Anomaly Detection - 2025-04
Anomaly Detection - 2025-04
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-04-30 | Toward Practical Quantum Machine Learning: A Novel Hybrid Quantum LSTM for Fraud Detection | Rushikesh Ubale et.al. | 2505.00137 | translate | read | null |
| 2025-04-30 | Anomaly-Driven Approach for Enhanced Prostate Cancer Segmentation | Alessia Hu et.al. | 2504.21789 | translate | read | null |
| 2025-04-30 | Overlapping data in network protocols: bridging OS and NIDS reassembly gap | Lucas Aubard et.al. | 2504.21618 | translate | read | null |
| 2025-04-30 | Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation | Bikash Saha et.al. | 2504.21574 | translate | read | null |
| 2025-04-30 | Enhanced Semi-Supervised Stamping Process Monitoring with Physically-Informed Feature Extraction | Jianyu Zhang et.al. | 2504.21389 | translate | read | null |
| 2025-04-30 | Are Haicheng and Tangshan Earthquakes Dragon-Kings? | Jiawei Li et.al. | 2504.21310 | translate | read | null |
| 2025-04-30 | Learning Multi-view Multi-class Anomaly Detection | Qianzi Yu et.al. | 2504.21294 | translate | read | null |
| 2025-04-30 | Subject Information Extraction for Novelty Detection with Domain Shifts | Yangyang Qu et.al. | 2504.21247 | translate | read | null |
| 2025-04-29 | Optimized Quantum Embedding: A Universal Minor-Embedding Framework for Large Complete Bipartite Graph | Salvatore Sinno et.al. | 2504.21112 | translate | read | null |
| 2025-04-29 | On the Potential of Large Language Models to Solve Semantics-Aware Process Mining Tasks | Adrian Rebmann et.al. | 2504.21074 | translate | read | null |
| 2025-04-29 | Leveraging Generative AI Through Prompt Engineering and Rigorous Validation to Create Comprehensive Synthetic Datasets for AI Training in Healthcare | Polycarp Nalela et.al. | 2504.20921 | translate | read | null |
| 2025-04-29 | GiBy: A Giant-Step Baby-Step Classifier For Anomaly Detection In Industrial Control Systems | Sarad Venugopalan et.al. | 2504.20906 | translate | read | null |
| 2025-04-29 | Evaluating Generative Models for Tabular Data: Novel Metrics and Benchmarking | Dayananda Herurkar et.al. | 2504.20900 | translate | read | null |
| 2025-04-29 | Tabular Data Adapters: Improving Outlier Detection for Unlabeled Private Data | Dayananda Herurkar et.al. | 2504.20862 | translate | read | null |
| 2025-04-29 | Unsupervised Surrogate Anomaly Detection | Simon Klüttermann et.al. | 2504.20733 | translate | read | null |
| 2025-04-28 | The Dark Side of Digital Twins: Adversarial Attacks on AI-Driven Water Forecasting | Mohammadhossein Homaei et.al. | 2504.20295 | translate | read | null |
| 2025-04-28 | Smart Water Security with AI and Blockchain-Enhanced Digital Twins | Mohammadhossein Homaei et.al. | 2504.20275 | translate | read | null |
| 2025-04-28 | A Virtual Cybersecurity Department for Securing Digital Twins in Water Distribution Systems | Mohammadhossein Homaei et.al. | 2504.20266 | translate | read | null |
| 2025-04-28 | Cybersecurity for Autonomous Vehicles | Sai varun reddy Bhemavarapu et.al. | 2504.20180 | translate | read | null |
| 2025-04-28 | A Novel Multilevel Taxonomical Approach for Describing High-Dimensional Unlabeled Movement Data | Yashat Tavakoli et.al. | 2504.20174 | translate | read | null |
| 2025-04-28 | Simplified and Secure MCP Gateways for Enterprise AI Integration | Ivo Brett et.al. | 2504.19997 | translate | read | null |
| 2025-04-28 | Shopformer: Transformer-Based Framework for Detecting Shoplifting via Human Pose | Narges Rashvand et.al. | 2504.19970 | translate | read | null |
| 2025-04-28 | QFDNN: A Resource-Efficient Variational Quantum Feature Deep Neural Networks for Fraud Detection and Loan Prediction | Subham Das et.al. | 2504.19632 | translate | read | null |
| 2025-04-28 | LR-IAD:Mask-Free Industrial Anomaly Detection with Logical Reasoning | Peijian Zeng et.al. | 2504.19524 | translate | read | null |
| 2025-04-27 | Segmenting Objectiveness and Task-awareness Unknown Region for Autonomous Driving | Mi Zheng et.al. | 2504.19183 | translate | read | null |
| 2025-04-26 | Zero-Day Botnet Attack Detection in IoV: A Modular Approach Using Isolation Forests and Particle Swarm Optimization | Abdelaziz Amara korba et.al. | 2504.18814 | translate | read | null |
| 2025-04-26 | Reservoir-enhanced Segment Anything Model for Subsurface Diagnosis | Xiren Zhou et.al. | 2504.18802 | translate | read | null |
| 2025-04-26 | ALF: Advertiser Large Foundation Model for Multi-Modal Advertiser Understanding | Santosh Rajagopalan et.al. | 2504.18785 | translate | read | null |
| 2025-04-26 | Performance of Machine Learning Classifiers for Anomaly Detection in Cyber Security Applications | Markus Haug et.al. | 2504.18771 | translate | read | null |
| 2025-04-25 | Unsupervised outlier detection to improve bird audio dataset labels | Bruce Collins et.al. | 2504.18650 | translate | read | null |
| 2025-04-25 | An Unsupervised Machine Learning Approach to Identify Spectral Energy Distribution Outliers: Application to the S-PLUS DR4 data | F. Quispe-Huaynasi et.al. | 2504.18491 | translate | read | null |
| 2025-04-25 | Time and Frequency Domain-based Anomaly Detection in Smart Meter Data for Distribution Network Studies | Petar Labura et.al. | 2504.18231 | translate | read | null |
| 2025-04-25 | Bayesian Quantum Orthogonal Neural Networks for Anomaly Detection | Natansh Mathur et.al. | 2504.18103 | translate | read | null |
| 2025-04-24 | Enabling Deep Visibility into VxWorks-Based Embedded Controllers in Cyber-Physical Systems for Anomaly Detection | Prashanth Krishnamurthy et.al. | 2504.17875 | translate | read | null |
| 2025-04-24 | Fault Diagnosis in New Wind Turbines using Knowledge from Existing Turbines by Generative Domain Adaptation | Stefan Jonas et.al. | 2504.17709 | translate | read | null |
| 2025-04-24 | MindFlow: A Network Traffic Anomaly Detection Model Based on MindSpore | Qiuyan Xiang et.al. | 2504.17678 | translate | read | null |
| 2025-04-25 | PTCL: Pseudo-Label Temporal Curriculum Learning for Label-Limited Dynamic Graph | Shengtao Zhang et.al. | 2504.17641 | translate | read | null |
| 2025-04-24 | Quantum Autoencoder for Multivariate Time Series Anomaly Detection | Kilian Tscharke et.al. | 2504.17548 | translate | read | null |
| 2025-04-23 | Goodness-of-fit for amplitude analysis with anomaly detection | Huoyi Hou et.al. | 2504.17494 | translate | read | null |
| 2025-04-24 | Breaking the Flow and the Bank: Stealthy Cyberattacks on Water Network Hydraulics | Abdallah Alalem Albustami et.al. | 2504.17211 | translate | read | null |
| 2025-04-23 | Unsupervised Time-Series Signal Analysis with Autoencoders and Vision Transformers: A Review of Architectures and Applications | Hossein Ahmadi et.al. | 2504.16972 | translate | read | null |
| 2025-04-23 | CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping | Eric Wagner et.al. | 2504.16695 | translate | read | null |
| 2025-04-23 | A Collaborative Intrusion Detection System Using Snort IDS Nodes | Tom Davies et.al. | 2504.16550 | translate | read | null |
| 2025-04-23 | Almost Right: Making First-layer Kernels Nearly Orthogonal Improves Model Generalization | Colton R. Crum et.al. | 2504.16362 | translate | read | null |
| 2025-04-22 | Blockchain Meets Adaptive Honeypots: A Trust-Aware Approach to Next-Gen IoT Security | Yazan Otoum et.al. | 2504.16226 | translate | read | null |
| 2025-04-22 | Explainable Unsupervised Anomaly Detection with Random Forest | Joshua S. Harvey et.al. | 2504.16075 | translate | read | null |
| 2025-04-22 | Adaptive PCA-Based Outlier Detection for Multi-Feature Time Series in Space Missions | Jonah Ekelund et.al. | 2504.15846 | translate | read | null |
| 2025-04-22 | Bayesian Autoencoder for Medical Anomaly Detection: Uncertainty-Aware Approach for Brain 2 MRI Analysis | Dip Roy et.al. | 2504.15562 | translate | read | null |
| 2025-04-21 | Application of Deep Generative Models for Anomaly Detection in Complex Financial Transactions | Tengda Tang et.al. | 2504.15491 | translate | read | null |
| 2025-04-21 | FLARE: Feature-based Lightweight Aggregation for Robust Evaluation of IoT Intrusion Detection | Bradley Boswell et.al. | 2504.15375 | translate | read | null |
| 2025-04-21 | M $^2$ AD: Multi-Sensor Multi-System Anomaly Detection through Global Scoring and Calibrated Thresholding | Sarah Alnegheimish et.al. | 2504.15225 | translate | read | link |
| 2025-04-21 | GenCLIP: Generalizing CLIP Prompts for Zero-shot Anomaly Detection | Donghyeong Kim et.al. | 2504.14919 | translate | read | null |
| 2025-04-21 | Memory-Augmented Dual-Decoder Networks for Multi-Class Unsupervised Anomaly Detection | Jingyu Xing et.al. | 2504.14884 | translate | read | null |
| 2025-04-20 | Advancing Video Anomaly Detection: A Bi-Directional Hybrid Framework for Enhanced Single- and Multi-Task Approaches | Guodong Shen et.al. | 2504.14753 | translate | read | null |
| 2025-04-20 | Sensor Scheduling in Intrusion Detection Games with Uncertain Payoffs | Jayanth Bhargav et.al. | 2504.14725 | translate | read | null |
| 2025-04-20 | Uncovering Issues in the Radio Access Network by Looking at the Neighbors | José Suárez-Varela et.al. | 2504.14686 | translate | read | null |
| 2025-04-20 | Hierarchical Robust PCA for Scalable Data Quality Monitoring in Multi-level Aggregation Pipelines | Preetam Kumar Ojha et.al. | 2504.14524 | translate | read | null |
| 2025-04-20 | Application of Deep Reinforcement Learning for Intrusion Detection in Internet of Things: A Systematic Review | Saeid Jamshidia et.al. | 2504.14436 | translate | read | null |
| 2025-04-19 | Balancing Privacy and Action Performance: A Penalty-Driven Approach to Image Anonymization | Nazia Aslam et.al. | 2504.14301 | translate | read | null |
| 2025-04-19 | A Pre-Training and Adaptive Fine-Tuning Framework for Graph Anomaly Detection | Yunhui Liu et.al. | 2504.14250 | translate | read | null |
| 2025-04-18 | Enhancing Pothole Detection and Characterization: Integrated Segmentation and Depth Estimation in Road Anomaly Systems | Uthman Baroudi et.al. | 2504.13648 | translate | read | null |
| 2025-04-18 | Can Local Representation Alignment RNNs Solve Temporal Tasks? | Nikolay Manchev et.al. | 2504.13531 | translate | read | null |
| 2025-04-18 | Chain-of-Thought Textual Reasoning for Few-shot Temporal Action Localization | Hongwei Ji et.al. | 2504.13460 | translate | read | null |
| 2025-04-18 | Towards a Multi-Agent Vision-Language System for Zero-Shot Novel Hazardous Object Detection for Autonomous Driving Safety | Shashank Shriram et.al. | 2504.13399 | translate | read | null |
| 2025-04-17 | DYNAMITE: Dynamic Defense Selection for Enhancing Machine Learning-based Intrusion Detection Against Adversarial Attacks | Jing Chen et.al. | 2504.13301 | translate | read | null |
| 2025-04-17 | Weakly supervised anomaly detection with event-level variables | Liam Brennan et.al. | 2504.13249 | translate | read | null |
| 2025-04-17 | Predicting BVD Re-emergence in Irish Cattle From Highly Imbalanced Herd-Level Data Using Machine Learning Algorithms | Niamh Mimnagh et.al. | 2504.13116 | translate | read | null |
| 2025-04-17 | Quorum: Zero-Training Unsupervised Anomaly Detection using Quantum Autoencoders | Jason Zev Ludmir et.al. | 2504.13113 | translate | read | link |
| 2025-04-17 | EventVAD: Training-Free Event-Aware Video Anomaly Detection | Yihua Shao et.al. | 2504.13092 | translate | read | null |
| 2025-04-17 | MathPhys-Guided Coarse-to-Fine Anomaly Synthesis with SQE-Driven Bi-Level Optimization for Anomaly Detection | Long Qian et.al. | 2504.12970 | translate | read | null |
| 2025-04-17 | Sliced-Wasserstein Distance-based Data Selection | Julien Pallage et.al. | 2504.12918 | translate | read | null |
| 2025-04-17 | 3D-PNAS: 3D Industrial Surface Anomaly Synthesis with Perlin Noise | Yifeng Cheng et.al. | 2504.12856 | translate | read | null |
| 2025-04-17 | LAD-Reasoner: Tiny Multimodal Models are Good Reasoners for Logical Anomaly Detection | Weijia Li et.al. | 2504.12749 | translate | read | null |
| 2025-04-17 | HSS-IAD: A Heterogeneous Same-Sort Industrial Anomaly Detection Dataset | Qishan Wang et.al. | 2504.12689 | translate | read | link |
| 2025-04-16 | Enhancing Sensitivity for Di-Higgs Boson Searches Using Anomaly Detection and Supervised Machine Learning Techniques | Sergei V. Chekanov et.al. | 2504.12418 | translate | read | null |
| 2025-04-16 | AnomalyGen: An Automated Semantic Log Sequence Generation Framework with LLM for Anomaly Detection | Xinyu Li et.al. | 2504.12250 | translate | read | null |
| 2025-04-16 | LO2: Microservice API Anomaly Dataset of Logs and Metrics | Alexander Bakhtin et.al. | 2504.12067 | translate | read | null |
| 2025-04-16 | AnomalyR1: A GRPO-based End-to-end MLLM for Industrial Anomaly Detection | Yuhao Chao et.al. | 2504.11914 | translate | read | null |
| 2025-04-16 | Search is All You Need for Few-shot Anomaly Detection | Qishan Wang et.al. | 2504.11895 | translate | read | link |
| 2025-04-16 | Federated Spectral Graph Transformers Meet Neural Ordinary Differential Equations for Non-IID Graphs | Kishan Gurumurthy et.al. | 2504.11808 | translate | read | null |
| 2025-04-16 | ACMamba: Fast Unsupervised Anomaly Detection via An Asymmetrical Consensus State Space Model | Guanchun Wang et.al. | 2504.11781 | translate | read | null |
| 2025-04-15 | Possibility for Proactive Anomaly Detection | Jinsung Jeon et.al. | 2504.11623 | translate | read | null |
| 2025-04-15 | Strengthening Anomaly Awareness | Adam Banda et.al. | 2504.11520 | translate | read | null |
| 2025-04-15 | HeatSense: Intelligent Thermal Anomaly Detection for Securing NoC-Enabled MPSoCs | Mahdi Hasanzadeh et.al. | 2504.11421 | translate | read | null |
| 2025-04-16 | A Real-time Anomaly Detection Method for Robots based on a Flexible and Sparse Latent Space | Taewook Kang et.al. | 2504.11170 | translate | read | null |
| 2025-04-15 | Crane: Context-Guided Prompt Learning and Attention Refinement for Zero-Shot Anomaly Detections | Alireza Salehi et.al. | 2504.11055 | translate | read | null |
| 2025-04-15 | AFiRe: Anatomy-Driven Self-Supervised Learning for Fine-Grained Representation in Radiographic Images | Yihang Liu et.al. | 2504.10972 | translate | read | null |
| 2025-04-14 | Optimising Intrusion Detection Systems in Cloud-Edge Continuum with Knowledge Distillation for Privacy-Preserving and Efficient Communication | Soad Almabdy et.al. | 2504.10698 | translate | read | null |
| 2025-04-14 | SlowFastVAD: Video Anomaly Detection via Integrating Simple Detector and RAG-Enhanced Vision-Language Model | Zongcan Ding et.al. | 2504.10320 | translate | read | null |
| 2025-04-14 | ROSFD: Robust Online Streaming Fraud Detection with Resilience to Concept Drift in Data Streams | Vivek Yelleti et.al. | 2504.10229 | translate | read | null |
| 2025-04-14 | Investigating the Role of Bilateral Symmetry for Inpainting Brain MRI | Sergey Kuznetsov et.al. | 2504.10039 | translate | read | null |
| 2025-04-13 | Evaluating Machine Learning-Driven Intrusion Detection Systems in IoT: Performance and Energy Consumption | Saeid Jamshidi et.al. | 2504.09634 | translate | read | null |
| 2025-04-13 | MADLLM: Multivariate Anomaly Detection via Pre-trained LLMs | Wei Tao et.al. | 2504.09504 | translate | read | null |
| 2025-04-12 | Dupin: A Parallel Framework for Densest Subgraph Discovery in Fraud Detection on Massive Graphs (Technical Report) | Jiaxin Jiang et.al. | 2504.09311 | translate | read | null |
| 2025-04-12 | Secure Physical Layer Communications for Low-Altitude Economy Networking: A Survey | Lingyi Cai et.al. | 2504.09153 | translate | read | null |
| 2025-04-12 | CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift | Jiongchi Yu et.al. | 2504.09115 | translate | read | null |
| 2025-04-12 | Leveraging Large Self-Supervised Time-Series Models for Transferable Diagnosis in Cross-Aircraft Type Bleed Air System | Yilin Wang et.al. | 2504.09090 | translate | read | null |
| 2025-04-11 | Toward Realistic Adversarial Attacks in IDS: A Novel Feasibility Metric for Transferability | Sabrine Ennaji et.al. | 2504.08480 | translate | read | null |
| 2025-04-11 | DaemonSec: Examining the Role of Machine Learning for Daemon Security in Linux Environments | Sheikh Muhammad Farjad et.al. | 2504.08227 | translate | read | null |
| 2025-04-11 | Detecting Credit Card Fraud via Heterogeneous Graph Neural Networks with Graph Attention | Qiuwu Sha et.al. | 2504.08183 | translate | read | null |
| 2025-04-10 | Benchmarking Suite for Synthetic Aperture Radar Imagery Anomaly Detection (SARIAD) Algorithms | Lucian Chauvina et.al. | 2504.08115 | translate | read | null |
| 2025-04-10 | Dataset of artefacts for machine learning applications in astronomy | Sreevarsha Sreejith et.al. | 2504.08053 | translate | read | null |
| 2025-04-10 | Patch distribution modeling framework adaptive cosine estimator (PaDiM-ACE) for anomaly detection and localization in synthetic aperture radar imagery | Angelina Ibarra et.al. | 2504.08049 | translate | read | null |
| 2025-04-10 | Deep Learning-based Intrusion Detection Systems: A Survey | Zhiwei Xu et.al. | 2504.07839 | translate | read | null |
| 2025-04-10 | PR-Attack: Coordinated Prompt-RAG Attacks on Retrieval-Augmented Generation in Large Language Models via Bilevel Optimization | Yang Jiao et.al. | 2504.07717 | translate | read | null |
| 2025-04-10 | Adversarial Subspace Generation for Outlier Detection in High-Dimensional Data | Jose Cribeiro-Ramallo et.al. | 2504.07522 | translate | read | link |
| 2025-04-10 | Intelligent DoS and DDoS Detection: A Hybrid GRU-NTM Approach to Network Security | Caroline Panggabean et.al. | 2504.07478 | translate | read | null |
| 2025-04-09 | Leveraging Machine Learning Techniques in Intrusion Detection Systems for Internet of Things | Saeid Jamshidi et.al. | 2504.07220 | translate | read | null |
| 2025-04-09 | Weak Signals and Heavy Tails: Machine-learning meets Extreme Value Theory | Stephan Clémençon et.al. | 2504.06984 | translate | read | null |
| 2025-04-09 | MultiADS: Defect-aware Supervision for Multi-type Anomaly Detection and Segmentation in Zero-Shot Learning | Ylli Sadikaj et.al. | 2504.06740 | translate | read | null |
| 2025-04-10 | AMAD: AutoMasked Attention for Unsupervised Multivariate Time Series Anomaly Detection | Tiange Huang et.al. | 2504.06643 | translate | read | null |
| 2025-04-08 | TRIDENT: Tri-modal Real-time Intrusion Detection Engine for New Targets | Ildi Alla et.al. | 2504.06417 | translate | read | link |
| 2025-04-08 | A Case for Network-wide Orchestration of Host-based Intrusion Detection and Response | Mark Timmons et.al. | 2504.06241 | translate | read | null |
| 2025-04-08 | A Self-Supervised Framework for Space Object Behaviour Characterisation | Ian Groves et.al. | 2504.06176 | translate | read | null |
| 2025-04-08 | Sherlock: A Dataset for Process-aware Intrusion Detection Research on Power Grid Networks | Eric Wagner et.al. | 2504.06102 | translate | read | null |
| 2025-04-08 | MCAT: Visual Query-Based Localization of Standard Anatomical Clips in Fetal Ultrasound Videos Using Multi-Tier Class-Aware Token Transformer | Divyanshu Mishra et.al. | 2504.06088 | translate | read | null |
| 2025-04-08 | Enhanced Anomaly Detection for Capsule Endoscopy Using Ensemble Learning Strategies | Julia Werner et.al. | 2504.06039 | translate | read | null |
| 2025-04-08 | Autoencoder-Based Detection of Anomalous Stokes V Spectra in the Flare-Producing Active Region 13663 Using Hinode/SP Observations | Jargalmaa Batmunkh et.al. | 2504.05962 | translate | read | null |
| 2025-04-08 | Addressing Class Imbalance with Probabilistic Graphical Models and Variational Inference | Yujia Lou et.al. | 2504.05758 | translate | read | null |
| 2025-04-08 | Reconstruction-Free Anomaly Detection with Diffusion Models via Direct Latent Likelihood Evaluation | Shunsuke Sakai et.al. | 2504.05662 | translate | read | null |
| 2025-04-07 | Towards Efficient Real-Time Video Motion Transfer via Generative Time Series Modeling | Tasmiah Haque et.al. | 2504.05537 | translate | read | null |
| 2025-04-07 | On multipolar magnetic anomaly detection: multipolar signal subspaces, an analytical orthonormal basis, multipolar truncature and detection performance | Clément Chenevas-Paule et.al. | 2504.05212 | translate | read | null |
| 2025-04-07 | IterMask3D: Unsupervised Anomaly Detection and Segmentation with Test-Time Iterative Mask Refinement in 3D Brain MR | Ziyun Liang et.al. | 2504.04911 | translate | read | null |
| 2025-04-07 | SoK: LLM-based Log Parsing | Viktor Beck et.al. | 2504.04877 | translate | read | null |
| 2025-04-06 | AVadCLIP: Audio-Visual Collaboration for Robust Video Anomaly Detection | Peng Wu et.al. | 2504.04495 | translate | read | null |
| 2025-04-06 | iADCPS: Time Series Anomaly Detection for Evolving Cyber-physical Systems via Incremental Meta-learning | Jiyu Tian et.al. | 2504.04374 | translate | read | null |
| 2025-04-06 | WeiDetect: Weibull Distribution-Based Defense against Poisoning Attacks in Federated Learning for Network Intrusion Detection Systems | Sameera K. M. et.al. | 2504.04367 | translate | read | null |
| 2025-04-06 | AnomalyHybrid: A Domain-agnostic Generative Framework for General Anomaly Detection | Ying Zhao et.al. | 2504.04340 | translate | read | null |
| 2025-04-05 | AttackLLM: LLM-based Attack Pattern Generation for an Industrial Control System | Chuadhry Mujeeb Ahmed et.al. | 2504.04187 | translate | read | null |
| 2025-04-05 | Overcoming the Identity Mapping Problem in Self-Supervised Hyperspectral Anomaly Detection | Yongchuan Cui et.al. | 2504.04115 | translate | read | null |
| 2025-04-05 | Foundation Models for Time Series: A Survey | Siva Rama Krishna Kottapalli et.al. | 2504.04011 | translate | read | null |
| 2025-04-04 | Pyramid-based Mamba Multi-class Unsupervised Anomaly Detection | Nasar Iqbal et.al. | 2504.03442 | translate | read | null |
| 2025-04-04 | Multi-Flow: Multi-View-Enriched Normalizing Flows for Industrial Anomaly Detection | Mathis Kruse et.al. | 2504.03306 | translate | read | null |
| 2025-04-04 | Search for anomalous quartic gauge couplings in the process $μ^+μ^-\to \barννγγ$ with a nested local outlier factor | Ke-Xin Chen et.al. | 2504.03145 | translate | read | null |
| 2025-04-03 | Anomaly Detection in Time Series Data Using Reinforcement Learning, Variational Autoencoder, and Active Learning | Bahareh Golchin et.al. | 2504.02999 | translate | read | null |
| 2025-04-03 | Improving log-based anomaly detection through learned adaptive filter | Yiyuan Xiong et.al. | 2504.02994 | translate | read | null |
| 2025-04-03 | TailedCore: Few-Shot Sampling for Unsupervised Long-Tail Noisy Anomaly Detection | Yoon Gyo Jung et.al. | 2504.02775 | translate | read | null |
| 2025-04-03 | Analytical Discovery of Manifold with Machine Learning | Yafei Shen et.al. | 2504.02511 | translate | read | null |
| 2025-04-03 | ZClip: Adaptive Spike Mitigation for LLM Pre-Training | Abhay Kumar et.al. | 2504.02507 | translate | read | link |
| 2025-04-03 | VISTA: Unsupervised 2D Temporal Dependency Representations for Time Series Anomaly Detection | Sinchee Chin et.al. | 2504.02498 | translate | read | null |
| 2025-04-03 | Robust Randomized Low-Rank Approximation with Row-Wise Outlier Detection | Aidan Tiruvan et.al. | 2504.02432 | translate | read | null |
| 2025-04-03 | Distributed Log-driven Anomaly Detection System based on Evolving Decision Making | Zhuoran Tan et.al. | 2504.02322 | translate | read | null |
| 2025-04-03 | Enhancing Customer Contact Efficiency with Graph Neural Networks in Credit Card Fraud Detection Workflow | Menghao Huo et.al. | 2504.02275 | translate | read | null |
| 2025-04-03 | CRC-SGAD: Conformal Risk Control for Supervised Graph Anomaly Detection | Songran Bai et.al. | 2504.02248 | translate | read | null |
| 2025-04-02 | LogLSHD: Fast Log Parsing with Locality-Sensitive Hashing and Dynamic Time Warping | Shu-Wei Huang et.al. | 2504.02172 | translate | read | null |
| 2025-04-03 | Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries | Furkan Çolhak et.al. | 2504.01905 | translate | read | null |
| 2025-04-02 | CO-DEFEND: Continuous Decentralized Federated Learning for Secure DoH-Based Threat Detection | Diego Cajaraville-Aboy et.al. | 2504.01882 | translate | read | null |
| 2025-04-02 | What is AI, what is it not, how we use it in physics and how it impacts… you | Claire David et.al. | 2504.01827 | translate | read | null |
| 2025-04-02 | Anomaly Detection for Hybrid Butterfly Subspecies via Probability Filtering | Bo-Kai Ruan et.al. | 2504.01671 | translate | read | null |
| 2025-04-02 | The Multifractal IP Address Structure: Physical Explanation and Implications | Chris Misa et.al. | 2504.01374 | translate | read | null |
| 2025-04-01 | Towards Resilient Federated Learning in CyberEdge Networks: Recent Advances and Future Trends | Kai Li et.al. | 2504.01240 | translate | read | null |
| 2025-04-01 | Conformal Anomaly Detection for Functional Data with Elastic Distance Metrics | Jason Adams et.al. | 2504.01172 | translate | read | null |
| 2025-04-01 | Efficient State Estimation of a Networked FlipIt Model | Brandon Collins et.al. | 2504.01096 | translate | read | null |
| 2025-04-01 | Detection of Anomalous Vehicular Traffic and Sensor Failures Using Data Clustering Techniques | Davide Moretti et.al. | 2504.00881 | translate | read | null |
| 2025-04-01 | FeatInsight: An Online ML Feature Management System on 4Paradigm Sage-Studio Platform | Xin Tong et.al. | 2504.00786 | translate | read | null |
| 2025-04-01 | TeleAntiFraud-28k: An Audio-Text Slow-Thinking Dataset for Telecom Fraud Detection | Zhiming Ma et.al. | 2503.24115 | translate | read | link |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)