Anomaly Detection - 2025-07
Anomaly Detection - 2025-07
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-07-23 | Unsupervised anomaly detection using Bayesian flow networks: application to brain FDG PET in the context of Alzheimer’s disease | Hugues Roy et.al. | 2507.17486 | translate | read | null |
| 2025-07-23 | HiProbe-VAD: Video Anomaly Detection via Hidden States Probing in Tuning-Free Multimodal LLMs | Zhaolin Cai et.al. | 2507.17394 | translate | read | null |
| 2025-07-23 | Tabular Diffusion based Actionable Counterfactual Explanations for Network Intrusion Detection | Vinura Galwaduge et.al. | 2507.17161 | translate | read | null |
| 2025-07-23 | Auto-scaling Approaches for Cloud-native Applications: A Survey and Taxonomy | Minxian Xu et.al. | 2507.17128 | translate | read | null |
| 2025-07-22 | Evaluating Ensemble and Deep Learning Models for Static Malware Detection with Dimensionality Reduction Using the EMBER Dataset | Md Min-Ha-Zul Abedin et.al. | 2507.16952 | translate | read | null |
| 2025-07-22 | Toward Long-Tailed Online Anomaly Detection through Class-Agnostic Concepts | Chiao-An Yang et.al. | 2507.16946 | translate | read | null |
| 2025-07-22 | Improving Predictions on Highly Unbalanced Data Using Open Source Synthetic Data Upsampling | Ivona Krchova et.al. | 2507.16419 | translate | read | null |
| 2025-07-22 | eX-NIDS: A Framework for Explainable Network Intrusion Detection Leveraging Large Language Models | Paul R. B. Houssel et.al. | 2507.16241 | translate | read | null |
| 2025-07-22 | DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT | Baofu Han et.al. | 2507.16134 | translate | read | null |
| 2025-07-21 | Stop-band Energy Constraint for Orthogonal Tunable Wavelet Units in Convolutional Neural Networks for Computer Vision problems | An D. Le et.al. | 2507.16114 | translate | read | null |
| 2025-07-21 | RightTyper: Effective and Efficient Type Annotation for Python | Juan Altmayer Pizzorno et.al. | 2507.16051 | translate | read | null |
| 2025-07-21 | Foundation Models and Transformers for Anomaly Detection: A Survey | Mouïn Ben Ammar et.al. | 2507.15905 | translate | read | null |
| 2025-07-21 | Explainable Anomaly Detection for Electric Vehicles Charging Stations | Matteo Cederle et.al. | 2507.15718 | translate | read | null |
| 2025-07-21 | Towards Explainable Anomaly Detection in Shared Mobility Systems | Elnur Isgandarov et.al. | 2507.15643 | translate | read | null |
| 2025-07-21 | Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems | Andrii Balashov et.al. | 2507.15613 | translate | read | null |
| 2025-07-21 | We Need to Rethink Benchmarking in Anomaly Detection | Philipp Röchner et.al. | 2507.15584 | translate | read | null |
| 2025-07-21 | An aerial color image anomaly dataset for search missions in complex forested terrain | Rakesh John Amala Arokia Nathan et.al. | 2507.15492 | translate | read | null |
| 2025-07-21 | ExDD: Explicit Dual Distribution Learning for Surface Defect Detection via Diffusion Synthesis | Muhammad Aqeel et.al. | 2507.15335 | translate | read | null |
| 2025-07-20 | Time-RA: Towards Time Series Reasoning for Anomaly with LLM Feedback | Yiyuan Yang et.al. | 2507.15066 | translate | read | null |
| 2025-07-20 | Deep Generative Models in Condition and Structural Health Monitoring: Opportunities, Limitations and Future Outlook | Xin Yang et.al. | 2507.15026 | translate | read | null |
| 2025-07-20 | A Comparative Analysis of Statistical and Machine Learning Models for Outlier Detection in Bitcoin Limit Order Books | Ivan Letteri et.al. | 2507.14960 | translate | read | null |
| 2025-07-20 | Mayura: Exploiting Similarities in Motifs for Temporal Co-Mining | Sanjay Sri Vallabh Singapuram et.al. | 2507.14813 | translate | read | null |
| 2025-07-18 | Unmasking Performance Gaps: A Comparative Study of Human Anonymization and Its Effects on Video Anomaly Detection | Sara Abdulaziz et.al. | 2507.14083 | translate | read | null |
| 2025-07-18 | Robust Anomaly Detection with Graph Neural Networks using Controllability | Yifan Wei et.al. | 2507.13954 | translate | read | null |
| 2025-07-18 | Conformal Data Contamination Tests for Trading or Sharing of Data | Martin V. Vejling et.al. | 2507.13835 | translate | read | null |
| 2025-07-18 | Efficient and Scalable Self-Healing Databases Using Meta-Learning and Dependency-Driven Recovery | Joydeep Chandra et.al. | 2507.13757 | translate | read | null |
| 2025-07-18 | Kolmogorov-Arnold Networks-based GRU and LSTM for Loan Default Early Prediction | Yue Yang et.al. | 2507.13685 | translate | read | null |
| 2025-07-17 | Theory-informed neural networks for particle physics | Barry M. Dillon et.al. | 2507.13447 | translate | read | null |
| 2025-07-17 | A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models | Chao Feng et.al. | 2507.13313 | translate | read | null |
| 2025-07-17 | 3DKeyAD: High-Resolution 3D Point Cloud Anomaly Detection via Keypoint-Guided Point Clustering | Zi Wang et.al. | 2507.13110 | translate | read | null |
| 2025-07-17 | Fault detection and diagnosis for the engine electrical system of a space launcher based on a temporal convolutional autoencoder and calibrated classifiers | Luis Basora et.al. | 2507.13022 | translate | read | null |
| 2025-07-17 | A Semi-Supervised Learning Method for the Identification of Bad Exposures in Large Imaging Surveys | Yufeng Luo et.al. | 2507.12784 | translate | read | null |
| 2025-07-16 | Text-ADBench: Text Anomaly Detection Benchmark based on LLMs Embedding | Feng Xiao et.al. | 2507.12295 | translate | read | null |
| 2025-07-16 | A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy | Xiang Li et.al. | 2507.12098 | translate | read | null |
| 2025-07-16 | MoViAD: Modular Visual Anomaly Detection | Manuel Barusco et.al. | 2507.12049 | translate | read | null |
| 2025-07-16 | Can LLMs Find Fraudsters? Multi-level LLM Enhanced Graph Fraud Detection | Tairan Huang et.al. | 2507.11997 | translate | read | null |
| 2025-07-16 | d-DQIVAR: Data-centric Visual Analytics and Reasoning for Data Quality Improvement | Hyein Hong et.al. | 2507.11960 | translate | read | null |
| 2025-07-15 | How To Mitigate And Defend Against DDoS Attacks In IoT Devices | Ifiyemi Leigha et.al. | 2507.11772 | translate | read | null |
| 2025-07-15 | Learning Representations of Event Time Series with Sparse Autoencoders for Anomaly Detection, Similarity Search, and Unsupervised Classification | Steven Dillmann et.al. | 2507.11620 | translate | read | null |
| 2025-07-15 | FlexCAST: Enabling Flexible Scientific Data Analyses | Benjamin Nachman et.al. | 2507.11528 | translate | read | null |
| 2025-07-15 | A Mathematical Optimization Approach to Multisphere Support Vector Data Description | Víctor Blanco et.al. | 2507.11106 | translate | read | null |
| 2025-07-15 | LogTinyLLM: Tiny Large Language Models Based Contextual Log Anomaly Detection | Isaiah Thompson Ocansey et.al. | 2507.11071 | translate | read | null |
| 2025-07-15 | Bridge Feature Matching and Cross-Modal Alignment with Mutual-filtering for Zero-shot Anomaly Detection | Yuhu Bai et.al. | 2507.11003 | translate | read | null |
| 2025-07-15 | Class-Proportional Coreset Selection for Difficulty-Separable Data | Elisa Tsai et.al. | 2507.10904 | translate | read | null |
| 2025-07-15 | From Alerts to Intelligence: A Novel LLM-Aided Framework for Host-based Intrusion Detection | Danyu Sun et.al. | 2507.10873 | translate | read | null |
| 2025-07-14 | REAL-IoT: Characterizing GNN Intrusion Detection Robustness under Practical Adversarial Attack | Zhonghao Zhan et.al. | 2507.10836 | translate | read | null |
| 2025-07-14 | Contrastive-KAN: A Semi-Supervised Intrusion Detection Framework for Cybersecurity with scarce Labeled Data | Mohammad Alikhani et.al. | 2507.10808 | translate | read | null |
| 2025-07-14 | Real-time, Adaptive Radiological Anomaly Detection and Isotope Identification Using Non-negative Matrix Factorization | Chandler Jones et.al. | 2507.10715 | translate | read | null |
| 2025-07-14 | BenchReAD: A systematic benchmark for retinal anomaly detection | Chenyu Lian et.al. | 2507.10492 | translate | read | null |
| 2025-07-13 | Causality-informed Anomaly Detection in Partially Observable Sensor Networks: Moving beyond Correlations | Xiaofeng Xiao et.al. | 2507.09742 | translate | read | null |
| 2025-07-12 | Adversarial Activation Patching: A Framework for Detecting and Mitigating Emergent Deception in Safety-Aligned Transformers | Santhosh Kumar Ravindran et.al. | 2507.09406 | translate | read | null |
| 2025-07-12 | Credit Card Fraud Detection Using RoFormer Model With Relative Distance Rotating Encoding | Kevin Reyes et.al. | 2507.09385 | translate | read | null |
| 2025-07-12 | Robust Spatiotemporal Epidemic Modeling with Integrated Adaptive Outlier Detection | Haoming Shi et.al. | 2507.09380 | translate | read | null |
| 2025-07-12 | Simplifying Traffic Anomaly Detection with Video Foundation Models | Svetlana Orlova et.al. | 2507.09338 | translate | read | null |
| 2025-07-12 | Stereo-based 3D Anomaly Object Detection for Autonomous Driving: A New Dataset and Baseline | Shiyi Mu et.al. | 2507.09214 | translate | read | null |
| 2025-07-12 | Proactive AI-and-RAN Workload Orchestration in O-RAN Architectures for 6G Networks | Syed Danial Ali Shah et.al. | 2507.09124 | translate | read | null |
| 2025-07-11 | RoundaboutHD: High-Resolution Real-World Urban Environment Benchmark for Multi-Camera Vehicle Tracking | Yuqiang Lin et.al. | 2507.08729 | translate | read | null |
| 2025-07-11 | InferLog: Accelerating LLM Inference for Online Log Parsing via ICL-oriented Prefix Caching | Yilun Wang et.al. | 2507.08523 | translate | read | null |
| 2025-07-11 | Data Depth as a Risk | Arturo Castellanos et.al. | 2507.08518 | translate | read | null |
| 2025-07-10 | Rethinking Spatio-Temporal Anomaly Detection: A Vision for Causality-Driven Cybersecurity | Arun Vignesh Malarkkan et.al. | 2507.08177 | translate | read | null |
| 2025-07-10 | HybridQC: Machine Learning-Augmented Quality Control for Single-Cell RNA-seq Data | Kaitao Lai et.al. | 2507.08058 | translate | read | null |
| 2025-07-10 | SAGE: A Visual Language Model for Anomaly Detection via Fact Enhancement and Entropy-aware Alignment | Guoxin Zang et.al. | 2507.07939 | translate | read | null |
| 2025-07-11 | LISTEN: Lightweight Industrial Sound-representable Transformer for Edge Notification | Changheon Han et.al. | 2507.07879 | translate | read | null |
| 2025-07-10 | 3D-ADAM: A Dataset for 3D Anomaly Detection in Advanced Manufacturing | Paul McHard et.al. | 2507.07838 | translate | read | null |
| 2025-07-10 | Adaptive Gaussian Mixture Models-based Anomaly Detection for under-constrained Cable-Driven Parallel Robots | Julio Garrido et.al. | 2507.07714 | translate | read | null |
| 2025-07-10 | NexViTAD: Few-shot Unsupervised Cross-Domain Defect Detection via Vision Foundation Models and Multi-Task Learning | Tianwei Mu et.al. | 2507.07579 | translate | read | null |
| 2025-07-10 | Real-Time Decorrelation-Based Anomaly Detection for Multivariate Time Series | Amirhossein Sadough et.al. | 2507.07559 | translate | read | null |
| 2025-07-10 | Towards High-Resolution 3D Anomaly Detection: A Scalable Dataset and Real-Time Framework for Subtle Industrial Defects | Yuqi Cheng et.al. | 2507.07435 | translate | read | null |
| 2025-07-10 | Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks | Mohammad F. Al-Hammouri et.al. | 2507.07413 | translate | read | null |
| 2025-07-09 | MADPOT: Medical Anomaly Detection with CLIP Adaptation and Partial Optimal Transport | Mahshid Shiri et.al. | 2507.06733 | translate | read | null |
| 2025-07-09 | UniOD: A Universal Model for Outlier Detection across Diverse Domains | Dazhi Fu et.al. | 2507.06624 | translate | read | null |
| 2025-07-09 | IMPACT: Industrial Machine Perception via Acoustic Cognitive Transformer | Changheon Han et.al. | 2507.06481 | translate | read | null |
| 2025-07-09 | Mitigating Message Imbalance in Fraud Detection with Dual-View Graph Representation Learning | Yudan Song et.al. | 2507.06469 | translate | read | null |
| 2025-07-08 | seMCD: Sequentially implemented Monte Carlo depth computation with statistical guarantees | Felix Gnettner et.al. | 2507.06227 | translate | read | null |
| 2025-07-08 | What ZTF Saw Where Rubin Looked: Anomaly Hunting in DR23 | Maria V. Pruzhinskaya et.al. | 2507.06217 | translate | read | null |
| 2025-07-08 | Universal Embeddings of Tabular Data | Astrid Franz et.al. | 2507.05904 | translate | read | null |
| 2025-07-08 | Hyperspectral Anomaly Detection Methods: A Survey and Comparative Study | Aayushma Pant et.al. | 2507.05730 | translate | read | null |
| 2025-07-08 | Area-based epigraph and hypograph indices for functional outlier detection | Belen Pulido et.al. | 2507.05701 | translate | read | null |
| 2025-07-08 | Graph Learning | Feng Xia et.al. | 2507.05636 | translate | read | null |
| 2025-07-08 | Quantum Machine Learning for Identifying Transient Events in X-ray Light Curves | Taiki Kawamuro et.al. | 2507.05589 | translate | read | null |
| 2025-07-08 | iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips | Mehdi Elahi et.al. | 2507.05576 | translate | read | null |
| 2025-07-07 | PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing | Sara Chennoufi et.al. | 2507.05524 | translate | read | null |
| 2025-07-09 | Silent Failures in Stateless Systems: Rethinking Anomaly Detection for Serverless Computing | Chanh Nguyen et.al. | 2507.04969 | translate | read | null |
| 2025-07-07 | Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions | Shuo Yang et.al. | 2507.04752 | translate | read | null |
| 2025-07-06 | A Data-Driven Novelty Score for Diverse In-Vehicle Data Recording | Philipp Reis et.al. | 2507.04529 | translate | read | null |
| 2025-07-06 | Dealing with Uncertainty in Contextual Anomaly Detection | Luca Bindini et.al. | 2507.04490 | translate | read | null |
| 2025-07-06 | Anomalous Decision Discovery using Inverse Reinforcement Learning | Ashish Bastola et.al. | 2507.04464 | translate | read | null |
| 2025-07-06 | Normalizing Flow to Augmented Posterior: Conditional Density Estimation with Interpretable Dimension Reduction for High Dimensional Data | Cheng Zeng et.al. | 2507.04216 | translate | read | null |
| 2025-07-06 | ML-Enhanced AES Anomaly Detection for Real-Time Embedded Security | Nishant Chinnasami et.al. | 2507.04197 | translate | read | null |
| 2025-07-05 | Specific heat and density anomalies in the Hubbard model | M. A. Habitzreuter et.al. | 2507.04041 | translate | read | null |
| 2025-07-05 | Fast Re-Trainable Attention Autoencoder for Liquid Sensor Anomaly Detection at the Edge | Seongyun Choi et.al. | 2507.03995 | translate | read | null |
| 2025-07-05 | An Efficient Detector for Faulty GNSS Measurements Detection With Non-Gaussian Noises | Penggao Yan et.al. | 2507.03987 | translate | read | null |
| 2025-07-03 | Alleviating Attack Data Scarcity: SCANIA’s Experience Towards Enhancing In-Vehicle Cyber Security Measures | Frida Sundfeldt et.al. | 2507.02607 | translate | read | null |
| 2025-07-03 | CyberRAG: An agentic RAG cyber attack classification and reporting tool | Francesco Blefari et.al. | 2507.02424 | translate | read | null |
| 2025-07-03 | Evaluating Language Models For Threat Detection in IoT Security Logs | Jorge J. Tejero-Fernández et.al. | 2507.02390 | translate | read | null |
| 2025-07-02 | Can Artificial Intelligence solve the blockchain oracle problem? Unpacking the Challenges and Possibilities | Giulio Caldarelli et.al. | 2507.02125 | translate | read | null |
| 2025-07-02 | SpecCLIP: Aligning and Translating Spectroscopic Measurements for Stars | Xiaosheng Zhao et.al. | 2507.01939 | translate | read | null |
| 2025-07-02 | Exploring a Hybrid Deep Learning Approach for Anomaly Detection in Mental Healthcare Provider Billing: Addressing Label Scarcity through Semi-Supervised Anomaly Detection | Samirah Bakker et.al. | 2507.01924 | translate | read | null |
| 2025-07-02 | Towards Foundation Auto-Encoders for Time-Series Anomaly Detection | Gastón García González et.al. | 2507.01875 | translate | read | null |
| 2025-07-02 | Graph Representation-based Model Poisoning on Federated LLMs in CyberEdge Networks | Hanlin Cai et.al. | 2507.01694 | translate | read | null |
| 2025-07-02 | BioMARS: A Multi-Agent Robotic System for Autonomous Biological Experiments | Yibo Qiu et.al. | 2507.01485 | translate | read | null |
| 2025-07-02 | OoDDINO:A Multi-level Framework for Anomaly Segmentation on Complex Road Scenes | Yuxing Liu et.al. | 2507.01455 | translate | read | null |
| 2025-07-02 | Reasoner for Real-World Event Detection: Scaling Reinforcement Learning via Adaptive Perplexity-Aware Sampling Strategy | Xiaoyun Zhang et.al. | 2507.01327 | translate | read | null |
| 2025-07-01 | Deep Learning-Based Intrusion Detection for Automotive Ethernet: Evaluating & Optimizing Fast Inference Techniques for Deployment on Low-Cost Platform | Pedro R. X. Carmo et.al. | 2507.01208 | translate | read | null |
| 2025-07-01 | Good Enough to Learn: LLM-based Anomaly Detection in ECU Logs without Reliable Labels | Bogdan Bogdan et.al. | 2507.01077 | translate | read | null |
| 2025-07-01 | Biorthogonal Tunable Wavelet Unit with Lifting Scheme in Convolutional Neural Network | An Le et.al. | 2507.00739 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)