Anomaly Detection - 2025-01
Anomaly Detection - 2025-01
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-01-31 | Synthetic User Behavior Sequence Generation with Large Language Models for Smart Homes | Zhiyao Xu et.al. | 2501.19298 | translate | read | null |
| 2025-01-31 | Transformer-Based Financial Fraud Detection with Cloud-Optimized Real-Time Streaming | Tingting Deng et.al. | 2501.19267 | translate | read | null |
| 2025-01-31 | DINAMO: Dynamic and INterpretable Anomaly MOnitoring for Large-Scale Particle Physics Experiments | Arsenii Gavrikov et.al. | 2501.19237 | translate | read | link |
| 2025-01-31 | Secured Communication Schemes for UAVs in 5G: CRYSTALS-Kyber and IDS | Taneya Sharma et.al. | 2501.19191 | translate | read | link |
| 2025-01-31 | An Optimal Cascade Feature-Level Spatiotemporal Fusion Strategy for Anomaly Detection in CAN Bus | Mohammad Fatahi et.al. | 2501.18821 | translate | read | null |
| 2025-01-30 | CryptoDNA: A Machine Learning Paradigm for DDoS Detection in Healthcare IoT, Inspired by crypto jacking prevention Models | Zag ElSayed et.al. | 2501.18549 | translate | read | null |
| 2025-01-30 | GDformer: Going Beyond Subsequence Isolation for Multivariate Time Series Anomaly Detection | Qingxiang Liu et.al. | 2501.18196 | translate | read | link |
| 2025-01-30 | Conformal novelty detection for replicate point patterns with FDR or FWER control | Christophe A. N. Biscio et.al. | 2501.18195 | translate | read | link |
| 2025-01-30 | Battery State of Health Estimation Using LLM Framework | Aybars Yunusoglu et.al. | 2501.18123 | translate | read | null |
| 2025-01-29 | KoopAGRU: A Koopman-based Anomaly Detection in Time-Series using Gated Recurrent Units | Issam Ait Yahia et.al. | 2501.17976 | translate | read | null |
| 2025-01-29 | Unsupervised Patch-GAN with Targeted Patch Ranking for Fine-Grained Novelty Detection in Medical Imaging | Jingkun Chen et.al. | 2501.17906 | translate | read | null |
| 2025-01-29 | Free Agent in Agent-Based Mixture-of-Experts Generative AI Framework | Jung-Hua Liu et.al. | 2501.17903 | translate | read | null |
| 2025-01-29 | Detecting Anomalies Using Rotated Isolation Forest | Vahideh Monemizadeh et.al. | 2501.17787 | translate | read | null |
| 2025-01-29 | Neural Networks for the Analysis of Traced Particles in Kinetic Plasma Simulations | Gabriel Torralba Paz et.al. | 2501.17537 | translate | read | null |
| 2025-01-29 | si4onnx: A Python package for Selective Inference in Deep Learning Models | Teruyuki Katsuoka et.al. | 2501.17415 | translate | read | null |
| 2025-01-28 | Anomaly Detection in Cooperative Vehicle Perception Systems under Imperfect Communication | Ashish Bastola et.al. | 2501.17329 | translate | read | null |
| 2025-01-28 | A Contrastive Teacher-Student Framework for Novelty Detection under Style Shifts | Hossein Mirzaei et.al. | 2501.17289 | translate | read | null |
| 2025-01-28 | Goodness of Fit for Bayesian Generative Models with Applications in Population Genetics | Guillaume Le Mailloux et.al. | 2501.17107 | translate | read | link |
| 2025-01-28 | MAUCell: An Adaptive Multi-Attention Framework for Video Frame Prediction | Shreyam Gupta et.al. | 2501.16997 | translate | read | null |
| 2025-01-28 | RODEO: Robust Outlier Detection via Exposing Adaptive Out-of-Distribution Samples | Hossein Mirzaei et.al. | 2501.16971 | translate | read | link |
| 2025-01-28 | Enhancing Web Service Anomaly Detection via Fine-grained Multi-modal Association and Frequency Domain Analysis | Xixuan Yang et.al. | 2501.16875 | translate | read | null |
| 2025-01-28 | LLM Assisted Anomaly Detection Service for Site Reliability Engineers: Enhancing Cloud Infrastructure Resilience | Nimesh Jha et.al. | 2501.16744 | translate | read | null |
| 2025-01-28 | Federated Learning for Efficient Condition Monitoring and Anomaly Detection in Industrial Cyber-Physical Systems | William Marfo et.al. | 2501.16666 | translate | read | null |
| 2025-01-28 | Analysis of Zero Day Attack Detection Using MLP and XAI | Ashim Dahal et.al. | 2501.16638 | translate | read | null |
| 2025-01-27 | Large Models in Dialogue for Active Perception and Anomaly Detection | Tzoulio Chamiti et.al. | 2501.16300 | translate | read | null |
| 2025-01-27 | Addressing Out-of-Label Hazard Detection in Dashcam Videos: Insights from the COOOL Challenge | Anh-Kiet Duong et.al. | 2501.16037 | translate | read | link |
| 2025-01-27 | Can Multimodal Large Language Models be Guided to Improve Industrial Anomaly Detection? | Zhiling Chen et.al. | 2501.15795 | translate | read | null |
| 2025-01-27 | Investigating Application of Deep Neural Networks in Intrusion Detection System Design | Mofe O. Jeje et.al. | 2501.15760 | translate | read | null |
| 2025-01-27 | Modeling shared micromobility as a label propagation process for detecting the overlapping communities | Peng Luo et.al. | 2501.15713 | translate | read | null |
| 2025-01-26 | PCAP-Backdoor: Backdoor Poisoning Generator for Network Traffic in CPS/IoT Environments | Ajesh Koyatan Chathoth et.al. | 2501.15563 | translate | read | null |
| 2025-01-26 | Mitigating Spurious Negative Pairs for Robust Industrial Anomaly Detection | Hossein Mirzaei et.al. | 2501.15434 | translate | read | null |
| 2025-01-26 | A Transfer Learning Framework for Anomaly Detection in Multivariate IoT Traffic Data | Mahshid Rezakhani et.al. | 2501.15365 | translate | read | null |
| 2025-01-25 | Advanced Real-Time Fraud Detection Using RAG-Based LLMs | Gurjot Singh et.al. | 2501.15290 | translate | read | null |
| 2025-01-25 | Killing it with Zero-Shot: Adversarially Robust Novelty Detection | Hossein Mirzaei et.al. | 2501.15271 | translate | read | link |
| 2025-01-24 | Towards Automated Self-Supervised Learning for Truly Unsupervised Graph Anomaly Detection | Zhong Li et.al. | 2501.14694 | translate | read | link |
| 2025-01-24 | Bi-directional Curriculum Learning for Graph Anomaly Detection: Dual Focus on Homogeneity and Heterogeneity | Yitong Hao et.al. | 2501.14197 | translate | read | null |
| 2025-01-24 | Argos: Agentic Time-Series Anomaly Detection with Autonomous Rule Generation via Large Language Models | Yile Gu et.al. | 2501.14170 | translate | read | null |
| 2025-01-23 | Autoencoders for Anomaly Detection are Unreliable | Roel Bouman et.al. | 2501.13864 | translate | read | null |
| 2025-01-23 | The Lock Generative Adversarial Network for Medical Waveform Anomaly Detection | Wenjie Xu et.al. | 2501.13858 | translate | read | null |
| 2025-01-23 | Anomaly Detection for Automated Data Quality Monitoring in the CMS Detector | Andrew Brinkerhoff et.al. | 2501.13789 | translate | read | null |
| 2025-01-23 | GCAD: Anomaly Detection in Multivariate Time Series from the Perspective of Granger Causality | Zehao Liu et.al. | 2501.13493 | translate | read | null |
| 2025-01-23 | Leveraging Digital Twin and Machine Learning Techniques for Anomaly Detection in Power Electronics Dominated Grid | Ildar N. Idrisov et.al. | 2501.13474 | translate | read | null |
| 2025-01-23 | Unraveling Normal Anatomy via Fluid-Driven Anomaly Randomization | Peirong Liu et.al. | 2501.13370 | translate | read | link |
| 2025-01-22 | Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning | Ozlem Ceviz et.al. | 2501.13213 | translate | read | null |
| 2025-01-22 | Real-Time Multi-Modal Subcomponent-Level Measurements for Trustworthy System Monitoring and Malware Detection | Farshad Khorrami et.al. | 2501.13081 | translate | read | null |
| 2025-01-22 | Comparison of feature extraction tools for network traffic data | Borys Lypa et.al. | 2501.13004 | translate | read | null |
| 2025-01-22 | Anomaly Detection in Double-entry Bookkeeping Data by Federated Learning System with Non-model Sharing Approach | Sota Mashiko et.al. | 2501.12723 | translate | read | null |
| 2025-01-22 | Improved Detection and Diagnosis of Faults in Deep Neural Networks Using Hierarchical and Explainable Classification | Sigma Jahan et.al. | 2501.12560 | translate | read | null |
| 2025-01-21 | Optimizing Blockchain Analysis: Tackling Temporality and Scalability with an Incremental Approach with Metropolis-Hastings Random Walks | Junliang Luo et.al. | 2501.12491 | translate | read | null |
| 2025-01-21 | SCFCRC: Simultaneously Counteract Feature Camouflage and Relation Camouflage for Fraud Detection | Xiaocheng Zhang et.al. | 2501.12430 | translate | read | null |
| 2025-01-21 | Towards Accurate Unified Anomaly Segmentation | Wenxin Ma et.al. | 2501.12295 | translate | read | link |
| 2025-01-21 | Score Combining for Contrastive OOD Detection | Edward T. Reehorst et.al. | 2501.12204 | translate | read | null |
| 2025-01-21 | Beyond Window-Based Detection: A Graph-Centric Framework for Discrete Log Anomaly Detection | Jiaxing Qi et.al. | 2501.12166 | translate | read | null |
| 2025-01-22 | Teacher Encoder-Student Decoder Denoising Guided Segmentation Network for Anomaly Detection | Shixuan Song et.al. | 2501.12104 | translate | read | null |
| 2025-01-21 | Application of Machine Learning Techniques for Secure Traffic in NoC-based Manycores | Geaninne Lopes et.al. | 2501.12034 | translate | read | null |
| 2025-01-21 | TAD-Bench: A Comprehensive Benchmark for Embedding-Based Text Anomaly Detection | Yang Cao et.al. | 2501.11960 | translate | read | null |
| 2025-01-21 | Noise-Resilient Point-wise Anomaly Detection in Time Series Using Weak Segment Labels | Yaxuan Wang et.al. | 2501.11959 | translate | read | link |
| 2025-01-20 | Towards Improving IDS Using CTF Events | Manuel Kern et.al. | 2501.11685 | translate | read | null |
| 2025-01-20 | Class Imbalance in Anomaly Detection: Learning from an Exactly Solvable Model | F. S. Pezzicoli et.al. | 2501.11638 | translate | read | null |
| 2025-01-20 | A Survey on Diffusion Models for Anomaly Detection | Jing Liu et.al. | 2501.11430 | translate | read | null |
| 2025-01-17 | FiLo++: Zero-/Few-Shot Anomaly Detection by Fused Fine-Grained Descriptions and Deformable Localization | Zhaopeng Gu et.al. | 2501.10067 | translate | read | link |
| 2025-01-16 | Ruling the Unruly: Designing Effective, Low-Noise Network Intrusion Detection Rules for Security Operations Centers | Koen T. W. Teuwen et.al. | 2501.09808 | translate | read | null |
| 2025-01-16 | ComplexVAD: Detecting Interaction Anomalies in Video | Furkan Mumcu et.al. | 2501.09733 | translate | read | null |
| 2025-01-16 | Sequential PatchCore: Anomaly Detection for Surface Inspection using Synthetic Impurities | Runzhou Mao et.al. | 2501.09579 | translate | read | null |
| 2025-01-16 | AI-based Identity Fraud Detection: A Systematic Review | Chuo Jun Zhang et.al. | 2501.09239 | translate | read | null |
| 2025-01-15 | Attention is All You Need Until You Need Retention | M. Murat Yaslioglu et.al. | 2501.09166 | translate | read | null |
| 2025-01-15 | When Uncertainty Leads to Unsafety: Empirical Insights into the Role of Uncertainty in Unmanned Aerial Vehicle Safety | Sajad Khatiri et.al. | 2501.08908 | translate | read | null |
| 2025-01-15 | Transformer-based Multivariate Time Series Anomaly Localization | Charalampos Shimillas et.al. | 2501.08628 | translate | read | null |
| 2025-01-14 | Detecting Contextual Anomalies by Discovering Consistent Spatial Regions | Zhengye Yang et.al. | 2501.08470 | translate | read | null |
| 2025-01-14 | Multiple-Input Variational Auto-Encoder for Anomaly Detection in Heterogeneous Data | Phai Vu Dinh et.al. | 2501.08149 | translate | read | null |
| 2025-01-14 | PolyLUT: Ultra-low Latency Polynomial Inference with Hardware-Aware Structured Pruning | Marta Andronic et.al. | 2501.08043 | translate | read | null |
| 2025-01-14 | Unsupervised Feature Construction for Anomaly Detection in Time Series – An Evaluation | Marine Hamon et.al. | 2501.07999 | translate | read | null |
| 2025-01-14 | STTS-EAD: Improving Spatio-Temporal Learning Based Time Series Prediction via | Yuanyuan Liang et.al. | 2501.07814 | translate | read | null |
| 2025-01-14 | A Comparative Analysis of DNN-based White-Box Explainable AI Methods in Network Security | Osvaldo Arreche et.al. | 2501.07801 | translate | read | link |
| 2025-01-13 | A Novel Approach to Network Traffic Analysis: the HERA tool | Daniela Pinto et.al. | 2501.07475 | translate | read | null |
| 2025-01-13 | ADKGD: Anomaly Detection in Knowledge Graphs with Dual-Channel Training | Jiayang Wu et.al. | 2501.07078 | translate | read | link |
| 2025-01-13 | Detection of AI Deepfake and Fraud in Online Payments Using GAN-Based Models | Zong Ke et.al. | 2501.07033 | translate | read | null |
| 2025-01-13 | TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph | Wenhan Jiang et.al. | 2501.06997 | translate | read | null |
| 2025-01-12 | Shake-VLA: Vision-Language-Action Model-Based System for Bimanual Robotic Manipulations and Liquid Mixing | Muhamamd Haris Khan et.al. | 2501.06919 | translate | read | null |
| 2025-01-12 | Driver Age and Its Effect on Key Driving Metrics: Insights from Dynamic Vehicle Data | Aparna Joshi et.al. | 2501.06918 | translate | read | null |
| 2025-01-12 | Generative AI Enabled Robust Sensor Placement in Cyber-Physical Power Systems: A Graph Diffusion Approach | Changyuan Zhao et.al. | 2501.06756 | translate | read | null |
| 2025-01-11 | Exploring Pose-Based Anomaly Detection for Retail Security: A Real-World Shoplifting Dataset and Benchmark | Narges Rashvand et.al. | 2501.06591 | translate | read | link |
| 2025-01-11 | Active Rule Mining for Multivariate Anomaly Detection in Radio Access Networks | Ebenezer R. H. P. Isaac et.al. | 2501.06571 | translate | read | null |
| 2025-01-10 | Explaining Deep Learning-based Anomaly Detection in Energy Consumption Data by Focusing on Contextually Relevant Data | Mohammad Noorchenarboo et.al. | 2501.06099 | translate | read | null |
| 2025-01-10 | Facilitate Collaboration between Large Language Model and Task-specific Model for Time Series Anomaly Detection | Feiyi Chen et.al. | 2501.05675 | translate | read | null |
| 2025-01-10 | Evidential Deep Learning for Uncertainty Quantification and Out-of-Distribution Detection in Jet Identification using Deep Neural Networks | Ayush Khot et.al. | 2501.05656 | translate | read | link |
| 2025-01-09 | Outlyingness Scores with Cluster Catch Digraphs | Rui Shi et.al. | 2501.05530 | translate | read | null |
| 2025-01-09 | EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database | Tianle Tao et.al. | 2501.05223 | translate | read | null |
| 2025-01-10 | Learning In-Distribution Representations for Anomaly Detection | Willian T. Lunardi et.al. | 2501.05130 | translate | read | link |
| 2025-01-08 | Back Home: A Machine Learning Approach to Seashell Classification and Ecosystem Restoration | Alexander Valverde et.al. | 2501.04873 | translate | read | null |
| 2025-01-08 | Quantum Hybrid Support Vector Machines for Stress Detection in Older Adults | Md Saif Hassan Onim et.al. | 2501.04831 | translate | read | null |
| 2025-01-08 | Planing It by Ear: Convolutional Neural Networks for Acoustic Anomaly Detection in Industrial Wood Planers | Anthony Deschênes et.al. | 2501.04819 | translate | read | link |
| 2025-01-08 | Leveraging Registers in Vision Transformers for Robust Adaptation | Srikar Yellapragada et.al. | 2501.04784 | translate | read | null |
| 2025-01-07 | SPECTRE: A Hybrid System for an Adaptative and Optimised Cyber Threats Detection, Response and Investigation in Volatile Memory | Arslan Tariq Syed et.al. | 2501.03898 | translate | read | null |
| 2025-01-07 | KAnoCLIP: Zero-Shot Anomaly Detection through Knowledge-Driven Prompt Learning and Enhanced Cross-Modal Integration | Chengyuan Li et.al. | 2501.03786 | translate | read | null |
| 2025-01-06 | On the Adversarial Robustness of Benjamini Hochberg | Louis L Chen et.al. | 2501.03402 | translate | read | null |
| 2025-01-07 | CONTINUUM: Detecting APT Attacks through Spatial-Temporal Graph Neural Networks | Atmane Ayoub Mansour Bahar et.al. | 2501.02981 | translate | read | null |
| 2025-01-06 | Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls | Can Gao et.al. | 2501.02975 | translate | read | link |
| 2025-01-06 | Unsupervised Tomato Split Anomaly Detection using Hyperspectral Imaging and Variational Autoencoders | Mahmoud Abdulsalam et.al. | 2501.02921 | translate | read | null |
| 2025-01-06 | GraphDART: Graph Distillation for Efficient Advanced Persistent Threat Detection | Saba Fathi Rabooki et.al. | 2501.02796 | translate | read | null |
| 2025-01-06 | Full-conformal novelty detection: A powerful and non-random approach | Junu Lee et.al. | 2501.02703 | translate | read | null |
| 2025-01-04 | Self-Supervised Learning for Detecting AI-Generated Faces as Anomalies | Mian Zou et.al. | 2501.02207 | translate | read | link |
| 2025-01-03 | Counterfactual Explanation for Auto-Encoder Based Time-Series Anomaly Detection | Abhishek Srinivasan et.al. | 2501.02069 | translate | read | null |
| 2025-01-03 | Dynamic Feature Fusion: Combining Global Graph Structures and Local Semantics for Blockchain Fraud Detection | Zhang Sheng et.al. | 2501.02032 | translate | read | null |
| 2025-01-03 | Robust resonant anomaly detection with NPLM | Gaia Grosso et.al. | 2501.01778 | translate | read | null |
| 2025-01-03 | LogicAD: Explainable Anomaly Detection via VLM-based Text Feature Extraction | Er Jin et.al. | 2501.01767 | translate | read | null |
| 2025-01-03 | BARTPredict: Empowering IoT Security with LLM-Driven Cyber Threat Prediction | Alaeddine Diaf et.al. | 2501.01664 | translate | read | null |
| 2025-01-03 | Multivariate Time Series Anomaly Detection using DiffGAN Model | Guangqiang Wu et.al. | 2501.01591 | translate | read | null |
| 2025-01-02 | Transfer Neyman-Pearson Algorithm for Outlier Detection | Mohammadreza M. Kalan et.al. | 2501.01525 | translate | read | null |
| 2025-01-02 | Quantum Computing for Partition Function Estimation of a Markov Random Field in a Radar Anomaly Detection Problem | Timothe Presles et.al. | 2501.01154 | translate | read | null |
| 2025-01-02 | InDeed: Interpretable image deep decomposition with guaranteed generalizability | Sihan Wang et.al. | 2501.01127 | translate | read | null |
| 2025-01-02 | SpecPT (Spectroscopy Pre-trained Transformer) Model for Extragalactic Spectroscopy: I. Architecture and Automated Redshift Measurement | Rohan Pattnaik et.al. | 2501.01070 | translate | read | null |
| 2025-01-02 | An Efficient Outlier Detection Algorithm for Data Streaming | Rui Hu et.al. | 2501.01061 | translate | read | null |
| 2025-01-01 | LENS-XAI: Redefining Lightweight and Explainable Network Security through Knowledge Distillation and Variational Autoencoders for Scalable Intrusion Detection in Cybersecurity | Muhammet Anil Yagiz et.al. | 2501.00790 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)