Anomaly Detection - 2025-12
Anomaly Detection - 2025-12
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2025-12-31 | Towards eco friendly cybersecurity: machine learning based anomaly detection with carbon and energy metrics | KC Aashish et.al. | 2601.00893 | translate | read | null |
| 2025-12-31 | Outlier Detection Using Vector Cosine Similarity by Adding a Dimension | Zhongyang Shen et.al. | 2601.00883 | translate | read | null |
| 2025-12-30 | Quantum Machine Learning Approaches for Coordinated Stealth Attack Detection in Distributed Generation Systems | Osasumwen Cedric Ogiesoba-Eguakun et.al. | 2601.00873 | translate | read | null |
| 2025-12-31 | The Trojan in the Vocabulary: Stealthy Sabotage of LLM Composition | Xiaoze Liu et.al. | 2601.00065 | translate | read | null |
| 2025-12-07 | Evaluating Anomaly Detectors for Simulated Highly Imbalanced Industrial Classification Problems | Lesley Wheat et.al. | 2601.00005 | translate | read | null |
| 2025-12-31 | Trustworthy Equipment Monitoring via Cascaded Anomaly Detection and Thermal Localization | Sungwoo Kang et.al. | 2512.24755 | translate | read | null |
| 2025-12-30 | Using Large Language Models To Translate Machine Results To Human Results | Trishna Niraula et.al. | 2512.24518 | translate | read | null |
| 2025-12-30 | FAST-IDS: A Fast Two-Stage Intrusion Detection System with Hybrid Compression for Real-Time Threat Detection in Connected and Autonomous Vehicles | Devika S et.al. | 2512.24391 | translate | read | null |
| 2025-12-30 | FedSecureFormer: A Fast, Federated and Secure Transformer Framework for Lightweight Intrusion Detection in Connected and Autonomous Vehicles | Devika S et.al. | 2512.24345 | translate | read | null |
| 2025-12-30 | Fast reconstruction-based ROI triggering via anomaly detection in the CYGNO optical TPC | F. D. Amaro et.al. | 2512.24290 | translate | read | null |
| 2025-12-30 | FedLiTeCAN : A Federated Lightweight Transformer for Fast and Robust CAN Bus Intrusion Detection | Devika S et.al. | 2512.24088 | translate | read | null |
| 2025-12-30 | Anomaly detection in satellite imagery through temporal inpainting | Bertrand Rouet-Leduc et.al. | 2512.23986 | translate | read | null |
| 2025-12-30 | Causify DataFlow: A Framework For High-performance Machine Learning Stream Computing | Giacinto Paolo Saggese et.al. | 2512.23977 | translate | read | null |
| 2025-12-29 | Security Without Detection: Economic Denial as a Primitive for Edge and IoT Defense | Samaresh Kumar Singh et.al. | 2512.23849 | translate | read | null |
| 2025-12-29 | Zero-Trust Agentic Federated Learning for Secure IIoT Defense Systems | Samaresh Kumar Singh et.al. | 2512.23809 | translate | read | null |
| 2025-12-29 | A Survey on Graph Neural Networks for Fraud Detection in Ride Hailing Platforms | Kanishka Hewageegana et.al. | 2512.23777 | translate | read | null |
| 2025-12-29 | Distribution-Free Process Monitoring with Conformal Prediction | Christopher Burger et.al. | 2512.23602 | translate | read | null |
| 2025-12-29 | Unsupervised Learning for Detection of Rare Driving Scenarios | Dat Le et.al. | 2512.23585 | translate | read | null |
| 2025-12-29 | A unified framework for detecting point and collective anomalies in operating system logs via collaborative transformers | Mohammad Nasirzadeh et.al. | 2512.23380 | translate | read | null |
| 2025-12-29 | Anomaly Detection by Effectively Leveraging Synthetic Images | Sungho Kang et.al. | 2512.23227 | translate | read | null |
| 2025-12-28 | Determining habitat anomalies in cross-diffusion predator-prey chemotaxis models | Yuhan Li et.al. | 2512.22946 | translate | read | null |
| 2025-12-25 | Multi-Head Spectral-Adaptive Graph Anomaly Detection | Qingyue Cao et.al. | 2512.22291 | translate | read | null |
| 2025-12-23 | Scalable Cloud-Native Architectures for Intelligent PMU Data Processing | Nachiappan Chockalingam et.al. | 2512.22231 | translate | read | null |
| 2025-12-20 | Bidirectional RAG: Safe Self-Improving Retrieval-Augmented Generation Through Multi-Stage Validation | Teja Chinthala et.al. | 2512.22199 | translate | read | null |
| 2025-12-19 | Latent Sculpting for Zero-Shot Generalization: A Manifold Learning Approach to Out-of-Distribution Anomaly Detection | Rajeeb Thapa Chhetri et.al. | 2512.22179 | translate | read | null |
| 2025-12-26 | Unsupervised Anomaly Detection in Brain MRI via Disentangled Anatomy Learning | Tao Yang et.al. | 2512.21924 | translate | read | null |
| 2025-12-26 | Secure and Explainable Fraud Detection in Finance via Hierarchical Multi-source Dataset Distillation | Yiming Qian et.al. | 2512.21866 | translate | read | null |
| 2025-12-25 | Causal-HM: Restoring Physical Generative Logic in Multimodal Anomaly Detection via Hierarchical Modulation | Xiao Liu et.al. | 2512.21650 | translate | read | null |
| 2025-12-25 | CCAD: Compressed Global Feature Conditioned Anomaly Detection | Xiao Jin et.al. | 2512.21459 | translate | read | null |
| 2025-12-24 | AnyAD: Unified Any-Modality Anomaly Detection in Incomplete Multi-Sequence MRI | Changwei Wu et.al. | 2512.21264 | translate | read | null |
| 2025-12-24 | Neutralization of IMU-Based GPS Spoofing Detection using external IMU sensor and feedback methodology | Ji Hyuk Jung et.al. | 2512.20964 | translate | read | null |
| 2025-12-23 | High Dimensional Data Decomposition for Anomaly Detection of Textured Images | Ji Song et.al. | 2512.20432 | translate | read | null |
| 2025-12-23 | Chain-of-Anomaly Thoughts with Large Vision-Language Models | Pedro Domingos et.al. | 2512.20417 | translate | read | null |
| 2025-12-23 | Machine-learning techniques for model-independent searches in dijet final states | CMS Collaboration et.al. | 2512.20395 | translate | read | null |
| 2025-12-23 | Population Protocols Revisited: Parity and Beyond | Leszek Gąsieniec et.al. | 2512.20163 | translate | read | null |
| 2025-12-23 | Spatio-Temporal Graphs Beyond Grids: Benchmark for Maritime Anomaly Detection | Jeehong Kim et.al. | 2512.20086 | translate | read | null |
| 2025-12-22 | Lightweight Intrusion Detection in IoT via SHAP-Guided Feature Pruning and Knowledge-Distilled Kronecker Networks | Hafsa Benaddi et.al. | 2512.19488 | translate | read | null |
| 2025-12-22 | Real-Time Machine Learning for Embedded Anomaly Detection | Abdelmadjid Benmachiche et.al. | 2512.19383 | translate | read | null |
| 2025-12-22 | Evaluating MCC for Low-Frequency Cyberattack Detection in Imbalanced Intrusion Detection Data | Prameshwar Thiyagarajan et.al. | 2512.19203 | translate | read | null |
| 2025-12-22 | Fraud Detection Through Large-Scale Graph Clustering with Heterogeneous Link Transformation | Chi Liu et.al. | 2512.19061 | translate | read | null |
| 2025-12-22 | Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms | Md Minhazul Islam Munna et.al. | 2512.19037 | translate | read | null |
| 2025-12-22 | Outlier detection in mixed-attribute data: a semi-supervised approach with fuzzy approximations and relative entropy | Baiyang Chen et.al. | 2512.18978 | translate | read | null |
| 2025-12-22 | Consistency-guided semi-supervised outlier detection in heterogeneous data using fuzzy rough sets | Baiyang Chen et.al. | 2512.18977 | translate | read | null |
| 2025-12-21 | Hyperbolic Graph Embeddings: a Survey and an Evaluation on Anomaly Detection | Souhail Abdelmouaiz Sadat et.al. | 2512.18826 | translate | read | null |
| 2025-12-21 | Label-Informed Outlier Detection Based on Granule Density | Baiyang Chen et.al. | 2512.18774 | translate | read | null |
| 2025-12-21 | Explainable and Fine-Grained Safeguarding of LLM Multi-Agent Systems via Bi-Level Graph Anomaly Detection | Junjun Pan et.al. | 2512.18733 | translate | read | null |
| 2025-12-21 | Improving Pattern Recognition of Scheduling Anomalies through Structure-Aware and Semantically-Enhanced Graphs | Ning Lyu et.al. | 2512.18673 | translate | read | null |
| 2025-12-20 | Cyber Threat Detection Enabled by Quantum Computing | Zisheng Chen et.al. | 2512.18493 | translate | read | null |
| 2025-12-20 | Towards Scalable Visual Data Wrangling via Direct Manipulation | El Kindi Rezig et.al. | 2512.18405 | translate | read | null |
| 2025-12-20 | Unsupervised Anomaly Detection with an Enhanced Teacher for Student-Teacher Feature Pyramid Matching | Mohammad Zolfaghari et.al. | 2512.18219 | translate | read | null |
| 2025-12-20 | PROVEX: Enhancing SOC Analyst Trust with Explainable Provenance-Based IDS | Devang Dhanuka et.al. | 2512.18199 | translate | read | null |
| 2025-12-19 | Grad: Guided Relation Diffusion Generation for Graph Augmentation in Graph Fraud Detection | Jie Yang et.al. | 2512.18133 | translate | read | null |
| 2025-12-19 | AI Assisted Next Gen Outdoor Optical Networks: Camera Sensing for Monitoring and User Localization | Meysam Ghanbari et.al. | 2512.18087 | translate | read | null |
| 2025-12-19 | Fraud detection in credit card transactions using Quantum-Assisted Restricted Boltzmann Machines | João Marcos Cavalcanti de Albuquerque Neto et.al. | 2512.17660 | translate | read | null |
| 2025-12-19 | HeadHunt-VAD: Hunting Robust Anomaly-Sensitive Heads in MLLM for Tuning-Free Video Anomaly Detection | Zhaolin Cai et.al. | 2512.17601 | translate | read | null |
| 2025-12-18 | Another Fit Bites the Dust: Conformal Prediction as a Calibration Standard for Machine Learning in High-Energy Physics | Jack Y. Araz et.al. | 2512.17048 | translate | read | null |
| 2025-12-18 | New Theoretical Insights and Algorithmic Solutions for Reconstructing Score Sequences from Tournament Score Sets | Bowen Liu et.al. | 2512.16961 | translate | read | null |
| 2025-12-18 | TimeSeries2Report prompting enables adaptive large language model management of lithium-ion batteries | Jiayang Yang et.al. | 2512.16453 | translate | read | null |
| 2025-12-18 | Coarse-to-Fine Open-Set Graph Node Classification with Large Language Models | Xueqi Ma et.al. | 2512.16244 | translate | read | null |
| 2025-12-17 | Explainable AI in Big Data Fraud Detection | Ayush Jain et.al. | 2512.16037 | translate | read | null |
| 2025-12-17 | Reusable theory representations for colliders: a demonstrator SMEFT foundation model | Supratim Das Bakshi et.al. | 2512.15862 | translate | read | null |
| 2025-12-14 | Adversarial Robustness in Financial Machine Learning: Defenses, Economic Impact, and Governance Evidence | Samruddhi Baviskar et.al. | 2512.15780 | translate | read | null |
| 2025-12-14 | Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection | Sudhanshu Sekhar Tripathy et.al. | 2512.15779 | translate | read | null |
| 2025-12-12 | PHANTOM: Progressive High-fidelity Adversarial Network for Threat Object Modeling | Jamal Al-Karaki et.al. | 2512.15768 | translate | read | null |
| 2025-12-06 | Bayesian Modeling for Uncertainty Management in Financial Risk Forecasting and Compliance | Sharif Al Mamun et.al. | 2512.15739 | translate | read | null |
| 2025-12-17 | A Multivariate Statistical Framework for Detection, Classification and Pre-localization of Anomalies in Water Distribution Networks | Oleg Melnikov et.al. | 2512.15685 | translate | read | null |
| 2025-12-17 | Online Partitioned Local Depth for semi-supervised applications | John D. Foley et.al. | 2512.15436 | translate | read | null |
| 2025-12-17 | A Masked Reverse Knowledge Distillation Method Incorporating Global and Local Information for Image Anomaly Detection | Yuxin Jiang et.al. | 2512.15326 | translate | read | null |
| 2025-12-17 | MECAD: A multi-expert architecture for continual anomaly detection | Malihe Dahmardeh et.al. | 2512.15323 | translate | read | null |
| 2025-12-17 | Prototypical Learning Guided Context-Aware Segmentation Network for Few-Shot Anomaly Detection | Yuxin Jiang et.al. | 2512.15319 | translate | read | null |
| 2025-12-17 | Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions | Siva Sai et.al. | 2512.15286 | translate | read | null |
| 2025-12-17 | Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries | Louis Hackländer-Jansen et.al. | 2512.15275 | translate | read | null |
| 2025-12-17 | Accelerating High-Throughput Catalyst Screening by Direct Generation of Equilibrium Adsorption Structures | Songze Huo et.al. | 2512.15228 | translate | read | null |
| 2025-12-16 | Intrusion Detection in Internet of Vehicles Using Machine Learning | Hop Le et.al. | 2512.14958 | translate | read | null |
| 2025-12-12 | Quantum-Augmented AI/ML for O-RAN: Hierarchical Threat Detection with Synergistic Intelligence and Interpretability (Technical Report) | Tan Le et.al. | 2512.14742 | translate | read | null |
| 2025-12-12 | How Deep Does Your Dependency Tree Go? An Empirical Study of Dependency Amplification Across 10 Package Ecosystems | Jahidul Arafat et.al. | 2512.14739 | translate | read | null |
| 2025-12-08 | SGEMAS: A Self-Growing Ephemeral Multi-Agent System for Unsupervised Online Anomaly Detection via Entropic Homeostasis | Mustapha Hamdi et.al. | 2512.14708 | translate | read | null |
| 2025-12-16 | Hierarchical Persistence Velocity for Network Anomaly Detection: Theory and Applications to Cryptocurrency Markets | Omid Khormali et.al. | 2512.14615 | translate | read | null |
| 2025-12-16 | Fusion of Cellular ISAC and Passive RF Sensing for UAV Detection and Tracking | Cole Dickerson et.al. | 2512.14608 | translate | read | null |
| 2025-12-16 | LLmFPCA-detect: LLM-powered Multivariate Functional PCA for Anomaly Detection in Sparse Longitudinal Texts | Prasanjit Dubey et.al. | 2512.14604 | translate | read | null |
| 2025-12-16 | Hybrid Ensemble Method for Detecting Cyber-Attacks in Water Distribution Systems Using the BATADAL Dataset | Waqas Ahmed et.al. | 2512.14422 | translate | read | null |
| 2025-12-16 | FusAD: Time-Frequency Fusion with Adaptive Denoising for General Time Series Analysis | Da Zhang et.al. | 2512.14078 | translate | read | null |
| 2025-12-15 | Look everywhere effects in anomaly detection | Marie Hein et.al. | 2512.13787 | translate | read | null |
| 2025-12-14 | DARTs: A Dual-Path Robust Framework for Anomaly Detection in High-Dimensional Multivariate Time Series | Xuechun Liu et.al. | 2512.13735 | translate | read | null |
| 2025-12-15 | AgentIAD: Tool-Augmented Single-Agent for Industrial Anomaly Detection | Junwen Miao et.al. | 2512.13671 | translate | read | null |
| 2025-12-15 | 3D Human-Human Interaction Anomaly Detection | Shun Maeda et.al. | 2512.13560 | translate | read | null |
| 2025-12-15 | Behavior-Aware and Generalizable Defense Against Black-Box Adversarial Attacks for ML-Based IDS | Sabrine Ennaji et.al. | 2512.13501 | translate | read | null |
| 2025-12-15 | On-Device Continual Learning for Unsupervised Visual Anomaly Detection in Dynamic Manufacturing | Haoyu Ren et.al. | 2512.13497 | translate | read | null |
| 2025-12-15 | Understanding Structured Financial Data with LLMs: A Case Study on Fraud Detection | Xuwei Tan et.al. | 2512.13040 | translate | read | null |
| 2025-12-14 | A Rule-Aware Prompt Framework for Structured Numeric Reasoning in Cyber-Physical Systems | Yichen Liu et.al. | 2512.12794 | translate | read | null |
| 2025-12-14 | FiD-QAE: A Fidelity-Driven Quantum Autoencoder for Credit Card Fraud Detection | Mansour El Alami et.al. | 2512.12689 | translate | read | null |
| 2025-12-13 | Sleep pattern profiling using a finite mixture of contaminated multivariate skew-normal distributions on incomplete data | Jason Pillay et.al. | 2512.12464 | translate | read | null |
| 2025-12-13 | Robust Outlier Detection and Low-Latency Concept Drift Adaptation for Data Stream Regression: A Dual-Channel Architecture | Bingbing Wang et.al. | 2512.12289 | translate | read | null |
| 2025-12-13 | A Multi-Year Urban Streetlight Imagery Dataset for Visual Monitoring and Spatio-Temporal Drift Detection | Peizheng Li et.al. | 2512.12205 | translate | read | null |
| 2025-12-12 | Rethinking Jailbreak Detection of Large Vision Language Models with Representational Contrastive Scoring | Peichun Hua et.al. | 2512.12069 | translate | read | null |
| 2025-12-12 | Log Anomaly Detection with Large Language Models via Knowledge-Enriched Fusion | Anfeng Peng et.al. | 2512.11997 | translate | read | null |
| 2025-12-12 | A Multi-Criteria Automated MLOps Pipeline for Cost-Effective Cloud-Based Classifier Retraining in Response to Data Distribution Shifts | Emmanuel K. Katalay et.al. | 2512.11541 | translate | read | null |
| 2025-12-12 | Collaborative Reconstruction and Repair for Multi-class Industrial Anomaly Detection | Qishan Wang et.al. | 2512.11401 | translate | read | null |
| 2025-12-12 | RcAE: Recursive Reconstruction Framework for Unsupervised Industrial Anomaly Detection | Rongcheng Wu et.al. | 2512.11284 | translate | read | null |
| 2025-12-11 | Q-BAR: Blogger Anomaly Recognition via Quantum-enhanced Manifold Learning | Maida Wang et.al. | 2512.11071 | translate | read | null |
| 2025-12-11 | An Efficient Variant of One-Class SVM with Lifelong Online Learning Guarantees | Joe Suk et.al. | 2512.11052 | translate | read | null |
| 2025-12-11 | DCFO: Density-Based Counterfactuals for Outliers - Additional Material | Tommaso Amico et.al. | 2512.10659 | translate | read | null |
| 2025-12-11 | Adaptive Intrusion Detection System Leveraging Dynamic Neural Models with Adversarial Learning for 5G/6G Networks | Neha et.al. | 2512.10637 | translate | read | null |
| 2025-12-11 | Stealth and Evasion in Rogue AP Attacks: An Analysis of Modern Detection and Bypass Techniques | Kaleb Bacztub et.al. | 2512.10470 | translate | read | null |
| 2025-12-11 | Semantic Reconstruction of Adversarial Plagiarism: A Context-Aware Framework for Detecting and Restoring “Tortured Phrases” in Scientific Literature | Agniva Maiti et.al. | 2512.10435 | translate | read | null |
| 2025-12-10 | LogICL: Distilling LLM Reasoning to Bridge the Semantic Gap in Cross-Domain Log Anomaly Detection | Jingwei Ye et.al. | 2512.09627 | translate | read | null |
| 2025-12-10 | Defect-aware Hybrid Prompt Optimization via Progressive Tuning for Zero-Shot Multi-type Anomaly Detection and Segmentation | Nadeem Nazer et.al. | 2512.09446 | translate | read | null |
| 2025-12-09 | Natural Geometry of Robust Data Attribution: From Convex Models to Deep Networks | Shihao Li et.al. | 2512.09103 | translate | read | null |
| 2025-12-09 | Explainable Anomaly Detection for Industrial IoT Data Streams | Ana Rita Paupério et.al. | 2512.08885 | translate | read | null |
| 2025-12-09 | Reusability in MLOps: Leveraging Ports and Adapters to Build a Microservices Architecture for the Maritime Domain | Renato Cordeiro Ferreira et.al. | 2512.08657 | translate | read | null |
| 2025-12-09 | The SMART+ Framework for AI Systems | Laxmiraju Kandikatla et.al. | 2512.08592 | translate | read | null |
| 2025-12-09 | Labeled Delegated PSI and its Applications in the Public Sector | Kristof Verslype et.al. | 2512.08558 | translate | read | null |
| 2025-12-09 | Developing a Strong CPS Defender: An Evolutionary Approach | Qingyuan Hu et.al. | 2512.08320 | translate | read | null |
| 2025-12-09 | FedLAD: A Modular and Adaptive Testbed for Federated Log Anomaly Detection | Yihan Liao et.al. | 2512.08277 | translate | read | null |
| 2025-12-09 | Improving the Sensitivity of Backdoor Detectors via Class Subspace Orthogonalization | Guangmingmei Yang et.al. | 2512.08129 | translate | read | null |
| 2025-12-08 | The interstellar signature: A computational framework for open source interstellar tracking | Pancha Narayan Sahu et.al. | 2512.07910 | translate | read | null |
| 2025-12-08 | Agentic Artificial Intelligence for Ethical Cybersecurity in Uganda: A Reinforcement Learning Framework for Threat Detection in Resource-Constrained Environments | Ibrahim Adabara et.al. | 2512.07909 | translate | read | null |
| 2025-12-08 | An Adaptive Multi-Layered Honeynet Architecture for Threat Behavior Analysis via Deep Learning | Lukas Johannes Möller et.al. | 2512.07827 | translate | read | null |
| 2025-12-08 | WaggleNet: A LoRa and MQTT-Based Monitoring System for Internal and External Beehive Conditions | Minju Jeon et.al. | 2512.07408 | translate | read | null |
| 2025-12-07 | MINES: Explainable Anomaly Detection through Web API Invariant Inference | Wenjie Zhang et.al. | 2512.06906 | translate | read | null |
| 2025-12-07 | Pseudo Anomalies Are All You Need: Diffusion-Based Generation for Weakly-Supervised Video Anomaly Detection | Satoshi Hashimoto et.al. | 2512.06845 | translate | read | null |
| 2025-12-07 | CADE: Continual Weakly-supervised Video Anomaly Detection with Ensembles | Satoshi Hashimoto et.al. | 2512.06840 | translate | read | null |
| 2025-12-07 | Financial Fraud Identification and Interpretability Study for Listed Companies Based on Convolutional Neural Network | Xiao Li et.al. | 2512.06648 | translate | read | null |
| 2025-12-06 | AgenticCyber: A GenAI-Powered Multi-Agent System for Multimodal Threat Detection and Adaptive Response in Cybersecurity | Shovan Roy et.al. | 2512.06396 | translate | read | null |
| 2025-12-06 | The Bag-and-Whisker Plot: A New Bagplot for Bivariate Data | Shenghao Qin et.al. | 2512.06314 | translate | read | null |
| 2025-12-05 | AIMNET: An IoT-Empowered Digital Twin for Continuous Gas Emission Monitoring and Early Hazard Detection | Zifan Zhou et.al. | 2512.06148 | translate | read | null |
| 2025-12-05 | A Unified AI System For Data Quality Control and DataOps Management in Regulated Environments | Devender Saini et.al. | 2512.05559 | translate | read | null |
| 2025-12-05 | SCoNE: Spherical Consistent Neighborhoods Ensemble for Effective and Efficient Multi-View Anomaly Detection | Yang Xu et.al. | 2512.05540 | translate | read | null |
| 2025-12-05 | IDK-S: Incremental Distributional Kernel for Streaming Anomaly Detection | Yang Xu et.al. | 2512.05531 | translate | read | null |
| 2025-12-05 | Concept-based Explainable Data Mining with VLM for 3D Detection | Mai Tsujimoto et.al. | 2512.05482 | translate | read | null |
| 2025-12-04 | Hybrid Quantum-Classical Autoencoders for Unsupervised Network Intrusion Detection | Mohammad Arif Rasyidi et.al. | 2512.05069 | translate | read | null |
| 2025-12-04 | Logic-Driven Cybersecurity: A Novel Framework for System Log Anomaly Detection using Answer Set Programming | Fang Li et.al. | 2512.04908 | translate | read | null |
| 2025-12-04 | A Novel Trust-Based DDoS Cyberattack Detection Model for Smart Business Environments | Oghenetejiri Okporokpo et.al. | 2512.04855 | translate | read | null |
| 2025-12-04 | Optimal Transport Event Representation for Anomaly Detection | Aditya Bhargava et.al. | 2512.04839 | translate | read | null |
| 2025-12-04 | Federated Learning for Anomaly Detection in Maritime Movement Data | Anita Graser et.al. | 2512.04635 | translate | read | null |
| 2025-12-04 | Exploiting ftrace’s function_graph Tracer Features for Machine Learning: A Case Study on Encryption Detection | Kenan Begovic et.al. | 2512.04590 | translate | read | null |
| 2025-12-04 | LLM-SrcLog: Towards Proactive and Unified Log Template Extraction via Large Language Models | Jiaqi Sun et.al. | 2512.04474 | translate | read | null |
| 2025-12-04 | AutoGuard: A Self-Healing Proactive Security Layer for DevSecOps Pipelines Using Reinforcement Learning | Praveen Anugula et.al. | 2512.04368 | translate | read | null |
| 2025-12-03 | Inference-time Stochastic Refinement of GRU-Normalizing Flow for Real-time Video Motion Transfer | Tasmiah Haque et.al. | 2512.04282 | translate | read | null |
| 2025-12-03 | TARA Test-by-Adaptive-Ranks for Quantum Anomaly Detection with Conformal Prediction Guarantees | Davut Emre Tasar et.al. | 2512.04016 | translate | read | null |
| 2025-12-03 | Quantum Topological Graph Neural Networks for Detecting Complex Fraud Patterns | Mohammad Doost et.al. | 2512.03696 | translate | read | null |
| 2025-12-03 | Federated Learning and Trajectory Compression for Enhanced AIS Coverage | Thomas Gräupl et.al. | 2512.03584 | translate | read | null |
| 2025-12-03 | MAGE-ID: A Multimodal Generative Framework for Intrusion Detection Systems | Mahdi Arab Loodaricheh et.al. | 2512.03375 | translate | read | null |
| 2025-12-03 | Hierarchical Attention for Sparse Volumetric Anomaly Detection in Subclinical Keratoconus | Lynn Kandakji et.al. | 2512.03346 | translate | read | null |
| 2025-12-02 | Novelty detection on path space | Ioannis Gasteratos et.al. | 2512.03243 | translate | read | null |
| 2025-12-02 | Deteccion de intrusiones en redes mediante algoritmos de aprendizaje automatico: Un estudio multiclase sobre el conjunto de datos NSL-KDD | Luis Miguel Osco Vasquez et.al. | 2512.03200 | translate | read | null |
| 2025-12-02 | Neighborhood density estimation using space-partitioning based hashing schemes | Aashi Jindal et.al. | 2512.03187 | translate | read | null |
| 2025-12-02 | AGENTSAFE: A Unified Framework for Ethical Assurance and Governance in Agentic AI | Rafflesia Khan et.al. | 2512.03180 | translate | read | null |
| 2025-12-02 | Temporal Graph Neural Networks for Early Anomaly Detection and Performance Prediction via PV System Monitoring Data | Srijani Mukherjee et.al. | 2512.03114 | translate | read | null |
| 2025-12-01 | ALARM: Automated MLLM-Based Anomaly Detection in Complex-EnviRonment Monitoring with Uncertainty Quantification | Congjing Zhang et.al. | 2512.03101 | translate | read | null |
| 2025-12-02 | AuditCopilot: Leveraging LLMs for Fraud Detection in Double-Entry Bookkeeping | Md Abdul Kadir et.al. | 2512.02726 | translate | read | null |
| 2025-12-02 | FGC-Comp: Adaptive Neighbor-Grouped Attribute Completion for Graph-based Anomaly Detection | Junpeng Wu et.al. | 2512.02705 | translate | read | null |
| 2025-12-02 | ClimaOoD: Improving Anomaly Segmentation via Physically Realistic Synthetic Data | Yuxing Liu et.al. | 2512.02686 | translate | read | null |
| 2025-12-02 | On the Problem of Consistent Anomalies in Zero-Shot Anomaly Detection | Tai Le-Gia et.al. | 2512.02520 | translate | read | null |
| 2025-12-02 | Breast Cell Segmentation Under Extreme Data Constraints: Quantum Enhancement Meets Adaptive Loss Stabilization | Varun Kumar Dasoju et.al. | 2512.02302 | translate | read | null |
| 2025-12-01 | Intrusion Detection on Resource-Constrained IoT Devices with Hardware-Aware ML and DL | Ali Diab et.al. | 2512.02272 | translate | read | null |
| 2025-12-01 | AI-Driven Cybersecurity Testbed for Nuclear Infrastructure: Comprehensive Evaluation Using METL Operational Data | Benjamin Blakely et.al. | 2512.01727 | translate | read | null |
| 2025-12-01 | ICAD-LLM: One-for-All Anomaly Detection via In-Context Learning with Large Language Models | Zhongyuan Wu et.al. | 2512.01672 | translate | read | null |
| 2025-12-01 | Deep Unsupervised Anomaly Detection in Brain Imaging: Large-Scale Benchmarking and Bias Analysis | Alexander Frotscher et.al. | 2512.01534 | translate | read | null |
| 2025-12-01 | No Trust Issues Here: A Technical Report on the Winning Solutions for the Rayan AI Contest | Ali Nafisi et.al. | 2512.01498 | translate | read | null |
| 2025-12-01 | Modeling Wavelet Transformed Quantum Support Vector for Network Intrusion Detection | Swati Kumari et.al. | 2512.01365 | translate | read | null |
| 2025-12-01 | The Dynamical Model Representation of Convolution-Generated Spatio-Temporal Gaussian Processes and Its Applications | Yutong Zhang et.al. | 2512.01279 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)