{"id":"https://openalex.org/W7133559368","doi":"https://doi.org/10.48550/arxiv.2603.02964","title":"Improving Anomaly Detection with Foundation-Model Synthesis and Wavelet-Domain Attention","display_name":"Improving Anomaly Detection with Foundation-Model Synthesis and Wavelet-Domain Attention","publication_year":2026,"publication_date":"2026-03-03","ids":{"openalex":"https://openalex.org/W7133559368","doi":"https://doi.org/10.48550/arxiv.2603.02964"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.02964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.02964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.02964","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065356319","display_name":"Wensheng Wu","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wu, Wensheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128097562","display_name":"Zheming Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lu, Zheming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128119260","display_name":"Ziqian Lu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lu, Ziqian","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128121885","display_name":"Zewei He","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"He, Zewei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Sun, Xuecheng","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sun, Xuecheng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5128056965","display_name":"Zhao Wang (145195)","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Han, Jungong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Han, Jungong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5128109217","display_name":"Yunlong Yu","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu, Yunlong","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5065356319"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.0035000001080334187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12535","display_name":"Machine Learning and Data Classification","score":0.0027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7773000001907349},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6452000141143799},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6166999936103821},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5374000072479248},{"id":"https://openalex.org/keywords/pipeline","display_name":"Pipeline (software)","score":0.5252000093460083},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4986000061035156}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7773000001907349},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6618000268936157},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6452000141143799},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6166999936103821},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5374000072479248},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.5252000093460083},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4986000061035156},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.48590001463890076},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45680001378059387},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41179999709129333},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3634999990463257},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.35510000586509705},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.265500009059906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.02964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.02964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.02964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.02964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.557191014289856,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"anomaly":[1,27,64,75],"detection":[2,76],"faces":[3],"significant":[4],"challenges":[5],"due":[6],"to":[7,62],"the":[8,14,44],"scarcity":[9],"of":[10,16,48,69],"anomalous":[11,35],"samples":[12,36],"and":[13,71,87],"complexity":[15],"real-world":[17],"anomalies.":[18],"In":[19],"this":[20],"paper,":[21],"we":[22,50],"propose":[23],"a":[24,94],"foundation":[25],"model-based":[26],"synthesis":[28],"pipeline":[29],"(FMAS)":[30],"that":[31,91],"generates":[32],"highly":[33],"realistic":[34],"without":[37],"fine-tuning":[38],"or":[39],"class-specific":[40],"training.":[41],"Motivated":[42],"by":[43],"distinct":[45],"frequency-domain":[46],"characteristics":[47],"anomalies,":[49],"introduce":[51],"aWavelet":[52],"Domain":[53],"Attention":[54],"Module":[55],"(WDAM),":[56],"which":[57],"exploits":[58],"adaptive":[59],"sub-band":[60],"processing":[61],"enhance":[63],"feature":[65],"extraction.":[66],"The":[67],"combination":[68],"FMAS":[70],"WDAM":[72],"significantly":[73],"improves":[74],"sensitivity":[77],"while":[78],"maintaining":[79],"computational":[80],"efficiency.":[81],"Comprehensive":[82],"experiments":[83],"on":[84],"MVTec":[85],"AD":[86],"VisA":[88],"datasets":[89],"demonstrate":[90],"WDAM,":[92],"as":[93],"plug-and-play":[95],"module,":[96],"achieves":[97],"substantial":[98],"performance":[99],"gains":[100],"against":[101],"existing":[102],"baselines.":[103]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-03-05T00:00:00"}
