Learning semantic context from normal samples for unsupervised anomaly detection

X Yan, H Zhang, X Xu, X Hu, PA Heng - Proceedings of the AAAI …, 2021 - ojs.aaai.org
Unsupervised anomaly detection aims to identify data samples that have low probability
density from a set of input samples, and only the normal samples are provided for model …

Learning sparse latent graph representations for anomaly detection in multivariate time series

S Han, SS Woo - Proceedings of the 28th ACM SIGKDD Conference on …, 2022 - dl.acm.org
Anomaly detection in high-dimensional time series is typically tackled using either
reconstruction-or forecasting-based algorithms due to their abilities to learn compressed …

Hierarchical vector quantized transformer for multi-class unsupervised anomaly detection

R Lu, YJ Wu, L Tian, D Wang… - Advances in Neural …, 2023 - proceedings.neurips.cc
Abstract Unsupervised image Anomaly Detection (UAD) aims to learn robust and
discriminative representations of normal samples. While separate solutions per class endow …

Deep nearest neighbor anomaly detection

L Bergman, N Cohen, Y Hoshen - arXiv preprint arXiv:2002.10445, 2020 - arxiv.org
Nearest neighbors is a successful and long-standing technique for anomaly detection.
Significant progress has been recently achieved by self-supervised deep methods (eg …

A survey on learning to reject

XY Zhang, GS Xie, X Li, T Mei… - Proceedings of the IEEE, 2023 - ieeexplore.ieee.org
Learning to reject is a special kind of self-awareness (the ability to know what you do not
know), which is an essential factor for humans to become smarter. Although machine …

Self-supervised masking for unsupervised anomaly detection and localization

C Huang, Q Xu, Y Wang, Y Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, anomaly detection and localization in multimedia data have received significant
attention among the machine learning community. In real-world applications such as …

A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems

D Gümüşbaş, T Yıldırım, A Genovese… - IEEE Systems …, 2020 - ieeexplore.ieee.org
This survey presents a comprehensive overview of machine learning methods for
cybersecurity intrusion detection systems, with a specific focus on recent approaches based …

Semantic anomaly detection with large language models

A Elhafsi, R Sinha, C Agia, E Schmerling… - Autonomous …, 2023 - Springer
As robots acquire increasingly sophisticated skills and see increasingly complex and varied
environments, the threat of an edge case or anomalous failure is ever present. For example …

Anomaly detection for medical images using self-supervised and translation-consistent features

H Zhao, Y Li, N He, K Ma, L Fang, H Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As the labeled anomalous medical images are usually difficult to acquire, especially for rare
diseases, the deep learning based methods, which heavily rely on the large amount of …

Adversarial machine learning for network intrusion detection: A comparative study

H Jmila, MI Khedher - Computer Networks, 2022 - Elsevier
Intrusion detection is a key topic in cybersecurity. It aims to protect computer systems and
networks from intruders and malicious attacks. Traditional intrusion detection systems (IDS) …