Anomaly Detection - 2025-06

Publish Date Title Authors PDF Translate Read Code
2025-06-30 Learning Constraints Directly from Network Data Hongyu Hè et.al. 2506.23964 translate read null
2025-06-30 MadCLIP: Few-shot Medical Anomaly Detection with CLIP Mahshid Shiri et.al. 2506.23810 translate read null
2025-06-30 Adaptive Out-of-Control Point Pattern Detection in Sequential Random Finite Set Observations Konstantinos Bourazas et.al. 2506.23802 translate read null
2025-06-30 MReg: A Novel Regression Model with MoE-based Video Feature Mining for Mitral Regurgitation Diagnosis Zhe Liu et.al. 2506.23648 translate read null
2025-06-30 StackCLIP: Clustering-Driven Stacked Prompt in Zero-Shot Industrial Anomaly Detection Yanning Hou et.al. 2506.23577 translate read null
2025-06-30 Reconciling Attribute and Structural Anomalies for Improved Graph Anomaly Detection Chunjing Xiao et.al. 2506.23469 translate read null
2025-06-30 Enhancing Insider Threat Detection Using User-Based Sequencing and Transformer Encoders Mohamed Elbasheer et.al. 2506.23446 translate read null
2025-06-29 GaussMaster: An LLM-based Database Copilot System Wei Zhou et.al. 2506.23322 translate read null
2025-06-29 Autoregressive Denoising Score Matching is a Good Video Anomaly Detector Hanwen Zhang et.al. 2506.23282 translate read null
2025-06-28 Kernel Outlier Detection Can Hakan Dağıdır et.al. 2506.22994 translate read null
2025-06-27 Data-Driven Intrusion Detection in Vehicles: Integrating Unscented Kalman Filter (UKF) with Machine Learning Shuhao Bian et.al. 2506.22404 translate read null
2025-06-27 A Self-scaled Approximate $\ell_0$ Regularization Robust Model for Outlier Detection Pengyang Song et.al. 2506.22277 translate read null
2025-06-27 Autonomic Microservice Management via Agentic AI and MAPE-K Integration Matteo Esposito et.al. 2506.22185 translate read null
2025-06-27 Proof-of-Behavior: Behavior-Driven Consensus for Trustworthy Decentralized Finance Ailiya Borjigin et.al. 2506.22171 translate read null
2025-06-27 Explainable anomaly detection for sound spectrograms using pooling statistics with quantile differences Nicolas Thewes et.al. 2506.21921 translate read null
2025-06-26 mTSBench: Benchmarking Multivariate Time Series Anomaly Detection and Model Selection at Scale Xiaona Zhou et.al. 2506.21550 translate read null
2025-06-26 SiM3D: Single-instance Multiview Multimodal and Multisetup 3D Anomaly Detection Benchmark Alex Costanzino et.al. 2506.21549 translate read null
2025-06-26 Process mining-driven modeling and simulation to enhance fault diagnosis in cyber-physical systems Francesco Vitale et.al. 2506.21502 translate read null
2025-06-26 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing Pin Ren et.al. 2506.21425 translate read null
2025-06-26 FastRef:Fast Prototype Refinement for Few-Shot Industrial Anomaly Detection Long Tian et.al. 2506.21398 translate read null
2025-06-26 Temporal-Aware Graph Attention Network for Cryptocurrency Transaction Fraud Detection Zhi Zheng et.al. 2506.21382 translate read null
2025-06-26 GANet-Seg: Adversarial Learning for Brain Tumor Segmentation with Hybrid Generative Models Qifei Cui et.al. 2506.21245 translate read null
2025-06-26 Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks Deepak Kumar Panda et.al. 2506.21142 translate read null
2025-06-25 Poster: Enhancing GNN Robustness for Network Intrusion Detection via Agent-based Analysis Zhonghao Zhan et.al. 2506.20806 translate read null
2025-06-25 Joint attitude estimation and 3D neural reconstruction of non-cooperative space objects Clément Forray et.al. 2506.20638 translate read null
2025-06-25 Benchmarking Unsupervised Strategies for Anomaly Detection in Multivariate Time Series Laura Boggia et.al. 2506.20574 translate read null
2025-06-24 Predicting wide binaries and deviations from standard gravity using machine learning algorithms Amoy Ashesh et.al. 2506.19942 translate read null
2025-06-24 A Hybrid Intrusion Detection System with a New Approach to Protect the Cybersecurity of Cloud Computing Maryam Mahdi Al-Husseini et.al. 2506.19934 translate read null
2025-06-24 Graph theory inspired anomaly detection at the LHC Jack Y. Araz et.al. 2506.19920 translate read null
2025-06-24 Exact Matrix Seriation through Mathematical Optimization: Stress and Effectiveness-Based Models Víctor Blanco et.al. 2506.19821 translate read null
2025-06-24 KnowML: Improving Generalization of ML-NIDS with Attack Knowledge Graphs Xin Fan Guo et.al. 2506.19802 translate read null
2025-06-24 UltraAD: Fine-Grained Ultrasound Anomaly Classification via Few-Shot CLIP Adaptation Yue Zhou et.al. 2506.19694 translate read null
2025-06-24 Experimental Assessment of Neural 3D Reconstruction for Small UAV-based Applications Genís Castillo Gómez-Raya et.al. 2506.19491 translate read null
2025-06-24 Behavioral Anomaly Detection in Distributed Systems via Federated Contrastive Learning Renzi Meng et.al. 2506.19246 translate read null
2025-06-24 Quantitative Benchmarking of Anomaly Detection Methods in Digital Pathology Can Cui et.al. 2506.19234 translate read null
2025-06-23 Multimodal Anomaly Detection with a Mixture-of-Experts Christoph Willibald et.al. 2506.19077 translate read null
2025-06-23 3D Arena: An Open Platform for Generative 3D Evaluation Dylan Ebert et.al. 2506.18787 translate read null
2025-06-23 Trustworthy Prediction with Gaussian Process Knowledge Scores Kurt Butler et.al. 2506.18630 translate read null
2025-06-23 Normality Prior Guided Multi-Semantic Fusion Network for Unsupervised Image Anomaly Detection Muhao Xu et.al. 2506.18544 translate read null
2025-06-23 Sequential keypoint density estimator: an overlooked baseline of skeleton-based video anomaly detection Anja Delić et.al. 2506.18368 translate read null
2025-06-23 Learning High-Quality Latent Representations for Anomaly Detection and Signal Integrity Enhancement in High-Speed Signals Muhammad Usama et.al. 2506.18288 translate read null
2025-06-23 Cross-Architecture Knowledge Distillation (KD) for Retinal Fundus Image Anomaly Detection on NVIDIA Jetson Nano Berk Yilmaz et.al. 2506.18220 translate read null
2025-06-22 Dynamic Temporal Positional Encodings for Early Intrusion Detection in IoT Ioannis Panopoulos et.al. 2506.18114 translate read null
2025-06-22 TAB: Unified Benchmarking of Time Series Anomaly Detection Methods Xiangfei Qiu et.al. 2506.18046 translate read null
2025-06-21 Quantum-Hybrid Support Vector Machines for Anomaly Detection in Industrial Control Systems Tyler Cultice et.al. 2506.17824 translate read null
2025-06-21 The Blind Spot of BGP Anomaly Detection: Why LSTM Autoencoders Fail on Real-World Outages Samuel Oluwafemi Adebayo et.al. 2506.17821 translate read null
2025-06-20 Searching for a Hidden Markov Anomaly over Multiple Processes Levli Citron et.al. 2506.17108 translate read null
2025-06-20 MAWIFlow Benchmark: Realistic Flow-Based Evaluation for Network Intrusion Detection Joshua Schraven et.al. 2506.17041 translate read link
2025-06-20 Anomaly Detection in Event-triggered Traffic Time Series via Similarity Learning Shaoyu Dou et.al. 2506.16855 translate read null
2025-06-20 Robust Group Anomaly Detection for Quasi-Periodic Network Time Series Kai Yang et.al. 2506.16815 translate read null
2025-06-19 Few-Shot Learning-Based Cyber Incident Detection with Augmented Context Intelligence Fei Zuo et.al. 2506.16626 translate read null
2025-06-19 On Continuous Monitoring of Risk Violations under Unknown Shift Alexander Timans et.al. 2506.16416 translate read null
2025-06-19 Classification of Cattle Behavior and Detection of Heat (Estrus) using Sensor Data Druva Dhakshinamoorthy et.al. 2506.16380 translate read null
2025-06-19 Signatures to help interpretability of anomalies Emmanuel Gangler et.al. 2506.16314 translate read null
2025-06-19 On the Efficient Discovery of Maximum $k$ -Defective Biclique Donghang Cui et.al. 2506.16121 translate read null
2025-06-19 CRIA: A Cross-View Interaction and Instance-Adapted Pre-training Framework for Generalizable EEG Representations Puchun Liu et.al. 2506.16056 translate read null
2025-06-18 Real-Time Initialization of Unknown Anchors for UWB-aided Navigation Giulio Delama et.al. 2506.15518 translate read null
2025-06-18 Time-dependent density estimation using binary classifiers Agnimitra Dasgupta et.al. 2506.15505 translate read null
2025-06-18 Semi-supervised Graph Anomaly Detection via Robust Homophily Learning Guoguo Ai et.al. 2506.15448 translate read null
2025-06-18 Evaluation Pipeline for systematically searching for Anomaly Detection Systems Florian Rokohl et.al. 2506.15388 translate read null
2025-06-18 Human-Centred AI in FinTech: Developing a User Experience (UX) Research Point of View (PoV) Playbook Festus Adedoyin et.al. 2506.15325 translate read null
2025-06-17 Determinação Automática de Limiar de Detecção de Ataques em Redes de Computadores Utilizando Autoencoders Luan Gonçalves Miranda et.al. 2506.14937 translate read null
2025-06-17 Explain First, Trust Later: LLM-Augmented Explanations for Graph-Based Crypto Anomaly Detection Adriana Watson et.al. 2506.14933 translate read link
2025-06-17 Latent Anomaly Detection: Masked VQ-GAN for Unsupervised Segmentation in Medical CBCT Pengwei Wang et.al. 2506.14209 translate read null
2025-06-17 $β$ -integrated local depth and corresponding partitioned local depth representation Siyi Wang et.al. 2506.14108 translate read null
2025-06-16 Bridging Unsupervised and Semi-Supervised Anomaly Detection: A Theoretically-Grounded and Practical Framework with Synthetic Anomalies Matthew Lau et.al. 2506.13955 translate read null
2025-06-15 Hybrid Meta-Learning Framework for Anomaly Forecasting in Nonlinear Dynamical Systems via Physics-Inspired Simulation and Deep Ensembles Abdullah Burkan Bereketoglu et.al. 2506.13828 translate read null
2025-06-16 Anomaly Object Segmentation with Vision-Language Models for Steel Scrap Recycling Daichi Tanaka et.al. 2506.13282 translate read null
2025-06-16 Polyra Swarms: A Shape-Based Approach to Machine Learning Simon Klüttermann et.al. 2506.13217 translate read null
2025-06-16 Pro-AD: Learning Comprehensive Prototypes with Prototype-based Constraint for Multi-class Unsupervised Anomaly Detection Ziqing Zhou et.al. 2506.13097 translate read null
2025-06-16 Learning Event Completeness for Weakly Supervised Video Anomaly Detection Yu Wang et.al. 2506.13095 translate read null
2025-06-16 Condition Monitoring with Machine Learning: A Data-Driven Framework for Quantifying Wind Turbine Energy Loss Emil Marcus Buchberg et.al. 2506.13012 translate read null
2025-06-15 SmartHome-Bench: A Comprehensive Benchmark for Video Anomaly Detection in Smart Homes Using Multi-Modal Large Language Models Xinyi Zhao et.al. 2506.12992 translate read null
2025-06-15 Probing Deep into Temporal Profile Makes the Infrared Small Target Detector Much Better Ruojing Li et.al. 2506.12766 translate read null
2025-06-13 Temporal cross-validation impacts multivariate time series subsequence anomaly detection evaluation Steven C. Hespeler et.al. 2506.12183 translate read null
2025-06-13 Diffusion-Based Electrocardiography Noise Quantification via Anomaly Detection Tae-Seong Han et.al. 2506.11815 translate read null
2025-06-13 A retrospective on DISPEED – Leveraging heterogeneity in a drone swarm for IDS execution Vincent Lannurien et.al. 2506.11800 translate read null
2025-06-13 Self-supervised Learning of Echocardiographic Video Representations via Online Cluster Distillation Divyanshu Mishra et.al. 2506.11777 translate read null
2025-06-13 CLIP Meets Diffusion: A Synergistic Approach to Anomaly Detection Byeongchan Lee et.al. 2506.11772 translate read null
2025-06-13 Deep Symmetric Autoencoders from the Eckart-Young-Schmidt Perspective Simone Brivio et.al. 2506.11641 translate read null
2025-06-13 FAA Framework: A Large Language Model-Based Approach for Credit Card Fraud Investigations Shaun Shuster et.al. 2506.11635 translate read null
2025-06-13 Prioritizing Alignment Paradigms over Task-Specific Model Customization in Time-Series LLMs Wei Li et.al. 2506.11512 translate read null
2025-06-12 Advanced fraud detection using machine learning models: enhancing financial transaction security Nudrat Fariha et.al. 2506.10842 translate read null
2025-06-13 IQE-CLIP: Instance-aware Query Embedding for Zero-/Few-shot Anomaly Detection in Medical Domain Hong Huang et.al. 2506.10730 translate read link
2025-06-12 Anomaly Detection for Sensing Security Stefan Roth et.al. 2506.10718 translate read null
2025-06-12 Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation Stefano Longari et.al. 2506.10620 translate read null
2025-06-12 Data Driven Diagnosis for Large Cyber-Physical-Systems with Minimal Prior Information Henrik Sebastian Steude et.al. 2506.10613 translate read null
2025-06-11 Conditional diffusion models for guided anomaly detection in brain images using fluid-driven anomaly randomization Ana Lawry Aguila et.al. 2506.10233 translate read null
2025-06-11 TrioXpert: An automated incident management framework for microservice system Yongqian Sun et.al. 2506.10043 translate read null
2025-06-11 Microservices and Real-Time Processing in Retail IT: A Review of Open-Source Toolchains and Deployment Strategies Aaditaa Vashisht et.al. 2506.09938 translate read null
2025-06-11 Wavelet Scattering Transform and Fourier Representation for Offline Detection of Malicious Clients in Federated Learning Alessandro Licciardi et.al. 2506.09674 translate read null
2025-06-11 Securing Open RAN: A Survey of Cryptographic Challenges and Emerging Solutions for 5G Ryan Barker et.al. 2506.09418 translate read null
2025-06-11 Anomaly Detection and Generation with Diffusion Models: A Survey Yang Liu et.al. 2506.09368 translate read null
2025-06-11 ContextBuddy: AI-Enhanced Contextual Insights for Security Alert Investigation (Applied to Intrusion Detection) Ronal Singh et.al. 2506.09365 translate read null
2025-06-10 PatchGuard: Adversarially Robust Anomaly Detection and Localization through Vision Transformers and Pseudo Anomalies Mojtaba Nafez et.al. 2506.09237 translate read null
2025-06-10 Integrating Asynchronous AdaBoost into Federated Learning: Five Real World Applications Arthur Oghlukyan et.al. 2506.09090 translate read null
2025-06-10 HomographyAD: Deep Anomaly Detection Using Self Homography Learning Jongyub Seok et.al. 2506.08784 translate read null
2025-06-10 EDINET-Bench: Evaluating LLMs on Complex Financial Tasks using Japanese Financial Statements Issa Sugiura et.al. 2506.08762 translate read null
2025-06-10 MAMBO: High-Resolution Generative Approach for Mammography Images Milica Škipina et.al. 2506.08677 translate read null
2025-06-09 Evaluating explainable AI for deep learning-based network intrusion detection system alert classification Rajesh Kalakoti et.al. 2506.07882 translate read null
2025-06-09 Are Trees Really Green? A Detection Approach of IoT Malware Attacks Silvia Lucia Sanna et.al. 2506.07836 translate read null
2025-06-09 Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain Bassam Noori Shaker et.al. 2506.07480 translate read null
2025-06-09 Anomaly Detection and Early Warning Mechanism for Intelligent Monitoring Systems in Multi-Cloud Environments Based on LLM Yihong Jin et.al. 2506.07407 translate read null
2025-06-09 Enhanced Consistency Bi-directional GAN(CBiGAN) for Malware Anomaly Detection Thesath Wijayasiri et.al. 2506.07372 translate read null
2025-06-08 Towards Physics-informed Diffusion for Anomaly Detection in Trajectories Arun Sharma et.al. 2506.06999 translate read null
2025-06-07 ARGOS: Anomaly Recognition and Guarding through O-RAN Sensing Stavros Dimou et.al. 2506.06916 translate read null
2025-06-07 Harnessing Vision-Language Models for Time Series Anomaly Detection Zelin He et.al. 2506.06836 translate read null
2025-06-07 Cross-Entropy Games for Language Models: From Implicit Knowledge to General Capability Measures Clément Hongler et.al. 2506.06832 translate read null
2025-06-07 LADSG: Label-Anonymized Distillation and Similar Gradient Substitution for Label Privacy in Vertical Federated Learning Zeyu Yan et.al. 2506.06742 translate read null
2025-06-06 PROVSYN: Synthesizing Provenance Graphs for Data Augmentation in Intrusion Detection Systems Yi Huang et.al. 2506.06226 translate read null
2025-06-06 MLOps with Microservices: A Case Study on the Maritime Domain Renato Cordeiro Ferreira et.al. 2506.06202 translate read null
2025-06-06 Tensor-to-Tensor Models with Fast Iterated Sum Features Joscha Diehl et.al. 2506.06041 translate read null
2025-06-06 $\text{C}^{2}\text{BNVAE}$ : Dual-Conditional Deep Generation of Network Traffic Data for Network Intrusion Detection System Balancing Yifan Zeng et.al. 2506.05844 translate read null
2025-06-06 FIST: A Structured Threat Modeling Framework for Fraud Incidents Yu-Chen Dai et.al. 2506.05740 translate read null
2025-06-05 Track Any Anomalous Object: A Granular Video Anomaly Detection Pipeline Yuzhi Huang et.al. 2506.05175 translate read null
2025-06-05 Federated Isolation Forest for Efficient Anomaly Detection on Edge IoT Systems Pavle Vasiljevic et.al. 2506.05138 translate read null
2025-06-05 Noise-Driven AI Sensors: Secure Healthcare Monitoring with PUFs Christiana Chamon et.al. 2506.05135 translate read null
2025-06-05 Low noise flux estimate and data quality control monitoring in EUCLID-NISP cosmological survey B. Kubik et.al. 2506.05024 translate read null
2025-06-05 Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection Gabriele Digregorio et.al. 2506.04978 translate read null
2025-06-05 KPIRoot+: An Efficient Integrated Framework for Anomaly Detection and Root Cause Analysis in Large-Scale Cloud Systems Wenwei Gu et.al. 2506.04569 translate read null
2025-06-04 Neurosymbolic Artificial Intelligence for Robust Network Intrusion Detection: From Scratch to Transfer Learning Huynh T. T. Tran et.al. 2506.04454 translate read null
2025-06-04 An AI-Based Public Health Data Monitoring System Ananya Joshi et.al. 2506.04429 translate read null
2025-06-04 How to Use Graph Data in the Wild to Help Graph Anomaly Detection? Yuxuan Cao et.al. 2506.04190 translate read null
2025-06-04 Causality-Aware Contrastive Learning for Robust Multivariate Time-Series Anomaly Detection HyunGi Kim et.al. 2506.03964 translate read null
2025-06-04 Lower Ricci Curvature for Hypergraphs Shiyi Yang et.al. 2506.03943 translate read null
2025-06-04 INP-Former++: Advancing Universal Anomaly Detection via Intrinsic Normal Prototypes and Residual Learning Wei Luo et.al. 2506.03660 translate read null
2025-06-04 SubSearch: Robust Estimation and Outlier Detection for Stochastic Block Models via Subgraph Search Leonardo Martins Bianco et.al. 2506.03657 translate read null
2025-06-03 Investigating Mask-aware Prototype Learning for Tabular Anomaly Detection Ruiying Lu et.al. 2506.02757 translate read null
2025-06-03 Data Leakage and Deceptive Performance: A Critical Examination of Credit Card Fraud Detection Methodologies Khizar Hayat et.al. 2506.02703 translate read null
2025-06-04 MemoryOut: Learning Principal Features via Multimodal Sparse Filtering Network for Semi-supervised Video Anomaly Detection Juntong Li et.al. 2506.02535 translate read link
2025-06-03 A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Sudhanshu Sekhar Tripathy et.al. 2506.02438 translate read null
2025-06-02 RATFM: Retrieval-augmented Time Series Foundation Model for Anomaly Detection Chihiro Maru et.al. 2506.02081 translate read null
2025-06-02 Enhancing Interpretability of Quantum-Assisted Blockchain Clustering via AI Agent-Based Qualitative Analysis Yun-Cheng Tsai et.al. 2506.02068 translate read null
2025-06-02 Federated Gaussian Mixture Models Sophia Zhang Pettersson et.al. 2506.01780 translate read null
2025-06-02 ShaTS: A Shapley-based Explainability Method for Time Series Artificial Intelligence Models applied to Anomaly Detection in Industrial Internet of Things Manuel Franco de la Peña et.al. 2506.01450 translate read null
2025-06-02 System Calls for Malware Detection and Classification: Methodologies and Applications Bishwajit Prasad Gond et.al. 2506.01412 translate read null
2025-06-01 Continual-MEGA: A Large-scale Benchmark for Generalizable Continual Anomaly Detection Geonu Lee et.al. 2506.00956 translate read null

(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)