Anomaly Detection - 2026-03
Anomaly Detection - 2026-03
| Publish Date | Title | Authors | Translate | Read | Code | |
|---|---|---|---|---|---|---|
| 2026-03-31 | An Information-Theoretic Method for Dynamic System Identification With Output-Only Damping Estimation | Marios Impraimakis et.al. | 2603.29956 | translate | read | null |
| 2026-03-31 | CausalPulse: An Industrial-Grade Neurosymbolic Multi-Agent Copilot for Causal Diagnostics in Smart Manufacturing | Chathurangi Shyalika et.al. | 2603.29755 | translate | read | null |
| 2026-03-31 | Data-Driven Optimisation of Superconducting Magnets at CEA Paris-Saclay | Damien F. G. Minenna et.al. | 2603.29740 | translate | read | null |
| 2026-03-31 | Anomaly detection in Fink. I. Discovery, follow-up, and classification of unusual sources | M. V. Pruzhinskaya et.al. | 2603.29511 | translate | read | null |
| 2026-03-31 | Deep Learning-Based Anomaly Detection in Spacecraft Telemetry on Edge Devices | Christopher Goetze et.al. | 2603.29375 | translate | read | null |
| 2026-03-31 | IMPACT: Influence Modeling for Open-Set Time Series Anomaly Detection | Xiaohui Zhou et.al. | 2603.29183 | translate | read | null |
| 2026-03-30 | Interpretable Ensemble Learning for Network Traffic Anomaly Detection: A SHAP-based Explainable AI Framework for Embedded Systems Security | Wanru Shao et.al. | 2603.28654 | translate | read | null |
| 2026-03-30 | “What Did It Actually Do?”: Understanding Risk Awareness and Traceability for Computer-Use Agents | Zifan Peng et.al. | 2603.28551 | translate | read | null |
| 2026-03-30 | NeiGAD: Augmenting Graph Anomaly Detection via Spectral Neighbor Information | Qing Qing et.al. | 2603.28300 | translate | read | null |
| 2026-03-30 | Detecting the Unexpected: AI-Driven Anomaly Detection in Smart Bridge Monitoring | Rahul Jaiswal et.al. | 2603.28225 | translate | read | null |
| 2026-03-25 | Causal Transfer in Medical Image Analysis | Mohammed M. Abdelsamea et.al. | 2603.24388 | translate | read | null |
| 2026-03-25 | Praxium: Diagnosing Cloud Anomalies with AI-based Telemetry and Dependency Analysis | Rohan Kumar et.al. | 2603.23890 | translate | read | null |
| 2026-03-25 | MLE-UVAD: Minimal Latent Entropy Autoencoder for Fully Unsupervised Video Anomaly Detection | Yuang Geng et.al. | 2603.23868 | translate | read | null |
| 2026-03-24 | Semantic Iterative Reconstruction: One-Shot Universal Anomaly Detection | Ning Zhu et.al. | 2603.23766 | translate | read | null |
| 2026-03-24 | Searching for Anomalies with Foundation Models | Vinicius Mikuni et.al. | 2603.23593 | translate | read | null |
| 2026-03-24 | PoiCGAN: A Targeted Poisoning Based on Feature-Label Joint Perturbation in Federated Learning | Tao Liu et.al. | 2603.23574 | translate | read | null |
| 2026-03-24 | Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks | Islam Debicha et.al. | 2603.23438 | translate | read | null |
| 2026-03-24 | An Experimental Study of Machine Learning-Based Intrusion Detection for OPC UA over Industrial Private 5G Networks | Song Son Ha et.al. | 2603.23416 | translate | read | null |
| 2026-03-24 | SynForceNet: A Force-Driven Global-Local Latent Representation Framework for Lithium-Ion Battery Fault Diagnosis | Rongxiu Chen et.al. | 2603.23265 | translate | read | null |
| 2026-03-24 | Between Resolution Collapse and Variance Inflation: Weighted Conformal Anomaly Detection in Low-Data Regimes | Oliver Hennhöfer et.al. | 2603.23205 | translate | read | null |
| 2026-03-24 | PiCo: Active Manifold Canonicalization for Robust Robotic Visual Anomaly Detection | Teng Yan et.al. | 2603.23122 | translate | read | null |
| 2026-03-24 | How Far Should We Need to Go : Evaluate Provenance-based Intrusion Detection Systems in Industrial Scenarios | Yue Xiao et.al. | 2603.22982 | translate | read | null |
| 2026-03-24 | Balancing Safety and Efficiency in Aircraft Health Diagnosis: A Task Decomposition Framework with Heterogeneous Long-Micro Scale Cascading and Knowledge Distillation-based Interpretability | Xinhang Chen et.al. | 2603.22885 | translate | read | null |
| 2026-03-24 | Template-Based Feature Aggregation Network for Industrial Anomaly Detection | Wei Luo et.al. | 2603.22874 | translate | read | null |
| 2026-03-24 | A Feature Shuffling and Restoration Strategy for Universal Unsupervised Anomaly Detection | Wei Luo et.al. | 2603.22861 | translate | read | null |
| 2026-03-24 | URA-Net: Uncertainty-Integrated Anomaly Perception and Restoration Attention Network for Unsupervised Anomaly Detection | Wei Luo et.al. | 2603.22840 | translate | read | null |
| 2026-03-24 | Predictive Photometric Uncertainty in Gaussian Splatting for Novel View Synthesis | Chamuditha Jayanga Galappaththige et.al. | 2603.22786 | translate | read | null |
| 2026-03-24 | Explainable Threat Attribution for IoT Networks Using Conditional SHAP and Flow Behavior Modelling | Samuel Ozechi et.al. | 2603.22771 | translate | read | null |
| 2026-03-24 | Multimodal Industrial Anomaly Detection via Geometric Prior | Min Li et.al. | 2603.22757 | translate | read | null |
| 2026-03-24 | How Far Can VLMs Go for Visual Bug Detection? Studying 19,738 Keyframes from 41 Hours of Gameplay Videos | Wentao Lu et.al. | 2603.22706 | translate | read | null |
| 2026-03-23 | When lookout sees crackle: Anomaly detection via kernel density estimation | Rob J Hyndman et.al. | 2603.22636 | translate | read | null |
| 2026-03-23 | A Foundation Model for Instruction-Conditioned In-Context Time Series Tasks | Anish Saha et.al. | 2603.22586 | translate | read | null |
| 2026-03-23 | Adversarial Vulnerabilities in Neural Operator Digital Twins: Gradient-Free Attacks on Nuclear Thermal-Hydraulic Surrogates | Samrendra Roy et.al. | 2603.22525 | translate | read | null |
| 2026-03-23 | Model Context Protocol Threat Modeling and Analyzing Vulnerabilities to Prompt Injection with Tool Poisoning | Charoes Huang et.al. | 2603.22489 | translate | read | null |
| 2026-03-23 | Modeling Quantum Federated Autoencoder for Anomaly Detection in IoT Networks | Devashish Chaudhary et.al. | 2603.22366 | translate | read | null |
| 2026-03-23 | Q-AGNN: Quantum-Enhanced Attentive Graph Neural Network for Intrusion Detection | Devashish Chaudhary et.al. | 2603.22365 | translate | read | null |
| 2026-03-23 | ANCHOR: Adaptive Network based on Cascaded Harmonic Offset Routing | Wangye Jiang et.al. | 2603.21718 | translate | read | null |
| 2026-03-23 | Towards Multimodal Time Series Anomaly Detection with Semantic Alignment and Condensed Interaction | Shiyan Hu et.al. | 2603.21612 | translate | read | null |
| 2026-03-23 | In-network Attack Detection with Federated Deep Learning in IoT Networks: Real Implementation and Analysis | Devashish Chaudhary et.al. | 2603.21596 | translate | read | null |
| 2026-03-23 | Exploring Multimodal Prompts For Unsupervised Continuous Anomaly Detection | Mingle Zhou et.al. | 2603.21562 | translate | read | null |
| 2026-03-23 | Back to Point: Exploring Point-Language Models for Zero-Shot 3D Anomaly Detection | Kaiqiang Li et.al. | 2603.21511 | translate | read | null |
| 2026-03-22 | Mechanisms of Introspective Awareness | Uzay Macar et.al. | 2603.21396 | translate | read | null |
| 2026-03-22 | Does Mechanistic Interpretability Transfer Across Data Modalities? A Cross-Domain Causal Circuit Analysis of Variational Autoencoders | Dip Roy et.al. | 2603.21236 | translate | read | null |
| 2026-03-22 | A lightweight Outlier Detection for Characterizing Radio- and Environment-Specific Link Quality Fluctuation in Low-Power Wireless Networks | Zegeye Mekasha Kidane et.al. | 2603.21107 | translate | read | null |
| 2026-03-22 | Long-Term Outlier Prediction Through Outlier Score Modeling | Yuma Aoki et.al. | 2603.20993 | translate | read | null |
| 2026-03-21 | A Modular LLM Framework for Explainable Price Outlier Detection | Shadi Sartipi et.al. | 2603.20636 | translate | read | null |
| 2026-03-21 | immUNITY: Detecting and Mitigating Low Volume & Slow Attacks with Programmable Switches and SmartNICs | Cuidi Wei et.al. | 2603.20573 | translate | read | null |
| 2026-03-20 | Spatio-Temporal Grid Intelligence: A Hybrid Graph Neural Network and LSTM Framework for Robust Electricity Theft Detection | Adewale U. Oguntola et.al. | 2603.20488 | translate | read | null |
| 2026-03-20 | Hybrid Autoencoder-Isolation Forest approach for time series anomaly detection in C70XP cyclotron operation data at ARRONAX | F Basbous et.al. | 2603.20335 | translate | read | null |
| 2026-03-18 | Efficient Visual Anomaly Detection at the Edge: Enabling Real-Time Industrial Inspection on Resource-Constrained Devices | Arianna Stropeni et.al. | 2603.20288 | translate | read | null |
| 2026-03-20 | Decoupled Sensitivity-Consistency Learning for Weakly Supervised Video Anomaly Detection | Hantao Zheng et.al. | 2603.19780 | translate | read | null |
| 2026-03-20 | A Deep Learning Approach to Multipath Component Detection in Power Delay Profiles | Ondrej Zeleny et.al. | 2603.19706 | translate | read | null |
| 2026-03-20 | Demographic-Aware Self-Supervised Anomaly Detection Pretraining for Equitable Rare Cardiac Diagnosis | Chaoqin Huang et.al. | 2603.19695 | translate | read | null |
| 2026-03-20 | FB-CLIP: Fine-Grained Zero-Shot Anomaly Detection with Foreground-Background Disentanglement | Ming Hu et.al. | 2603.19608 | translate | read | null |
| 2026-03-19 | ICLAD: In-Context Learning for Unified Tabular Anomaly Detection Across Supervision Regimes | Jack Yi Wei et.al. | 2603.19497 | translate | read | null |
| 2026-03-19 | A Novel Solution for Zero-Day Attack Detection in IDS using Self-Attention and Jensen-Shannon Divergence in WGAN-GP | Ziyu Mu et.al. | 2603.19350 | translate | read | null |
| 2026-03-19 | Revisiting OmniAnomaly for Anomaly Detection: performance metrics and comparison with PCA-based models | Bruna Alves et.al. | 2603.18985 | translate | read | null |
| 2026-03-19 | Balancing Performance and Fairness in Explainable AI for Anomaly Detection in Distributed Power Plants Monitoring | Corneille Niyonkuru et.al. | 2603.18954 | translate | read | null |
| 2026-03-19 | Unified Taxonomy for Multivariate Time Series Anomaly Detection using Deep Learning | Bruna Alves et.al. | 2603.18941 | translate | read | null |
| 2026-03-19 | Deceiving Flexibility: A Stealthy False Data Injection Model in Vehicle-to-Grid Coordination | Kaan T. Gun et.al. | 2603.18424 | translate | read | null |
| 2026-03-19 | Statistical Testing Framework for Clustering Pipelines by Selective Inference | Yugo Miyata et.al. | 2603.18413 | translate | read | null |
| 2026-03-19 | To See or To Please: Uncovering Visual Sycophancy and Split Beliefs in VLMs | Rui Hong et.al. | 2603.18373 | translate | read | null |
| 2026-03-18 | Retrieval-Augmented LLMs for Security Incident Analysis | Xavier Cadet et.al. | 2603.18196 | translate | read | null |
| 2026-03-18 | VLM-AutoDrive: Post-Training Vision-Language Models for Safety-Critical Autonomous Driving Events | Mohammad Qazim Bhat et.al. | 2603.18178 | translate | read | null |
| 2026-03-18 | BoundAD: Boundary-Aware Negative Generation for Time Series Anomaly Detection | Xiancheng Wang et.al. | 2603.18111 | translate | read | null |
| 2026-03-18 | One-to-More: High-Fidelity Training-Free Anomaly Generation with Attention Control | Haoxiang Rao et.al. | 2603.18093 | translate | read | null |
| 2026-03-18 | On min-Storey estimators for multiple testing and conformal novelty detection | Gao Zijun et.al. | 2603.17984 | translate | read | null |
| 2026-03-18 | Noise-Aware Misclassification Attack Detection in Collaborative DNN Inference | Shima Yousefi et.al. | 2603.17914 | translate | read | null |
| 2026-03-18 | RangeAD: Fast On-Model Anomaly Detection | Luca Hinkamp et.al. | 2603.17795 | translate | read | null |
| 2026-03-18 | Machine Learning for Network Attacks Classification and Statistical Evaluation of Machine Learning for Network Attacks Classification and Adversarial Learning Methodologies for Synthetic Data Generation | Iakovos-Christos Zarkadis et.al. | 2603.17717 | translate | read | null |
| 2026-03-18 | Unsupervised Symbolic Anomaly Detection | Md Maruf Hossain et.al. | 2603.17575 | translate | read | null |
| 2026-03-18 | FoMo X: Modular Explainability Signals for Outlier Detection Foundation Models | Simon Klüttermann et.al. | 2603.17570 | translate | read | null |
| 2026-03-18 | AdapTS: Lightweight Teacher-Student Approach for Multi-Class and Continual Visual Anomaly Detection | Manuel Barusco et.al. | 2603.17530 | translate | read | null |
| 2026-03-18 | MedSAD-CLIP: Supervised CLIP with Token-Patch Cross-Attention for Medical Anomaly Detection and Segmentation | Thuy Truong Tran et.al. | 2603.17325 | translate | read | null |
| 2026-03-17 | Towards Unsupervised Adversarial Document Detection in Retrieval Augmented Generation Systems | Patrick Levi et.al. | 2603.17176 | translate | read | null |
| 2026-03-17 | Continual Multimodal Egocentric Activity Recognition via Modality-Aware Novel Detection | Wonseon Lim et.al. | 2603.16970 | translate | read | null |
| 2026-03-17 | Cost Trade-offs in Matrix Inversion Updates for Streaming Outlier Detection | Florian Grivet et.al. | 2603.16697 | translate | read | null |
| 2026-03-17 | BUSSARD: Normalizing Flows for Bijective Universal Scene-Specific Anomalous Relationship Detection | Melissa Schween et.al. | 2603.16645 | translate | read | null |
| 2026-03-17 | TinyGLASS: Real-Time Self-Supervised In-Sensor Anomaly Detection | Pietro Bonazzi et.al. | 2603.16451 | translate | read | null |
| 2026-03-17 | Deep learning based intelligent IDS for Large-scale IoT networks | Isha Andrade et.al. | 2603.16342 | translate | read | null |
| 2026-03-17 | A Depth-Aware Comparative Study of Euclidean and Hyperbolic Graph Neural Networks on Bitcoin Transaction Systems | Ankit Ghimire et.al. | 2603.16080 | translate | read | null |
| 2026-03-16 | Anatomy of a Lie: A Multi-Stage Diagnostic Framework for Tracing Hallucinations in Vision-Language Models | Lexiang Xiong et.al. | 2603.15557 | translate | read | null |
| 2026-03-16 | Nova: Scalable Streaming Join Placement and Parallelization in Resource-Constrained Geo-Distributed Environments | Xenofon Chatziliadis et.al. | 2603.15453 | translate | read | null |
| 2026-03-16 | Unsupervised Cross-Protocol Anomaly Analysis in Mobile Core Networks via Multi-Embedding Models Consensus | Aayush Garg et.al. | 2603.15344 | translate | read | null |
| 2026-03-16 | GATE-AD: Graph Attention Network Encoding For Few-Shot Industrial Visual Anomaly Detection | Aggelos Psiris et.al. | 2603.15300 | translate | read | null |
| 2026-03-16 | Multi-turn Physics-informed Vision-language Model for Physics-grounded Anomaly Detection | Yao Gu et.al. | 2603.15237 | translate | read | null |
| 2026-03-16 | DeFRiS: Silo-Cooperative IoT Applications Scheduling via Decentralized Federated Reinforcement Learning | Zhiyu Wang et.al. | 2603.14729 | translate | read | null |
| 2026-03-15 | A Multi-Scale Graph Learning Framework with Temporal Consistency Constraints for Financial Fraud Detection in Transaction Networks under Non-Stationary Conditions | Yiming Lei et.al. | 2603.14592 | translate | read | null |
| 2026-03-15 | Towards One-for-All Anomaly Detection for Tabular Data | Shiyuan Li et.al. | 2603.14407 | translate | read | null |
| 2026-03-15 | Graph-Based Deep Learning for Intelligent Detection of Energy Losses, Theft, and Operational Inefficiencies in Oil & Gas Production Networks | AbdulQoyum A. Olowookere et.al. | 2603.14406 | translate | read | null |
| 2026-03-15 | TACTIC for Navigating the Unknown: Tabular Anomaly deteCTion via In-Context inference | Patryk Marszałek et.al. | 2603.14171 | translate | read | null |
| 2026-03-12 | Single Pixel Image Classification using an Ultrafast Digital Light Projector | Aisha Kanwal et.al. | 2603.12036 | translate | read | null |
| 2026-03-12 | Decentralized Orchestration Architecture for Fluid Computing: A Secure Distributed AI Use Case | Diego Cajaraville-Aboy et.al. | 2603.12001 | translate | read | null |
| 2026-03-12 | Anomaly detection in time-series via inductive biases in the latent space of conditional normalizing flows | David Baumgartner et.al. | 2603.11756 | translate | read | null |
| 2026-03-12 | CINDI: Conditional Imputation and Noisy Data Integrity with Flows in Power Grid Data | David Baumgartner et.al. | 2603.11745 | translate | read | null |
| 2026-03-11 | Multilingual Financial Fraud Detection Using Machine Learning and Transformer Models: A Bangla-English Study | Mohammad Shihab Uddin et.al. | 2603.11358 | translate | read | null |
| 2026-03-11 | FinRule-Bench: A Benchmark for Joint Reasoning over Financial Tables and Principles | Arun Vignesh Malarkkan et.al. | 2603.11339 | translate | read | null |
| 2026-03-11 | DNS-GT: A Graph-based Transformer Approach to Learn Embeddings of Domain Names from DNS Queries | Massimiliano Altieri et.al. | 2603.11200 | translate | read | null |
| 2026-03-11 | RC-NF: Robot-Conditioned Normalizing Flow for Real-Time Anomaly Detection in Robotic Manipulation | Shijie Zhou et.al. | 2603.11106 | translate | read | null |
| 2026-03-11 | ECoLAD: Deployment-Oriented Evaluation for Automotive Time-Series Anomaly Detection | Kadir-Kaan Özer et.al. | 2603.10926 | translate | read | null |
| 2026-03-11 | Incremental Federated Learning for Intrusion Detection in IoT Networks under Evolving Threat Landscape | Muaan Ur Rehman et.al. | 2603.10776 | translate | read | null |
| 2026-03-11 | Spatio-Temporal Attention Graph Neural Network: Explaining Causalities With Attention | Kosti Koistinen et.al. | 2603.10676 | translate | read | null |
| 2026-03-11 | Detecting and Eliminating Neural Network Backdoors Through Active Paths with Application to Intrusion Detection | Eirik Høyheim et.al. | 2603.10641 | translate | read | null |
| 2026-03-11 | Enhancing Network Intrusion Detection Systems: A Multi-Layer Ensemble Approach to Mitigate Adversarial Attacks | Nasim Soltani et.al. | 2603.10413 | translate | read | null |
| 2026-03-10 | TASER: Task-Aware Spectral Energy Refine for Backdoor Suppression in UAV Swarms Decentralized Federated Learning | Sizhe Huang et.al. | 2603.10075 | translate | read | null |
| 2026-03-10 | Role Classification of Hosts within Enterprise Networks Based on Connection Patterns | Godfrey Tan et.al. | 2603.09910 | translate | read | null |
| 2026-03-10 | TIMID: Time-Dependent Mistake Detection in Videos of Robot Executions | Nerea Gallego et.al. | 2603.09782 | translate | read | null |
| 2026-03-10 | Supernova scores for active anomaly detection | Semenikhin T. A. et.al. | 2603.09762 | translate | read | null |
| 2026-03-10 | GNNs for Time Series Anomaly Detection: An Open-Source Framework and a Critical Evaluation | Federico Bello et.al. | 2603.09675 | translate | read | null |
| 2026-03-10 | Game-Theoretic Modeling of Stealthy Intrusion Defense against MDP-Based Attackers | Willie Kouam et.al. | 2603.09587 | translate | read | null |
| 2026-03-10 | Temporal-Conditioned Normalizing Flows for Multivariate Time Series Anomaly Detection | David Baumgartner et.al. | 2603.09490 | translate | read | null |
| 2026-03-10 | ProvAgent: Threat Detection Based on Identity-Behavior Binding and Multi-Agent Collaborative Attack Investigation | Wenhao Yan et.al. | 2603.09358 | translate | read | null |
| 2026-03-10 | TA-GGAD: Testing-time Adaptive Graph Model for Generalist Graph Anomaly Detection | Xiong Zhang et.al. | 2603.09349 | translate | read | null |
| 2026-03-10 | Anomaly detection using surprisals | Rob J Hyndman et.al. | 2603.09318 | translate | read | null |
| 2026-03-10 | $P^2$ GNN: Two Prototype Sets to boost GNN Performance | Arihant Jain et.al. | 2603.09195 | translate | read | null |
| 2026-03-09 | NetDiffuser: Deceiving DNN-Based Network Attack Detection Systems with Diffusion-Generated Adversarial Traffic | Pratyay Kumar et.al. | 2603.08901 | translate | read | null |
| 2026-03-09 | Explicit or Implicit? Encoding Physics at the Precision Frontier | Victor Breso-Pla et.al. | 2603.08802 | translate | read | null |
| 2026-03-07 | Permutation-Equivariant 2D State Space Models: Theory and Canonical Architecture for Multivariate Time Series | Seungwoo Jeong et.al. | 2603.08753 | translate | read | null |
| 2026-03-09 | The Boiling Frog Threshold: Criticality and Blindness in World Model-Based Anomaly Detection Under Gradual Drift | Zhe Hong et.al. | 2603.08455 | translate | read | null |
| 2026-03-09 | Structure from Rank: Rank-Order Coding as a Bridge from Sequence to Structure | Xiaodan Chen et.al. | 2603.08380 | translate | read | null |
| 2026-03-09 | Beyond the Markovian Assumption: Robust Optimization via Fractional Weyl Integrals in Imbalanced Data | Gustavo A. Dorrego et.al. | 2603.08377 | translate | read | null |
| 2026-03-09 | SoK: Harmonizing Attack Graphs and Intrusion Detection Systems | Andrea Agiollo et.al. | 2603.08295 | translate | read | null |
| 2026-03-09 | A Comparative Study of Recent Advances in Internet of Intrusion Detection Things | Marianna Rezk et.al. | 2603.08218 | translate | read | null |
| 2026-03-09 | Mitigating Homophily Disparity in Graph Anomaly Detection: A Scalable and Adaptive Approach | Yunhui Liu et.al. | 2603.08137 | translate | read | null |
| 2026-03-09 | Explainable Condition Monitoring via Probabilistic Anomaly Detection Applied to Helicopter Transmissions | Aurelio Raffa Ugolini et.al. | 2603.08130 | translate | read | null |
| 2026-03-09 | See and Switch: Vision-Based Branching for Interactive Robot-Skill Programming | Petr Vanc et.al. | 2603.08057 | translate | read | null |
| 2026-03-09 | VisualAD: Language-Free Zero-Shot Anomaly Detection via Vision Transformer | Yanning Hou et.al. | 2603.07952 | translate | read | null |
| 2026-03-09 | VLM-SubtleBench: How Far Are VLMs from Human-Level Subtle Comparative Reasoning? | Minkyu Kim et.al. | 2603.07888 | translate | read | null |
| 2026-03-09 | An Interpretable Generative Framework for Anomaly Detection in High-Dimensional Financial Time Series | Waldyn G Martinez et.al. | 2603.07864 | translate | read | null |
| 2026-03-08 | Integration of deep generative Anomaly Detection algorithm in high-speed industrial line | Niccolò Ferrari et.al. | 2603.07577 | translate | read | null |
| 2026-03-08 | GRD-Net: Generative-Reconstructive-Discriminative Anomaly Detection with Region of Interest Attention Module | Niccolò Ferrari et.al. | 2603.07566 | translate | read | null |
| 2026-03-08 | Online Continual Learning for Anomaly Detection in IoT under Data Distribution Shifts | Matea Marinova et.al. | 2603.07507 | translate | read | null |
| 2026-03-08 | GSAT: Geometric Traversability Estimation using Self-supervised Learning with Anomaly Detection for Diverse Terrains | Dongjin Cho et.al. | 2603.07480 | translate | read | null |
| 2026-03-07 | Self-Supervised Evolutionary Learning of Neurodynamic Progression and Identity Manifolds from EEG During Safety-Critical Decision Making | Xiaoshan Zhou et.al. | 2603.07334 | translate | read | null |
| 2026-03-07 | PDD: Manifold-Prior Diverse Distillation for Medical Anomaly Detection | Xijun Lu et.al. | 2603.07142 | translate | read | null |
| 2026-03-07 | Interpretable Maximum Margin Deep Anomaly Detection | Zhiji Yang et.al. | 2603.07073 | translate | read | null |
| 2026-03-07 | Foundational World Models Accurately Detect Bimanual Manipulator Failures | Isaac R. Ward et.al. | 2603.06987 | translate | read | null |
| 2026-03-06 | Learning the Standard Model Manifold: Bayesian Latent Diffusion for Collider Anomaly Detection | Jigar Patel et.al. | 2603.06754 | translate | read | null |
| 2026-03-06 | Proteus: A Practical Framework for Privacy-Preserving Device Logs | Sanket Goutam et.al. | 2603.06540 | translate | read | null |
| 2026-03-06 | A Mixture-of-Experts Framework for Practical Hybrid-Quantum Models in Credit Card Fraud Detection | Rodrigo Chaves et.al. | 2603.06473 | translate | read | null |
| 2026-03-06 | WMoE-CLIP: Wavelet-Enhanced Mixture-of-Experts Prompt Learning for Zero-Shot Anomaly Detection | Peng Chen et.al. | 2603.06313 | translate | read | null |
| 2026-03-06 | Word-Anchored Temporal Forgery Localization | Tianyi Wang et.al. | 2603.06220 | translate | read | null |
| 2026-03-06 | DQE: A Semantic-Aware Evaluation Metric for Time Series Anomaly Detection | Yuewei Li et.al. | 2603.06131 | translate | read | null |
| 2026-03-05 | Identifying Adversary Characteristics from an Observed Attack | Soyon Choi et.al. | 2603.05625 | translate | read | null |
| 2026-03-03 | In-batch Relational Features Enhance Precision in An Unsupervised Medical Anomaly Detection Task | P. Bilha Githinji et.al. | 2603.05534 | translate | read | null |
| 2026-03-05 | Extreme Quantum Cognition Machines for Deliberative Decision Making | Francesco Romeo et.al. | 2603.05430 | translate | read | null |
| 2026-03-05 | AegisUI: Behavioral Anomaly Detection for Structured User Interface Protocols in AI Agent Systems | Mohd Safwan Uddin et.al. | 2603.05031 | translate | read | null |
| 2026-03-05 | Are Multimodal LLMs Ready for Surveillance? A Reality Check on Zero-Shot Anomaly Detection in the Wild | Shanle Yao et.al. | 2603.04727 | translate | read | null |
| 2026-03-05 | From Offline to Periodic Adaptation for Pose-Based Shoplifting Detection in Real-world Retail Security | Shanle Yao et.al. | 2603.04723 | translate | read | null |
| 2026-03-04 | Beyond the Interface: Redefining UX for Society-in-the-Loop AI Systems | Nahal Mafi et.al. | 2603.04552 | translate | read | null |
| 2026-03-04 | Beyond Edge Deletion: A Comprehensive Approach to Counterfactual Explanation in Graph Neural Networks | Matteo De Sanctis et.al. | 2603.04209 | translate | read | null |
| 2026-03-04 | CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts | Max Landauer et.al. | 2603.04186 | translate | read | null |
| 2026-03-04 | Cross-Modal Mapping and Dual-Branch Reconstruction for 2D-3D Multimodal Industrial Anomaly Detection | Radia Daci et.al. | 2603.03939 | translate | read | null |
| 2026-03-04 | Autoencoder-based framework for anomaly detection in stellar spectra: application to the MaNGA Stellar Library | Akihiro Suzuki et.al. | 2603.03734 | translate | read | null |
| 2026-03-04 | STARDIS: Strategic Scheduling and Deceptive Signaling for Satellite Intrusion Detection System Deployment | Yuzhou Xiao et.al. | 2603.03678 | translate | read | null |
| 2026-03-03 | Adversarial Learning Game for Intrusion Detection in Quantum Key Distribution | Noureldin Mohamed et.al. | 2603.03502 | translate | read | null |
| 2026-03-03 | DKD-KAN: A Lightweight knowledge-distilled KAN intrusion detection framework, based on MLP and KAN | Mohammad Alikhani et.al. | 2603.03486 | translate | read | null |
| 2026-03-03 | Multi-Scale Adaptive Neighborhood Awareness Transformer For Graph Fraud Detection | Jiaqi Lv et.al. | 2603.03106 | translate | read | null |
| 2026-03-03 | MoECLIP: Patch-Specialized Experts for Zero-shot Anomaly Detection | Jun Yeong Park et.al. | 2603.03101 | translate | read | null |
| 2026-03-03 | Spatial Autoregressive Modeling of DINOv3 Embeddings for Unsupervised Anomaly Detection | Ertunc Erdil et.al. | 2603.02974 | translate | read | null |
| 2026-03-03 | Improving Anomaly Detection with Foundation-Model Synthesis and Wavelet-Domain Attention | Wensheng Wu et.al. | 2603.02964 | translate | read | null |
| 2026-03-03 | Neural quantum support vector data description for one-class classification | Changjae Im et.al. | 2603.02700 | translate | read | null |
| 2026-03-03 | Towards an Incremental Unified Multimodal Anomaly Detection: Augmenting Multimodal Denoising From an Information Bottleneck Perspective | Kaifang Long et.al. | 2603.02629 | translate | read | null |
| 2026-03-02 | Solving Convex Quadratic Optimization with Indicators Over Structured Graphs | Aaresh Bhathena et.al. | 2603.02103 | translate | read | null |
| 2026-03-02 | GCTAM: Global and Contextual Truncated Affinity Combined Maximization Model For Unsupervised Graph Anomaly Detection | Xiong Zhang et.al. | 2603.01806 | translate | read | null |
| 2026-03-02 | Dual Distillation for Few-Shot Anomaly Detection | Le Dong et.al. | 2603.01713 | translate | read | null |
| 2026-03-02 | Information-Theoretic Digital Twins for Stealthy Attack Detection in Industrial Control Systems: A Closed-Form KL Divergence Approach | Inda Kreso et.al. | 2603.01621 | translate | read | null |
| 2026-03-02 | D-GVIO: A Buffer-Driven and Efficient Decentralized GNSS-Visual-Inertial State Estimator for Multi-Agent Systems | Yarong Luo et.al. | 2603.01404 | translate | read | null |
| 2026-03-01 | Robust measures of dispersion for circular data with an anomaly detection rule | Houyem Demni et.al. | 2603.01237 | translate | read | null |
| 2026-03-01 | Extending Adaptive Cruise Control with Machine Learning Intrusion Detection Systems | Lotfi Ben Othmane et.al. | 2603.01173 | translate | read | null |
| 2026-03-01 | AMDS: Attack-Aware Multi-Stage Defense System for Network Intrusion Detection with Two-Stage Adaptive Weight Learning | Oluseyi Olukola et.al. | 2603.00859 | translate | read | null |
(<a href=../Anomaly_Detection.md>back to Anomaly Detection</a>)