{"id":"https://openalex.org/W7143425692","doi":"https://doi.org/10.48550/arxiv.2603.26461","title":"Neuro-Symbolic Process Anomaly Detection","display_name":"Neuro-Symbolic Process Anomaly Detection","publication_year":2026,"publication_date":"2026-03-27","ids":{"openalex":"https://openalex.org/W7143425692","doi":"https://doi.org/10.48550/arxiv.2603.26461"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.26461","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.26461","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130925734","display_name":"Devashish Gaikwad","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gaikwad, Devashish","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5130928998","display_name":"Wil M. P. van der Aalst","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"van der Aalst, Wil M. P.","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5122901952","display_name":"Gyunam Park","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Park, Gyunam","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5130925734"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.7993000149726868,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.7993000149726868,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.05979999899864197,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.026799999177455902,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8068000078201294},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6031000018119812},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.5932000279426575},{"id":"https://openalex.org/keywords/domain-knowledge","display_name":"Domain knowledge","score":0.5196999907493591},{"id":"https://openalex.org/keywords/constraint","display_name":"Constraint (computer-aided design)","score":0.5131999850273132},{"id":"https://openalex.org/keywords/encode","display_name":"ENCODE","score":0.49540001153945923},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.478300005197525},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4578000009059906}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8068000078201294},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.670799970626831},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6111999750137329},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6031000018119812},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.5932000279426575},{"id":"https://openalex.org/C207685749","wikidata":"https://www.wikidata.org/wiki/Q2088941","display_name":"Domain knowledge","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5149999856948853},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.5131999850273132},{"id":"https://openalex.org/C66746571","wikidata":"https://www.wikidata.org/wiki/Q1134833","display_name":"ENCODE","level":3,"score":0.49540001153945923},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.478300005197525},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4578000009059906},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4514000117778778},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.45089998841285706},{"id":"https://openalex.org/C120567893","wikidata":"https://www.wikidata.org/wiki/Q1582085","display_name":"Knowledge extraction","level":2,"score":0.44600000977516174},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4431999921798706},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4088999927043915},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.37959998846054077},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.36809998750686646},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3221000134944916},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.2897000014781952},{"id":"https://openalex.org/C115925183","wikidata":"https://www.wikidata.org/wiki/Q1412694","display_name":"Knowledge-based systems","level":2,"score":0.2615000009536743},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.26461","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.26461","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.26461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Process":[0],"anomaly":[1,43,124],"detection":[2,44,81,125],"is":[3,45],"an":[4],"important":[5],"application":[6],"of":[7,17,79,88,184],"process":[8,39,148],"mining":[9],"for":[10],"identifying":[11],"deviations":[12],"from":[13,32],"the":[14,77,80,86,146,182],"normal":[15],"behavior":[16],"a":[18,37,46,59,98,115,135],"process.":[19,82],"Neural":[20],"network-based":[21],"methods":[22],"have":[23,91],"recently":[24],"been":[25],"applied":[26],"to":[27,53,71,100,149],"this":[28,111],"task,":[29,49],"learning":[30,147],"directly":[31],"event":[33],"logs":[34],"without":[35],"requiring":[36],"predefined":[38],"model.":[40],"However,":[41],"since":[42],"purely":[47],"statistical":[48],"these":[50],"models":[51,133],"fail":[52],"incorporate":[54],"human":[55,190],"domain":[56,120,191],"knowledge.":[57],"As":[58],"result,":[60],"rare":[61,154],"but":[62,155],"conformant":[63,156,177],"traces":[64,178],"are":[65],"often":[66],"misclassified":[67],"as":[68,97,134,141,173,175],"anomalies":[69],"due":[70],"their":[72],"low":[73],"frequency,":[74],"which":[75],"limits":[76],"effectiveness":[78],"Recent":[83],"developments":[84],"in":[85],"field":[87],"neuro-symbolic":[89,116],"AI":[90],"introduced":[92],"Logic":[93],"Tensor":[94],"Networks":[95],"(LTN)":[96],"means":[99],"integrate":[101],"symbolic":[102],"knowledge":[103,121,192],"into":[104,122],"neural":[105,123],"networks":[106],"using":[107,126],"real-valued":[108],"logic.":[109],"In":[110],"work,":[112],"we":[113,137],"propose":[114],"approach":[117,167],"that":[118,165,181],"integrates":[119],"LTN":[127],"and":[128,153,161,180,187],"Declare":[129,139,185],"constraints.":[130],"Using":[131],"autoencoder":[132],"foundation,":[136],"encode":[138],"constraints":[140],"soft":[142],"logical":[143],"guiderails":[144],"within":[145],"distinguish":[150],"between":[151],"anomalous":[152],"behavior.":[157],"Evaluations":[158],"on":[159],"synthetic":[160],"real-world":[162],"datasets":[163],"demonstrate":[164],"our":[166],"improves":[168],"F1":[169],"scores":[170],"even":[171],"when":[172],"few":[174],"10":[176],"exist,":[179],"choice":[183],"constraint":[186],"by":[188],"extension":[189],"significantly":[193],"influences":[194],"performance":[195],"gains.":[196]},"counts_by_year":[],"updated_date":"2026-03-31T06:07:48.031334","created_date":"2026-03-31T00:00:00"}
