{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2019:QX5GPKXGUS5IK4SMMT5RERR5N7","short_pith_number":"pith:QX5GPKXG","schema_version":"1.0","canonical_sha256":"85fa67aae6a4ba85724c64fb12463d6ff1b1e9a53483155f16f9d125cec15ba5","source":{"kind":"arxiv","id":"1901.03407","version":2},"attestation_state":"computed","paper":{"title":"Deep Learning for Anomaly Detection: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["stat.ML"],"primary_cat":"cs.LG","authors_text":"Capital Markets Cooperative Research Centre (CMCRC)), HBKU), Raghavendra Chalapathy (University of Sydney, Sanjay Chawla (Qatar Computing Research Institute (QCRI)","submitted_at":"2019-01-10T21:36:57Z","abstract_excerpt":"Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The aim of this survey is two-fold, firstly we present a structured and comprehensive overview of research methods in deep learning-based anomaly detection. Furthermore, we review the adoption of these methods for anomaly across various application domains and assess their effectiveness. We have grouped state-of-the-art research techniques into different categories based on the underlying assumptions and approach adopted. Within each category we outline the basic anomaly "},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1901.03407","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.LG","submitted_at":"2019-01-10T21:36:57Z","cross_cats_sorted":["stat.ML"],"title_canon_sha256":"11143d0e7cf9ba8fab8c0e5738735047997b7da6285d4f5575edbb14102e1a09","abstract_canon_sha256":"9cb730c9f9e1c5d37c9beb83c99ef6430c7da02a8fff5fced322e60af31aab5b"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:55:42.263419Z","signature_b64":"RjDEOnRBCnN7qzakfd0YR2+tIhgpMqjK9uGCI8NM5BbgASnvxrt9Pgms7UxlPfU8Ju7I4+BbvFDPO+EzFoe1Bw==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"85fa67aae6a4ba85724c64fb12463d6ff1b1e9a53483155f16f9d125cec15ba5","last_reissued_at":"2026-05-17T23:55:42.262808Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:55:42.262808Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Deep Learning for Anomaly Detection: A Survey","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["stat.ML"],"primary_cat":"cs.LG","authors_text":"Capital Markets Cooperative Research Centre (CMCRC)), HBKU), Raghavendra Chalapathy (University of Sydney, Sanjay Chawla (Qatar Computing Research Institute (QCRI)","submitted_at":"2019-01-10T21:36:57Z","abstract_excerpt":"Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The aim of this survey is two-fold, firstly we present a structured and comprehensive overview of research methods in deep learning-based anomaly detection. Furthermore, we review the adoption of these methods for anomaly across various application domains and assess their effectiveness. We have grouped state-of-the-art research techniques into different categories based on the underlying assumptions and approach adopted. Within each category we outline the basic anomaly "},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.03407","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1901.03407","created_at":"2026-05-17T23:55:42.262902+00:00"},{"alias_kind":"arxiv_version","alias_value":"1901.03407v2","created_at":"2026-05-17T23:55:42.262902+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.03407","created_at":"2026-05-17T23:55:42.262902+00:00"},{"alias_kind":"pith_short_12","alias_value":"QX5GPKXGUS5I","created_at":"2026-05-18T12:33:27.125529+00:00"},{"alias_kind":"pith_short_16","alias_value":"QX5GPKXGUS5IK4SM","created_at":"2026-05-18T12:33:27.125529+00:00"},{"alias_kind":"pith_short_8","alias_value":"QX5GPKXG","created_at":"2026-05-18T12:33:27.125529+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":7,"internal_anchor_count":3,"sample":[{"citing_arxiv_id":"2507.21023","citing_title":"On Using the Shapley Value for Anomaly Localization: A Statistical Investigation","ref_index":17,"is_internal_anchor":true},{"citing_arxiv_id":"2602.09329","citing_title":"MacrOData: New Benchmarks of Thousands of Datasets for Tabular Outlier Detection","ref_index":11,"is_internal_anchor":true},{"citing_arxiv_id":"2603.23966","citing_title":"Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage","ref_index":38,"is_internal_anchor":true},{"citing_arxiv_id":"2605.05638","citing_title":"Scaling Pretrained Representations Enables Label-Free Out-of-Distribution Detection Without Fine-Tuning","ref_index":26,"is_internal_anchor":false},{"citing_arxiv_id":"2605.07675","citing_title":"FactoryBench: Evaluating Industrial Machine Understanding","ref_index":6,"is_internal_anchor":false},{"citing_arxiv_id":"2604.13788","citing_title":"Failure Identification in Imitation Learning Via Statistical and Semantic Filtering","ref_index":16,"is_internal_anchor":false},{"citing_arxiv_id":"2604.14685","citing_title":"Beyond Nodes vs. Edges: A Multi-View Fusion Framework for Provenance-Based Intrusion Detection","ref_index":71,"is_internal_anchor":false}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7","json":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7.json","graph_json":"https://pith.science/api/pith-number/QX5GPKXGUS5IK4SMMT5RERR5N7/graph.json","events_json":"https://pith.science/api/pith-number/QX5GPKXGUS5IK4SMMT5RERR5N7/events.json","paper":"https://pith.science/paper/QX5GPKXG"},"agent_actions":{"view_html":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7","download_json":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7.json","view_paper":"https://pith.science/paper/QX5GPKXG","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1901.03407&json=true","fetch_graph":"https://pith.science/api/pith-number/QX5GPKXGUS5IK4SMMT5RERR5N7/graph.json","fetch_events":"https://pith.science/api/pith-number/QX5GPKXGUS5IK4SMMT5RERR5N7/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7/action/timestamp_anchor","attest_storage":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7/action/storage_attestation","attest_author":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7/action/author_attestation","sign_citation":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7/action/citation_signature","submit_replication":"https://pith.science/pith/QX5GPKXGUS5IK4SMMT5RERR5N7/action/replication_record"}},"created_at":"2026-05-17T23:55:42.262902+00:00","updated_at":"2026-05-17T23:55:42.262902+00:00"}