Anomaly Detection - 2025-02
Anomaly Detection - 2025-02
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-02-28 | Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis | Li Yang et.al. | 2502.21286 | translate | read | null |
| 2025-02-28 | TimesBERT: A BERT-Style Foundation Model for Time Series Understanding | Haoran Zhang et.al. | 2502.21245 | translate | read | null |
| 2025-02-28 | Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids | Abdallah Alalem Albustami et.al. | 2502.21146 | translate | read | null |
| 2025-02-28 | Detection of anomalies in cow activity using wavelet transform based features | Valentin Guien et.al. | 2502.21051 | translate | read | null |
| 2025-02-28 | When Unsupervised Domain Adaptation meets One-class Anomaly Detection: Addressing the Two-fold Unsupervised Curse by Leveraging Anomaly Scarcity | Nesryne Mejri et.al. | 2502.21022 | translate | read | null |
| 2025-02-28 | FedDyMem: Efficient Federated Learning with Dynamic Memory and Memory-Reduce for Unsupervised Image Anomaly Detection | Silin Chen et.al. | 2502.21012 | translate | read | null |
| 2025-02-28 | Distribution Prototype Diffusion Learning for Open-set Supervised Anomaly Detection | Fuyun Wang et.al. | 2502.20981 | translate | read | null |
| 2025-02-28 | Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks | Li Yang et.al. | 2502.20627 | translate | read | null |
| 2025-02-27 | Discovering Antagonists in Networks of Systems: Robot Deployment | Ingeborg Wenger et.al. | 2502.20125 | translate | read | link |
| 2025-02-27 | One-for-More: Continual Diffusion Model for Anomaly Detection | Xiaofan Li et.al. | 2502.19848 | translate | read | link |
| 2025-02-26 | Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without Retraining | Sam Pastoriza et.al. | 2502.19534 | translate | read | null |
| 2025-02-26 | Anomaly Detection in Complex Dynamical Systems: A Systematic Framework Using Embedding Theory and Physics-Inspired Consistency | Michael Somma et.al. | 2502.19307 | translate | read | null |
| 2025-02-26 | Corporate Fraud Detection in Rich-yet-Noisy Financial Graph | Shiqi Wang et.al. | 2502.19305 | translate | read | null |
| 2025-02-26 | HDM: Hybrid Diffusion Model for Unified Image Anomaly Detection | Zekang Weng et.al. | 2502.19200 | translate | read | null |
| 2025-02-26 | Towards Privacy-Preserving Anomaly-Based Intrusion Detection in Energy Communities | Zeeshan Afzal et.al. | 2502.19154 | translate | read | null |
| 2025-02-26 | Random Similarity Isolation Forests | Sebastian Chwilczyński et.al. | 2502.19122 | translate | read | null |
| 2025-02-26 | Sherlock: Towards Multi-scene Video Abnormal Event Extraction and Localization via a Global-local Spatial-sensitive LLM | Junxiao Ma et.al. | 2502.18863 | translate | read | null |
| 2025-02-25 | Identification and Characterization for Disruptions in the U.S. National Airspace System (NAS) | Jing Xu et.al. | 2502.18687 | translate | read | null |
| 2025-02-25 | Tighten The Lasso: A Convex Hull Volume-based Anomaly Detection Method | Uri Itai et.al. | 2502.18601 | translate | read | null |
| 2025-02-25 | Structural Alignment Improves Graph Test-Time Adaptation | Hans Hao-Hsun Hsu et.al. | 2502.18334 | translate | read | null |
| 2025-02-25 | From Vision to Sound: Advancing Audio Anomaly Detection with Vision-Based Algorithms | Manuel Barusco et.al. | 2502.18328 | translate | read | link |
| 2025-02-25 | Sequential Outlier Detection in Non-Stationary Time Series | Florian Heinrichs et.al. | 2502.18038 | translate | read | null |
| 2025-02-25 | Radon-Nikodým Derivative: Re-imagining Anomaly Detection from a Measure Theoretic Perspective | Shlok Mehendale et.al. | 2502.18002 | translate | read | null |
| 2025-02-25 | Improved YOLOv7x-Based Defect Detection Algorithm for Power Equipment | Jin Hou et.al. | 2502.17961 | translate | read | null |
| 2025-02-25 | Can Multimodal LLMs Perform Time Series Anomaly Detection? | Xiongxiao Xu et.al. | 2502.17812 | translate | read | link |
| 2025-02-25 | A digital eye-fixation biomarker using a deep anomaly scheme to classify Parkisonian patterns | Juan Niño et.al. | 2502.17762 | translate | read | null |
| 2025-02-24 | 1 Particle - 1 Qubit: Particle Physics Data Encoding for Quantum Machine Learning | Aritra Bal et.al. | 2502.17301 | translate | read | null |
| 2025-02-24 | Using Machine Learning to Detect Fraudulent SMSs in Chichewa | Amelia Taylor et.al. | 2502.16947 | translate | read | null |
| 2025-02-24 | MAD-AD: Masked Diffusion for Unsupervised Brain Anomaly Detection | Farzad Beizaee et.al. | 2502.16943 | translate | read | link |
| 2025-02-23 | Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata | Parastou Fahim et.al. | 2502.16753 | translate | read | null |
| 2025-02-23 | TrustChain: A Blockchain Framework for Auditing and Verifying Aggregators in Decentralized Federated Learning | Ehsan Hallaji et.al. | 2502.16406 | translate | read | null |
| 2025-02-23 | An Expert Ensemble for Detecting Anomalous Scenes, Interactions, and Behaviors in Autonomous Driving | Tianchen Ji et.al. | 2502.16389 | translate | read | null |
| 2025-02-22 | Machine Learning-Based Cloud Computing Compliance Process Automation | Yuqing Wang et.al. | 2502.16344 | translate | read | null |
| 2025-02-22 | DiffFake: Exposing Deepfakes using Differential Anomaly Detection | Sotirios Stamnas et.al. | 2502.16247 | translate | read | null |
| 2025-02-21 | Anomaly preserving contrastive neural embeddings for end-to-end model-independent searches at the LHC | Kyle Metzger et.al. | 2502.15926 | translate | read | null |
| 2025-02-21 | ML-Driven Approaches to Combat Medicare Fraud: Advances in Class Imbalance Solutions, Feature Engineering, Adaptive Learning, and Business Impact | Dorsa Farahmandazad et.al. | 2502.15898 | translate | read | null |
| 2025-02-21 | A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems | Benyamin Tafreshian et.al. | 2502.15561 | translate | read | null |
| 2025-02-21 | Pub-Guard-LLM: Detecting Fraudulent Biomedical Articles with Reliable Explanations | Lihu Chen et.al. | 2502.15429 | translate | read | link |
| 2025-02-20 | CyberSentinel: An Emergent Threat Detection System for AI Security | Krti Tallam et.al. | 2502.14966 | translate | read | null |
| 2025-02-20 | Outlier Detection in Mendelian Randomisation | Maximilian M Mandl et.al. | 2502.14716 | translate | read | link |
| 2025-02-19 | A Method to Simultaneously Facilitate All Jet Physics Tasks | Vinicius Mikuni et.al. | 2502.14652 | translate | read | null |
| 2025-02-20 | dtaianomaly: A Python library for time series anomaly detection | Louis Carpentier et.al. | 2502.14381 | translate | read | link |
| 2025-02-20 | Graph Anomaly Detection via Adaptive Test-time Representation Learning across Out-of-Distribution Domains | Delaram Pirhayati et.al. | 2502.14293 | translate | read | null |
| 2025-02-20 | Adaptive Sparsified Graph Learning Framework for Vessel Behavior Anomalies | Jeehong Kim et.al. | 2502.14197 | translate | read | null |
| 2025-02-19 | CND-IDS: Continual Novelty Detection for Intrusion Detection Systems | Sean Fuhrman et.al. | 2502.14094 | translate | read | null |
| 2025-02-19 | Isolating Unisolated Upsilons with Anomaly Detection in CMS Open Data | Rikab Gambhir et.al. | 2502.14036 | translate | read | link |
| 2025-02-19 | A Synergy Scoring Filter for Unsupervised Anomaly Detection with Noisy Data | Fengjie Wang et.al. | 2502.13992 | translate | read | null |
| 2025-02-19 | Unlocking Multimodal Integration in EHRs: A Prompt Learning Framework for Language and Time Series Fusion | Shuai Niu et.al. | 2502.13509 | translate | read | null |
| 2025-02-19 | Flow-based generative models as iterative algorithms in probability space | Yao Xie et.al. | 2502.13394 | translate | read | null |
| 2025-02-18 | VUS: Effective and Efficient Accuracy Measures for Time-Series Anomaly Detection | Paul Boniol et.al. | 2502.13318 | translate | read | link |
| 2025-02-18 | A Label-Free Heterophily-Guided Approach for Unsupervised Graph Fraud Detection | Junjun Pan et.al. | 2502.13308 | translate | read | null |
| 2025-02-18 | Value Gradient Sampler: Sampling as Sequential Decision Making | Sangwoong Yoon et.al. | 2502.13280 | translate | read | null |
| 2025-02-18 | A Survey of Anomaly Detection in Cyber-Physical Systems | Danial Abshari et.al. | 2502.13256 | translate | read | null |
| 2025-02-18 | Statistically Significant $k$ NNAD by Selective Inference | Mizuki Niihori et.al. | 2502.12978 | translate | read | null |
| 2025-02-18 | Fraud-R1 : A Multi-Round Benchmark for Assessing the Robustness of LLM Against Augmented Fraud and Phishing Inducements | Shu Yang et.al. | 2502.12904 | translate | read | null |
| 2025-02-18 | Toward Cybersecurity Testing and Monitoring of IoT Ecosystems | Steve Taylor et.al. | 2502.12837 | translate | read | null |
| 2025-02-18 | Unsupervised Anomaly Detection through Mass Repulsing Optimal Transport | Eduardo Fernandes Montesuma et.al. | 2502.12793 | translate | read | null |
| 2025-02-17 | Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset | Md Ahnaf Akif et.al. | 2502.12382 | translate | read | null |
| 2025-02-17 | Positional Encoding in Transformer-Based Time Series Models: A Survey | Habib Irani et.al. | 2502.12370 | translate | read | link |
| 2025-02-17 | Unifying Explainable Anomaly Detection and Root Cause Analysis in Dynamical Systems | Yue Sun et.al. | 2502.12086 | translate | read | null |
| 2025-02-17 | Enhanced Anomaly Detection in IoMT Networks using Ensemble AI Models on the CICIoMT2024 Dataset | Prathamesh Chandekar et.al. | 2502.11854 | translate | read | null |
| 2025-02-17 | Component-aware Unsupervised Logical Anomaly Generation for Industrial Anomaly Detection | Xuan Tong et.al. | 2502.11712 | translate | read | null |
| 2025-02-17 | Towards a Trustworthy Anomaly Detection for Critical Applications through Approximated Partial AUC Loss | Arnaud Bougaham et.al. | 2502.11570 | translate | read | null |
| 2025-02-17 | DCAD-2000: A Multilingual Dataset across 2000+ Languages with Data Cleaning as Anomaly Detection | Yingli Shen et.al. | 2502.11546 | translate | read | link |
| 2025-02-17 | WRT-SAM: Foundation Model-Driven Segmentation for Generalized Weld Radiographic Testing | Yunyi Zhou et.al. | 2502.11338 | translate | read | null |
| 2025-02-16 | Exploiting Point-Language Models with Dual-Prompts for 3D Anomaly Detection | Jiaxiang Wang et.al. | 2502.11307 | translate | read | null |
| 2025-02-16 | Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems | Armando Bellante et.al. | 2502.11173 | translate | read | null |
| 2025-02-16 | Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions | Sahar Lazim et.al. | 2502.11138 | translate | read | null |
| 2025-02-15 | A Computational Model for Ransomware Detection Using Cross-Domain Entropy Signatures | Michael Mannon et.al. | 2502.10711 | translate | read | null |
| 2025-02-14 | Dynamic Fraud Proof | Gabriele Picco et.al. | 2502.10321 | translate | read | null |
| 2025-02-14 | Anomaly Detection with LWE Encrypted Control | Rijad Alisic et.al. | 2502.10283 | translate | read | null |
| 2025-02-14 | Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction | Francesco Vitale et.al. | 2502.10211 | translate | read | null |
| 2025-02-14 | Enhancing anomaly detection with topology-aware autoencoders | Vishal S. Ngairangbam et.al. | 2502.10163 | translate | read | null |
| 2025-02-14 | Robust Anomaly Detection via Tensor Chidori Pseudoskeleton Decomposition | Bowen Su et.al. | 2502.09926 | translate | read | null |
| 2025-02-13 | Weakly supervised anomaly detection for resonant new physics in the dijet final state using proton-proton collisions at $\sqrt{s}=13$ TeV with the ATLAS detector | ATLAS Collaboration et.al. | 2502.09770 | translate | read | null |
| 2025-02-13 | APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models | Sidahmed Benabderrahmane et.al. | 2502.09385 | translate | read | null |
| 2025-02-13 | AnomalyGFM: Graph Foundation Model for Zero/Few-shot Anomaly Detection | Hezhe Qiao et.al. | 2502.09254 | translate | read | null |
| 2025-02-13 | XAInomaly: Explainable and Interpretable Deep Contractive Autoencoder for O-RAN Traffic Anomaly Detection | Osman Tugay Basaran et.al. | 2502.09194 | translate | read | null |
| 2025-02-13 | Unsupervised Anomaly Detection on Implicit Shape representations for Sarcopenia Detection | Louise Piecuch et.al. | 2502.09088 | translate | read | null |
| 2025-02-13 | Privacy-Preserving Hybrid Ensemble Model for Network Anomaly Detection: Balancing Security and Data Protection | Shaobo Liu et.al. | 2502.09001 | translate | read | null |
| 2025-02-12 | Hierarchical Entropy Disruption for Ransomware Detection: A Computationally-Driven Framework | Hayden Srynn et.al. | 2502.08843 | translate | read | null |
| 2025-02-12 | Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures | Almuthanna Alageel et.al. | 2502.08830 | translate | read | null |
| 2025-02-12 | CurvGAD: Leveraging Curvature for Enhanced Graph Anomaly Detection | Karish Grover et.al. | 2502.08605 | translate | read | null |
| 2025-02-12 | Mapping the Landscape of Generative AI in Network Monitoring and Management | Giampaolo Bovenzi et.al. | 2502.08576 | translate | read | null |
| 2025-02-12 | GenIAS: Generator for Instantiating Anomalies in time Series | Zahra Zamanzadeh Darban et.al. | 2502.08262 | translate | read | null |
| 2025-02-12 | Out-of-Distribution Detection on Graphs: A Survey | Tingyi Cai et.al. | 2502.08105 | translate | read | null |
| 2025-02-11 | MAAT: Mamba Adaptive Anomaly Transformer with association discrepancy for time series | Abdellah Zakaria Sellam et.al. | 2502.07858 | translate | read | link |
| 2025-02-11 | Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach | Shakil Ahmed et.al. | 2502.07779 | translate | read | null |
| 2025-02-11 | Advancing climate model interpretability: Feature attribution for Arctic melt anomalies | Tolulope Ale et.al. | 2502.07741 | translate | read | null |
| 2025-02-11 | Methodology for Identifying Social Groups within a Transactional Graph | Maxence Morin et.al. | 2502.07694 | translate | read | null |
| 2025-02-11 | Unsupervised Feature Extraction and Reconstruction Using Parameterized Quantum Circuits | Li-An Lo et.al. | 2502.07667 | translate | read | link |
| 2025-02-11 | Towards Zero-Shot Anomaly Detection and Reasoning with Multimodal Large Language Models | Jiacong Xu et.al. | 2502.07601 | translate | read | null |
| 2025-02-11 | FADE: Forecasting for Anomaly Detection on ECG | Paula Ruiz-Barroso et.al. | 2502.07389 | translate | read | null |
| 2025-02-10 | SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection | Elvin Li et.al. | 2502.07119 | translate | read | null |
| 2025-02-10 | Leveraging GPT-4o Efficiency for Detecting Rework Anomaly in Business Processes | Mohammad Derakhshan et.al. | 2502.06918 | translate | read | null |
| 2025-02-10 | Network Intrusion Datasets: A Survey, Limitations, and Recommendations | Patrik Goldschmidt et.al. | 2502.06688 | translate | read | null |
| 2025-02-10 | An Efficient Security Model for Industrial Internet of Things (IIoT) System Based on Machine Learning Principles | Sahar L. Qaddoori et.al. | 2502.06502 | translate | read | null |
| 2025-02-10 | Multimodal Task Representation Memory Bank vs. Catastrophic Forgetting in Anomaly Detection | You Zhou et.al. | 2502.06194 | translate | read | null |
| 2025-02-10 | Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT | Robert Akinie et.al. | 2502.06099 | translate | read | null |
| 2025-02-09 | A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks | Safaa Menssouri et.al. | 2502.06031 | translate | read | null |
| 2025-02-09 | A 3D Multimodal Feature for Infrastructure Anomaly Detection | Yixiong Jing et.al. | 2502.05779 | translate | read | link |
| 2025-02-09 | 3CAD: A Large-Scale Real-World 3C Product Dataset for Unsupervised Anomaly | Enquan Yang et.al. | 2502.05761 | translate | read | link |
| 2025-02-08 | Extended Histogram-based Outlier Score (EHBOS) | Tanvir Islam et.al. | 2502.05719 | translate | read | null |
| 2025-02-08 | Federated Learning with Reservoir State Analysis for Time Series Anomaly Detection | Keigo Nogami et.al. | 2502.05679 | translate | read | null |
| 2025-02-08 | Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning | Runhua Xu et.al. | 2502.05547 | translate | read | null |
| 2025-02-07 | Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks | Yohannis Kifle Telila et.al. | 2502.05041 | translate | read | null |
| 2025-02-07 | Robust Conformal Outlier Detection under Contaminated Reference Data | Meshi Bashari et.al. | 2502.04807 | translate | read | null |
| 2025-02-06 | Finding Pegasus: Enhancing Unsupervised Anomaly Detection in High-Dimensional Data using a Manifold-Based Approach | R. P. Nathan et.al. | 2502.04310 | translate | read | null |
| 2025-02-06 | NLP-Based .NET CLR Event Logs Analyzer | Maxim Stavtsev et.al. | 2502.04219 | translate | read | null |
| 2025-02-06 | CleanSurvival: Automated data preprocessing for time-to-event models using reinforcement learning | Yousef Koka et.al. | 2502.03946 | translate | read | null |
| 2025-02-06 | Technical Report: Generating the WEB-IDS23 Dataset | Eric Lanfer et.al. | 2502.03909 | translate | read | null |
| 2025-02-06 | Hierarchical Entropic Diffusion for Ransomware Detection: A Probabilistic Approach to Behavioral Anomaly Isolation | Vasili Iskorohodov et.al. | 2502.03882 | translate | read | null |
| 2025-02-06 | Position: Untrained Machine Learning for Anomaly Detection | Juan Du et.al. | 2502.03876 | translate | read | null |
| 2025-02-05 | The Adoption of Artificial Intelligence in Different Network Security Concepts | Mamoon A. Al Jbaar et.al. | 2502.03398 | translate | read | null |
| 2025-02-05 | A Structured Reasoning Framework for Unbalanced Data Classification Using Probabilistic Models | Junliang Du et.al. | 2502.03386 | translate | read | null |
| 2025-02-05 | General Time-series Model for Universal Knowledge Representation of Multivariate Time-Series data | Cheng He et.al. | 2502.03264 | translate | read | null |
| 2025-02-05 | Calibrated Unsupervised Anomaly Detection in Multivariate Time-series using Reinforcement Learning | Saba Sanami et.al. | 2502.03245 | translate | read | null |
| 2025-02-05 | SpaceGNN: Multi-Space Graph Neural Network for Node Anomaly Detection with Extremely Limited Labels | Xiangyu Dong et.al. | 2502.03201 | translate | read | null |
| 2025-02-05 | Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research | Othmane Belarbi et.al. | 2502.03134 | translate | read | null |
| 2025-02-05 | Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing | Salvatore Sinno et.al. | 2502.03086 | translate | read | null |
| 2025-02-05 | Time Series Anomaly Detection in the Frequency Domain with Statistical Reliability | Akifumi Yamada et.al. | 2502.03062 | translate | read | null |
| 2025-02-05 | TopoCL: Topological Contrastive Learning for Time Series | Namwoo Kim et.al. | 2502.02924 | translate | read | null |
| 2025-02-04 | SHIELD: APT Detection and Intelligent Explanation Using LLM | Parth Atulbhai Gandhi et.al. | 2502.02342 | translate | read | null |
| 2025-02-04 | FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection | Daniele Lunghi et.al. | 2502.02290 | translate | read | null |
| 2025-02-04 | LAST SToP For Modeling Asynchronous Time Series | Shubham Gupta et.al. | 2502.01922 | translate | read | null |
| 2025-02-04 | Anomaly Detection via Autoencoder Composite Features and NCE | Yalin Liao et.al. | 2502.01920 | translate | read | null |
| 2025-02-03 | A Poisson Process AutoDecoder for X-ray Sources | Yanke Song et.al. | 2502.01627 | translate | read | null |
| 2025-02-03 | Federated Detection of Open Charge Point Protocol 1.6 Cyberattacks | Christos Dalamagkas et.al. | 2502.01569 | translate | read | null |
| 2025-02-03 | Unsupervised anomaly detection in large-scale estuarine acoustic telemetry data | Siphendulwe Zaza et.al. | 2502.01543 | translate | read | null |
| 2025-02-03 | Dense Subgraph Discovery Meets Strong Triadic Closure | Chamalee Wickrama Arachchi et.al. | 2502.01435 | translate | read | null |
| 2025-02-03 | ConceptVAE: Self-Supervised Fine-Grained Concept Disentanglement from 2D Echocardiographies | Costin F. Ciusdel et.al. | 2502.01335 | translate | read | null |
| 2025-02-03 | One-to-Normal: Anomaly Personalization for Few-shot Anomaly Detection | Yiyue Li et.al. | 2502.01201 | translate | read | null |
| 2025-02-03 | Real-Time Anomaly Detection with Synthetic Anomaly Monitoring (SAM) | Emanuele Luzio et.al. | 2501.18417 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)