Anomaly Detection - 2025-05
Anomaly Detection - 2025-05
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-05-30 | Harnessing Large Language Models for Scientific Novelty Detection | Yan Liu et.al. | 2505.24615 | translate | read | null |
| 2025-05-30 | HLSAD: Hodge Laplacian-based Simplicial Anomaly Detection | Florian Frantzen et.al. | 2505.24534 | translate | read | null |
| 2025-05-30 | Diversify and Conquer: Open-set Disagreement for Robust Semi-supervised Learning with Outliers | Heejo Kong et.al. | 2505.24443 | translate | read | link |
| 2025-05-30 | Bridging 3D Anomaly Localization and Repair via High-Quality Continuous Geometric Representation | Bozhong Zheng et.al. | 2505.24431 | translate | read | null |
| 2025-05-30 | Anomaly Detection and Improvement of Clusters using Enhanced K-Means Algorithm | Vardhan Shorewala et.al. | 2505.24365 | translate | read | null |
| 2025-05-30 | KairosAD: A SAM-Based Model for Industrial Anomaly Detection on Embedded Devices | Uzair Khan et.al. | 2505.24334 | translate | read | null |
| 2025-05-30 | INSIGHT: A Survey of In-Network Systems for Intelligent, High-Efficiency AI and Topology Optimization | Aleksandr Algazinov et.al. | 2505.24269 | translate | read | null |
| 2025-05-30 | SentinelAgent: Graph-based Anomaly Detection in Multi-Agent Systems | Xu He et.al. | 2505.24201 | translate | read | null |
| 2025-05-29 | Machine Learning-Based Anomaly Detection of Correlated Sensor Data: An Integrated Principal Component Analysis-Autoencoder Approach | Tanish Baranwal et.al. | 2505.24044 | translate | read | null |
| 2025-05-29 | An Advanced Cyber-Physical System Security Testbed for Substation Automation | Akila Herath et.al. | 2505.24021 | translate | read | null |
| 2025-05-29 | Distributed Federated Learning for Vehicular Network Security: Anomaly Detection Benefits and Multi-Domain Attack Threats | Utku Demir et.al. | 2505.23706 | translate | read | null |
| 2025-05-29 | VAU-R1: Advancing Video Anomaly Understanding via Reinforcement Fine-Tuning | Liyun Zhu et.al. | 2505.23504 | translate | read | link |
| 2025-05-29 | Sentinel: Scheduling Live Streams with Proactive Anomaly Detection in Crowdsourced Cloud-Edge Platforms | Yuting Li et.al. | 2505.23347 | translate | read | null |
| 2025-05-29 | FreRA: A Frequency-Refined Augmentation for Contrastive Learning on Time Series Classification | Tian Tian et.al. | 2505.23181 | translate | read | link |
| 2025-05-28 | Anomalies by Synthesis: Anomaly Detection using Generative Diffusion Models for Off-Road Navigation | Siddharth Ancha et.al. | 2505.22805 | translate | read | null |
| 2025-05-28 | Evaluating Supervised Learning Models for Fraud Detection: A Comparative Study of Classical and Deep Architectures on Imbalanced Transaction Data | Chao Wang et.al. | 2505.22521 | translate | read | null |
| 2025-05-28 | Does Johnny Get the Message? Evaluating Cybersecurity Notifications for Everyday Users | Victor Jüttner et.al. | 2505.22435 | translate | read | null |
| 2025-05-28 | Domain Adaptation of Attention Heads for Zero-shot Anomaly Detection | Kiyoon Jeong et.al. | 2505.22259 | translate | read | null |
| 2025-05-28 | OmniAD: Detect and Understand Industrial Anomaly via Multimodal Reasoning | Shifang Zhao et.al. | 2505.22039 | translate | read | null |
| 2025-05-28 | A2Seek: Towards Reasoning-Centric Benchmark for Aerial Anomaly Understanding | Mengjingcheng Mo et.al. | 2505.21962 | translate | read | null |
| 2025-05-27 | Mentor3AD: Feature Reconstruction-based 3D Anomaly Detection via Multi-modality Mentor Learning | Jinbao Wang et.al. | 2505.21420 | translate | read | null |
| 2025-05-27 | Learnable Kernel Density Estimation for Graphs | Xudong Wang et.al. | 2505.21285 | translate | read | null |
| 2025-05-27 | Is Hyperbolic Space All You Need for Medical Anomaly Detection? | Alvaro Gonzalez-Jimenez et.al. | 2505.21228 | translate | read | null |
| 2025-05-27 | RoBiS: Robust Binary Segmentation for High-Resolution Industrial Images | Xurui Li et.al. | 2505.21152 | translate | read | link |
| 2025-05-27 | Robust and Explainable Detector of Time Series Anomaly via Augmenting Multiclass Pseudo-Anomalies | Kohei Obata et.al. | 2505.20765 | translate | read | null |
| 2025-05-26 | Byzantine-Resilient Distributed P2P Energy Trading via Spatial-Temporal Anomaly Detection | Junhong Liu et.al. | 2505.20567 | translate | read | null |
| 2025-05-26 | Cellwise and Casewise Robust Covariance in High Dimensions | Fabio Centofanti et.al. | 2505.19925 | translate | read | null |
| 2025-05-26 | Vad-R1: Towards Video Anomaly Reasoning via Perception-to-Cognition Chain-of-Thought | Chao Huang et.al. | 2505.19877 | translate | read | link |
| 2025-05-26 | Multi-Agent Reinforcement Learning in Cybersecurity: From Fundamentals to Applications | Christoph R. Landolt et.al. | 2505.19837 | translate | read | null |
| 2025-05-27 | SuperAD: A Training-free Anomaly Classification and Segmentation Method for CVPR 2025 VAND 3.0 Workshop Challenge Track 1: Adapt & Detect | Huaiyuan Zhang et.al. | 2505.19750 | translate | read | null |
| 2025-05-26 | ICS for complex data with application to outlier detection for density data | Camille Mondon et.al. | 2505.19403 | translate | read | link |
| 2025-05-25 | Co-evolutionary Dynamics of Attack and Defence in Cybersecurity | Adeela Bashir et.al. | 2505.19338 | translate | read | null |
| 2025-05-25 | Rethinking Metrics and Benchmarks of Video Anomaly Detection | Zihao Liu et.al. | 2505.19022 | translate | read | null |
| 2025-05-25 | Chi-Square Wavelet Graph Neural Networks for Heterogeneous Graph Anomaly Detection | Xiping Li et.al. | 2505.18934 | translate | read | null |
| 2025-05-25 | Words as Geometric Features: Estimating Homography using Optical Character Recognition as Compressed Image Representation | Ross Greer et.al. | 2505.18925 | translate | read | null |
| 2025-05-24 | Anomaly detection in radio galaxy data with trainable COSFIRE filters | Steven Ndung’u et.al. | 2505.18643 | translate | read | null |
| 2025-05-23 | Rethinking Contrastive Learning in Graph Anomaly Detection: A Clean-View Perspective | Di Jin et.al. | 2505.18002 | translate | read | null |
| 2025-05-23 | Hyperspectral Anomaly Detection Fused Unified Nonconvex Tensor Ring Factors Regularization | Wenjin Qin et.al. | 2505.17881 | translate | read | null |
| 2025-05-23 | ViP $^2$ -CLIP: Visual-Perception Prompting with Unified Alignment for Zero-Shot Anomaly Detection | Ziteng Yang et.al. | 2505.17692 | translate | read | null |
| 2025-05-23 | Automating Versatile Time-Series Analysis with Tiny Transformers on Embedded FPGAs | Tianheng Ling et.al. | 2505.17662 | translate | read | null |
| 2025-05-23 | Large Language Models in the IoT Ecosystem – A Survey on Security Challenges and Applications | Kushal Khatiwada et.al. | 2505.17586 | translate | read | null |
| 2025-05-23 | Center-aware Residual Anomaly Synthesis for Multi-class Industrial Anomaly Detection | Qiyu Chen et.al. | 2505.17551 | translate | read | null |
| 2025-05-22 | Harnessing EHRs for Diffusion-based Anomaly Detection on Chest X-rays | Harim Kim et.al. | 2505.17311 | translate | read | null |
| 2025-05-22 | Advancing Security with Digital Twins: A Comprehensive Survey | Blessing Airehenbuwa et.al. | 2505.17310 | translate | read | null |
| 2025-05-22 | Vehicular Intrusion Detection System for Controller Area Network: A Comprehensive Survey and Evaluation | Yangyang Liu et.al. | 2505.17274 | translate | read | null |
| 2025-05-22 | A Multi-Step Comparative Framework for Anomaly Detection in IoT Data Streams | Mohammed Al-Qudah et.al. | 2505.16872 | translate | read | null |
| 2025-05-22 | Zero-Shot Anomaly Detection in Battery Thermal Images Using Visual Question Answering with Prior Knowledge | Marcella Astrid et.al. | 2505.16674 | translate | read | null |
| 2025-05-22 | SD-MAD: Sign-Driven Few-shot Multi-Anomaly Detection in Medical Images | Kaiyu Guo et.al. | 2505.16659 | translate | read | null |
| 2025-05-22 | Unsupervised Network Anomaly Detection with Autoencoders and Traffic Images | Michael Neri et.al. | 2505.16650 | translate | read | link |
| 2025-05-22 | Is Your LLM-Based Multi-Agent a Reliable Real-World Planner? Exploring Fraud Detection in Travel Planning | Junchi Yao et.al. | 2505.16557 | translate | read | null |
| 2025-05-22 | Privacy-Aware Cyberterrorism Network Analysis using Graph Neural Networks and Federated Learning | Anas Ali et.al. | 2505.16371 | translate | read | null |
| 2025-05-22 | Learning novel representations of variable sources from multi-modal $\textit{Gaia}$ data via autoencoders | P. Huijse et.al. | 2505.16320 | translate | read | null |
| 2025-05-22 | Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models | Kalindi Singh et.al. | 2505.16261 | translate | read | null |
| 2025-05-22 | MADCluster: Model-agnostic Anomaly Detection with Self-supervised Clustering Network | Sangyong Lee et.al. | 2505.16223 | translate | read | null |
| 2025-05-22 | A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles | Md Ashraf Uddin et.al. | 2505.16215 | translate | read | null |
| 2025-05-21 | Federated Learning-Enhanced Blockchain Framework for Privacy-Preserving Intrusion Detection in Industrial IoT | Anas Ali et.al. | 2505.15376 | translate | read | null |
| 2025-05-21 | Flashback: Memory-Driven Zero-shot, Real-time Video Anomaly Detection | Hyogun Lee et.al. | 2505.15205 | translate | read | null |
| 2025-05-20 | Anomaly Detection Based on Critical Paths for Deep Neural Networks | Fangzhen Zhao et.al. | 2505.14967 | translate | read | null |
| 2025-05-20 | SecCAN: An Extended CAN Controller with Embedded Intrusion Detection | Shashwat Khandelwal et.al. | 2505.14924 | translate | read | null |
| 2025-05-20 | Adaptive Pruning of Deep Neural Networks for Resource-Aware Embedded Intrusion Detection on the Edge | Alexandre Broggi et.al. | 2505.14592 | translate | read | null |
| 2025-05-20 | AquaSignal: An Integrated Framework for Robust Underwater Acoustic Analysis | Eirini Panteli et.al. | 2505.14285 | translate | read | null |
| 2025-05-20 | Partition-wise Graph Filtering: A Unified Perspective Through the Lens of Graph Coarsening | Guoming Li et.al. | 2505.14033 | translate | read | null |
| 2025-05-20 | CSAGC-IDS: A Dual-Module Deep Learning Network Intrusion Detection Model for Complex and Imbalanced Data | Yifan Zeng et.al. | 2505.14027 | translate | read | null |
| 2025-05-20 | Multimodal RAG-driven Anomaly Detection and Classification in Laser Powder Bed Fusion using Large Language Models | Kiarash Naghavi Khanghah et.al. | 2505.13828 | translate | read | null |
| 2025-05-19 | Unsupervised anomaly detection in MeV ultrafast electron diffraction | Mariana A. Fazio et.al. | 2505.13702 | translate | read | null |
| 2025-05-19 | Sensitivity to New Physics Phenomena in Anomaly Detection: A Study of Untunable Hyperparameters | Fernando Abreu de Souza et.al. | 2505.13228 | translate | read | null |
| 2025-05-19 | Just Dance with $π$ ! A Poly-modal Inductor for Weakly-supervised Video Anomaly Detection | Snehashis Majhi et.al. | 2505.13123 | translate | read | null |
| 2025-05-19 | TSPulse: Dual Space Tiny Pre-Trained Models for Rapid Time-Series Analysis | Vijay Ekambaram et.al. | 2505.13033 | translate | read | null |
| 2025-05-19 | Structure-based Anomaly Detection and Clustering | Filippo Leveni et.al. | 2505.12751 | translate | read | null |
| 2025-05-19 | AD-AGENT: A Multi-agent Framework for End-to-end Anomaly Detection | Tiankai Yang et.al. | 2505.12594 | translate | read | null |
| 2025-05-18 | Importance Sampling for Nonlinear Models | Prakash Palanivelu Rajmohan et.al. | 2505.12353 | translate | read | link |
| 2025-05-17 | PyScrew: A Comprehensive Dataset Collection from Industrial Screw Driving Experiments | Nikolai West et.al. | 2505.11925 | translate | read | null |
| 2025-05-17 | Robust outlier detection for heterogeneous distributions applicable to censoring in functional MRI | Saranjeet Singh Saluja et.al. | 2505.11806 | translate | read | null |
| 2025-05-17 | Are vision language models robust to uncertain inputs? | Xi Wang et.al. | 2505.11804 | translate | read | null |
| 2025-05-17 | CL-BioGAN: Biologically-Inspired Cross-Domain Continual Learning for Hyperspectral Anomaly Detection | Jianing Wang et.al. | 2505.11796 | translate | read | null |
| 2025-05-16 | Anomaly Detection for Non-stationary Time Series using Recurrent Wavelet Probabilistic Neural Network | Pu Yang et.al. | 2505.11321 | translate | read | null |
| 2025-05-16 | Diffusion Model in Hyperspectral Image Processing and Analysis: A Review | Xing Hu et.al. | 2505.11158 | translate | read | null |
| 2025-05-16 | Fairness-aware Anomaly Detection via Fair Projection | Feng Xiao et.al. | 2505.11132 | translate | read | null |
| 2025-05-16 | Visual Anomaly Detection under Complex View-Illumination Interplay: A Large-Scale Benchmark | Yunkang Cao et.al. | 2505.10996 | translate | read | link |
| 2025-05-16 | Preference Isolation Forest for Structure-based Anomaly Detection | Filippo Leveni et.al. | 2505.10876 | translate | read | null |
| 2025-05-16 | Hashing for Structure-based Anomaly Detection | Filippo Leveni et.al. | 2505.10873 | translate | read | null |
| 2025-05-15 | PIF: Anomaly detection via preference embedding | Filippo Leveni et.al. | 2505.10441 | translate | read | null |
| 2025-05-15 | A Representation Learning Approach to Feature Drift Detection in Wireless Networks | Athanasios Tziouvaras et.al. | 2505.10325 | translate | read | null |
| 2025-05-15 | Financial Fraud Detection Using Explainable AI and Stacking Ensemble Methods | Fahad Almalki et.al. | 2505.10050 | translate | read | null |
| 2025-05-15 | AdaptCLIP: Adapting CLIP for Universal Visual Anomaly Detection | Bin-Bin Gao et.al. | 2505.09926 | translate | read | link |
| 2025-05-15 | Correlating Account on Ethereum Mixing Service via Domain-Invariant feature learning | Zheng Che et.al. | 2505.09892 | translate | read | null |
| 2025-05-14 | Online Isolation Forest | Filippo Leveni et.al. | 2505.09593 | translate | read | link |
| 2025-05-14 | CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations | Denis Donadel et.al. | 2505.09384 | translate | read | null |
| 2025-05-14 | MetaUAS: Universal Anomaly Segmentation with One-Prompt Meta-Learning | Bin-Bin Gao et.al. | 2505.09265 | translate | read | link |
| 2025-05-14 | Learning to Detect Multi-class Anomalies with Just One Normal Image Prompt | Bin-Bin Gao et.al. | 2505.09264 | translate | read | link |
| 2025-05-14 | Few-Shot Anomaly-Driven Generation for Anomaly Classification and Segmentation | Guan Gui et.al. | 2505.09263 | translate | read | link |
| 2025-05-14 | WSCIF: A Weakly-Supervised Color Intelligence Framework for Tactical Anomaly Detection in Surveillance Keyframes | Wei Meng et.al. | 2505.09129 | translate | read | null |
| 2025-05-13 | Intelligent Road Anomaly Detection with Real-time Notification System for Enhanced Road Safety | Ali Almakhluk et.al. | 2505.08882 | translate | read | null |
| 2025-05-13 | Exploring Scotogenic Parameter Spaces and Mapping Uncharted Dark Matter Phenomenology with Multi-Objective Search Algorithms | Fernando Abreu de Souza et.al. | 2505.08862 | translate | read | null |
| 2025-05-13 | Robust Indoor Localization via Conformal Methods and Variational Bayesian Adaptive Filtering | Zhiyi Zhou et.al. | 2505.08639 | translate | read | null |
| 2025-05-13 | neuralGAM: An R Package for Fitting Generalized Additive Neural Networks | Ines Ortega-Fernandez et.al. | 2505.08610 | translate | read | null |
| 2025-05-13 | Isolation Forest in Novelty Detection Scenario | Adam Ulrich et.al. | 2505.08489 | translate | read | null |
| 2025-05-13 | Structural-Temporal Coupling Anomaly Detection with Dynamic Graph Transformer | Chang Zong et.al. | 2505.08330 | translate | read | null |
| 2025-05-13 | Deep Probabilistic Modeling of User Behavior for Anomaly Detection via Mixture Density Networks | Lu Dai et.al. | 2505.08220 | translate | read | null |
| 2025-05-13 | Fault Detection Method for Power Conversion Circuits Using Thermal Image and Convolutional Autoencoder | Noboru Katayama et.al. | 2505.08150 | translate | read | null |
| 2025-05-12 | Evaluating Explanation Quality in X-IDS Using Feature Alignment Metrics | Mohammed Alquliti et.al. | 2505.08006 | translate | read | null |
| 2025-05-12 | Vision Foundation Model Embedding-Based Semantic Anomaly Detection | Max Peter Ronecker et.al. | 2505.07998 | translate | read | null |
| 2025-05-12 | Simultaneous Intrusion Detection and Localization Using ISAC Network | Usama Shakoor et.al. | 2505.07656 | translate | read | null |
| 2025-05-12 | Evaluating Modern Visual Anomaly Detection Approaches in Semiconductor Manufacturing: A Comparative Study | Manuel Barusco et.al. | 2505.07576 | translate | read | null |
| 2025-05-12 | EAGLE: Contrastive Learning for Efficient Graph Anomaly Detection | Jing Ren et.al. | 2505.07508 | translate | read | null |
| 2025-05-12 | Boosting Global-Local Feature Matching via Anomaly Synthesis for Multi-Class Point Cloud Anomaly Detection | Yuqi Cheng et.al. | 2505.07375 | translate | read | link |
| 2025-05-12 | GAN-based synthetic FDG PET images from T1 brain MRI can serve to improve performance of deep unsupervised anomaly detection models | Daria Zotova et.al. | 2505.07364 | translate | read | null |
| 2025-05-11 | Towards Scalable IoT Deployment for Visual Anomaly Detection via Efficient Compression | Arianna Stropeni et.al. | 2505.07119 | translate | read | null |
| 2025-05-11 | Benign Samples Matter! Fine-tuning On Outlier Benign Samples Severely Breaks Safety | Zihan Guan et.al. | 2505.06843 | translate | read | null |
| 2025-05-10 | A Contrastive Federated Semi-Supervised Learning Intrusion Detection Framework for Internet of Robotic Things | Yifan Zeng et.al. | 2505.06636 | translate | read | null |
| 2025-05-10 | AI-Powered Anomaly Detection with Blockchain for Real-Time Security and Reliability in Autonomous Vehicles | Rathin Chandra Shit et.al. | 2505.06632 | translate | read | null |
| 2025-05-10 | ReplayCAD: Generative Diffusion Replay for Continual Anomaly Detection | Lei Hu et.al. | 2505.06603 | translate | read | link |
| 2025-05-09 | Mixtures of multivariate linear asymmetric Laplace regressions with multiple asymmetric Laplace covariates | Arnoldus F. Otto et.al. | 2505.05979 | translate | read | null |
| 2025-05-09 | Adaptive Robot Localization with Ultra-wideband Novelty Detection | Umberto Albertin et.al. | 2505.05903 | translate | read | null |
| 2025-05-09 | Examining the Source of Defects from a Mechanical Perspective for 3D Anomaly Detection | Hanzhe Liang et.al. | 2505.05901 | translate | read | link |
| 2025-05-09 | Unsupervised Anomaly Detection for Autonomous Robots via Mahalanobis SVDD with Audio-IMU Fusion | Yizhuo Yang et.al. | 2505.05811 | translate | read | link |
| 2025-05-09 | Intrusion Detection System Using Deep Learning for Network Security | Soham Chatterjee et.al. | 2505.05810 | translate | read | null |
| 2025-05-08 | KPI Poisoning: An Attack in Open RAN Near Real-Time Control Loop | Hamed Alimohammadi et.al. | 2505.05537 | translate | read | null |
| 2025-05-08 | QUIC-Exfil: Exploiting QUIC’s Server Preferred Address Feature to Perform Data Exfiltration Attacks | Thomas Grübl et.al. | 2505.05292 | translate | read | null |
| 2025-05-08 | Research on Anomaly Detection Methods Based on Diffusion Models | Yi Chen et.al. | 2505.05137 | translate | read | null |
| 2025-05-08 | Conformal Prediction with Cellwise Outliers: A Detect-then-Impute Approach | Qian Peng et.al. | 2505.04986 | translate | read | null |
| 2025-05-07 | Comparison of Visual Trackers for Biomechanical Analysis of Running | Luis F. Gomez et.al. | 2505.04713 | translate | read | null |
| 2025-05-07 | Hierarchical Task Decomposition for Execution Monitoring and Error Recovery: Understanding the Rationale Behind Task Demonstrations | Christoph Willibald et.al. | 2505.04565 | translate | read | null |
| 2025-05-07 | Detecting Spelling and Grammatical Anomalies in Russian Poetry Texts | Ilya Koziev et.al. | 2505.04507 | translate | read | null |
| 2025-05-07 | Blockchain Data Analytics: A Scoping Literature Review and Directions for Future Research | Marcel Bühlmann et.al. | 2505.04403 | translate | read | null |
| 2025-05-07 | Cyber Security Data Science: Machine Learning Methods and their Performance on Imbalanced Datasets | Mateo Lopez-Ledezma et.al. | 2505.04204 | translate | read | null |
| 2025-05-06 | Extending Decision Predicate Graphs for Comprehensive Explanation of Isolation Forest | Matteo Ceschin et.al. | 2505.04019 | translate | read | null |
| 2025-05-06 | Using anomaly detection to search for technosignatures in Breakthrough Listen observations | Snir Pardo et.al. | 2505.03927 | translate | read | null |
| 2025-05-06 | Explaining Anomalies with Tensor Networks | Hans Hohenfeld et.al. | 2505.03911 | translate | read | null |
| 2025-05-06 | AnomalyMatch: Discovering Rare Objects of Interest with Semi-supervised and Active Learning | Pablo Gómez et.al. | 2505.03509 | translate | read | null |
| 2025-05-06 | CXR-AD: Component X-ray Image Dataset for Industrial Anomaly Detection | Haoyu Bai et.al. | 2505.03412 | translate | read | null |
| 2025-05-06 | Bridging Expertise Gaps: The Role of LLMs in Human-AI Collaboration for Cybersecurity | Shahroz Tariq et.al. | 2505.03179 | translate | read | null |
| 2025-05-06 | Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems | Abdul Mustafa et.al. | 2505.03120 | translate | read | null |
| 2025-05-05 | An Explainable Anomaly Detection Framework for Monitoring Depression and Anxiety Using Consumer Wearable Devices | Yuezhou Zhang et.al. | 2505.03039 | translate | read | null |
| 2025-05-05 | Fast and Precise Track Fitting with Machine Learning | Ryan Miller et.al. | 2505.02937 | translate | read | null |
| 2025-05-05 | A robust neural determination of the source-count distribution of the Fermi-LAT sky at high latitudes | Christopher Eckner et.al. | 2505.02906 | translate | read | null |
| 2025-05-05 | Detect, Classify, Act: Categorizing Industrial Anomalies with Multi-Modal Large Language Models | Sassan Mokhtar et.al. | 2505.02626 | translate | read | null |
| 2025-05-05 | Lane-Wise Highway Anomaly Detection | Mei Qiu et.al. | 2505.02613 | translate | read | null |
| 2025-05-05 | A probabilistic view on Riemannian machine learning models for SPD matrices | Thibault de Surrel et.al. | 2505.02402 | translate | read | null |
| 2025-05-05 | Uncertainty-Weighted Image-Event Multimodal Fusion for Video Anomaly Detection | Sungheon Jeong et.al. | 2505.02393 | translate | read | link |
| 2025-05-05 | Quantum-assited anomaly detection with multivariate Gaussian distribution | Chao-Hua Yu et.al. | 2505.02316 | translate | read | null |
| 2025-05-04 | ProDisc-VAD: An Efficient System for Weakly-Supervised Anomaly Detection in Video Surveillance Applications | Tao Zhu et.al. | 2505.02179 | translate | read | link |
| 2025-05-04 | Spotting the Unexpected (STU): A 3D LiDAR Dataset for Anomaly Segmentation in Autonomous Driving | Alexey Nekrasov et.al. | 2505.02148 | translate | read | null |
| 2025-05-04 | MC3D-AD: A Unified Geometry-aware Reconstruction Model for Multi-category 3D Anomaly Detection | Jiayi Cheng et.al. | 2505.01969 | translate | read | null |
| 2025-05-03 | Runtime Anomaly Detection for Drones: An Integrated Rule-Mining and Unsupervised-Learning Approach | Ivan Tan et.al. | 2505.01947 | translate | read | null |
| 2025-05-03 | Context-Aware Online Conformal Anomaly Detection with Prediction-Powered Data Acquisition | Amirmohammad Farzaneh et.al. | 2505.01783 | translate | read | null |
| 2025-05-02 | Constrained Network Adversarial Attacks: Validity, Robustness, and Transferability | Anass Grini et.al. | 2505.01328 | translate | read | null |
| 2025-05-02 | Secure Cluster-Based Hierarchical Federated Learning in Vehicular Networks | M. Saeid HaghighiFard et.al. | 2505.01186 | translate | read | null |
| 2025-05-02 | Quantum Support Vector Regression for Robust Anomaly Detection | Kilian Tscharke et.al. | 2505.01012 | translate | read | null |
| 2025-05-02 | Addressing Noise and Stochasticity in Fraud Detection for Service Networks | Wenxin Zhang et.al. | 2505.00946 | translate | read | null |
| 2025-05-02 | FreCT: Frequency-augmented Convolutional Transformer for Robust Time Series Anomaly Detection | Wenxin Zhang et.al. | 2505.00941 | translate | read | null |
| 2025-05-02 | MARS: Defending Unmanned Aerial Vehicles From Attacks on Inertial Sensors with Model-based Anomaly Detection and Recovery | Haocheng Meng et.al. | 2505.00924 | translate | read | null |
| 2025-05-01 | CICADA: Cross-Domain Interpretable Coding for Anomaly Detection and Adaptation in Multivariate Time Series | Tian Lan et.al. | 2505.00415 | translate | read | null |
| 2025-05-01 | LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems | Yazan Otoum et.al. | 2505.00240 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)