Anomaly Detection - 2025-02

Publish Date Title Authors PDF Translate Read Code
2025-02-28 Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis Li Yang et.al. 2502.21286 translate read null
2025-02-28 TimesBERT: A BERT-Style Foundation Model for Time Series Understanding Haoran Zhang et.al. 2502.21245 translate read null
2025-02-28 Unmasking Stealthy Attacks on Nonlinear DAE Models of Power Grids Abdallah Alalem Albustami et.al. 2502.21146 translate read null
2025-02-28 Detection of anomalies in cow activity using wavelet transform based features Valentin Guien et.al. 2502.21051 translate read null
2025-02-28 When Unsupervised Domain Adaptation meets One-class Anomaly Detection: Addressing the Two-fold Unsupervised Curse by Leveraging Anomaly Scarcity Nesryne Mejri et.al. 2502.21022 translate read null
2025-02-28 FedDyMem: Efficient Federated Learning with Dynamic Memory and Memory-Reduce for Unsupervised Image Anomaly Detection Silin Chen et.al. 2502.21012 translate read null
2025-02-28 Distribution Prototype Diffusion Learning for Open-set Supervised Anomaly Detection Fuyun Wang et.al. 2502.20981 translate read null
2025-02-28 Towards Zero Touch Networks: Cross-Layer Automated Security Solutions for 6G Wireless Networks Li Yang et.al. 2502.20627 translate read null
2025-02-27 Discovering Antagonists in Networks of Systems: Robot Deployment Ingeborg Wenger et.al. 2502.20125 translate read link
2025-02-27 One-for-More: Continual Diffusion Model for Anomaly Detection Xiaofan Li et.al. 2502.19848 translate read link
2025-02-26 Retrieval Augmented Anomaly Detection (RAAD): Nimble Model Adjustment Without Retraining Sam Pastoriza et.al. 2502.19534 translate read null
2025-02-26 Anomaly Detection in Complex Dynamical Systems: A Systematic Framework Using Embedding Theory and Physics-Inspired Consistency Michael Somma et.al. 2502.19307 translate read null
2025-02-26 Corporate Fraud Detection in Rich-yet-Noisy Financial Graph Shiqi Wang et.al. 2502.19305 translate read null
2025-02-26 HDM: Hybrid Diffusion Model for Unified Image Anomaly Detection Zekang Weng et.al. 2502.19200 translate read null
2025-02-26 Towards Privacy-Preserving Anomaly-Based Intrusion Detection in Energy Communities Zeeshan Afzal et.al. 2502.19154 translate read null
2025-02-26 Random Similarity Isolation Forests Sebastian Chwilczyński et.al. 2502.19122 translate read null
2025-02-26 Sherlock: Towards Multi-scene Video Abnormal Event Extraction and Localization via a Global-local Spatial-sensitive LLM Junxiao Ma et.al. 2502.18863 translate read null
2025-02-25 Identification and Characterization for Disruptions in the U.S. National Airspace System (NAS) Jing Xu et.al. 2502.18687 translate read null
2025-02-25 Tighten The Lasso: A Convex Hull Volume-based Anomaly Detection Method Uri Itai et.al. 2502.18601 translate read null
2025-02-25 Structural Alignment Improves Graph Test-Time Adaptation Hans Hao-Hsun Hsu et.al. 2502.18334 translate read null
2025-02-25 From Vision to Sound: Advancing Audio Anomaly Detection with Vision-Based Algorithms Manuel Barusco et.al. 2502.18328 translate read link
2025-02-25 Sequential Outlier Detection in Non-Stationary Time Series Florian Heinrichs et.al. 2502.18038 translate read null
2025-02-25 Radon-Nikodým Derivative: Re-imagining Anomaly Detection from a Measure Theoretic Perspective Shlok Mehendale et.al. 2502.18002 translate read null
2025-02-25 Improved YOLOv7x-Based Defect Detection Algorithm for Power Equipment Jin Hou et.al. 2502.17961 translate read null
2025-02-25 Can Multimodal LLMs Perform Time Series Anomaly Detection? Xiongxiao Xu et.al. 2502.17812 translate read link
2025-02-25 A digital eye-fixation biomarker using a deep anomaly scheme to classify Parkisonian patterns Juan Niño et.al. 2502.17762 translate read null
2025-02-24 1 Particle - 1 Qubit: Particle Physics Data Encoding for Quantum Machine Learning Aritra Bal et.al. 2502.17301 translate read null
2025-02-24 Using Machine Learning to Detect Fraudulent SMSs in Chichewa Amelia Taylor et.al. 2502.16947 translate read null
2025-02-24 MAD-AD: Masked Diffusion for Unsupervised Brain Anomaly Detection Farzad Beizaee et.al. 2502.16943 translate read link
2025-02-23 Enhancing sensor attack detection in supervisory control systems modeled by probabilistic automata Parastou Fahim et.al. 2502.16753 translate read null
2025-02-23 TrustChain: A Blockchain Framework for Auditing and Verifying Aggregators in Decentralized Federated Learning Ehsan Hallaji et.al. 2502.16406 translate read null
2025-02-23 An Expert Ensemble for Detecting Anomalous Scenes, Interactions, and Behaviors in Autonomous Driving Tianchen Ji et.al. 2502.16389 translate read null
2025-02-22 Machine Learning-Based Cloud Computing Compliance Process Automation Yuqing Wang et.al. 2502.16344 translate read null
2025-02-22 DiffFake: Exposing Deepfakes using Differential Anomaly Detection Sotirios Stamnas et.al. 2502.16247 translate read null
2025-02-21 Anomaly preserving contrastive neural embeddings for end-to-end model-independent searches at the LHC Kyle Metzger et.al. 2502.15926 translate read null
2025-02-21 ML-Driven Approaches to Combat Medicare Fraud: Advances in Class Imbalance Solutions, Feature Engineering, Adaptive Learning, and Business Impact Dorsa Farahmandazad et.al. 2502.15898 translate read null
2025-02-21 A Defensive Framework Against Adversarial Attacks on Machine Learning-Based Network Intrusion Detection Systems Benyamin Tafreshian et.al. 2502.15561 translate read null
2025-02-21 Pub-Guard-LLM: Detecting Fraudulent Biomedical Articles with Reliable Explanations Lihu Chen et.al. 2502.15429 translate read link
2025-02-20 CyberSentinel: An Emergent Threat Detection System for AI Security Krti Tallam et.al. 2502.14966 translate read null
2025-02-20 Outlier Detection in Mendelian Randomisation Maximilian M Mandl et.al. 2502.14716 translate read link
2025-02-19 A Method to Simultaneously Facilitate All Jet Physics Tasks Vinicius Mikuni et.al. 2502.14652 translate read null
2025-02-20 dtaianomaly: A Python library for time series anomaly detection Louis Carpentier et.al. 2502.14381 translate read link
2025-02-20 Graph Anomaly Detection via Adaptive Test-time Representation Learning across Out-of-Distribution Domains Delaram Pirhayati et.al. 2502.14293 translate read null
2025-02-20 Adaptive Sparsified Graph Learning Framework for Vessel Behavior Anomalies Jeehong Kim et.al. 2502.14197 translate read null
2025-02-19 CND-IDS: Continual Novelty Detection for Intrusion Detection Systems Sean Fuhrman et.al. 2502.14094 translate read null
2025-02-19 Isolating Unisolated Upsilons with Anomaly Detection in CMS Open Data Rikab Gambhir et.al. 2502.14036 translate read link
2025-02-19 A Synergy Scoring Filter for Unsupervised Anomaly Detection with Noisy Data Fengjie Wang et.al. 2502.13992 translate read null
2025-02-19 Unlocking Multimodal Integration in EHRs: A Prompt Learning Framework for Language and Time Series Fusion Shuai Niu et.al. 2502.13509 translate read null
2025-02-19 Flow-based generative models as iterative algorithms in probability space Yao Xie et.al. 2502.13394 translate read null
2025-02-18 VUS: Effective and Efficient Accuracy Measures for Time-Series Anomaly Detection Paul Boniol et.al. 2502.13318 translate read link
2025-02-18 A Label-Free Heterophily-Guided Approach for Unsupervised Graph Fraud Detection Junjun Pan et.al. 2502.13308 translate read null
2025-02-18 Value Gradient Sampler: Sampling as Sequential Decision Making Sangwoong Yoon et.al. 2502.13280 translate read null
2025-02-18 A Survey of Anomaly Detection in Cyber-Physical Systems Danial Abshari et.al. 2502.13256 translate read null
2025-02-18 Statistically Significant $k$ NNAD by Selective Inference Mizuki Niihori et.al. 2502.12978 translate read null
2025-02-18 Fraud-R1 : A Multi-Round Benchmark for Assessing the Robustness of LLM Against Augmented Fraud and Phishing Inducements Shu Yang et.al. 2502.12904 translate read null
2025-02-18 Toward Cybersecurity Testing and Monitoring of IoT Ecosystems Steve Taylor et.al. 2502.12837 translate read null
2025-02-18 Unsupervised Anomaly Detection through Mass Repulsing Optimal Transport Eduardo Fernandes Montesuma et.al. 2502.12793 translate read null
2025-02-17 Hybrid Machine Learning Models for Intrusion Detection in IoT: Leveraging a Real-World IoT Dataset Md Ahnaf Akif et.al. 2502.12382 translate read null
2025-02-17 Positional Encoding in Transformer-Based Time Series Models: A Survey Habib Irani et.al. 2502.12370 translate read link
2025-02-17 Unifying Explainable Anomaly Detection and Root Cause Analysis in Dynamical Systems Yue Sun et.al. 2502.12086 translate read null
2025-02-17 Enhanced Anomaly Detection in IoMT Networks using Ensemble AI Models on the CICIoMT2024 Dataset Prathamesh Chandekar et.al. 2502.11854 translate read null
2025-02-17 Component-aware Unsupervised Logical Anomaly Generation for Industrial Anomaly Detection Xuan Tong et.al. 2502.11712 translate read null
2025-02-17 Towards a Trustworthy Anomaly Detection for Critical Applications through Approximated Partial AUC Loss Arnaud Bougaham et.al. 2502.11570 translate read null
2025-02-17 DCAD-2000: A Multilingual Dataset across 2000+ Languages with Data Cleaning as Anomaly Detection Yingli Shen et.al. 2502.11546 translate read link
2025-02-17 WRT-SAM: Foundation Model-Driven Segmentation for Generalized Weld Radiographic Testing Yunyi Zhou et.al. 2502.11338 translate read null
2025-02-16 Exploiting Point-Language Models with Dual-Prompts for 3D Anomaly Detection Jiaxiang Wang et.al. 2502.11307 translate read null
2025-02-16 Evaluating the Potential of Quantum Machine Learning in Cybersecurity: A Case-Study on PCA-based Intrusion Detection Systems Armando Bellante et.al. 2502.11173 translate read null
2025-02-16 Machine Learning-Based Intrusion Detection and Prevention System for IIoT Smart Metering Networks: Challenges and Solutions Sahar Lazim et.al. 2502.11138 translate read null
2025-02-15 A Computational Model for Ransomware Detection Using Cross-Domain Entropy Signatures Michael Mannon et.al. 2502.10711 translate read null
2025-02-14 Dynamic Fraud Proof Gabriele Picco et.al. 2502.10321 translate read null
2025-02-14 Anomaly Detection with LWE Encrypted Control Rijad Alisic et.al. 2502.10283 translate read null
2025-02-14 Control-flow anomaly detection by process mining-based feature extraction and dimensionality reduction Francesco Vitale et.al. 2502.10211 translate read null
2025-02-14 Enhancing anomaly detection with topology-aware autoencoders Vishal S. Ngairangbam et.al. 2502.10163 translate read null
2025-02-14 Robust Anomaly Detection via Tensor Chidori Pseudoskeleton Decomposition Bowen Su et.al. 2502.09926 translate read null
2025-02-13 Weakly supervised anomaly detection for resonant new physics in the dijet final state using proton-proton collisions at $\sqrt{s}=13$ TeV with the ATLAS detector ATLAS Collaboration et.al. 2502.09770 translate read null
2025-02-13 APT-LLM: Embedding-Based Anomaly Detection of Cyber Advanced Persistent Threats Using Large Language Models Sidahmed Benabderrahmane et.al. 2502.09385 translate read null
2025-02-13 AnomalyGFM: Graph Foundation Model for Zero/Few-shot Anomaly Detection Hezhe Qiao et.al. 2502.09254 translate read null
2025-02-13 XAInomaly: Explainable and Interpretable Deep Contractive Autoencoder for O-RAN Traffic Anomaly Detection Osman Tugay Basaran et.al. 2502.09194 translate read null
2025-02-13 Unsupervised Anomaly Detection on Implicit Shape representations for Sarcopenia Detection Louise Piecuch et.al. 2502.09088 translate read null
2025-02-13 Privacy-Preserving Hybrid Ensemble Model for Network Anomaly Detection: Balancing Security and Data Protection Shaobo Liu et.al. 2502.09001 translate read null
2025-02-12 Hierarchical Entropy Disruption for Ransomware Detection: A Computationally-Driven Framework Hayden Srynn et.al. 2502.08843 translate read null
2025-02-12 Investigation of Advanced Persistent Threats Network-based Tactics, Techniques and Procedures Almuthanna Alageel et.al. 2502.08830 translate read null
2025-02-12 CurvGAD: Leveraging Curvature for Enhanced Graph Anomaly Detection Karish Grover et.al. 2502.08605 translate read null
2025-02-12 Mapping the Landscape of Generative AI in Network Monitoring and Management Giampaolo Bovenzi et.al. 2502.08576 translate read null
2025-02-12 GenIAS: Generator for Instantiating Anomalies in time Series Zahra Zamanzadeh Darban et.al. 2502.08262 translate read null
2025-02-12 Out-of-Distribution Detection on Graphs: A Survey Tingyi Cai et.al. 2502.08105 translate read null
2025-02-11 MAAT: Mamba Adaptive Anomaly Transformer with association discrepancy for time series Abdellah Zakaria Sellam et.al. 2502.07858 translate read link
2025-02-11 Quantum-driven Zero Trust Framework with Dynamic Anomaly Detection in 7G Technology: A Neural Network Approach Shakil Ahmed et.al. 2502.07779 translate read null
2025-02-11 Advancing climate model interpretability: Feature attribution for Arctic melt anomalies Tolulope Ale et.al. 2502.07741 translate read null
2025-02-11 Methodology for Identifying Social Groups within a Transactional Graph Maxence Morin et.al. 2502.07694 translate read null
2025-02-11 Unsupervised Feature Extraction and Reconstruction Using Parameterized Quantum Circuits Li-An Lo et.al. 2502.07667 translate read link
2025-02-11 Towards Zero-Shot Anomaly Detection and Reasoning with Multimodal Large Language Models Jiacong Xu et.al. 2502.07601 translate read null
2025-02-11 FADE: Forecasting for Anomaly Detection on ECG Paula Ruiz-Barroso et.al. 2502.07389 translate read null
2025-02-10 SAFE: Self-Supervised Anomaly Detection Framework for Intrusion Detection Elvin Li et.al. 2502.07119 translate read null
2025-02-10 Leveraging GPT-4o Efficiency for Detecting Rework Anomaly in Business Processes Mohammad Derakhshan et.al. 2502.06918 translate read null
2025-02-10 Network Intrusion Datasets: A Survey, Limitations, and Recommendations Patrik Goldschmidt et.al. 2502.06688 translate read null
2025-02-10 An Efficient Security Model for Industrial Internet of Things (IIoT) System Based on Machine Learning Principles Sahar L. Qaddoori et.al. 2502.06502 translate read null
2025-02-10 Multimodal Task Representation Memory Bank vs. Catastrophic Forgetting in Anomaly Detection You Zhou et.al. 2502.06194 translate read null
2025-02-10 Fine-Tuning Federated Learning-Based Intrusion Detection Systems for Transportation IoT Robert Akinie et.al. 2502.06099 translate read null
2025-02-09 A Conditional Tabular GAN-Enhanced Intrusion Detection System for Rare Attacks in IoT Networks Safaa Menssouri et.al. 2502.06031 translate read null
2025-02-09 A 3D Multimodal Feature for Infrastructure Anomaly Detection Yixiong Jing et.al. 2502.05779 translate read link
2025-02-09 3CAD: A Large-Scale Real-World 3C Product Dataset for Unsupervised Anomaly Enquan Yang et.al. 2502.05761 translate read link
2025-02-08 Extended Histogram-based Outlier Score (EHBOS) Tanvir Islam et.al. 2502.05719 translate read null
2025-02-08 Federated Learning with Reservoir State Analysis for Time Series Anomaly Detection Keigo Nogami et.al. 2502.05679 translate read null
2025-02-08 Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning Runhua Xu et.al. 2502.05547 translate read null
2025-02-07 Federated Learning for Anomaly Detection in Energy Consumption Data: Assessing the Vulnerability to Adversarial Attacks Yohannis Kifle Telila et.al. 2502.05041 translate read null
2025-02-07 Robust Conformal Outlier Detection under Contaminated Reference Data Meshi Bashari et.al. 2502.04807 translate read null
2025-02-06 Finding Pegasus: Enhancing Unsupervised Anomaly Detection in High-Dimensional Data using a Manifold-Based Approach R. P. Nathan et.al. 2502.04310 translate read null
2025-02-06 NLP-Based .NET CLR Event Logs Analyzer Maxim Stavtsev et.al. 2502.04219 translate read null
2025-02-06 CleanSurvival: Automated data preprocessing for time-to-event models using reinforcement learning Yousef Koka et.al. 2502.03946 translate read null
2025-02-06 Technical Report: Generating the WEB-IDS23 Dataset Eric Lanfer et.al. 2502.03909 translate read null
2025-02-06 Hierarchical Entropic Diffusion for Ransomware Detection: A Probabilistic Approach to Behavioral Anomaly Isolation Vasili Iskorohodov et.al. 2502.03882 translate read null
2025-02-06 Position: Untrained Machine Learning for Anomaly Detection Juan Du et.al. 2502.03876 translate read null
2025-02-05 The Adoption of Artificial Intelligence in Different Network Security Concepts Mamoon A. Al Jbaar et.al. 2502.03398 translate read null
2025-02-05 A Structured Reasoning Framework for Unbalanced Data Classification Using Probabilistic Models Junliang Du et.al. 2502.03386 translate read null
2025-02-05 General Time-series Model for Universal Knowledge Representation of Multivariate Time-Series data Cheng He et.al. 2502.03264 translate read null
2025-02-05 Calibrated Unsupervised Anomaly Detection in Multivariate Time-series using Reinforcement Learning Saba Sanami et.al. 2502.03245 translate read null
2025-02-05 SpaceGNN: Multi-Space Graph Neural Network for Node Anomaly Detection with Extremely Limited Labels Xiangyu Dong et.al. 2502.03201 translate read null
2025-02-05 Gotham Dataset 2025: A Reproducible Large-Scale IoT Network Dataset for Intrusion Detection and Security Research Othmane Belarbi et.al. 2502.03134 translate read null
2025-02-05 Implementing Large Quantum Boltzmann Machines as Generative AI Models for Dataset Balancing Salvatore Sinno et.al. 2502.03086 translate read null
2025-02-05 Time Series Anomaly Detection in the Frequency Domain with Statistical Reliability Akifumi Yamada et.al. 2502.03062 translate read null
2025-02-05 TopoCL: Topological Contrastive Learning for Time Series Namwoo Kim et.al. 2502.02924 translate read null
2025-02-04 SHIELD: APT Detection and Intelligent Explanation Using LLM Parth Atulbhai Gandhi et.al. 2502.02342 translate read null
2025-02-04 FRAUD-RLA: A new reinforcement learning adversarial attack against credit card fraud detection Daniele Lunghi et.al. 2502.02290 translate read null
2025-02-04 LAST SToP For Modeling Asynchronous Time Series Shubham Gupta et.al. 2502.01922 translate read null
2025-02-04 Anomaly Detection via Autoencoder Composite Features and NCE Yalin Liao et.al. 2502.01920 translate read null
2025-02-03 A Poisson Process AutoDecoder for X-ray Sources Yanke Song et.al. 2502.01627 translate read null
2025-02-03 Federated Detection of Open Charge Point Protocol 1.6 Cyberattacks Christos Dalamagkas et.al. 2502.01569 translate read null
2025-02-03 Unsupervised anomaly detection in large-scale estuarine acoustic telemetry data Siphendulwe Zaza et.al. 2502.01543 translate read null
2025-02-03 Dense Subgraph Discovery Meets Strong Triadic Closure Chamalee Wickrama Arachchi et.al. 2502.01435 translate read null
2025-02-03 ConceptVAE: Self-Supervised Fine-Grained Concept Disentanglement from 2D Echocardiographies Costin F. Ciusdel et.al. 2502.01335 translate read null
2025-02-03 One-to-Normal: Anomaly Personalization for Few-shot Anomaly Detection Yiyue Li et.al. 2502.01201 translate read null
2025-02-03 Real-Time Anomaly Detection with Synthetic Anomaly Monitoring (SAM) Emanuele Luzio et.al. 2501.18417 translate read null

(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)