pith. sign in

arxiv: 1901.03407 · v2 · pith:QX5GPKXGnew · submitted 2019-01-10 · 💻 cs.LG · stat.ML

Deep Learning for Anomaly Detection: A Survey

classification 💻 cs.LG stat.ML
keywords anomalydetectionresearchapplicationdomainstechniquesassumptionscategory
0
0 comments X p. Extension
pith:QX5GPKXG Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{QX5GPKXG}

Prints a linked pith:QX5GPKXG badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The aim of this survey is two-fold, firstly we present a structured and comprehensive overview of research methods in deep learning-based anomaly detection. Furthermore, we review the adoption of these methods for anomaly across various application domains and assess their effectiveness. We have grouped state-of-the-art research techniques into different categories based on the underlying assumptions and approach adopted. Within each category we outline the basic anomaly detection technique, along with its variants and present key assumptions, to differentiate between normal and anomalous behavior. For each category, we present we also present the advantages and limitations and discuss the computational complexity of the techniques in real application domains. Finally, we outline open issues in research and challenges faced while adopting these techniques.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 7 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. MacrOData: New Benchmarks of Thousands of Datasets for Tabular Outlier Detection

    cs.LG 2026-02 accept novelty 8.0

    MacrOData supplies three large, curated benchmark suites totaling 2,446 datasets for tabular outlier detection, complete with standardized splits, metadata, and a public leaderboard.

  2. FactoryBench: Evaluating Industrial Machine Understanding

    cs.AI 2026-05 unverdicted novelty 7.0

    FactoryBench reveals that frontier LLMs achieve under 50% on structured causal questions and under 18% on decision-making in industrial robotic telemetry.

  3. Beyond Nodes vs. Edges: A Multi-View Fusion Framework for Provenance-Based Intrusion Detection

    cs.CR 2026-04 unverdicted novelty 7.0

    PROVFUSION fuses three complementary views of provenance data with lightweight schemes and voting to achieve higher detection accuracy and lower false positives than node- or edge-only baselines on nine benchmarks.

  4. Failure Identification in Imitation Learning Via Statistical and Semantic Filtering

    cs.RO 2026-04 unverdicted novelty 7.0

    FIDeL detects failures in imitation learning by building compact nominal representations via optimal transport, applying conformal prediction thresholds, and using VLMs for semantic filtering, outperforming baselines ...

  5. Scaling Pretrained Representations Enables Label-Free Out-of-Distribution Detection Without Fine-Tuning

    cs.LG 2026-05 unverdicted novelty 6.0

    Scaling pretrained representations improves label-free OOD detection on frozen backbones, causing performance gaps between global and local detectors to vanish across vision and language tasks.

  6. On Using the Shapley Value for Anomaly Localization: A Statistical Investigation

    cs.LG 2025-07 unverdicted novelty 5.0

    A single fixed term in the Shapley value yields the same anomaly localization error probability as the full calculation for independent sensor observations, supported by a proof.

  7. Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage

    cs.CR 2026-03 unverdicted novelty 4.0

    An integrated framework using autoencoders, deep reinforcement learning, and LLMs automates risk-based prioritization and contextual analysis of suspicious network traffic within Splunk SOC environments.