Anomaly Detection - 2025-12

Publish Date Title Authors PDF Translate Read Code
2025-12-31 Towards eco friendly cybersecurity: machine learning based anomaly detection with carbon and energy metrics KC Aashish et.al. 2601.00893 translate read null
2025-12-31 Outlier Detection Using Vector Cosine Similarity by Adding a Dimension Zhongyang Shen et.al. 2601.00883 translate read null
2025-12-30 Quantum Machine Learning Approaches for Coordinated Stealth Attack Detection in Distributed Generation Systems Osasumwen Cedric Ogiesoba-Eguakun et.al. 2601.00873 translate read null
2025-12-31 The Trojan in the Vocabulary: Stealthy Sabotage of LLM Composition Xiaoze Liu et.al. 2601.00065 translate read null
2025-12-07 Evaluating Anomaly Detectors for Simulated Highly Imbalanced Industrial Classification Problems Lesley Wheat et.al. 2601.00005 translate read null
2025-12-31 Trustworthy Equipment Monitoring via Cascaded Anomaly Detection and Thermal Localization Sungwoo Kang et.al. 2512.24755 translate read null
2025-12-30 Using Large Language Models To Translate Machine Results To Human Results Trishna Niraula et.al. 2512.24518 translate read null
2025-12-30 FAST-IDS: A Fast Two-Stage Intrusion Detection System with Hybrid Compression for Real-Time Threat Detection in Connected and Autonomous Vehicles Devika S et.al. 2512.24391 translate read null
2025-12-30 FedSecureFormer: A Fast, Federated and Secure Transformer Framework for Lightweight Intrusion Detection in Connected and Autonomous Vehicles Devika S et.al. 2512.24345 translate read null
2025-12-30 Fast reconstruction-based ROI triggering via anomaly detection in the CYGNO optical TPC F. D. Amaro et.al. 2512.24290 translate read null
2025-12-30 FedLiTeCAN : A Federated Lightweight Transformer for Fast and Robust CAN Bus Intrusion Detection Devika S et.al. 2512.24088 translate read null
2025-12-30 Anomaly detection in satellite imagery through temporal inpainting Bertrand Rouet-Leduc et.al. 2512.23986 translate read null
2025-12-30 Causify DataFlow: A Framework For High-performance Machine Learning Stream Computing Giacinto Paolo Saggese et.al. 2512.23977 translate read null
2025-12-29 Security Without Detection: Economic Denial as a Primitive for Edge and IoT Defense Samaresh Kumar Singh et.al. 2512.23849 translate read null
2025-12-29 Zero-Trust Agentic Federated Learning for Secure IIoT Defense Systems Samaresh Kumar Singh et.al. 2512.23809 translate read null
2025-12-29 A Survey on Graph Neural Networks for Fraud Detection in Ride Hailing Platforms Kanishka Hewageegana et.al. 2512.23777 translate read null
2025-12-29 Distribution-Free Process Monitoring with Conformal Prediction Christopher Burger et.al. 2512.23602 translate read null
2025-12-29 Unsupervised Learning for Detection of Rare Driving Scenarios Dat Le et.al. 2512.23585 translate read null
2025-12-29 A unified framework for detecting point and collective anomalies in operating system logs via collaborative transformers Mohammad Nasirzadeh et.al. 2512.23380 translate read null
2025-12-29 Anomaly Detection by Effectively Leveraging Synthetic Images Sungho Kang et.al. 2512.23227 translate read null
2025-12-28 Determining habitat anomalies in cross-diffusion predator-prey chemotaxis models Yuhan Li et.al. 2512.22946 translate read null
2025-12-25 Multi-Head Spectral-Adaptive Graph Anomaly Detection Qingyue Cao et.al. 2512.22291 translate read null
2025-12-23 Scalable Cloud-Native Architectures for Intelligent PMU Data Processing Nachiappan Chockalingam et.al. 2512.22231 translate read null
2025-12-20 Bidirectional RAG: Safe Self-Improving Retrieval-Augmented Generation Through Multi-Stage Validation Teja Chinthala et.al. 2512.22199 translate read null
2025-12-19 Latent Sculpting for Zero-Shot Generalization: A Manifold Learning Approach to Out-of-Distribution Anomaly Detection Rajeeb Thapa Chhetri et.al. 2512.22179 translate read null
2025-12-26 Unsupervised Anomaly Detection in Brain MRI via Disentangled Anatomy Learning Tao Yang et.al. 2512.21924 translate read null
2025-12-26 Secure and Explainable Fraud Detection in Finance via Hierarchical Multi-source Dataset Distillation Yiming Qian et.al. 2512.21866 translate read null
2025-12-25 Causal-HM: Restoring Physical Generative Logic in Multimodal Anomaly Detection via Hierarchical Modulation Xiao Liu et.al. 2512.21650 translate read null
2025-12-25 CCAD: Compressed Global Feature Conditioned Anomaly Detection Xiao Jin et.al. 2512.21459 translate read null
2025-12-24 AnyAD: Unified Any-Modality Anomaly Detection in Incomplete Multi-Sequence MRI Changwei Wu et.al. 2512.21264 translate read null
2025-12-24 Neutralization of IMU-Based GPS Spoofing Detection using external IMU sensor and feedback methodology Ji Hyuk Jung et.al. 2512.20964 translate read null
2025-12-23 High Dimensional Data Decomposition for Anomaly Detection of Textured Images Ji Song et.al. 2512.20432 translate read null
2025-12-23 Chain-of-Anomaly Thoughts with Large Vision-Language Models Pedro Domingos et.al. 2512.20417 translate read null
2025-12-23 Machine-learning techniques for model-independent searches in dijet final states CMS Collaboration et.al. 2512.20395 translate read null
2025-12-23 Population Protocols Revisited: Parity and Beyond Leszek Gąsieniec et.al. 2512.20163 translate read null
2025-12-23 Spatio-Temporal Graphs Beyond Grids: Benchmark for Maritime Anomaly Detection Jeehong Kim et.al. 2512.20086 translate read null
2025-12-22 Lightweight Intrusion Detection in IoT via SHAP-Guided Feature Pruning and Knowledge-Distilled Kronecker Networks Hafsa Benaddi et.al. 2512.19488 translate read null
2025-12-22 Real-Time Machine Learning for Embedded Anomaly Detection Abdelmadjid Benmachiche et.al. 2512.19383 translate read null
2025-12-22 Evaluating MCC for Low-Frequency Cyberattack Detection in Imbalanced Intrusion Detection Data Prameshwar Thiyagarajan et.al. 2512.19203 translate read null
2025-12-22 Fraud Detection Through Large-Scale Graph Clustering with Heterogeneous Link Transformation Chi Liu et.al. 2512.19061 translate read null
2025-12-22 Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms Md Minhazul Islam Munna et.al. 2512.19037 translate read null
2025-12-22 Outlier detection in mixed-attribute data: a semi-supervised approach with fuzzy approximations and relative entropy Baiyang Chen et.al. 2512.18978 translate read null
2025-12-22 Consistency-guided semi-supervised outlier detection in heterogeneous data using fuzzy rough sets Baiyang Chen et.al. 2512.18977 translate read null
2025-12-21 Hyperbolic Graph Embeddings: a Survey and an Evaluation on Anomaly Detection Souhail Abdelmouaiz Sadat et.al. 2512.18826 translate read null
2025-12-21 Label-Informed Outlier Detection Based on Granule Density Baiyang Chen et.al. 2512.18774 translate read null
2025-12-21 Explainable and Fine-Grained Safeguarding of LLM Multi-Agent Systems via Bi-Level Graph Anomaly Detection Junjun Pan et.al. 2512.18733 translate read null
2025-12-21 Improving Pattern Recognition of Scheduling Anomalies through Structure-Aware and Semantically-Enhanced Graphs Ning Lyu et.al. 2512.18673 translate read null
2025-12-20 Cyber Threat Detection Enabled by Quantum Computing Zisheng Chen et.al. 2512.18493 translate read null
2025-12-20 Towards Scalable Visual Data Wrangling via Direct Manipulation El Kindi Rezig et.al. 2512.18405 translate read null
2025-12-20 Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid Matching Mohammad Zolfaghari et.al. 2512.18219 translate read null
2025-12-20 PROVEX: Enhancing SOC Analyst Trust with Explainable Provenance-Based IDS Devang Dhanuka et.al. 2512.18199 translate read null
2025-12-19 Grad: Guided Relation Diffusion Generation for Graph Augmentation in Graph Fraud Detection Jie Yang et.al. 2512.18133 translate read null
2025-12-19 AI Assisted Next Gen Outdoor Optical Networks: Camera Sensing for Monitoring and User Localization Meysam Ghanbari et.al. 2512.18087 translate read null
2025-12-19 Fraud detection in credit card transactions using Quantum-Assisted Restricted Boltzmann Machines João Marcos Cavalcanti de Albuquerque Neto et.al. 2512.17660 translate read null
2025-12-19 HeadHunt-VAD: Hunting Robust Anomaly-Sensitive Heads in MLLM for Tuning-Free Video Anomaly Detection Zhaolin Cai et.al. 2512.17601 translate read null
2025-12-18 Another Fit Bites the Dust: Conformal Prediction as a Calibration Standard for Machine Learning in High-Energy Physics Jack Y. Araz et.al. 2512.17048 translate read null
2025-12-18 New Theoretical Insights and Algorithmic Solutions for Reconstructing Score Sequences from Tournament Score Sets Bowen Liu et.al. 2512.16961 translate read null
2025-12-18 TimeSeries2Report prompting enables adaptive large language model management of lithium-ion batteries Jiayang Yang et.al. 2512.16453 translate read null
2025-12-18 Coarse-to-Fine Open-Set Graph Node Classification with Large Language Models Xueqi Ma et.al. 2512.16244 translate read null
2025-12-17 Explainable AI in Big Data Fraud Detection Ayush Jain et.al. 2512.16037 translate read null
2025-12-17 Reusable theory representations for colliders: a demonstrator SMEFT foundation model Supratim Das Bakshi et.al. 2512.15862 translate read null
2025-12-14 Adversarial Robustness in Financial Machine Learning: Defenses, Economic Impact, and Governance Evidence Samruddhi Baviskar et.al. 2512.15780 translate read null
2025-12-14 Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection Sudhanshu Sekhar Tripathy et.al. 2512.15779 translate read null
2025-12-12 PHANTOM: Progressive High-fidelity Adversarial Network for Threat Object Modeling Jamal Al-Karaki et.al. 2512.15768 translate read null
2025-12-06 Bayesian Modeling for Uncertainty Management in Financial Risk Forecasting and Compliance Sharif Al Mamun et.al. 2512.15739 translate read null
2025-12-17 A Multivariate Statistical Framework for Detection, Classification and Pre-localization of Anomalies in Water Distribution Networks Oleg Melnikov et.al. 2512.15685 translate read null
2025-12-17 Online Partitioned Local Depth for semi-supervised applications John D. Foley et.al. 2512.15436 translate read null
2025-12-17 A Masked Reverse Knowledge Distillation Method Incorporating Global and Local Information for Image Anomaly Detection Yuxin Jiang et.al. 2512.15326 translate read null
2025-12-17 MECAD: A multi-expert architecture for continual anomaly detection Malihe Dahmardeh et.al. 2512.15323 translate read null
2025-12-17 Prototypical Learning Guided Context-Aware Segmentation Network for Few-Shot Anomaly Detection Yuxin Jiang et.al. 2512.15319 translate read null
2025-12-17 Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions Siva Sai et.al. 2512.15286 translate read null
2025-12-17 Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries Louis Hackländer-Jansen et.al. 2512.15275 translate read null
2025-12-17 Accelerating High-Throughput Catalyst Screening by Direct Generation of Equilibrium Adsorption Structures Songze Huo et.al. 2512.15228 translate read null
2025-12-16 Intrusion Detection in Internet of Vehicles Using Machine Learning Hop Le et.al. 2512.14958 translate read null
2025-12-12 Quantum-Augmented AI/ML for O-RAN: Hierarchical Threat Detection with Synergistic Intelligence and Interpretability (Technical Report) Tan Le et.al. 2512.14742 translate read null
2025-12-12 How Deep Does Your Dependency Tree Go? An Empirical Study of Dependency Amplification Across 10 Package Ecosystems Jahidul Arafat et.al. 2512.14739 translate read null
2025-12-08 SGEMAS: A Self-Growing Ephemeral Multi-Agent System for Unsupervised Online Anomaly Detection via Entropic Homeostasis Mustapha Hamdi et.al. 2512.14708 translate read null
2025-12-16 Hierarchical Persistence Velocity for Network Anomaly Detection: Theory and Applications to Cryptocurrency Markets Omid Khormali et.al. 2512.14615 translate read null
2025-12-16 Fusion of Cellular ISAC and Passive RF Sensing for UAV Detection and Tracking Cole Dickerson et.al. 2512.14608 translate read null
2025-12-16 LLmFPCA-detect: LLM-powered Multivariate Functional PCA for Anomaly Detection in Sparse Longitudinal Texts Prasanjit Dubey et.al. 2512.14604 translate read null
2025-12-16 Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset Waqas Ahmed et.al. 2512.14422 translate read null
2025-12-16 FusAD: Time-Frequency Fusion with Adaptive Denoising for General Time Series Analysis Da Zhang et.al. 2512.14078 translate read null
2025-12-15 Look everywhere effects in anomaly detection Marie Hein et.al. 2512.13787 translate read null
2025-12-14 DARTs: A Dual-Path Robust Framework for Anomaly Detection in High-Dimensional Multivariate Time Series Xuechun Liu et.al. 2512.13735 translate read null
2025-12-15 AgentIAD: Tool-Augmented Single-Agent for Industrial Anomaly Detection Junwen Miao et.al. 2512.13671 translate read null
2025-12-15 3D Human-Human Interaction Anomaly Detection Shun Maeda et.al. 2512.13560 translate read null
2025-12-15 Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS Sabrine Ennaji et.al. 2512.13501 translate read null
2025-12-15 On-Device Continual Learning for Unsupervised Visual Anomaly Detection in Dynamic Manufacturing Haoyu Ren et.al. 2512.13497 translate read null
2025-12-15 Understanding Structured Financial Data with LLMs: A Case Study on Fraud Detection Xuwei Tan et.al. 2512.13040 translate read null
2025-12-14 A Rule-Aware Prompt Framework for Structured Numeric Reasoning in Cyber-Physical Systems Yichen Liu et.al. 2512.12794 translate read null
2025-12-14 FiD-QAE: A Fidelity-Driven Quantum Autoencoder for Credit Card Fraud Detection Mansour El Alami et.al. 2512.12689 translate read null
2025-12-13 Sleep pattern profiling using a finite mixture of contaminated multivariate skew-normal distributions on incomplete data Jason Pillay et.al. 2512.12464 translate read null
2025-12-13 Robust Outlier Detection and Low-Latency Concept Drift Adaptation for Data Stream Regression: A Dual-Channel Architecture Bingbing Wang et.al. 2512.12289 translate read null
2025-12-13 A Multi-Year Urban Streetlight Imagery Dataset for Visual Monitoring and Spatio-Temporal Drift Detection Peizheng Li et.al. 2512.12205 translate read null
2025-12-12 Rethinking Jailbreak Detection of Large Vision Language Models with Representational Contrastive Scoring Peichun Hua et.al. 2512.12069 translate read null
2025-12-12 Log Anomaly Detection with Large Language Models via Knowledge-Enriched Fusion Anfeng Peng et.al. 2512.11997 translate read null
2025-12-12 A Multi-Criteria Automated MLOps Pipeline for Cost-Effective Cloud-Based Classifier Retraining in Response to Data Distribution Shifts Emmanuel K. Katalay et.al. 2512.11541 translate read null
2025-12-12 Collaborative Reconstruction and Repair for Multi-class Industrial Anomaly Detection Qishan Wang et.al. 2512.11401 translate read null
2025-12-12 RcAE: Recursive Reconstruction Framework for Unsupervised Industrial Anomaly Detection Rongcheng Wu et.al. 2512.11284 translate read null
2025-12-11 Q-BAR: Blogger Anomaly Recognition via Quantum-enhanced Manifold Learning Maida Wang et.al. 2512.11071 translate read null
2025-12-11 An Efficient Variant of One-Class SVM with Lifelong Online Learning Guarantees Joe Suk et.al. 2512.11052 translate read null
2025-12-11 DCFO: Density-Based Counterfactuals for Outliers - Additional Material Tommaso Amico et.al. 2512.10659 translate read null
2025-12-11 Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks Neha et.al. 2512.10637 translate read null
2025-12-11 Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques Kaleb Bacztub et.al. 2512.10470 translate read null
2025-12-11 Semantic Reconstruction of Adversarial Plagiarism: A Context-Aware Framework for Detecting and Restoring “Tortured Phrases” in Scientific Literature Agniva Maiti et.al. 2512.10435 translate read null
2025-12-10 LogICL: Distilling LLM Reasoning to Bridge the Semantic Gap in Cross-Domain Log Anomaly Detection Jingwei Ye et.al. 2512.09627 translate read null
2025-12-10 Defect-aware Hybrid Prompt Optimization via Progressive Tuning for Zero-Shot Multi-type Anomaly Detection and Segmentation Nadeem Nazer et.al. 2512.09446 translate read null
2025-12-09 Natural Geometry of Robust Data Attribution: From Convex Models to Deep Networks Shihao Li et.al. 2512.09103 translate read null
2025-12-09 Explainable Anomaly Detection for Industrial IoT Data Streams Ana Rita Paupério et.al. 2512.08885 translate read null
2025-12-09 Reusability in MLOps: Leveraging Ports and Adapters to Build a Microservices Architecture for the Maritime Domain Renato Cordeiro Ferreira et.al. 2512.08657 translate read null
2025-12-09 The SMART+ Framework for AI Systems Laxmiraju Kandikatla et.al. 2512.08592 translate read null
2025-12-09 Labeled Delegated PSI and its Applications in the Public Sector Kristof Verslype et.al. 2512.08558 translate read null
2025-12-09 Developing a Strong CPS Defender: An Evolutionary Approach Qingyuan Hu et.al. 2512.08320 translate read null
2025-12-09 FedLAD: A Modular and Adaptive Testbed for Federated Log Anomaly Detection Yihan Liao et.al. 2512.08277 translate read null
2025-12-09 Improving the Sensitivity of Backdoor Detectors via Class Subspace Orthogonalization Guangmingmei Yang et.al. 2512.08129 translate read null
2025-12-08 The interstellar signature: A computational framework for open source interstellar tracking Pancha Narayan Sahu et.al. 2512.07910 translate read null
2025-12-08 Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments Ibrahim Adabara et.al. 2512.07909 translate read null
2025-12-08 An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning Lukas Johannes Möller et.al. 2512.07827 translate read null
2025-12-08 WaggleNet: A LoRa and MQTT-Based Monitoring System for Internal and External Beehive Conditions Minju Jeon et.al. 2512.07408 translate read null
2025-12-07 MINES: Explainable Anomaly Detection through Web API Invariant Inference Wenjie Zhang et.al. 2512.06906 translate read null
2025-12-07 Pseudo Anomalies Are All You Need: Diffusion-Based Generation for Weakly-Supervised Video Anomaly Detection Satoshi Hashimoto et.al. 2512.06845 translate read null
2025-12-07 CADE: Continual Weakly-supervised Video Anomaly Detection with Ensembles Satoshi Hashimoto et.al. 2512.06840 translate read null
2025-12-07 Financial Fraud Identification and Interpretability Study for Listed Companies Based on Convolutional Neural Network Xiao Li et.al. 2512.06648 translate read null
2025-12-06 AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity Shovan Roy et.al. 2512.06396 translate read null
2025-12-06 The Bag-and-Whisker Plot: A New Bagplot for Bivariate Data Shenghao Qin et.al. 2512.06314 translate read null
2025-12-05 AIMNET: An IoT-Empowered Digital Twin for Continuous Gas Emission Monitoring and Early Hazard Detection Zifan Zhou et.al. 2512.06148 translate read null
2025-12-05 A Unified AI System For Data Quality Control and DataOps Management in Regulated Environments Devender Saini et.al. 2512.05559 translate read null
2025-12-05 SCoNE: Spherical Consistent Neighborhoods Ensemble for Effective and Efficient Multi-View Anomaly Detection Yang Xu et.al. 2512.05540 translate read null
2025-12-05 IDK-S: Incremental Distributional Kernel for Streaming Anomaly Detection Yang Xu et.al. 2512.05531 translate read null
2025-12-05 Concept-based Explainable Data Mining with VLM for 3D Detection Mai Tsujimoto et.al. 2512.05482 translate read null
2025-12-04 Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection Mohammad Arif Rasyidi et.al. 2512.05069 translate read null
2025-12-04 Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming Fang Li et.al. 2512.04908 translate read null
2025-12-04 A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments Oghenetejiri Okporokpo et.al. 2512.04855 translate read null
2025-12-04 Optimal Transport Event Representation for Anomaly Detection Aditya Bhargava et.al. 2512.04839 translate read null
2025-12-04 Federated Learning for Anomaly Detection in Maritime Movement Data Anita Graser et.al. 2512.04635 translate read null
2025-12-04 Exploiting ftrace’s function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection Kenan Begovic et.al. 2512.04590 translate read null
2025-12-04 LLM-SrcLog: Towards Proactive and Unified Log Template Extraction via Large Language Models Jiaqi Sun et.al. 2512.04474 translate read null
2025-12-04 AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning Praveen Anugula et.al. 2512.04368 translate read null
2025-12-03 Inference-time Stochastic Refinement of GRU-Normalizing Flow for Real-time Video Motion Transfer Tasmiah Haque et.al. 2512.04282 translate read null
2025-12-03 TARA Test-by-Adaptive-Ranks for Quantum Anomaly Detection with Conformal Prediction Guarantees Davut Emre Tasar et.al. 2512.04016 translate read null
2025-12-03 Quantum Topological Graph Neural Networks for Detecting Complex Fraud Patterns Mohammad Doost et.al. 2512.03696 translate read null
2025-12-03 Federated Learning and Trajectory Compression for Enhanced AIS Coverage Thomas Gräupl et.al. 2512.03584 translate read null
2025-12-03 MAGE-ID: A Multimodal Generative Framework for Intrusion Detection Systems Mahdi Arab Loodaricheh et.al. 2512.03375 translate read null
2025-12-03 Hierarchical Attention for Sparse Volumetric Anomaly Detection in Subclinical Keratoconus Lynn Kandakji et.al. 2512.03346 translate read null
2025-12-02 Novelty detection on path space Ioannis Gasteratos et.al. 2512.03243 translate read null
2025-12-02 Deteccion de intrusiones en redes mediante algoritmos de aprendizaje automatico: Un estudio multiclase sobre el conjunto de datos NSL-KDD Luis Miguel Osco Vasquez et.al. 2512.03200 translate read null
2025-12-02 Neighborhood density estimation using space-partitioning based hashing schemes Aashi Jindal et.al. 2512.03187 translate read null
2025-12-02 AGENTSAFE: A Unified Framework for Ethical Assurance and Governance in Agentic AI Rafflesia Khan et.al. 2512.03180 translate read null
2025-12-02 Temporal Graph Neural Networks for Early Anomaly Detection and Performance Prediction via PV System Monitoring Data Srijani Mukherjee et.al. 2512.03114 translate read null
2025-12-01 ALARM: Automated MLLM-Based Anomaly Detection in Complex-EnviRonment Monitoring with Uncertainty Quantification Congjing Zhang et.al. 2512.03101 translate read null
2025-12-02 AuditCopilot: Leveraging LLMs for Fraud Detection in Double-Entry Bookkeeping Md Abdul Kadir et.al. 2512.02726 translate read null
2025-12-02 FGC-Comp: Adaptive Neighbor-Grouped Attribute Completion for Graph-based Anomaly Detection Junpeng Wu et.al. 2512.02705 translate read null
2025-12-02 ClimaOoD: Improving Anomaly Segmentation via Physically Realistic Synthetic Data Yuxing Liu et.al. 2512.02686 translate read null
2025-12-02 On the Problem of Consistent Anomalies in Zero-Shot Anomaly Detection Tai Le-Gia et.al. 2512.02520 translate read null
2025-12-02 Breast Cell Segmentation Under Extreme Data Constraints: Quantum Enhancement Meets Adaptive Loss Stabilization Varun Kumar Dasoju et.al. 2512.02302 translate read null
2025-12-01 Intrusion Detection on Resource-Constrained IoT Devices with Hardware-Aware ML and DL Ali Diab et.al. 2512.02272 translate read null
2025-12-01 AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data Benjamin Blakely et.al. 2512.01727 translate read null
2025-12-01 ICAD-LLM: One-for-All Anomaly Detection via In-Context Learning with Large Language Models Zhongyuan Wu et.al. 2512.01672 translate read null
2025-12-01 Deep Unsupervised Anomaly Detection in Brain Imaging: Large-Scale Benchmarking and Bias Analysis Alexander Frotscher et.al. 2512.01534 translate read null
2025-12-01 No Trust Issues Here: A Technical Report on the Winning Solutions for the Rayan AI Contest Ali Nafisi et.al. 2512.01498 translate read null
2025-12-01 Modeling Wavelet Transformed Quantum Support Vector for Network Intrusion Detection Swati Kumari et.al. 2512.01365 translate read null
2025-12-01 The Dynamical Model Representation of Convolution-Generated Spatio-Temporal Gaussian Processes and Its Applications Yutong Zhang et.al. 2512.01279 translate read null

(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)