Anomaly Detection - 2025-10
Anomaly Detection - 2025-10
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-10-31 | Rapid Inference of Logic Gate Neural Networks for Anomaly Detection in High Energy Physics | Lino Gerlach et.al. | 2511.01908 | translate | read | null |
| 2025-10-31 | Mist-Assisted Federated Learning for Intrusion Detection in Heterogeneous IoT Networks | Saadat Izadi et.al. | 2511.00271 | translate | read | null |
| 2025-10-31 | Feature Importance Guided Random Forest Learning with Simulated Annealing Based Hyperparameter Tuning | Kowshik Balasubramanian et.al. | 2511.00133 | translate | read | null |
| 2025-10-30 | A generative adversarial network optimization method for damage detection and digital twinning by deep AI fault learning: Z24 Bridge structural health monitoring benchmark validation | Marios Impraimakis et.al. | 2511.00099 | translate | read | null |
| 2025-10-28 | Adoption of AI-Driven Fraud Detection System in the Nigerian Banking Sector: An Analysis of Cost, Compliance, and Competency | Stephen Alaba John et.al. | 2511.00061 | translate | read | null |
| 2025-10-28 | DynBERG: Dynamic BERT-based Graph neural network for financial fraud detection | Omkar Kulkarni et.al. | 2511.00047 | translate | read | null |
| 2025-10-31 | Rethinking Telemetry Design for Fine-Grained Anomaly Detection in 5G User Planes | Niloy Saha et.al. | 2510.27664 | translate | read | null |
| 2025-10-31 | Information theory for hypergraph similarity | Helcio Felippe et.al. | 2510.27411 | translate | read | null |
| 2025-10-31 | Binary Anomaly Detection in Streaming IoT Traffic under Concept Drift | Rodrigo Matos Carnier et.al. | 2510.27304 | translate | read | null |
| 2025-10-31 | Functional Analysis of Loss-development Patterns in P&C Insurance | Arthur Charpentier et.al. | 2510.27204 | translate | read | null |
| 2025-10-31 | SERVIMON: AI-Driven Predictive Maintenance and Real-Time Monitoring for Astronomical Observatories | Emilio Mastriani et.al. | 2510.27146 | translate | read | null |
| 2025-10-31 | Conditional variational autoencoders for cosmological model discrimination and anomaly detection in cosmic microwave background power spectra | Tian-Yang Sun et.al. | 2510.27086 | translate | read | null |
| 2025-10-30 | Robust fuzzy clustering for high-dimensional multivariate time series with outlier detection | Ziling Ma et.al. | 2510.26982 | translate | read | null |
| 2025-10-30 | The Impact of Data Compression in Real-Time and Historical Data Acquisition Systems on the Accuracy of Analytical Solutions | Reham Faqehi et.al. | 2510.26868 | translate | read | null |
| 2025-10-30 | Process Integrated Computer Vision for Real-Time Failure Prediction in Steel Rolling Mill | Vaibhav Kurrey et.al. | 2510.26684 | translate | read | null |
| 2025-10-30 | MSAD: A Deep Dive into Model Selection for Time series Anomaly Detection | Emmanouil Sylligardos et.al. | 2510.26643 | translate | read | null |
| 2025-10-30 | Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters | Mustafa Fuad Rifet Ibrahim et.al. | 2510.26501 | translate | read | null |
| 2025-10-30 | Quantum Gated Recurrent GAN with Gaussian Uncertainty for Network Anomaly Detection | Wajdi Hammami et.al. | 2510.26487 | translate | read | null |
| 2025-10-30 | Towards Fine-Grained Vision-Language Alignment for Few-Shot Anomaly Detection | Yuanting Fan et.al. | 2510.26464 | translate | read | null |
| 2025-10-30 | A Survey of Heterogeneous Graph Neural Networks for Cybersecurity Anomaly Detection | Laura Jiang et.al. | 2510.26307 | translate | read | null |
| 2025-10-30 | Segmentation over Complexity: Evaluating Ensemble and Hybrid Approaches for Anomaly Detection in Industrial Time Series | Emilio Mastriani et.al. | 2510.26159 | translate | read | null |
| 2025-10-29 | CAVE: Detecting and Explaining Commonsense Anomalies in Visual Environments | Rishika Bhagwatkar et.al. | 2510.26006 | translate | read | null |
| 2025-10-29 | A Critical Roadmap to Driver Authentication via CAN Bus: Dataset Review, Introduction of the Kidmose CANid Dataset (KCID), and Proof of Concept | Brooke Elizabeth Kidmose et.al. | 2510.25856 | translate | read | null |
| 2025-10-29 | Flex-GAD : Flexible Graph Anomaly Detection | Apu Chakraborty et.al. | 2510.25809 | translate | read | null |
| 2025-10-29 | Attention Augmented GNN RNN-Attention Models for Advanced Cybersecurity Intrusion Detection | Jayant Biradar et.al. | 2510.25802 | translate | read | null |
| 2025-10-29 | Bridging the Divide: End-to-End Sequence-Graph Learning | Yuen Chen et.al. | 2510.25126 | translate | read | null |
| 2025-10-28 | Semi-supervised and unsupervised learning for health indicator extraction from guided waves in aerospace composite structures | James Josep Perry et.al. | 2510.24614 | translate | read | null |
| 2025-10-28 | ARIMA_PLUS: Large-scale, Accurate, Automatic and Interpretable In-Database Time Series Forecasting and Anomaly Detection in Google BigQuery | Xi Cheng et.al. | 2510.24452 | translate | read | null |
| 2025-10-28 | OmniLearned: A Foundation Model Framework for All Tasks Involving Jet Physics | Wahid Bhimji et.al. | 2510.24066 | translate | read | null |
| 2025-10-28 | Localized Kernel Projection Outlyingness: A Two-Stage Approach for Multi-Modal Outlier Detection | Akira Tamamori et.al. | 2510.24043 | translate | read | null |
| 2025-10-28 | LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models | Peng Cai et.al. | 2510.24031 | translate | read | null |
| 2025-10-27 | In Search of the Unknown Unknowns: A Multi-Metric Distance Ensemble for Out of Distribution Anomaly Detection in Astronomical Surveys | Siddharth Chaini et.al. | 2510.23702 | translate | read | null |
| 2025-10-27 | GRAD: Real-Time Gated Recurrent Anomaly Detection in Autonomous Vehicle Sensors Using Reinforced EMA and Multi-Stage Sliding Window Techniques | Mohammad Hossein Jafari Naeimi et.al. | 2510.23327 | translate | read | null |
| 2025-10-27 | Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks | Yaokai Feng et.al. | 2510.23313 | translate | read | null |
| 2025-10-27 | Approaching Domain Generalization with Embeddings for Robust Discrimination and Recognition of RF Communication Signals | Lukas Henneke et.al. | 2510.23186 | translate | read | null |
| 2025-10-27 | A method for outlier detection based on cluster analysis and visual expert criteria | Juan A. Lara et.al. | 2510.23136 | translate | read | null |
| 2025-10-27 | Reliable Robotic Task Execution in the Face of Anomalies | Bharath Santhanam et.al. | 2510.23121 | translate | read | null |
| 2025-10-27 | Sentinel: Dynamic Knowledge Distillation for Personalized Federated Intrusion Detection in Heterogeneous IoT Networks | Gurpreet Singh et.al. | 2510.23019 | translate | read | null |
| 2025-10-27 | CodeAD: Synthesize Code of Rules for Log-based Anomaly Detection with LLMs | Junjie Huang et.al. | 2510.22986 | translate | read | null |
| 2025-10-27 | Diffuse to Detect: A Generalizable Framework for Anomaly Detection with Diffusion Models Applications to UAVs and Beyond | Mingze Gong et.al. | 2510.22928 | translate | read | null |
| 2025-10-26 | A Theory of the Mechanics of Information: Generalization Through Measurement of Uncertainty (Learning is Measuring) | Christopher J. Hazard et.al. | 2510.22809 | translate | read | null |
| 2025-10-26 | VADTree: Explainable Training-Free Video Anomaly Detection via Hierarchical Granularity-Aware Tree | Wenlong Li et.al. | 2510.22693 | translate | read | null |
| 2025-10-26 | CLEANet: Robust and Efficient Anomaly Detection in Contaminated Multivariate Time Series | Songhan Zhang et.al. | 2510.22619 | translate | read | null |
| 2025-10-26 | Doubly Smoothed Density Estimation with Application on Miners’ Unsafe Act Detection | Qianhan Zeng et.al. | 2510.22482 | translate | read | null |
| 2025-10-25 | Optimal Spatial Anomaly Detection | Baiyu Wang et.al. | 2510.22330 | translate | read | null |
| 2025-10-25 | Adapting Noise-Driven PUF and AI for Secure WBG ICS: A Proof-of-Concept Study | Devon A. Kelly et.al. | 2510.22283 | translate | read | null |
| 2025-10-24 | Human-Centric Anomaly Detection in Surveillance Videos Using YOLO-World and Spatio-Temporal Deep Learning | Mohammad Ali Etemadi Naeen et.al. | 2510.22056 | translate | read | null |
| 2025-10-24 | Input Adaptive Bayesian Model Averaging | Yuli Slavutsky et.al. | 2510.22054 | translate | read | null |
| 2025-10-24 | AutoSciDACT: Automated Scientific Discovery through Contrastive Embedding and Hypothesis Testing | Samuel Bright-Thonney et.al. | 2510.21935 | translate | read | null |
| 2025-10-22 | Training data membership inference via Gaussian process meta-modeling: a post-hoc analysis approach | Yongchao Huang et.al. | 2510.21846 | translate | read | null |
| 2025-10-22 | Quantum Autoencoders for Anomaly Detection in Cybersecurity | Rohan Senthil et.al. | 2510.21837 | translate | read | null |
| 2025-10-24 | Automated Quality Control for Language Documentation: Detecting Phonotactic Inconsistencies in a Kokborok Wordlist | Kellen Parker van Dam et.al. | 2510.21584 | translate | read | null |
| 2025-10-24 | FrameShield: Adversarially Robust Video Anomaly Detection | Mojtaba Nafez et.al. | 2510.21532 | translate | read | null |
| 2025-10-24 | Actionable Cybersecurity Notifications for Smart Homes: A User Study on the Role of Length and Complexity | Victor Jüttner et.al. | 2510.21508 | translate | read | null |
| 2025-10-24 | MoniTor: Exploiting Large Language Models with Instruction for Online Video Anomaly Detection | Shengtian Yang et.al. | 2510.21449 | translate | read | null |
| 2025-10-24 | REMONI: An Autonomous System Integrating Wearables and Multimodal Large Language Models for Enhanced Remote Health Monitoring | Thanh Cong Ho et.al. | 2510.21445 | translate | read | null |
| 2025-10-24 | An Evidence-Based Post-Hoc Adjustment Framework for Anomaly Detection Under Data Contamination | Sukanya Patra et.al. | 2510.21296 | translate | read | null |
| 2025-10-24 | TokenCLIP: Token-wise Prompt Learning for Zero-shot Anomaly Detection | Qihang Zhou et.al. | 2510.21171 | translate | read | null |
| 2025-10-23 | Security Logs to ATT&CK Insights: Leveraging LLMs for High-Level Threat Understanding and Cognitive Trait Inference | Soham Hans et.al. | 2510.20930 | translate | read | null |
| 2025-10-23 | Unsupervised Anomaly Prediction with N-BEATS and Graph Neural Network in Multi-variate Semiconductor Process Time Series | Daniel Sorensen et.al. | 2510.20718 | translate | read | null |
| 2025-10-23 | Capability of using the normalizing flows for extraction rare gamma events in the TAIGA experiment | A. P. Kryukov et.al. | 2510.20334 | translate | read | null |
| 2025-10-23 | GMFVAD: Using Grained Multi-modal Feature to Improve Video Anomaly Detection | Guangyu Dai et.al. | 2510.20268 | translate | read | null |
| 2025-10-23 | Unifying Boxplots: A Multiple Testing Perspective | Bowen Gang et.al. | 2510.20259 | translate | read | null |
| 2025-10-23 | Physics-Guided Fusion for Robust 3D Tracking of Fast Moving Small Objects | Prithvi Raj Singh et.al. | 2510.20126 | translate | read | null |
| 2025-10-23 | Human-Centered LLM-Agent System for Detecting Anomalous Digital Asset Transactions | Gyuyeon Na et.al. | 2510.20102 | translate | read | null |
| 2025-10-22 | The Temporal Graph of Bitcoin Transactions | Vahid Jalili et.al. | 2510.20028 | translate | read | link |
| 2025-10-22 | Machine Learning-Based Localization Accuracy of RFID Sensor Networks via RSSI Decision Trees and CAD Modeling for Defense Applications | Curtis Lee Shull et.al. | 2510.20019 | translate | read | null |
| 2025-10-21 | Cyberattack Detection in Critical Infrastructure and Supply Chains | Smita Khapre et.al. | 2510.19859 | translate | read | null |
| 2025-10-22 | Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems | Mohamed ElShehaby et.al. | 2510.19761 | translate | read | null |
| 2025-10-22 | Network-Centric Anomaly Filtering and Spoofer localization for 5G-NR Localization in LAWNs | Zexin Fang et.al. | 2510.19521 | translate | read | null |
| 2025-10-22 | AegisMCP: Online Graph Intrusion Detection for Tool-Augmented LLMs on Edge Devices | Zhonghao Zhan et.al. | 2510.19462 | translate | read | null |
| 2025-10-22 | Neuromorphic computing for anomaly detection in a laser powder bed fusion process | Shreyan Banerjee et.al. | 2510.19309 | translate | read | null |
| 2025-10-22 | Reliability and Resilience of AI-Driven Critical Network Infrastructure under Cyber-Physical Threats | Konstantinos A. Lizos et.al. | 2510.19295 | translate | read | null |
| 2025-10-22 | Brain-Inspired Perspective on Configurations: Unsupervised Similarity and Early Cognition | Juntang Wang et.al. | 2510.19229 | translate | read | null |
| 2025-10-21 | Securing IoT Communications via Anomaly Traffic Detection: Synergy of Genetic Algorithm and Ensemble Method | Behnam Seyedi et.al. | 2510.19121 | translate | read | null |
| 2025-10-21 | Fusion of Machine Learning and Blockchain-based Privacy-Preserving Approach for Health Care Data in the Internet of Things | Behnam Rezaei Bezanjani et.al. | 2510.19026 | translate | read | null |
| 2025-10-21 | An Encode-then-Decompose Approach to Unsupervised Time Series Anomaly Detection on Contaminated Training Data–Extended Version | Buang Zhang et.al. | 2510.18998 | translate | read | null |
| 2025-10-21 | Dimensionality Reduction for Remote Sensing Data Analysis: A Systematic Review of Methods and Applications | Nathan Mankovich et.al. | 2510.18935 | translate | read | null |
| 2025-10-21 | Rebellious Student: A Complementary Learning Framework for Background Feature Enhancement in Hyperspectral Anomaly Detection | Wenping Jin et.al. | 2510.18781 | translate | read | null |
| 2025-10-21 | Privacy-Preserving Healthcare Data in IoT: A Synergistic Approach with Deep Learning and Blockchain | Behnam Rezaei Bezanjani et.al. | 2510.18568 | translate | read | null |
| 2025-10-21 | Microsecond Federated SVD on Grassmann Manifold for Real-time IoT Intrusion Detection | Tung-Anh Nguyen et.al. | 2510.18501 | translate | read | null |
| 2025-10-14 | BeSTAD: Behavior-Aware Spatio-Temporal Anomaly Detection for Human Mobility Data | Junyi Xie et.al. | 2510.12076 | translate | read | null |
| 2025-10-06 | Interpreting anomaly detection of SDSS spectra | Edgar Ortiz Manrique et.al. | 2510.05235 | translate | read | null |
| 2025-10-02 | Unlocking Vision-Language Models for Video Anomaly Detection via Fine-Grained Prompting | Shu Zou et.al. | 2510.02155 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)