{"id":"https://openalex.org/W7128775431","doi":"https://doi.org/10.48550/arxiv.2602.11539","title":"Real-Time Proactive Anomaly Detection via Forward and Backward Forecast Modeling","display_name":"Real-Time Proactive Anomaly Detection via Forward and Backward Forecast Modeling","publication_year":2026,"publication_date":"2026-02-12","ids":{"openalex":"https://openalex.org/W7128775431","doi":"https://doi.org/10.48550/arxiv.2602.11539"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.11539","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5125988054","display_name":"Luis Olmos","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Olmos, Luis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5091820414","display_name":"Rashida Hasan","orcid":"https://orcid.org/0000-0002-6231-8116"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hasan, Rashida","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5125988054"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9473000168800354,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9473000168800354,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.020099999383091927,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.004699999932199717,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7354000210762024},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5946999788284302},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.48590001463890076},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4350999891757965},{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.3978999853134155},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.391400009393692},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.3822000026702881},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.37709999084472656}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7354000210762024},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156999707221985},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5946999788284302},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.48590001463890076},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4814999997615814},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4350999891757965},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39980000257492065},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.3978999853134155},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3978999853134155},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.391400009393692},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.37709999084472656},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C161584116","wikidata":"https://www.wikidata.org/wiki/Q1952580","display_name":"Multivariate statistics","level":2,"score":0.32839998602867126},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3215999901294708},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3027999997138977},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.29499998688697815},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.28760001063346863},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.2590000033378601},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2531000077724457}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.11539","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.11539","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.11539","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.11539","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"score":0.4033602476119995,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Reactive":[0],"anomaly":[1,35,73,184],"detection":[2,74,176],"methods,":[3],"which":[4],"are":[5,130],"commonly":[6],"deployed":[7],"to":[8,40,105,114,125],"identify":[9],"anomalies":[10],"after":[11],"they":[12],"occur":[13],"based":[14,132],"on":[15,133,158],"observed":[16],"deviations,":[17],"often":[18],"fall":[19],"short":[20],"in":[21,153,194],"applications":[22],"that":[23,168],"demand":[24],"timely":[25],"intervention,":[26],"such":[27],"as":[28],"industrial":[29],"monitoring,":[30],"finance,":[31],"and":[32,58,81,102,137,146,165,170,178],"cybersecurity.":[33],"Proactive":[34],"detection,":[36],"by":[37],"contrast,":[38],"aims":[39],"detect":[41],"early":[42,127],"warning":[43],"signals":[44],"before":[45],"failures":[46],"fully":[47],"manifest,":[48],"but":[49],"existing":[50],"methods":[51],"struggle":[52],"with":[53],"handling":[54],"heterogeneous":[55],"multivariate":[56,148],"data":[57],"maintaining":[59],"precision":[60],"under":[61],"noisy":[62],"or":[63],"unpredictable":[64],"conditions.":[65],"In":[66],"this":[67],"work,":[68],"we":[69],"introduce":[70],"two":[71],"proactive":[72,198],"frameworks:":[75],"the":[76,82,181],"Forward":[77],"Forecasting":[78],"Model":[79,85],"(FFM)":[80],"Backward":[83],"Reconstruction":[84],"(BRM).":[86],"Both":[87],"models":[88,142],"leverage":[89],"a":[90],"hybrid":[91],"architecture":[92],"combining":[93],"Temporal":[94],"Convolutional":[95],"Networks":[96],"(TCNs),":[97],"Gated":[98],"Recurrent":[99],"Units":[100],"(GRUs),":[101],"Transformer":[103],"encoders":[104],"model":[106],"directional":[107,138],"temporal":[108],"dynamics.":[109],"FFM":[110,169],"forecasts":[111],"future":[112,123],"sequences":[113],"anticipate":[115],"disruptions,":[116],"while":[117],"BRM":[118,171],"reconstructs":[119],"recent":[120],"history":[121],"from":[122],"context":[124],"uncover":[126],"precursors.":[128],"Anomalies":[129],"flagged":[131],"forecasting":[134],"error":[135],"magnitudes":[136],"embedding":[139],"discrepancies.":[140],"Our":[141],"support":[143],"both":[144],"continuous":[145],"discrete":[147],"features,":[149],"enabling":[150],"robust":[151],"performance":[152],"real-world":[154],"settings.":[155],"Extensive":[156],"experiments":[157],"four":[159],"benchmark":[160],"datasets,":[161],"MSL,":[162],"SMAP,":[163],"SMD,":[164],"PSM,":[166],"demonstrate":[167],"outperform":[172],"state-of-the-art":[173],"baselines":[174],"across":[175],"metrics":[177],"significantly":[179],"improve":[180],"timeliness":[182],"of":[183],"anticipation.":[185],"These":[186],"properties":[187],"make":[188],"our":[189],"approach":[190],"well-suited":[191],"for":[192],"deployment":[193],"time-sensitive":[195],"domains":[196],"requiring":[197],"monitoring.":[199]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-14T00:00:00"}
