pith. machine review for the scientific record. sign in

arxiv: 1901.03407 · v2 · submitted 2019-01-10 · 💻 cs.LG · stat.ML

Recognition: unknown

Deep Learning for Anomaly Detection: A Survey

Authors on Pith no claims yet
classification 💻 cs.LG stat.ML
keywords anomalydetectionresearchapplicationdomainstechniquesassumptionscategory
0
0 comments X
read the original abstract

Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The aim of this survey is two-fold, firstly we present a structured and comprehensive overview of research methods in deep learning-based anomaly detection. Furthermore, we review the adoption of these methods for anomaly across various application domains and assess their effectiveness. We have grouped state-of-the-art research techniques into different categories based on the underlying assumptions and approach adopted. Within each category we outline the basic anomaly detection technique, along with its variants and present key assumptions, to differentiate between normal and anomalous behavior. For each category, we present we also present the advantages and limitations and discuss the computational complexity of the techniques in real application domains. Finally, we outline open issues in research and challenges faced while adopting these techniques.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 5 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. FactoryBench: Evaluating Industrial Machine Understanding

    cs.AI 2026-05 unverdicted novelty 7.0

    FactoryBench reveals that frontier LLMs achieve under 50% on structured causal questions and under 18% on decision-making in industrial robotic telemetry.

  2. Beyond Nodes vs. Edges: A Multi-View Fusion Framework for Provenance-Based Intrusion Detection

    cs.CR 2026-04 unverdicted novelty 7.0

    PROVFUSION fuses three complementary views of provenance data with lightweight schemes and voting to achieve higher detection accuracy and lower false positives than node- or edge-only baselines on nine benchmarks.

  3. Failure Identification in Imitation Learning Via Statistical and Semantic Filtering

    cs.RO 2026-04 unverdicted novelty 7.0

    FIDeL detects failures in imitation learning by building compact nominal representations via optimal transport, applying conformal prediction thresholds, and using VLMs for semantic filtering, outperforming baselines ...

  4. Scaling Pretrained Representations Enables Label-Free Out-of-Distribution Detection Without Fine-Tuning

    cs.LG 2026-05 unverdicted novelty 6.0

    Scaling pretrained representations improves label-free OOD detection on frozen backbones, causing performance gaps between global and local detectors to vanish across vision and language tasks.

  5. Policy-Guided Threat Hunting: An LLM enabled Framework with Splunk SOC Triage

    cs.CR 2026-03 unverdicted novelty 4.0

    An integrated framework using autoencoders, deep reinforcement learning, and LLMs automates risk-based prioritization and contextual analysis of suspicious network traffic within Splunk SOC environments.