{"id":"https://openalex.org/W7151744510","doi":"https://doi.org/10.48550/arxiv.2604.05335","title":"Cross-Machine Anomaly Detection Leveraging Pre-trained Time-series Model","display_name":"Cross-Machine Anomaly Detection Leveraging Pre-trained Time-series Model","publication_year":2026,"publication_date":"2026-04-07","ids":{"openalex":"https://openalex.org/W7151744510","doi":"https://doi.org/10.48550/arxiv.2604.05335"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.05335","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05335","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.05335","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028188775","display_name":"Yangmeng Li","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Yangmeng","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133154828","display_name":"Kei Sano","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sano, Kei","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022737301","display_name":"Toshihiro Kitao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kitao, Toshihiro","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089827151","display_name":"Ryoji Anzaki","orcid":"https://orcid.org/0000-0002-6395-8799"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anzaki, Ryoji","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133177162","display_name":"Yukiya Saitoh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Saitoh, Yukiya","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025039861","display_name":"Hironori Moki","orcid":"https://orcid.org/0009-0006-6476-3359"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Moki, Hironori","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5027265649","display_name":"Dragan Djurdjanovi\u0107","orcid":"https://orcid.org/0000-0002-9080-818X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Djurdjanovic, Dragan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5028188775"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.967199981212616,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.008999999612569809,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.005100000184029341,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8589000105857849},{"id":"https://openalex.org/keywords/extractor","display_name":"Extractor","score":0.5770000219345093},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5022000074386597},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4383000135421753},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.423799991607666},{"id":"https://openalex.org/keywords/feature-extraction","display_name":"Feature extraction","score":0.39910000562667847}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8589000105857849},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6991000175476074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.590499997138977},{"id":"https://openalex.org/C117978034","wikidata":"https://www.wikidata.org/wiki/Q5422192","display_name":"Extractor","level":2,"score":0.5770000219345093},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5022000074386597},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.45829999446868896},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4440999925136566},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4383000135421753},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.423799991607666},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.39910000562667847},{"id":"https://openalex.org/C190470478","wikidata":"https://www.wikidata.org/wiki/Q2370229","display_name":"Invariant (physics)","level":2,"score":0.35179999470710754},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.3240000009536743},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.05335","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05335","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.05335","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.05335","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Achieving":[0],"resilient":[1],"and":[2,28,94,150],"high-quality":[3],"manufacturing":[4],"requires":[5],"reliable":[6],"data-driven":[7],"anomaly":[8,62,74,117],"detection":[9,63,75],"methods":[10],"that":[11,65,142],"are":[12,24,29,104],"capable":[13],"of":[14,38],"addressing":[15],"differences":[16,107],"in":[17,41,157],"behaviors":[18],"among":[19],"different":[20,49,134],"individual":[21,50,109],"machines":[22,51,135],"which":[23,103],"nominally":[25,137],"the":[26,31,36,53,78,83,98,115,138,143,148],"same":[27,32,54,139],"executing":[30,52],"processes.":[33],"To":[34],"address":[35],"problem":[37],"detecting":[39],"anomalies":[40],"a":[42,59,67],"machine":[43],"using":[44],"sensory":[45],"data":[46],"gathered":[47],"from":[48,132],"procedure,":[55],"this":[56],"paper":[57],"proposes":[58],"cross-machine":[60,159],"time-series":[61],"framework":[64],"integrates":[66],"domain-invariant":[68],"feature":[69,152],"extractor":[70,84],"with":[71,97],"an":[72,128],"unsupervised":[73],"module.":[76],"Leveraging":[77],"pre-trained":[79],"foundation":[80],"model":[81],"MOMENT,":[82],"employs":[85],"Random":[86],"Forest":[87],"Classifiers":[88],"to":[89,106,119,122],"disentangle":[90],"embeddings":[91],"into":[92],"machine-related":[93],"condition-related":[95],"features,":[96],"latter":[99],"serving":[100],"as":[101],"representations":[102],"invariant":[105],"between":[108],"machines.":[110,125],"These":[111],"refined":[112],"features":[113],"enable":[114],"downstream":[116],"detectors":[118],"generalize":[120],"effectively":[121],"unseen":[123],"target":[124],"Experiments":[126],"on":[127],"industrial":[129],"dataset":[130],"collected":[131],"three":[133],"performing":[136],"operation":[140],"demonstrate":[141],"proposed":[144],"approach":[145],"outperforms":[146],"both":[147],"raw-signal-based":[149],"MOMENT-embedding":[151],"baselines,":[153],"confirming":[154],"its":[155],"effectiveness":[156],"enhancing":[158],"generalization.":[160]},"counts_by_year":[],"updated_date":"2026-04-09T06:13:59.934233","created_date":"2026-04-09T00:00:00"}
