Anomaly Detection - 2025-11
Anomaly Detection - 2025-11
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-11-26 | Pattern Recognition of Ozone-Depleting Substance Exports in Global Trade Data | Muhammad Sukri Bin Ramli et.al. | 2512.07864 | translate | read | null |
| 2025-11-26 | SetAD: Semi-Supervised Anomaly Learning in Contextual Sets | Jianling Gao et.al. | 2512.07863 | translate | read | null |
| 2025-11-25 | Autoencoder-based time series anomaly detection for ATLAS Liquid Argon calorimeter data quality monitoring | Vilius Čepaitis et.al. | 2512.05977 | translate | read | null |
| 2025-11-30 | A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification | Berkani Khaled et.al. | 2512.03462 | translate | read | null |
| 2025-11-30 | Opportunities and Challenges for Data Quality in the Era of Quantum Computing | Sven Groppe et.al. | 2512.00870 | translate | read | null |
| 2025-11-30 | FC-ADL: Efficient Microservice Anomaly Detection and Localisation Through Functional Connectivity | Giles Winchester et.al. | 2512.00844 | translate | read | null |
| 2025-11-29 | Pushing the Boundaries of Interpretability: Incremental Enhancements to the Explainable Boosting Machine | Isara Liyanage et.al. | 2512.00528 | translate | read | null |
| 2025-11-29 | Introducing AI-Driven IoT Energy Management Framework | Shivani Mruthyunjaya et.al. | 2512.00321 | translate | read | null |
| 2025-11-29 | ART-ASyn: Anatomy-aware Realistic Texture-based Anomaly Synthesis Framework for Chest X-Rays | Qinyi Cao et.al. | 2512.00310 | translate | read | null |
| 2025-11-28 | SD-CGAN: Conditional Sinkhorn Divergence GAN for DDoS Anomaly Detection in IoT Networks | Henry Onyeka et.al. | 2512.00251 | translate | read | null |
| 2025-11-28 | TIE: A Training-Inversion-Exclusion Framework for Visually Interpretable and Uncertainty-Guided Out-of-Distribution Detection | Pirzada Suhail et.al. | 2512.00229 | translate | read | null |
| 2025-11-28 | A Trainable Centrality Framework for Modern Data | Minh Duc Vu et.al. | 2511.22959 | translate | read | null |
| 2025-11-27 | An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks | Kanchon Gharami et.al. | 2511.22791 | translate | read | null |
| 2025-11-27 | AnoRefiner: Anomaly-Aware Group-Wise Refinement for Zero-Shot Industrial Anomaly Detection | Dayou Huang et.al. | 2511.22595 | translate | read | null |
| 2025-11-27 | ABounD: Adversarial Boundary-Driven Few-Shot Learning for Multi-Class Anomaly Detection | Runzhi Deng et.al. | 2511.22436 | translate | read | null |
| 2025-11-27 | ARES: Anomaly Recognition Model For Edge Streams | Simone Mungari et.al. | 2511.22078 | translate | read | null |
| 2025-11-27 | A Catalogue of Mid-infrared Variable Sources from unTimely | Zihan kang et.al. | 2511.22071 | translate | read | null |
| 2025-11-26 | Modeling Quantum Autoencoder Trainable Kernel for IoT Anomaly Detection | Swathi Chandrasekhar et.al. | 2511.21932 | translate | read | null |
| 2025-11-26 | New Physics Searches at the LHC through Event-based Anomaly Detection and Development of ADFilter Web-tool | Wasikul Islam et.al. | 2511.21869 | translate | read | null |
| 2025-11-26 | Unsupervised Anomaly Detection for Smart IoT Devices: Performance and Resource Comparison | Md. Sad Abdullah Sami et.al. | 2511.21842 | translate | read | null |
| 2025-11-26 | Advanced Data Collection Techniques in Cloud Security: A Multi-Modal Deep Learning Autoencoder Approach | Aamiruddin Syed et.al. | 2511.21795 | translate | read | null |
| 2025-11-26 | TAGFN: A Text-Attributed Graph Dataset for Fake News Detection in the Age of LLMs | Kay Liu et.al. | 2511.21624 | translate | read | null |
| 2025-11-26 | Anomaly Detection with Adaptive and Aggressive Rejection for Contaminated Training Data | Jungi Lee et.al. | 2511.21378 | translate | read | null |
| 2025-11-26 | Evaluation of Large Language Models for Numeric Anomaly Detection in Power Systems | Yichen Liu et.al. | 2511.21371 | translate | read | null |
| 2025-11-26 | Hybrid SIFT-SNN for Efficient Anomaly Detection of Traffic Flow-Control Infrastructure | Munish Rathee et.al. | 2511.21337 | translate | read | null |
| 2025-11-26 | I-GLIDE: Input Groups for Latent Health Indicators in Degradation Estimation | Lucas Thil et.al. | 2511.21208 | translate | read | link |
| 2025-11-25 | Securing the Model Context Protocol (MCP): Risks, Controls, and Governance | Herman Errico et.al. | 2511.20920 | translate | read | null |
| 2025-11-25 | Ranking-Enhanced Anomaly Detection Using Active Learning-Assisted Attention Adversarial Dual AutoEncoders | Sidahmed Benabderrahmane et.al. | 2511.20480 | translate | read | null |
| 2025-11-25 | DRL-Guided Neural Batch Sampling for Semi-Supervised Pixel-Level Anomaly Detection | Amirhossein Khadivi Noghredeh et.al. | 2511.20270 | translate | read | null |
| 2025-11-25 | ADNet: A Large-Scale and Extensible Multi-Domain Benchmark for Anomaly Detection Across 380 Real-World Categories | Hai Ling et.al. | 2511.20169 | translate | read | null |
| 2025-11-25 | An experimental study of existing tools for outlier detection and cleaning in trajectories | Mariana M Garcez Duarte et.al. | 2511.20139 | translate | read | null |
| 2025-11-25 | Explainable Visual Anomaly Detection via Concept Bottleneck Models | Arianna Stropeni et.al. | 2511.20088 | translate | read | null |
| 2025-11-24 | IRSDA: An Agent-Orchestrated Framework for Enterprise Intrusion Response | Damodar Panigrahi et.al. | 2511.19644 | translate | read | null |
| 2025-11-23 | The Generalized Proximity Forest | Ben Shaw et.al. | 2511.19487 | translate | read | null |
| 2025-11-22 | Pistachio: Towards Synthetic, Balanced, and Long-Form Video Anomaly Benchmarks | Jie Li et.al. | 2511.19474 | translate | read | null |
| 2025-11-24 | Neural Architecture Search for Quantum Autoencoders | Hibah Agha et.al. | 2511.19246 | translate | read | null |
| 2025-11-24 | Unsupervised Multi-View Visual Anomaly Detection via Progressive Homography-Guided Alignment | Xintao Chen et.al. | 2511.18766 | translate | read | null |
| 2025-11-24 | Evaluation of Real-Time Mitigation Techniques for Cyber Security in IEC 61850 / IEC 62351 Substations | Akila Herath et.al. | 2511.18748 | translate | read | null |
| 2025-11-24 | A Problem-Oriented Taxonomy of Evaluation Metrics for Time Series Anomaly Detection | Kaixiang Yang et.al. | 2511.18739 | translate | read | null |
| 2025-11-24 | Multimodal Real-Time Anomaly Detection and Industrial Applications | Aman Verma et.al. | 2511.18698 | translate | read | null |
| 2025-11-23 | Functional Localization Enforced Deep Anomaly Detection Using Fundus Images | Jan Benedikt Ruhland et.al. | 2511.18627 | translate | read | null |
| 2025-11-23 | Algorithmic detection of false data injection attacks in cyber-physical systems | Souvik Das et.al. | 2511.18588 | translate | read | null |
| 2025-11-23 | Carbon-Aware Intrusion Detection: A Comparative Study of Supervised and Unsupervised DRL for Sustainable IoT Edge Gateways | Saeid Jamshidi et.al. | 2511.18240 | translate | read | null |
| 2025-11-23 | Lightweight Autoencoder-Isolation Forest Anomaly Detection for Green IoT Edge Gateways | Saeid Jamshidi et.al. | 2511.18235 | translate | read | null |
| 2025-11-23 | Think Fast: Real-Time IoT Intrusion Reasoning Using IDS and LLMs at the Edge Gateway | Saeid Jamshidi et.al. | 2511.18230 | translate | read | null |
| 2025-11-22 | A Novel and Practical Universal Adversarial Perturbations against Deep Reinforcement Learning based Intrusion Detection Systems | H. Zhang et.al. | 2511.18223 | translate | read | null |
| 2025-11-22 | MEDIC: a network for monitoring data quality in collider experiments | Juvenal Bassa et.al. | 2511.18172 | translate | read | null |
| 2025-11-22 | PromptMoE: Generalizable Zero-Shot Anomaly Detection via Visually-Guided Prompt Mixtures | Yuheng Shao et.al. | 2511.18116 | translate | read | null |
| 2025-11-22 | Federated Anomaly Detection and Mitigation for EV Charging Forecasting Under Cyberattacks | Oluleke Babayomi et.al. | 2511.17978 | translate | read | null |
| 2025-11-21 | StealthCup: Realistic, Multi-Stage, Evasion-Focused CTF for Benchmarking IDS | Manuel Kern et.al. | 2511.17761 | translate | read | null |
| 2025-11-21 | DelTriC: A Novel Clustering Method with Accurate Outlier | Tomas Javurek et.al. | 2511.17219 | translate | read | null |
| 2025-11-21 | Modeling Anomaly Detection in Cloud Services: Analysis of the Properties that Impact Latency and Resource Consumption | Gabriel Job Antunes Grabher et.al. | 2511.17119 | translate | read | null |
| 2025-11-21 | AutoGraphAD: A novel approach using Variational Graph Autoencoders for anomalous network flow detection | Georgios Anyfantis et.al. | 2511.17113 | translate | read | null |
| 2025-11-21 | Sparse Reasoning is Enough: Biological-Inspired Framework for Video Anomaly Detection with Large Pre-trained Models | He Huang et.al. | 2511.17094 | translate | read | null |
| 2025-11-21 | CroTad: A Contrastive Reinforcement Learning Framework for Online Trajectory Anomaly Detection | Rui Xue et.al. | 2511.16929 | translate | read | null |
| 2025-11-20 | A streaming algorithm and hardware accelerator for top-K flow detection in network traffic | Carolina Gallardo-Pavesi et.al. | 2511.16797 | translate | read | null |
| 2025-11-20 | PersonaDrift: A Benchmark for Temporal Anomaly Detection in Language-Based Dementia Monitoring | Joy Lai et.al. | 2511.16445 | translate | read | null |
| 2025-11-04 | M2S2L: Mamba-based Multi-Scale Spatial-temporal Learning for Video Anomaly Detection | Yang Liu et.al. | 2511.05564 | translate | read | null |
| 2025-11-06 | Knowledge-based anomaly detection for identifying network-induced shape artifacts | Rucha Deshpande et.al. | 2511.04729 | translate | read | null |
| 2025-11-06 | ARETE: an R package for Automated REtrieval from TExt with large language models | Vasco V. Branco et.al. | 2511.04573 | translate | read | null |
| 2025-11-06 | Large Language Models for Cyber Security | Raunak Somani et.al. | 2511.04508 | translate | read | null |
| 2025-11-06 | Fraud-Proof Revenue Division on Subscription Platforms | Abheek Ghosh et.al. | 2511.04465 | translate | read | null |
| 2025-11-06 | PUL-SLAM: Path-Uncertainty Co-Optimization with Lightweight Stagnation Detection for Efficient Robotic Exploration | Yizhen Yin et.al. | 2511.04180 | translate | read | null |
| 2025-11-06 | Automated and Explainable Denial of Service Analysis for AI-Driven Intrusion Detection Systems | Paul Badu Yakubu et.al. | 2511.04114 | translate | read | null |
| 2025-11-06 | DeNoise: Learning Robust Graph Representations for Unsupervised Graph-Level Anomaly Detection | Qingfeng Chen et.al. | 2511.04086 | translate | read | null |
| 2025-11-06 | Detecting Silent Failures in Multi-Agentic AI Trajectories | Divya Pathak et.al. | 2511.04032 | translate | read | null |
| 2025-11-06 | Multiscale Astrocyte Network Calcium Dynamics for Biologically Plausible Intelligence in Anomaly Detection | Berk Iskar et.al. | 2511.03993 | translate | read | null |
| 2025-11-06 | Design and Detection of Covert Man-in-the-Middle Cyberattacks on Water Treatment Plants | Victor Mattos et.al. | 2511.03971 | translate | read | null |
| 2025-11-05 | I Detect What I Don’t Know: Incremental Anomaly Learning with Stochastic Weight Averaging-Gaussian for Oracle-Free Medical Imaging | Nand Kumar Yadav et.al. | 2511.03912 | translate | read | null |
| 2025-11-05 | Temporal Analysis Framework for Intrusion Detection Systems: A Novel Taxonomy for Time-Aware Cybersecurity | Tatiana S. Parlanti et.al. | 2511.03799 | translate | read | null |
| 2025-11-05 | Magnetism and Peierls distortion in Dirac semimetal CaMnBi $_2$ | Aashish Sapkota et.al. | 2511.03721 | translate | read | null |
| 2025-11-05 | SHIELD: Securing Healthcare IoT with Efficient Machine Learning Techniques for Anomaly Detection | Mahek Desai et.al. | 2511.03661 | translate | read | null |
| 2025-11-05 | Model order reduction via Lie groups | Yannik P. Wotte et.al. | 2511.03520 | translate | read | null |
| 2025-11-05 | Analytical Queries for Unstructured Data | Daniel Kang et.al. | 2511.03489 | translate | read | null |
| 2025-11-05 | Graph Neural AI with Temporal Dynamics for Comprehensive Anomaly Detection in Microservices | Qingyuan Zhang et.al. | 2511.03285 | translate | read | null |
| 2025-11-05 | IEC3D-AD: A 3D Dataset of Industrial Equipment Components for Unsupervised Point Cloud Anomaly Detection | Bingyang Guo et.al. | 2511.03267 | translate | read | null |
| 2025-11-05 | RKUM: An R Package for Robust Kernel Unsupervised Methods | Md Ashad Alam et.al. | 2511.03216 | translate | read | null |
| 2025-11-05 | Who Sees the Risk? Stakeholder Conflicts and Explanatory Policies in LLM-based Risk Assessment | Srishti Yadav et.al. | 2511.03152 | translate | read | null |
| 2025-11-05 | Sparse, self-organizing ensembles of local kernels detect rare statistical anomalies | Gaia Grosso et.al. | 2511.03095 | translate | read | null |
| 2025-11-04 | A Collaborative Reasoning Framework for Anomaly Diagnostics in Underwater Robotics | Markus Buchholz et.al. | 2511.03075 | translate | read | null |
| 2025-11-04 | Adaptive and Robust Data Poisoning Detection and Sanitization in Wearable IoT Systems using Large Language Models | W. K. M Mithsara et.al. | 2511.02894 | translate | read | null |
| 2025-11-04 | AI-Generated Image Detection: An Empirical Study and Future Research Directions | Nusrat Tasnim et.al. | 2511.02791 | translate | read | null |
| 2025-11-04 | Unsupervised Learning for Industrial Defect Detection: A Case Study on Shearographic Data | Jessica Plassmann et.al. | 2511.02541 | translate | read | null |
| 2025-11-04 | Anomaly Detection-Based UE-Centric Inter-Cell Interference Suppression | Kwonyeol Park et.al. | 2511.02320 | translate | read | null |
| 2025-11-04 | Federated Quantum Kernel Learning for Anomaly Detection in Multivariate IoT Time-Series | Kuan-Cheng Chen et.al. | 2511.02301 | translate | read | null |
| 2025-11-04 | DOD: Detection of outliers in high dimensional data with distance of distances | Seong-ho Lee et.al. | 2511.02199 | translate | read | null |
| 2025-11-04 | DoFlow: Causal Generative Flows for Interventional and Counterfactual Time-Series Prediction | Dongze Wu et.al. | 2511.02137 | translate | read | null |
| 2025-11-03 | A short blanket for cosmology: the CMB lensing anomaly behind the preference for a negative neutrino mass | Andrea Cozzumbo et.al. | 2511.01967 | translate | read | null |
| 2025-11-03 | Machine and Deep Learning for Indoor UWB Jammer Localization | Hamed Fard et.al. | 2511.01819 | translate | read | null |
| 2025-11-03 | An Open-Access Benchmark of Statistical and Machine-Learning Anomaly Detection Methods for Battery Applications | Mei-Chin Pang et.al. | 2511.01745 | translate | read | null |
| 2025-11-03 | Detailed spectroscopic and photometric analysis of the remarkable planet-hosting wide binary system HD 202772A/B | Emiliano Jofré et.al. | 2511.01595 | translate | read | null |
| 2025-11-03 | Example-Based Feature Painting on Textures | Andrei-Timotei Ardelean et.al. | 2511.01513 | translate | read | null |
| 2025-11-03 | Characterizing Build Compromises Through Vulnerability Disclosure Analysis | Maimouna Tamah Diao et.al. | 2511.01395 | translate | read | null |
| 2025-11-03 | An Interdisciplinary and Cross-Task Review on Missing Data Imputation | Jicong Fan et.al. | 2511.01196 | translate | read | null |
| 2025-11-02 | SliceVision-F2I: A Synthetic Feature-to-Image Dataset for Visual Pattern Representation on Network Slices | Md. Abid Hasan Rafi et.al. | 2511.01087 | translate | read | null |
| 2025-11-02 | Hydra: Dual Exponentiated Memory for Multivariate Time Series Analysis | Asal Meskin et.al. | 2511.00989 | translate | read | null |
| 2025-11-02 | A Unified Reasoning Framework for Holistic Zero-Shot Video Anomaly Analysis | Dongheng Lin et.al. | 2511.00962 | translate | read | null |
| 2025-11-02 | Towards Ultra-Low Latency: Binarized Neural Network Architectures for In-Vehicle Network Intrusion Detection | Huiyao Dong et.al. | 2511.00828 | translate | read | null |
| 2025-11-01 | TRACES: Temporal Recall with Contextual Embeddings for Real-Time Video Anomaly Detection | Yousuf Ahmed Siddiqui et.al. | 2511.00580 | translate | read | null |
| 2025-11-01 | Real-IAD Variety: Pushing Industrial Anomaly Detection Dataset to a Modern Era | Wenbing Zhu et.al. | 2511.00540 | translate | read | null |
| 2025-11-01 | Text-guided Fine-Grained Video Anomaly Detection | Jihao Gu et.al. | 2511.00524 | translate | read | null |
| 2025-11-01 | An Efficient Anomaly Detection Framework for Wireless Sensor Networks Using Markov Process | Rahul Mishra et.al. | 2511.00481 | translate | read | null |
| 2025-11-01 | Deep Learning Approach to Anomaly Detection in Enterprise ETL Processes with Autoencoders | Xin Chen et.al. | 2511.00462 | translate | read | null |
| 2025-11-01 | Mind the Gap: Missing Cyber Threat Coverage in NIDS Datasets for the Energy Sector | Adrita Rahman Tory et.al. | 2511.00360 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)