.11239 | translate | read | null |
| 2024-12-15 | Redefining Normal: A Novel Object-Level Approach for Multi-Object Novelty Detection | Mohammadreza Salehi et.al. | 2412.11148 | translate | read | link |
| 2024-12-15 | AD-LLM: Benchmarking Large Language Models for Anomaly Detection | Tiankai Yang et.al. | 2412.11142 | translate | read | link |
| 2024-12-14 | Labeling NIDS Rules with MITRE ATT&CK Techniques: Machine Learning vs. Large Language Models | Nir Daniel et.al. | 2412.10978 | translate | read | null |
| 2024-12-14 | Know Unreported Roadway Incidents in Real-time: A Deep Learning Framework for Early Traffic Anomaly Detection | Haocheng Duan et.al. | 2412.10892 | translate | read | null |
| 2024-12-14 | Audio-based Anomaly Detection in Industrial Machines Using Deep One-Class Support Vector Data Description | Sertac Kilickaya et.al. | 2412.10792 | translate | read | null |
| 2024-12-14 | Diagnosing Unknown Attacks in Smart Homes Using Abductive Reasoning | Kushal Ramkumar et.al. | 2412.10738 | translate | read | null |
| 2024-12-13 | Copy-Move Detection in Optical Microscopy: A Segmentation Network and A Dataset | Hao-Chiang Shao et.al. | 2412.10258 | translate | read | null |
| 2024-12-13 | Filter or Compensate: Towards Invariant Representation from Distribution Shift for Anomaly Detection | Zining Chen et.al. | 2412.10115 | translate | read | null |
| 2024-12-13 | FDM-Bench: A Comprehensive Benchmark for Evaluating Large Language Models in Additive Manufacturing Tasks | Ahmadreza Eslaminia et.al. | 2412.09819 | translate | read | link |
| 2024-12-12 | Video Anomaly Detection with Motion and Appearance Guided Patch Diffusion Model | Hang Zhou et.al. | 2412.09026 | translate | read | null |
| 2024-12-12 | Multimodal Industrial Anomaly Detection by Crossmodal Reverse Distillation | Xinyue Liu et.al. | 2412.08949 | translate | read | link |
| 2024-12-12 | Federated Foundation Models on Heterogeneous Time Series | Shengchao Chen et.al. | 2412.08906 | translate | read | link |
| 2024-12-11 | GradStop: Exploring Training Dynamics in Unsupervised Outlier Detection through Gradient Cohesion | Yuang Zhang et.al. | 2412.08501 | translate | read | link |
| 2024-12-11 | Backdoor attacks on DNN and GBDT – A Case Study from the insurance domain | Robin Kühlem et.al. | 2412.08366 | translate | read | null |
| 2024-12-11 | Enhancing Cybersecurity in IoT Networks: A Deep Learning Approach to Anomaly Detection | Yining Pang et.al. | 2412.08301 | translate | read | null |
| 2024-12-11 | Breaking the Bias: Recalibrating the Attention of Industrial Anomaly Detection | Xin Chen et.al. | 2412.08189 | translate | read | null |
| 2024-12-11 | Unsupervised Detection of Anomalous Driving Patterns Using High Resolution Telematics Time Series Data | Ian Weng Chan et.al. | 2412.08106 | translate | read | null |
| 2024-12-10 | Distributed Intrusion Detection System using Semantic-based Rules for SCADA in Smart Grid | Sathya Narayana Mohan et.al. | 2412.07917 | translate | read | null |
| 2024-12-10 | Unlocking the Potential of Reverse Distillation for Anomaly Detection | Xinyue Liu et.al. | 2412.07579 | translate | read | link |
| 2024-12-10 | Boundary anomaly detection in two-dimensional subsystem symmetry-protected topological phases | Ke Ding et.al. | 2412.07563 | translate | read | null |
| 2024-12-10 | Anomaly detection using Diffusion-based methods | Aryan Bhosale et.al. | 2412.07539 | translate | read | null |
| 2024-12-10 | Impact of Sampling Techniques and Data Leakage on XGBoost Performance in Credit Card Fraud Detection | Siyaxolisa Kabane et.al. | 2412.07437 | translate | read | null |
| 2024-12-09 | Facade: High-Precision Insider Threat Detection Using Deep Contextual Anomaly Detection | Alex Kantchelian et.al. | 2412.06700 | translate | read | null |
| 2024-12-09 | Simulation of Multi-Stage Attack and Defense Mechanisms in Smart Grids | Omer Sen et.al. | 2412.06255 | translate | read | null |
| 2024-12-09 | Applications of Positive Unlabeled (PU) and Negative Unlabeled (NU) Learning in Cybersecurity | Robert Dilworth et.al. | 2412.06203 | translate | read | null |
| 2024-12-09 | Holmes-VAU: Towards Long-term Video Anomaly Understanding at Any Granularity | Huaxin Zhang et.al. | 2412.06171 | translate | read | link |
| 2024-12-08 | siForest: Detecting Network Anomalies with Set-Structured Isolation Forest | Christie Djidjev et.al. | 2412.06015 | translate | read | null |
| 2024-12-07 | Leveraging Time-Series Foundation Model for Subsurface Well Logs Prediction and Anomaly Detection | Ardiansyah Koeshidayatullah et.al. | 2412.05681 | translate | read | null |
| 2024-12-07 | Detecting outliers by clustering algorithms | Qi Li et.al. | 2412.05669 | translate | read | null |
| 2024-12-07 | Hyperedge Anomaly Detection with Hypergraph Neural Network | Md. Tanvir Alam et.al. | 2412.05641 | translate | read | null |
| 2024-12-07 | Self-Supervised Masked Mesh Learning for Unsupervised Anomaly Detection on 3D Cortical Surfaces | Hao-Chun Yang et.al. | 2412.05580 | translate | read | null |
| 2024-12-07 | A New Perspective on Time Series Anomaly Detection: Faster Patch-based Broad Learning System | Pengyu Li et.al. | 2412.05498 | translate | read | null |
| 2024-12-06 | Automated, Unsupervised, and Auto-parameterized Inference of Data Patterns and Anomaly Detection | Qiaolin Qin et.al. | 2412.05240 | translate | read | null |
| 2024-12-06 | Backdooring Outlier Detection Methods: A Novel Attack Approach | ZeinabSadat Taghavi et.al. | 2412.05010 | translate | read | null |
| 2024-12-06 | ETLNet: An Efficient TCN-BiLSTM Network for Road Anomaly Detection Using Smartphone Sensors | Mohd Faiz Ansari et.al. | 2412.04990 | translate | read | null |
| 2024-12-06 | On Process Awareness in Detecting Multi-stage Cyberattacks in Smart Grids | Omer Sen et.al. | 2412.04902 | translate | read | null |
| 2024-12-06 | Encryption-Aware Anomaly Detection in Power Grid Communication Networks | Omer Sen et.al. | 2412.04901 | translate | read | null |
| 2024-12-06 | MANTA: A Large-Scale Multi-View and Visual-Text Anomaly Detection Dataset for Tiny Objects | Lei Fan et.al. | 2412.04867 | translate | read | null |
| 2024-12-06 | NLP-ADBench: NLP Anomaly Detection Benchmark | Yuangang Li et.al. | 2412.04784 | translate | read | link |
| 2024-12-06 | DPGIIL: Dirichlet Process-Deep Generative Model-Integrated Incremental Learning for Clustering in Transmissibility-based Online Structural Anomaly Detection | Lin-Feng Mei et.al. | 2412.04781 | translate | read | null |
| 2024-12-06 | Anomaly Detection and Classification in Knowledge Graphs | Asara Senaratne et.al. | 2412.04780 | translate | read | null |
| 2024-12-06 | Revitalizing Reconstruction Models for Multi-class Anomaly Detection via Class-Aware Contrastive Learning | Lei Fan et.al. | 2412.04769 | translate | read | null |
| 2024-12-05 | Towards Zero-shot 3D Anomaly Localization | Yizhou Wang et.al. | 2412.04304 | translate | read | null |
| 2024-12-05 | SCADE: Scalable Command-line Anomaly Detection Engine | Vaishali Vinay et.al. | 2412.04259 | translate | read | null |
| 2024-12-05 | DistB-VNET: Distributed Cluster-based Blockchain Vehicular Ad-Hoc Networks through SDN-NFV for Smart City | Anichur Rahman et.al. | 2412.04222 | translate | read | null |
| 2024-12-05 | ONER: Online Experience Replay for Incremental Anomaly Detection | Yizhou Jin et.al. | 2412.03907 | translate | read | null |
| 2024-12-05 | Machine Learning-based Android Intrusion Detection System | Madiha Tahreem et.al. | 2412.03894 | translate | read | null |
| 2024-12-05 | Transferring self-supervised pre-trained models for SHM data anomaly detection with scarce labeled data | Mingyuan Zhou et.al. | 2412.03880 | translate | read | null |
| 2024-12-05 | Training MLPs on Graphs without Supervision | Zehong Wang et.al. | 2412.03864 | translate | read | link |
| 2024-12-05 | CLIP-FSAC++: Few-Shot Anomaly Classification with Anomaly Descriptor Based on CLIP | Zuo Zuo et.al. | 2412.03829 | translate | read | null |
| 2024-12-04 | Model-agnostic search for dijet resonances with anomalous jet substructure in proton-proton collisions at $\sqrt{s}$ = 13 TeV | CMS Collaboration et.al. | 2412.03747 | translate | read | null |
| 2024-12-04 | Convolutional Neural Networks and Mixture of Experts for Intrusion Detection in 5G Networks and beyond | Loukas Ilias et.al. | 2412.03483 | translate | read | null |
| 2024-12-04 | Sifting through the haystack – efficiently finding rare animal behaviors in large-scale datasets | Shir Bar et.al. | 2412.03452 | translate | read | link |
| 2024-12-04 | State Frequency Estimation for Anomaly Detection | Clinton Cao et.al. | 2412.03442 | translate | read | null |
| 2024-12-04 | UniVAD: A Training-free Unified Model for Few-shot Visual Anomaly Detection | Zhaopeng Gu et.al. | 2412.03342 | translate | read | null |
| 2024-12-04 | The bcc coating of Lennard-Jones crystal nuclei vanishes with a change of local structure detection algorithm | Willem Gispen et.al. | 2412.03276 | translate | read | null |
| 2024-12-04 | Frequency-Guided Diffusion Model with Perturbation Training for Skeleton-Based Video Anomaly Detection | Xiaofeng Tan et.al. | 2412.03044 | translate | read | link |
| 2024-12-03 | Optimized IoT Intrusion Detection using Machine Learning Technique | Muhammad Zawad Mahmud et.al. | 2412.02845 | translate | read | null |
| 2024-12-03 | Graph-Powered Defense: Controller Area Network Intrusion Detection for Unmanned Aerial Vehicles | Reek Majumder et.al. | 2412.02539 | translate | read | null |
| 2024-12-03 | F-SE-LSTM: A Time Series Anomaly Detection Method with Frequency Domain Information | Yi-Xiang Lu et.al. | 2412.02474 | translate | read | null |
| 2024-12-03 | Leveraging Ensemble-Based Semi-Supervised Learning for Illicit Account Detection in Ethereum DeFi Transactions | Shabnam Fazliani et.al. | 2412.02408 | translate | read | null |
| 2024-12-03 | An Automated Data Mining Framework Using Autoencoders for Feature Extraction and Dimensionality Reduction | Yaxin Liang et.al. | 2412.02211 | translate | read | null |
| 2024-12-03 | Deep Learning, Machine Learning, Advancing Big Data Analytics and Management | Weiche Hsieh et.al. | 2412.02187 | translate | read | null |
| 2024-12-02 | Network Simulation with Complex Cyber-attack Scenarios | Tiago Dias et.al. | 2412.01421 | translate | read | null |
| 2024-12-02 | Representation Learning for Time-Domain High-Energy Astrophysics: Discovery of Extragalactic Fast X-ray Transient XRT 200515 | Steven Dillmann et.al. | 2412.01150 | translate | read | null |
| 2024-12-02 | VERA: Explainable Video Anomaly Detection via Verbalized Learning of Vision-Language Models | Muchao Ye et.al. | 2412.01095 | translate | read | null |
| 2024-12-02 | Practitioners’ Expectations on Log Anomaly Detection | Xiaoxue Ma et.al. | 2412.01066 | translate | read | null |
| 2024-12-01 | TGTOD: A Global Temporal Graph Transformer for Outlier Detection at Scale | Kay Liu et.al. | 2412.00984 | translate | read | link |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)