Anomaly Detection - 2026-01
Anomaly Detection - 2026-01
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2026-01-31 | DINO-AD: Unsupervised Anomaly Detection with Frozen DINO-V3 Features | Jiayu Huo et.al. | 2602.03870 | translate | read | null |
| 2026-01-31 | A Graph-based Framework for Coverage Analysis in Autonomous Driving | Thomas Muehlenstädt et.al. | 2602.00903 | translate | read | null |
| 2026-01-31 | Strong Linear Baselines Strike Back: Closed-Form Linear Models as Gaussian Process Conditional Density Estimators for TSAD | Aleksandr Yugay et.al. | 2602.00672 | translate | read | null |
| 2026-01-31 | MRAD: Zero-Shot Anomaly Detection with Memory-Driven Retrieval | Chaoran Xu et.al. | 2602.00522 | translate | read | null |
| 2026-01-30 | Inter-detector differential fuzz testing for tamper detection in gamma spectrometers | Pei Yao Li et.al. | 2602.00336 | translate | read | null |
| 2026-01-30 | Tri-LLM Cooperative Federated Zero-Shot Intrusion Detection with Semantic Disagreement and Trust-Aware Aggregation | Saeid Jamshidi et.al. | 2602.00219 | translate | read | null |
| 2026-01-30 | Analyzing Shapley Additive Explanations to Understand Anomaly Detection Algorithm Behaviors and Their Complementarity | Jordan Levy et.al. | 2602.00208 | translate | read | null |
| 2026-01-30 | Semantic-Aware Advanced Persistent Threat Detection Using Autoencoders on LLM-Encoded System Logs | Waleed Khan Mohammed et.al. | 2602.00204 | translate | read | null |
| 2026-01-27 | D3R-Net: Dual-Domain Denoising Reconstruction Network for Robust Industrial Anomaly Detection | Dmytro Filatov et.al. | 2602.00126 | translate | read | null |
| 2026-01-27 | Context-Aware Autoencoders for Anomaly Detection in Maritime Surveillance | Divya Acharya et.al. | 2602.00124 | translate | read | null |
| 2026-01-30 | TSAQA: Time Series Analysis Question And Answering Benchmark | Baoyu Jing et.al. | 2601.23204 | translate | read | null |
| 2026-01-30 | Deep Search with Hierarchical Meta-Cognitive Monitoring Inspired by Cognitive Neuroscience | Zhongxiang Sun et.al. | 2601.23188 | translate | read | null |
| 2026-01-30 | Securing Time in Energy IoT: A Clock-Dynamics-Aware Spatio-Temporal Graph Attention Network for Clock Drift Attacks and Y2K38 Failures | Saeid Jamshidi et.al. | 2601.23147 | translate | read | null |
| 2026-01-30 | TriCEGAR: A Trace-Driven Abstraction Mechanism for Agentic AI | Roham Koohestani et.al. | 2601.22997 | translate | read | null |
| 2026-01-30 | PIDSMaker: Building and Evaluating Provenance-based Intrusion Detection Systems | Tristan Bilot et.al. | 2601.22983 | translate | read | null |
| 2026-01-30 | Autonomous Chain-of-Thought Distillation for Graph-Based Fraud Detection | Yuan Li et.al. | 2601.22949 | translate | read | null |
| 2026-01-30 | Multi-Cue Anomaly Detection and Localization under Data Contamination | Anindya Sundar Das et.al. | 2601.22913 | translate | read | null |
| 2026-01-30 | AnoMod: A Dataset for Anomaly Detection and Root Cause Analysis in Microservice Systems | Ke Ping et.al. | 2601.22881 | translate | read | null |
| 2026-01-30 | When Anomalies Depend on Context: Learning Conditional Compatibility for Anomaly Detection | Shashank Mishra et.al. | 2601.22868 | translate | read | null |
| 2026-01-30 | Trackly: A Unified SaaS Platform for User Behavior Analytics and Real Time Rule Based Anomaly Detection | Md Zahurul Haque et.al. | 2601.22800 | translate | read | null |
| 2026-01-30 | Is Training Necessary for Anomaly Detection? | Xingwu Zhang et.al. | 2601.22763 | translate | read | null |
| 2026-01-30 | AR-BENCH: Benchmarking Legal Reasoning with Judgment Error Detection, Classification and Correction | Yifei Li et.al. | 2601.22742 | translate | read | null |
| 2026-01-30 | VarParser: Unleashing the Neglected Power of Variables for LLM-based Log Parsing | Jinrui Sun et.al. | 2601.22676 | translate | read | null |
| 2026-01-30 | Fire on Motion: Optimizing Video Pass-bands for Efficient Spiking Action Recognition | Shuhan Ye et.al. | 2601.22675 | translate | read | null |
| 2026-01-30 | PromptMAD: Cross-Modal Prompting for Multi-Class Visual Anomaly Localization | Duncan McCain et.al. | 2601.22492 | translate | read | null |
| 2026-01-29 | Score-based Integrated Gradient for Root Cause Explanations of Outliers | Phuoc Nguyen et.al. | 2601.22399 | translate | read | null |
| 2026-01-28 | MemeChain: A Multimodal Cross-Chain Dataset for Meme Coin Forensics and Risk Analysis | Alberto Maria Mongardini et.al. | 2601.22185 | translate | read | null |
| 2026-01-29 | A Unified XAI-LLM Approach for EndotrachealSuctioning Activity Recognition | Hoang Khang Phan et.al. | 2601.21802 | translate | read | null |
| 2026-01-29 | ECSEL: Explainable Classification via Signomial Equation Learning | Adia Lumadjeng et.al. | 2601.21789 | translate | read | null |
| 2026-01-29 | HERS: Hidden-Pattern Expert Learning for Risk-Specific Vehicle Damage Adaptation in Diffusion Models | Teerapong Panboonyuen et.al. | 2601.21517 | translate | read | null |
| 2026-01-29 | QCL-IDS: Quantum Continual Learning for Intrusion Detection with Fidelity-Anchored Stability and Generative Replay | Zirui Zhu et.al. | 2601.21318 | translate | read | null |
| 2026-01-29 | AC2L-GAD: Active Counterfactual Contrastive Learning for Graph Anomaly Detection | Kamal Berahmand et.al. | 2601.21171 | translate | read | null |
| 2026-01-28 | SMKC: Sketch Based Kernel Correlation Images for Variable Cardinality Time Series Anomaly Detection | Haokun Zhou et.al. | 2601.21050 | translate | read | null |
| 2026-01-28 | Anomalous narrow line Seyfert I galaxies from SDSS DR17 | Arihant Tiwari et.al. | 2601.20957 | translate | read | null |
| 2026-01-28 | VSCOUT: A Hybrid Variational Autoencoder Approach to Outlier Detection in High-Dimensional Retrospective Monitoring | Waldyn G. Martinez et.al. | 2601.20830 | translate | read | null |
| 2026-01-28 | Trigger Optimization and Event Classification for Dark Matter Searches in the CYGNO Experiment Using Machine Learning | F. D. Amaro et.al. | 2601.20626 | translate | read | null |
| 2026-01-28 | AnomalyVFM – Transforming Vision Foundation Models into Zero-Shot Anomaly Detectors | Matic Fučka et.al. | 2601.20524 | translate | read | null |
| 2026-01-28 | Unsupervised Anomaly Detection in Multi-Agent Trajectory Prediction via Transformer-Based Models | Qing Lyu et.al. | 2601.20367 | translate | read | null |
| 2026-01-28 | Test-Time Adaptation for Anomaly Segmentation via Topology-Aware Optimal Transport Chaining | Ali Zia et.al. | 2601.20333 | translate | read | null |
| 2026-01-28 | LogSieve: Task-Aware CI Log Reduction for Sustainable LLM-Based Analysis | Marcus Emmanuel Barnes et.al. | 2601.20148 | translate | read | null |
| 2026-01-27 | Benchmarking Reward Hack Detection in Code Environments via Contrastive Analysis | Darshan Deshpande et.al. | 2601.20103 | translate | read | null |
| 2026-01-27 | BayPrAnoMeta: Bayesian Proto-MAML for Few-Shot Industrial Image Anomaly Detection | Soham Sarkar et.al. | 2601.19992 | translate | read | null |
| 2026-01-27 | A Multi-directional Meta-Learning Framework for Class-Generalizable Anomaly Detection | Padmaksha Roy et.al. | 2601.19833 | translate | read | null |
| 2026-01-27 | LLM-Assisted Authentication and Fraud Detection | Emunah S-S. Chan et.al. | 2601.19684 | translate | read | null |
| 2026-01-27 | Yunque DeepResearch Technical Report | Yuxuan Cai et.al. | 2601.19578 | translate | read | null |
| 2026-01-27 | AI-driven Intrusion Detection for UAV in Smart Urban Ecosystems: A Comprehensive Survey | Abdullah Khanfor et.al. | 2601.19345 | translate | read | null |
| 2026-01-27 | LLM-Assisted Logic Rule Learning: Scaling Human Expertise for Time Series Anomaly Detection | Haoting Zhang et.al. | 2601.19255 | translate | read | null |
| 2026-01-27 | OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection | Lecheng Zheng et.al. | 2601.19102 | translate | read | null |
| 2026-01-26 | $α^3$ -SecBench: A Large-Scale Evaluation Suite of Security, Resilience, and Trust for LLM-based UAV Agents over 6G Networks | Mohamed Amine Ferrag et.al. | 2601.18754 | translate | read | null |
| 2026-01-26 | Forward Consistency Learning with Gated Context Aggregation for Video Anomaly Detection | Jiahao Lyu et.al. | 2601.18135 | translate | read | null |
| 2026-01-23 | Latent Diffusion for Internet of Things Attack Data Generation in Intrusion Detection | Estela Sánchez-Carballo et.al. | 2601.16976 | translate | read | null |
| 2026-01-23 | VTFusion: A Vision-Text Multimodal Fusion Network for Few-Shot Anomaly Detection | Yuxin Jiang et.al. | 2601.16381 | translate | read | null |
| 2026-01-22 | TempoNet: Learning Realistic Communication and Timing Patterns for Network Traffic Simulation | Kristen Moore et.al. | 2601.15663 | translate | read | null |
| 2026-01-22 | Machine Failure Detection Based on Projected Quantum Models | Larry Bowden et.al. | 2601.15641 | translate | read | null |
| 2026-01-21 | DevPrompt: Deviation-Based Prompt Learning for One-Normal ShotImage Anomaly Detection | Morteza Poudineh et.al. | 2601.15453 | translate | read | null |
| 2026-01-21 | Lightweight LLMs for Network Attack Detection in IoT Networks | Piyumi Bhagya Sudasinghe et.al. | 2601.15269 | translate | read | null |
| 2026-01-21 | Dynamic Management of a Deep Learning-Based Anomaly Detection System for 5G Networks | Lorenzo Fernández Maimó et.al. | 2601.15177 | translate | read | null |
| 2026-01-21 | A Real-Time Error Prevention System for Gaze-Based Interaction in Virtual Reality Based on Anomaly Detection | Björn R. Severitt et.al. | 2601.15146 | translate | read | null |
| 2026-01-21 | Central subspace data depth | Giacomo Francisci et.al. | 2601.14947 | translate | read | null |
| 2026-01-20 | AI Agents vs. Human Investigators: Balancing Automation, Security, and Expertise in Cyber Forensic Analysis | Sneha Sudhakaran et.al. | 2601.14544 | translate | read | null |
| 2026-01-20 | Log anomaly detection via Meta Learning and Prototypical Networks for Cross domain generalization | Krishna Sharma et.al. | 2601.14336 | translate | read | null |
| 2026-01-20 | CREATE: Cross-Layer Resilience Characterization and Optimization for Efficient yet Reliable Embodied AI Systems | Tong Xie et.al. | 2601.14140 | translate | read | null |
| 2026-01-20 | AttackMate: Realistic Emulation and Automation of Cyber Attack Scenarios Across the Kill Chain | Max Landauer et.al. | 2601.14108 | translate | read | null |
| 2026-01-20 | Vision Also You Need: Navigating Out-of-Distribution Detection with Multimodal Large Language Model | Haoran Xu et.al. | 2601.14052 | translate | read | null |
| 2026-01-20 | Prospecting MeerKAT Continuum Data for Enigmatic Radio Sources with Unsupervised Vector-Quantised Variational Autoencoders | Fernando L. Ventura et.al. | 2601.13901 | translate | read | null |
| 2026-01-20 | Intelligent Distributed Optical Fiber Sensing in Transportation Infrastructures: Research Progress, Applications, and Challenges | Xin Gui et.al. | 2601.13891 | translate | read | null |
| 2026-01-20 | Enhanced Cyber Threat Intelligence by Network Forensic Analysis for Ransomware as a Service(RaaS) Malwares | Sharmila S P et.al. | 2601.13873 | translate | read | null |
| 2026-01-20 | ChauBoxplot and AdaptiveBoxplot: two R packages for boxplot-based outlier detection | Tiejun Tong et.al. | 2601.13759 | translate | read | null |
| 2026-01-20 | Towards Token-Level Text Anomaly Detection | Yang Cao et.al. | 2601.13644 | translate | read | null |
| 2026-01-20 | ChatAD: Reasoning-Enhanced Time-Series Anomaly Detection with Multi-Turn Instruction Evolution | Hui Sun et.al. | 2601.13546 | translate | read | null |
| 2026-01-19 | Analyzing VLM-Based Approaches for Anomaly Classification and Segmentation | Mohit Kakda et.al. | 2601.13440 | translate | read | null |
| 2026-01-19 | Diffusion-Driven Synthetic Tabular Data Generation for Enhanced DoS/DDoS Attack Classification | Aravind B et.al. | 2601.13197 | translate | read | null |
| 2026-01-19 | PrivFly: A Privacy-Preserving Self-Supervised Framework for Rare Attack Detection in IoFT | Safaa Menssouri et.al. | 2601.13003 | translate | read | null |
| 2026-01-19 | PDFInspect: A Unified Feature Extraction Framework for Malicious Document Detection | Sharmila S P et.al. | 2601.12866 | translate | read | null |
| 2026-01-19 | Knowledge-Integrated Representation Learning for Crypto Anomaly Detection under Extreme Label Scarcity; Relational Domain-Logic Integration with Retrieval-Grounded Context and Path-Level Explanations | Gyuyeon Na et.al. | 2601.12839 | translate | read | null |
| 2026-01-19 | A Graph Prompt Fine-Tuning Method for WSN Spatio-Temporal Correlation Anomaly Detection | Miao Ye et.al. | 2601.12745 | translate | read | null |
| 2026-01-19 | Empowering All-in-Loop Health Management of Spacecraft Power System in the Mega-Constellation Era via Human-AI Collaboration | Yi Di et.al. | 2601.12667 | translate | read | null |
| 2026-01-19 | Toward Faithful Explanations in Acoustic Anomaly Detection | Maab Elrashid et.al. | 2601.12660 | translate | read | null |
| 2026-01-16 | QUPID: A Partitioned Quantum Neural Network for Anomaly Detection in Smart Grid | Hoang M. Ngo et.al. | 2601.11500 | translate | read | null |
| 2026-01-16 | FTDMamba: Frequency-Assisted Temporal Dilation Mamba for Unmanned Aerial Vehicle Video Anomaly Detection | Cheng-Zhuang Liu et.al. | 2601.11254 | translate | read | null |
| 2026-01-16 | Assesing the Viability of Unsupervised Learning with Autoencoders for Predictive Maintenance in Helicopter Engines | P. Sánchez et.al. | 2601.11154 | translate | read | null |
| 2026-01-16 | Bridging Cognitive Neuroscience and Graph Intelligence: Hippocampus-Inspired Multi-View Hypergraph Learning for Web Finance Fraud | Rongkun Cui et.al. | 2601.11073 | translate | read | null |
| 2026-01-16 | Memorize Early, Then Query: Inlier-Memorization-Guided Active Outlier Detection | Minseo Kang et.al. | 2601.10993 | translate | read | null |
| 2026-01-15 | Efficient Quantum Circuits for the Hilbert Transform | Henry Zhang et.al. | 2601.10876 | translate | read | null |
| 2026-01-15 | SecMLOps: A Comprehensive Framework for Integrating Security Throughout the MLOps Lifecycle | Xinrui Zhang et.al. | 2601.10848 | translate | read | null |
| 2026-01-15 | GFM4GA: Graph Foundation Model for Group Anomaly Detection | Jiujiu Chen et.al. | 2601.10193 | translate | read | null |
| 2026-01-15 | Advancing Adaptive Multi-Stage Video Anomaly Reasoning: A Benchmark Dataset and Method | Chao Huang et.al. | 2601.10165 | translate | read | null |
| 2026-01-14 | A Novel Contrastive Loss for Zero-Day Network Intrusion Detection | Jack Wilkie et.al. | 2601.09902 | translate | read | null |
| 2026-01-14 | CLiMB: A Domain-Informed Novelty Detection Clustering Framework for Scientific Discovery | Lorenzo Monti et.al. | 2601.09768 | translate | read | null |
| 2026-01-14 | Evaluating GAN-LSTM for Smart Meter Anomaly Detection in Power Systems | Fahimeh Orvati Nia et.al. | 2601.09701 | translate | read | null |
| 2026-01-14 | 3D-SONAR: Self-Organizing Network for 3D Anomaly Ranking | Guodong Xu et.al. | 2601.09294 | translate | read | null |
| 2026-01-14 | Explainable Autoencoder-Based Anomaly Detection in IEC 61850 GOOSE Networks | Dafne Lozano-Paredes et.al. | 2601.09287 | translate | read | null |
| 2026-01-14 | SSVP: Synergistic Semantic-Visual Prompting for Industrial Zero-Shot Anomaly Detection | Chenhao Fu et.al. | 2601.09147 | translate | read | null |
| 2026-01-13 | DriftGuard: A Hierarchical Framework for Concept Drift Detection and Remediation in Supply Chain Forecasting | Shahnawaz Alam et.al. | 2601.08928 | translate | read | null |
| 2026-01-13 | Towards a Self-Driving Trigger at the LHC: Adaptive Response in Real Time | Shaghayegh Emami et.al. | 2601.08910 | translate | read | null |
| 2026-01-13 | Adaptive few-shot learning for robust part quality classification in two-photon lithography | Sixian Jia et.al. | 2601.08885 | translate | read | null |
| 2026-01-13 | Portable Single-Beam Atomic Total-Field Magnetometer for Stand-off Magnetic Sensing | Heonsik Lee et.al. | 2601.08716 | translate | read | null |
| 2026-01-13 | TRACE: Reconstruction-Based Anomaly Detection in Ensemble and Time-Dependent Simulations | Hamid Gadirov et.al. | 2601.08659 | translate | read | null |
| 2026-01-13 | Efficient Maintenance of Leiden Communities in Large Dynamic Graphs | Chunxu Lin et.al. | 2601.08554 | translate | read | null |
| 2026-01-13 | An IoT-Enabled Smart Aquarium System for Real-Time Water Quality Monitoring and Automated Feeding | MD Fatin Ishraque Ayon et.al. | 2601.08484 | translate | read | null |
| 2026-01-13 | Quantitative Analysis of Proxy Tasks for Anomalous Sound Detection | Seunghyeon Shin et.al. | 2601.08480 | translate | read | null |
| 2026-01-13 | APT-MCL: An Adaptive APT Detection System Based on Multi-View Collaborative Provenance Graph Learning | Mingqi Lv et.al. | 2601.08328 | translate | read | null |
| 2026-01-13 | A Survey of Security Challenges and Solutions for UAS Traffic Management (UTM) and small Unmanned Aerial Systems (sUAS) | Iman Sharifi et.al. | 2601.08229 | translate | read | null |
| 2026-01-13 | Instance-Aligned Captions for Explainable Video Anomaly Detection | Inpyo Song et.al. | 2601.08155 | translate | read | null |
| 2026-01-12 | LUT-Compiled Kolmogorov-Arnold Networks for Lightweight DoS Detection on IoT Edge Devices | Oleksandr Kuznetsov et.al. | 2601.08044 | translate | read | null |
| 2026-01-12 | Training Free Zero-Shot Visual Anomaly Localization via Diffusion Inversion | Samet Hicsonmez et.al. | 2601.08022 | translate | read | null |
| 2026-01-12 | A Protocol-Aware P4 Pipeline for MQTT Security and Anomaly Mitigation in Edge IoT Systems | Bui Ngoc Thanh Binh et.al. | 2601.07536 | translate | read | null |
| 2026-01-12 | A High-Recall Cost-Sensitive Machine Learning Framework for Real-Time Online Banking Transaction Fraud Detection | Karthikeyan V. R. et.al. | 2601.07276 | translate | read | null |
| 2026-01-11 | VISTA: Knowledge-Driven Interpretable Vessel Trajectory Imputation via Large Language Models | Hengyu Liu et.al. | 2601.06940 | translate | read | null |
| 2026-01-11 | Graph Neural Network with One-side Edge Sampling for Fraud Detection | Hoang Hiep Trieu et.al. | 2601.06800 | translate | read | null |
| 2026-01-11 | Deep Recurrent Hidden Markov Learning Framework for Multi-Stage Advanced Persistent Threat Prediction | Saleem Ishaq Tijjani et.al. | 2601.06734 | translate | read | null |
| 2026-01-10 | Nonparametric contaminated Gaussian mixture of regressions | Sphiwe B. Skhosana et.al. | 2601.06695 | translate | read | null |
| 2026-01-10 | SecureDyn-FL: A Robust Privacy-Preserving Federated Learning Framework for Intrusion Detection in IoT Networks | Imtiaz Ali Soomro et.al. | 2601.06466 | translate | read | null |
| 2026-01-09 | Agentic AI Microservice Framework for Deepfake and Document Fraud Detection in KYC Pipelines | Chandra Sekhar Kubam et.al. | 2601.06241 | translate | read | null |
| 2026-01-08 | Cascading multi-agent anomaly detection in surveillance systems via vision-language models and embedding-based classification | Tayyab Rehman et.al. | 2601.06204 | translate | read | null |
| 2026-01-09 | CyberGFM: Graph Foundation Models for Lateral Movement Detection in Enterprise Networks | Isaiah J. King et.al. | 2601.05988 | translate | read | null |
| 2026-01-09 | Community-Based Model Sharing and Generalisation: Anomaly Detection in IoT Temperature Sensor Networks | Sahibzada Saadoon Hammad et.al. | 2601.05984 | translate | read | null |
| 2026-01-09 | A Framework for Optimizing Human-Machine Interaction in Classification Systems | Goran Muric et.al. | 2601.05974 | translate | read | null |
| 2026-01-09 | Kidney Cancer Detection Using 3D-Based Latent Diffusion Models | Jen Dusseljee et.al. | 2601.05852 | translate | read | null |
| 2026-01-09 | Descriptor: Multi-Regional Cloud Honeypot Dataset (MURHCAD) | Enrique Feito-Casares et.al. | 2601.05813 | translate | read | null |
| 2026-01-09 | Variational Autoencoders for P-wave Detection on Strong Motion Earthquake Spectrograms | Turkan Simge Ispak et.al. | 2601.05759 | translate | read | null |
| 2026-01-09 | Conditional Cauchy-Schwarz Divergence for Time Series Analysis: Kernelized Estimation and Applications in Clustering and Fraud Detection | Jiayi Wang et.al. | 2601.05711 | translate | read | null |
| 2026-01-09 | Reinforcement Learning of Large Language Models for Interpretable Credit Card Fraud Detection | Cooper Lin et.al. | 2601.05578 | translate | read | null |
| 2026-01-09 | One Language-Free Foundation Model Is Enough for Universal Vision Anomaly Detection | Bin-Bin Gao et.al. | 2601.05552 | translate | read | null |
| 2026-01-09 | DeMa: Dual-Path Delay-Aware Mamba for Efficient Multivariate Time Series Analysis | Rui An et.al. | 2601.05527 | translate | read | null |
| 2026-01-08 | TIME: Temporally Intelligent Meta-reasoning Engine for Context Triggered Explicit Reasoning | Susmit Das et.al. | 2601.05300 | translate | read | null |
| 2026-01-08 | A Survey of Agentic AI and Cybersecurity: Challenges, Opportunities and Use-case Prototypes | Sahaya Jestus Lazer et.al. | 2601.05293 | translate | read | null |
| 2026-01-08 | Knowledge-to-Data: LLM-Driven Synthesis of Structured Network Traffic for Testbed-Free IDS Evaluation | Konstantinos E. Kampourakis et.al. | 2601.05022 | translate | read | null |
| 2026-01-08 | LGTD: Local-Global Trend Decomposition for Season-Length-Free Time Series Analysis | Chotanansub Sophaken et.al. | 2601.04820 | translate | read | null |
| 2026-01-08 | Decision-Aware Trust Signal Alignment for SOC Alert Triage | Israt Jahan Chowdhury et.al. | 2601.04486 | translate | read | null |
| 2026-01-07 | AHA: Scalable Alternative History Analysis for Operational Timeseries Applications | Harshavardhan Kamarthi et.al. | 2601.04432 | translate | read | null |
| 2026-01-07 | Online robust covariance matrix estimation and outlier detection | Paul Guillot et.al. | 2601.03957 | translate | read | null |
| 2026-01-07 | Stochastic Voronoi Ensembles for Anomaly Detection | Yang Cao et.al. | 2601.03664 | translate | read | null |
| 2026-01-07 | Cyberattack Detection in Virtualized Microgrids Using LightGBM and Knowledge-Distilled Classifiers | Osasumwen Cedric Ogiesoba-Eguakun et.al. | 2601.03495 | translate | read | null |
| 2026-01-06 | Autonomous Threat Detection and Response in Cloud Security: A Comprehensive Survey of AI-Driven Strategies | Gaurav Sarraf et.al. | 2601.03303 | translate | read | null |
| 2026-01-06 | PersonaLedger: Generating Realistic Financial Transactions with Persona Conditioned LLMs and Rule Grounded Feedback | Dehao Yuan et.al. | 2601.03149 | translate | read | null |
| 2026-01-06 | Real-Time Adaptive Anomaly Detection in Industrial IoT Environments | Mahsa Raeiszadeh et.al. | 2601.03085 | translate | read | null |
| 2026-01-06 | PrismVAU: Prompt-Refined Inference System for Multimodal Video Anomaly Understanding | Iñaki Erregue et.al. | 2601.02927 | translate | read | null |
| 2026-01-06 | Conformal novelty detection with false discovery rate control at the boundary | Zijun Gao et.al. | 2601.02610 | translate | read | null |
| 2026-01-05 | Threat Detection in Social Media Networks Using Machine Learning Based Network Analysis | Aditi Sanjay Agrawal et.al. | 2601.02581 | translate | read | null |
| 2026-01-05 | LLM-Enhanced Reinforcement Learning for Time Series Anomaly Detection | Bahareh Golchin et.al. | 2601.02511 | translate | read | null |
| 2026-01-05 | Mitigating Long-Tailed Anomaly Score Distributions with Importance-Weighted Loss | Jungi Lee et.al. | 2601.02440 | translate | read | null |
| 2026-01-05 | Hunting for “Oddballs” with Machine Learning: Detecting Anomalous Exoplanets Using a Deep-Learned Low-Dimensional Representation of Transit Spectra with Autoencoders | Alexander Roman et.al. | 2601.02324 | translate | read | null |
| 2026-01-05 | BigSUMO: A Scalable Framework for Big Data Traffic Analytics and Parallel Simulation | Rahul Sengupta et.al. | 2601.02286 | translate | read | null |
| 2026-01-05 | Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis | Jessica A. Sciammarelli et.al. | 2601.02237 | translate | read | null |
| 2026-01-05 | Multivariate Time-series Anomaly Detection via Dynamic Model Pool & Ensembling | Wei Hu et.al. | 2601.02037 | translate | read | null |
| 2026-01-05 | GCR: Geometry-Consistent Routing for Task-Agnostic Continual Anomaly Detection | Joongwon Chae et.al. | 2601.01856 | translate | read | null |
| 2026-01-05 | Beyond Homophily: Community Search on Heterophilic Graphs | Qing Sima et.al. | 2601.01703 | translate | read | null |
| 2026-01-05 | Digital Twin-Driven Communication-Efficient Federated Anomaly Detection for Industrial IoT | Mohammed Ayalew Belay et.al. | 2601.01701 | translate | read | null |
| 2026-01-04 | Communication-Efficient Federated AUC Maximization with Cyclic Client Participation | Umesh Vangapally et.al. | 2601.01649 | translate | read | null |
| 2026-01-04 | Bayesian Orchestration of Multi-LLM Agents for Cost-Aware Sequential Decision-Making | Danial Amin et.al. | 2601.01522 | translate | read | null |
| 2026-01-04 | A Graph-based Framework for Online Time Series Anomaly Detection Using Model Ensemble | Zewei Yu et.al. | 2601.01403 | translate | read | null |
| 2026-01-04 | SAFE-QAQ: End-to-End Slow-Thinking Audio-Text Fraud Detection via Reinforcement Learning | Peidong Wang et.al. | 2601.01392 | translate | read | null |
| 2026-01-04 | A New Framework for Explainable Rare Cell Identification in Single-Cell Transcriptomics Data | Di Su et.al. | 2601.01358 | translate | read | null |
| 2026-01-04 | Digital Twin AI: Opportunities and Challenges from Large Language Models to World Models | Rong Zhou et.al. | 2601.01321 | translate | read | null |
| 2026-01-03 | Comparative Evaluation of VAE, GAN, and SMOTE for Tor Detection in Encrypted Network Traffic | Saravanan A et.al. | 2601.01183 | translate | read | null |
| 2026-01-03 | AI-Powered Hybrid Intrusion Detection Framework for Cloud Security Using Novel Metaheuristic Optimization | Maryam Mahdi Alhusseini et.al. | 2601.01134 | translate | read | null |
| 2026-01-03 | Tiny Machine Learning for Real-Time Aquaculture Monitoring: A Case Study in Morocco | Achraf Hsain et.al. | 2601.01065 | translate | read | null |
| 2026-01-03 | Byzantine-Robust Federated Learning Framework with Post-Quantum Secure Aggregation for Real-Time Threat Intelligence Sharing in Critical IoT Infrastructure | Milad Rahmati et.al. | 2601.01053 | translate | read | null |
| 2026-01-03 | Improving Variational Autoencoder using Random Fourier Transformation: An Aviation Safety Anomaly Detection Case-Study | Ata Akbari Asanjan et.al. | 2601.01016 | translate | read | null |
| 2026-01-02 | Improving Router Security using BERT | John Carter et.al. | 2601.00783 | translate | read | null |
| 2026-01-02 | Cyberscurity Threats and Defense Mechanisms in IoT network | Trung Dao et.al. | 2601.00556 | translate | read | null |
| 2026-01-02 | Trajectory Guard – A Lightweight, Sequence-Aware Model for Real-Time Anomaly Detection in Agentic AI | Laksh Advani et.al. | 2601.00516 | translate | read | null |
| 2026-01-01 | A Comparative Study of Adaptation Strategies for Time Series Foundation Models in Anomaly Detection | Miseon Park et.al. | 2601.00446 | translate | read | null |
| 2026-01-01 | NOS-Gate: Queue-Aware Streaming IDS for Consumer Gateways under Timing-Controlled Evasion | Muhammad Bilal et.al. | 2601.00389 | translate | read | null |
| 2026-01-01 | Engineering Attack Vectors and Detecting Anomalies in Additive Manufacturing | Md Mahbub Hasan et.al. | 2601.00384 | translate | read | null |
| 2026-01-01 | PatchBlock: A Lightweight Defense Against Adversarial Patches for Embedded EdgeAI Devices | Nandish Chattopadhyay et.al. | 2601.00367 | translate | read | null |
| 2026-01-01 | HarmoniAD: Harmonizing Local Structures and Global Semantics for Anomaly Detection | Naiqi Zhang et.al. | 2601.00327 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)