pith. sign in

arxiv: 2602.01359 · v2 · pith:GXIUZS4Fnew · submitted 2026-02-01 · 💻 cs.LG · cs.AI

PaAno: Patch-Based Representation Learning for Time-Series Anomaly Detection

Pith reviewed 2026-05-16 08:40 UTC · model grok-4.3

classification 💻 cs.LG cs.AI
keywords time-series anomaly detectionpatch representation1D convolutional networktriplet lossrepresentation learninglightweight modelTSB-AD benchmark
0
0 comments X p. Extension
pith:GXIUZS4F Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{GXIUZS4F}

Prints a linked pith:GXIUZS4F badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

The pith

A patch-based CNN method for time-series anomaly detection surpasses complex models on benchmarks.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

PaAno learns vector representations of short temporal patches drawn from time-series data by passing them through a 1D convolutional network. The network is trained with a triplet loss that pulls similar normal patches together and a pretext loss that encourages the embeddings to capture useful temporal structure. At inference an anomaly score at each time step is obtained simply by measuring how far the embeddings of nearby patches lie from the collection of all normal patches seen in the training series. On the TSB-AD benchmark this procedure produces higher accuracy than existing methods, including large transformer and foundation-model baselines, for both univariate and multivariate series and under both point-wise and range-wise scoring rules. The result matters for any setting that needs fast, low-memory anomaly detection without sacrificing detection quality.

Core claim

PaAno shows that a 1D CNN embedding of short temporal patches, trained with triplet loss to cluster normal patterns and pretext loss to retain informative features, permits anomaly scoring by direct comparison of test-patch embeddings against the set of normal patches extracted from training data, and that this scoring rule yields state-of-the-art results on the TSB-AD benchmark for both univariate and multivariate time series across range-wise and point-wise measures.

What carries the argument

The anomaly score obtained by comparing embeddings of test patches to the reference set of normal training patches.

If this is right

  • Lightweight CNN patch models can exceed the accuracy of heavy transformer architectures on time-series anomaly detection.
  • The same procedure works for both univariate and multivariate series.
  • Performance improvements appear under both point-wise and range-wise evaluation protocols.
  • Inference remains fast and memory-light because only a small CNN and a fixed set of normal embeddings are required.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • Local patch comparisons may suffice for detecting many global anomalies without modeling entire long sequences.
  • The method could be adapted to streaming settings by maintaining a rolling buffer of recent normal patches.
  • Similar patch-embedding ideas might transfer to other sequential domains such as audio or physiological signals.

Load-bearing premise

Embeddings of normal patches from the training series form a sufficient reference set so that simple distance comparison accurately identifies anomalies in new data.

What would settle it

A time-series dataset containing documented anomalies whose surrounding patches embed closer to normal training patches than to other anomalous patches, causing the distance-based score to miss them.

Figures

Figures reproduced from arXiv: 2602.01359 by Jinju Park, Seokho Kang.

Figure 1
Figure 1. Figure 1: Illustrative results of PaAno, demonstrating strong [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 3
Figure 3. Figure 3: Training procedure of PaAno. The training dataset is split into patches. Using the patch [PITH_FULL_IMAGE:figures/full_fig_p005_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: Anomaly detection procedure of PaAno. During inference, the patch en￾coder fθ and reduced memory bank Mˆ are used to compute the anomaly score st∗ for a query time step t∗. We first compute patch-level anomaly scores for the patches that include the query time step t∗. Let Pt∗ = {pt} t∗ t=t∗−w+1 denote the set of these patches, where each patch pt = (xt, . . . , xt+w−1) is a collection of the w most recent… view at source ↗
Figure 5
Figure 5. Figure 5: Sensitivity analysis on Top-k and memory bank size of PaAno across TSB-AD-U/M. In practical deployments, the patterns of normal data may change over time. PaAno can address this with a simple online update of the memory bank without requiring model retraining. By constructing the memory bank as a queue that inserts recent normal patch embeddings and discards old ones, it continually reflects up-to-date nor… view at source ↗
Figure 6
Figure 6. Figure 6: Average run time on TSB-AD-U. 26 [PITH_FULL_IMAGE:figures/full_fig_p026_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: Average run time on TSB-AD-M. 27 [PITH_FULL_IMAGE:figures/full_fig_p027_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: Boxplot of VUS-PR distributions for the TSB-AD-U and TSB-AD-M. The dashed line [PITH_FULL_IMAGE:figures/full_fig_p028_8.png] view at source ↗
read the original abstract

Although recent studies on time-series anomaly detection have increasingly adopted ever-larger neural network architectures such as transformers and foundation models, they incur high computational costs and memory usage, making them impractical for real-time and resource-constrained scenarios. Moreover, they often fail to demonstrate significant performance gains over simpler methods under rigorous evaluation protocols. In this study, we propose Patch-based representation learning for time-series Anomaly detection (PaAno), a lightweight yet effective method for fast and efficient time-series anomaly detection. PaAno extracts short temporal patches from time-series training data and uses a 1D convolutional neural network to embed each patch into a vector representation. The model is trained using a combination of triplet loss and pretext loss to ensure the embeddings capture informative temporal patterns from input patches. During inference, the anomaly score at each time step is computed by comparing the embeddings of its surrounding patches to those of normal patches extracted from the training time-series. Evaluated on the TSB-AD benchmark, PaAno achieved state-of-the-art performance, significantly outperforming existing methods, including those based on heavy architectures, on both univariate and multivariate time-series anomaly detection across various range-wise and point-wise performance measures.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript proposes PaAno, a lightweight method for time-series anomaly detection that extracts short temporal patches from training data, embeds them with a 1D CNN trained via triplet loss plus pretext loss, and scores test time steps by nearest-neighbor distance of their surrounding patches to the fixed collection of normal patches from the training series. It reports state-of-the-art results on the TSB-AD benchmark for both univariate and multivariate series under range-wise and point-wise metrics, claiming to outperform heavier transformer-based and foundation-model baselines while remaining computationally efficient.

Significance. If the empirical superiority holds under a transparent protocol, PaAno would demonstrate that simple patch embeddings with contrastive objectives can deliver competitive or better anomaly detection performance than large architectures at far lower cost, which is practically relevant for real-time or resource-constrained deployments.

major comments (2)
  1. [§3.3] §3.3 (Inference and anomaly scoring): the nearest-neighbor scoring treats the entire set of training normal patches as an exhaustive reference distribution. No experiments test robustness under distribution shift (e.g., held-out normal regimes, cross-dataset transfer, or controlled regime changes), which directly undermines the validity of the reported SOTA gains.
  2. [§4] §4 (Experiments and results): the manuscript claims significant outperformance across multiple measures but supplies neither per-dataset tables with exact scores, standard deviations from repeated runs, nor details on baseline re-implementation and hyper-parameter search protocol, preventing verification that the gains are robust and not artifacts of evaluation choices.
minor comments (2)
  1. [§3.1] Notation for patch extraction and embedding dimension is introduced without an explicit equation or diagram, making the pipeline harder to follow on first reading.
  2. [Abstract] The abstract asserts SOTA performance without any numerical values or metric names, which is atypical for an empirical methods paper.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive comments on our manuscript. We address each major point below and will revise the paper to strengthen the presentation and reproducibility.

read point-by-point responses
  1. Referee: [§3.3] §3.3 (Inference and anomaly scoring): the nearest-neighbor scoring treats the entire set of training normal patches as an exhaustive reference distribution. No experiments test robustness under distribution shift (e.g., held-out normal regimes, cross-dataset transfer, or controlled regime changes), which directly undermines the validity of the reported SOTA gains.

    Authors: We acknowledge that explicit robustness tests under distribution shift are absent. Our approach follows the standard unsupervised anomaly detection assumption that training data captures the normal regime, and the TSB-AD benchmark already spans diverse datasets with varying characteristics. In revision we will add a limitations paragraph explicitly discussing this point and include a small-scale cross-dataset transfer experiment (training on one dataset family and evaluating on another) to provide initial evidence. These changes will contextualize rather than alter the core SOTA claims on the benchmark. revision: partial

  2. Referee: [§4] §4 (Experiments and results): the manuscript claims significant outperformance across multiple measures but supplies neither per-dataset tables with exact scores, standard deviations from repeated runs, nor details on baseline re-implementation and hyper-parameter search protocol, preventing verification that the gains are robust and not artifacts of evaluation choices.

    Authors: We agree that fuller reporting is required for verification. The revised manuscript will include complete per-dataset tables reporting exact scores together with standard deviations from five independent runs. An expanded appendix will document baseline re-implementations, the hyper-parameter search protocol, and the exact evaluation settings used. These additions will make the experimental claims fully reproducible. revision: yes

Circularity Check

0 steps flagged

No circularity: standard patch embedding + distance scoring evaluated on external benchmark

full rationale

The paper presents a conventional supervised representation-learning pipeline: 1D-CNN embeddings of fixed-length patches are trained with triplet loss plus a pretext objective, then anomaly scores are produced by comparing test patches to the fixed collection of normal patches extracted from the training series. No equations, uniqueness theorems, or self-citations are invoked that would make the anomaly score or the SOTA claim reduce by construction to a fitted parameter or to a quantity defined in terms of itself. Performance is measured on the external TSB-AD benchmark using standard range-wise and point-wise metrics; the scoring rule is a direct, non-calibrated distance computation whose validity is an empirical modeling assumption rather than a mathematical identity. Consequently the derivation chain is self-contained and non-circular.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

The central claim rests on the domain assumption that triplet and pretext losses will produce embeddings that separate normal from anomalous temporal structure; no free parameters or invented entities are mentioned.

axioms (1)
  • domain assumption Triplet loss combined with pretext loss produces embeddings that capture informative temporal patterns sufficient for anomaly detection.
    Invoked in the training description to justify the representation quality.

pith-pipeline@v0.9.0 · 5503 in / 1198 out tokens · 27754 ms · 2026-05-16T08:40:07.423151+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

37 extracted references · 37 canonical work pages · 1 internal anchor

  1. [1]

    Shaojie Bai, J

    doi: 10.1145/3394486.3403392. Shaojie Bai, J. Zico Kolter, and Vladlen Koltun. An empirical evaluation of generic convolutional and recurrent networks for sequence modeling.arXiv preprint arXiv:1803.01271,

  2. [2]

    Debarpan Bhattacharya, Sumanta Mukherjee, Chandramouli Kamanchi, Vijay Ekambaram, Arindam Jati, and Pankaj Dayama

    doi: 10.1109/CVPR.2019.00982. Debarpan Bhattacharya, Sumanta Mukherjee, Chandramouli Kamanchi, Vijay Ekambaram, Arindam Jati, and Pankaj Dayama. Towards unbiased evaluation of time-series anomaly detector. InProceedings of the NeurIPS Workshop on Time Series and Learning Machines,

  3. [3]

    Paul Boniol, John Paparrizos, Themis Palpanas, and Michael J

    doi: 10.14778/ 3407790.3407805. Paul Boniol, John Paparrizos, Themis Palpanas, and Michael J. Franklin. SAND: Streaming subse- quence anomaly detection.Proceedings of the VLDB Endowment, 14(10):1717–1729,

  4. [4]

    Paul Boniol, Qinghua Liu, Mingyi Huang, Themis Palpanas, and John Paparrizos

    doi: 10.14778/3467861.3467865. Paul Boniol, Qinghua Liu, Mingyi Huang, Themis Palpanas, and John Paparrizos. Dive into time- series anomaly detection: A decade review.arXiv preprint arXiv:2412.20512,

  5. [5]

    Breunig, Hans-Peter Kriegel, Raymond T

    11 Published as a conference paper at ICLR 2026 Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J ¨org Sander. LOF: Identifying density-based local outliers.ACM SIGMOD Record, 29(2):93–104,

  6. [6]

    doi: 10.1145/335191. 335388. Kukjin Choi, Jihun Yi, Changhwa Park, and Sungroh Yoon. Deep learning for anomaly detection in time-series data: Review, analysis, and guidelines.IEEE Access, 9:120043–120065,

  7. [7]

    doi: 10.1109/TKDE.2019. 2947676. Zengyou He, Xiaofei Xu, and Shengchun Deng. Discovering cluster-based local outliers.Pattern Recognition Letters, 24(9–10):1641–1650,

  8. [8]

    Md Khairul Islam

    doi: 10.1016/S0167-8655(03)00003-5. Md Khairul Islam. Temporal dependencies and spatio-temporal patterns of time series models. In Proceedings of the AAAI Conference on Artificial Intelligence, pp. 23391–23392,

  9. [9]

    Feng Jia, Kai Wang, Yuxuan Zheng, Dong Cao, and Yang Liu

    doi: 10.1609/aaai.v38i21.30396. Feng Jia, Kai Wang, Yuxuan Zheng, Dong Cao, and Yang Liu. GPT4MTS: Prompt-based large language model for multimodal time-series forecasting. InProceedings of the AAAI Conference on Artificial Intelligence, pp. 23343–23351,

  10. [10]

    Ming Jin, Shiyu Wang, Lintao Ma, Zhixuan Chu, James Y

    doi: 10.1609/aaai.v38i21.30383. Ming Jin, Shiyu Wang, Lintao Ma, Zhixuan Chu, James Y . Zhang, Xiaoming Shi, Pin-Yu Chen, Yuxuan Liang, Yuan-Fang Li, Shirui Pan, and Qingsong Wen. Time-LLM: Time series forecasting by reprogramming large language models. InProceedings of the International Conference on Learning Representations,

  11. [11]

    Towards a rigorous evaluation of time-series anomaly detection

    Siwon Kim, Kukjin Choi, Hyun-Soo Choi, Byunghan Lee, and Sungroh Yoon. Towards a rigorous evaluation of time-series anomaly detection. InProceedings of the AAAI Conference on Artificial Intelligence, pp. 7194–7201, 2022a. doi: 10.1609/aaai.v36i7.20680. Taesung Kim, Jinhee Kim, Yunwon Tae, Cheonbok Park, Jang-Ho Choi, and Jaegul Choo. Re- versible Instance...

  12. [12]

    Kin Kwan Leung, Clayton Rooke, Jonathan Smith, Saba Zuberi, and Maksims V olkovs

    1145/3209978.3210006. Kin Kwan Leung, Clayton Rooke, Jonathan Smith, Saba Zuberi, and Maksims V olkovs. Temporal dependencies in feature importance for time series prediction. InProceedings of the International Conference on Learning Representations,

  13. [13]

    COPOD: Copula-based outlier detection

    12 Published as a conference paper at ICLR 2026 Zhao Li, Yue Zhao, Nicola Botta, Ciprian Ionescu, and Xiaohui Hu. COPOD: Copula-based outlier detection. InProceedings of the IEEE International Conference on Data Mining, pp. 1118–1123,

  14. [14]

    Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou

    doi: 10.1109/ICDM50108.2020.00139. Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. Isolation forest. InProceedings of the IEEE International Conference on Data Mining, pp. 413–422,

  15. [15]

    Isolation forest, in: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), IEEE

    doi: 10.1109/ICDM.2008.17. Qinghua Liu and John Paparrizos. The elephant in the room: Towards a reliable time-series anomaly detection benchmark. InAdvances in Neural Information Processing Systems, volume 37, pp. 108231–108261,

  16. [16]

    Siddiqui, Andreas Dengel, and Sheraz Ahmed

    Mahmudul Hasan Munir, Shehroz A. Siddiqui, Andreas Dengel, and Sheraz Ahmed. DeepAnt: A deep learning approach for unsupervised anomaly detection in time series.IEEE Access, 7: 1991–2005,

  17. [17]

    Yuqi Nie, Nam H

    doi: 10.1109/ACCESS.2018.2886457. Yuqi Nie, Nam H. Nguyen, Phanwadee Sinthong, and Jayant Kalagnanam. A time series is worth 64 words: Long-term forecasting with transformers. InProceedings of the International Conference on Learning Representations,

  18. [18]

    Jos´e Manuel Oliveira and Patr´ıcia Ramos

    Accessed: 2025-07-14. Jos´e Manuel Oliveira and Patr´ıcia Ramos. Evaluating the effectiveness of time series transformers for demand forecasting in retail.Mathematics, 12(17):2728,

  19. [19]

    Robust PCA for Anomaly Detection in Cyber Networks

    Randy Paffenroth, Kathleen Kay, and Les Servi. Robust PCA for anomaly detection in cyber net- works.arXiv preprint arXiv:1801.01571,

  20. [20]

    Srikant Ramaswamy, Rajeev Rastogi, and Kyuseok Shim

    doi: 10.14778/3551793.3551830. Srikant Ramaswamy, Rajeev Rastogi, and Kyuseok Shim. Efficient algorithms for mining outliers from large data sets. InProceedings of the ACM SIGMOD International Conference on Manage- ment of Data, pp. 427–438,

  21. [21]

    doi: 10.1145/342009.335437. Kashif Rasul, Arjun Ashok, Andrew Robert Williams, Arian Khorasani, George Adamopoulos, Rishika Bhagwatkar, Marin Biloˇs, Hena Ghonia, Nadhir Hassen, Anderson Schneider, Sahil Garg, Alexandre Drouin, Nicolas Chapados, Yuriy Nevmyvaka, and Irina Rish. Lag-Llama: Towards foundation models for time series forecasting. InProceeding...

  22. [22]

    Towards total recall in industrial anomaly detection

    13 Published as a conference paper at ICLR 2026 Karsten Roth, Latha Pemula, Joaquin Zepeda, Bernhard Sch¨olkopf, Thomas Brox, and Peter Gehler. Towards total recall in industrial anomaly detection. InProceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318–14328,

  23. [23]

    doi: 10.1145/2689746.2689747. M. Saquib Sarfraz, Mei-Yen Chen, Lukas Layer, Kunyu Peng, and Marios Koulakis. Position: Quo vadis, unsupervised time series anomaly detection? InProceedings of the International Conference on Machine Learning, pp. 43461–43476,

  24. [24]

    Robust anomaly detection for multivariate time series through stochastic re- current neural network,

    doi: 10.1145/3292500.3330672. Wensi Tang, Guodong Long, Lu Liu, Tianyi Zhou, Michael Blumenstein, and Jing Jiang. Omni- scale CNNs: A simple and effective kernel size configuration for time series classification. In Proceedings of the International Conference on Learning Representations,

  25. [25]

    Hao Wang and Yong Dou

    doi: 10.14778/3514061.3514065. Hao Wang and Yong Dou. SNCSE: Contrastive Learning for Unsupervised Sentence Embedding with Soft Negative Samples. InAdvanced Intelligent Computing Technology and Applications, pp. 419,

  26. [26]

    Haixu Wu, Tongtong Hu, Yujun Liu, Han Zhou, Jianmin Wang, and Mingsheng Long

    doi: 10.1109/IJCNN.2017.7966039. Haixu Wu, Tongtong Hu, Yujun Liu, Han Zhou, Jianmin Wang, and Mingsheng Long. TimesNet: Temporal 2D-variation modeling for general time series analysis. InProceedings of the Interna- tional Conference on Learning Representations,

  27. [27]

    14 Published as a conference paper at ICLR 2026 Jing Xu, Haixu Wu, Jianmin Wang, and Mingsheng Long

    doi: 10.1145/3178876.3185996. 14 Published as a conference paper at ICLR 2026 Jing Xu, Haixu Wu, Jianmin Wang, and Mingsheng Long. Anomaly Transformer: Time series anomaly detection with association discrepancy. InProceedings of the International Conference on Learning Representations,

  28. [28]

    Chin-Chia Michael Yeh, Yan Zhu, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Diego Furtado Silva, Abdullah Mueen, and Eamonn Keogh

    doi: 10.1145/3580305.3599295. Chin-Chia Michael Yeh, Yan Zhu, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Diego Furtado Silva, Abdullah Mueen, and Eamonn Keogh. Matrix profile I: All pairs similarity joins for time series: A unifying view that includes motifs, discords and shapelets. In Proceedings of the IEEE International Conference on ...

  29. [29]

    Jihun Yi and Sungroh Yoon

    doi: 10.1109/ICDM.2016.0179. Jihun Yi and Sungroh Yoon. Patch SVDD: Patch-level SVDD for anomaly detection and segmenta- tion. InProceedings of the Asian Conference on Computer Vision,

  30. [30]

    TS2Vec: Towards universal representation of time series

    doi: 10.1609/aaai.v36i8.20881. Zahra Zamanzadeh Darban, Geoffrey I Webb, Shirui Pan, Charu Aggarwal, and Mahsa Salehi. Deep learning for time series anomaly detection: A survey.ACM Computing Surveys, 57(1):15,

  31. [31]

    Are transformers effective for time series forecasting? InProceedings of the AAAI Conference on Artificial Intelligence, volume 37, pages 11121–11128, 2023

    doi: 10.1609/aaai.v37i9.26317. Qianyu Zhou, Jiaxi Chen, Han Liu, Shuyu He, and Weizhu Meng. Detecting multivariate time series anomalies with zero known label. InProceedings of the AAAI Conference on Artificial Intelligence, pp. 4963–4971, 2023a. doi: 10.1609/aaai.v37i4.25623. Quan Zhou, Changhua Pei, Fei Sun, Jing Han, Zhengwei Gao, Haiming Zhang, Gaogan...

  32. [32]

    One Fits All: Power general time series analysis by pretrained LM

    Tian Zhou, Peng Niu, Liyuan Sun, and Ruiyang Jin. One Fits All: Power general time series analysis by pretrained LM. InAdvances in Neural Information Processing Systems, volume 36, pp. 43322–43355, 2023b. 15 Published as a conference paper at ICLR 2026 A PSEUDOCODE Algorithm 1 presents the pseudocode of the training procedure. Algorithm 2 presents the pse...

  33. [33]

    We adopted instance normalization (Kim et al., 2022b) following a widely used convention in recent time-series anomaly detection (Yang et al., 2023; Wu et al.,

    The classification headc θ was a one-layer MLP with sigmoid activation. We adopted instance normalization (Kim et al., 2022b) following a widely used convention in recent time-series anomaly detection (Yang et al., 2023; Wu et al.,

  34. [34]

    For the hyperparameters, the maximum offsetrfor defining positive patches was set to 2, and the marginδfor the triplet loss was set to 0.5

    and forecasting methods (Jin et al., 2024; Wang et al., 2024). For the hyperparameters, the maximum offsetrfor defining positive patches was set to 2, and the marginδfor the triplet loss was set to 0.5. The number of per- anchor random patchesUwas set to

  35. [35]

    A patch size of 64 and a learning rate of1e−4were selected for TSB-AD-U, and 96 and1e−4for TSB-AD-M

    The patch sizewand initial learning rate were explored from {32,64,96}and{1e−3,1e−4,1e−5}, respectively, based on VUS-PR performance on the Tuning split of the TSB-AD benchmark. A patch size of 64 and a learning rate of1e−4were selected for TSB-AD-U, and 96 and1e−4for TSB-AD-M. Experiments were conducted using an NVIDIA RTX 2080Ti GPU with 11GB of memory....

  36. [36]

    First, several commonly used benchmark datasets exhibit known structural flaws (Liu & Paparrizos, 2024)

    C EVALUATION OFTIME-SERIESANOMALYDETECTION C.1 CHALLENGES INEVALUATIONPRACTICES The recent studies on time-series anomaly detection have often relied on evaluation protocols that in- troduce several biases, undermining the validity of reported results (Liu & Paparrizos, 2024; Sarfraz et al., 2024). First, several commonly used benchmark datasets exhibit k...

  37. [37]

    E.3 RUNTIME To evaluate the practical applicability of real-time anomaly detection, we measured the run time of each method, including both training and inference, averaged across the datasets within each benchmark. The results for the baseline methods are taken from the TSB-AD benchmark (Liu & Paparrizos, 2024), where statistical and machine learning met...