[2601.19102] OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection

[2601.19102] OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection

arXiv - Machine Learning 4 min read

About this article

Abstract page for arXiv paper 2601.19102: OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection

Computer Science > Machine Learning arXiv:2601.19102 (cs) [Submitted on 27 Jan 2026 (v1), last revised 26 Mar 2026 (this version, v2)] Title:OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection Authors:Lecheng Zheng, Dongqi Fu, Zihao Li, Jingrui He View a PDF of the paper titled OWLEYE: Zero-Shot Learner for Cross-Domain Graph Data Anomaly Detection, by Lecheng Zheng and 3 other authors View PDF HTML (experimental) Abstract:Graph data is informative to represent complex relationships such as transactions between accounts, communications between devices, and dependencies among machines or processes. Correspondingly, graph anomaly detection (GAD) plays a critical role in identifying anomalies across various domains, including finance, cybersecurity, manufacturing, etc. Facing the large-volume and multi-domain graph data, nascent efforts attempt to develop foundational generalist models capable of detecting anomalies in unseen graphs without retraining. To the best of our knowledge, the different feature semantics and dimensions of cross-domain graph data heavily hinder the development of the graph foundation model, leaving further in-depth continual learning and inference capabilities a quite open problem. Hence, we propose OWLEYE, a novel zero-shot GAD framework that learns transferable patterns of normal behavior from multiple graphs, with a threefold contribution. First, OWLEYE proposes a cross-domain feature alignment module to harmonize feature distri...

Originally published on March 27, 2026. Curated by AI News.

Related Articles

Llms

Nicolas Carlini (67.2k citations on Google Scholar) says Claude is a better security researcher than him, made $3.7 million from exploiting smart contracts, and found vulnerabilities in Linux and Ghost

Link: https://m.youtube.com/watch?v=1sd26pWhfmg The Linux exploit is especially interesting because it was introduced in 2003 and was nev...

Reddit - Artificial Intelligence · 1 min ·
Llms

[P] I built an autonomous ML agent that runs experiments on tabular data indefinitely - inspired by Karpathy's AutoResearch

Inspired by Andrej Karpathy's AutoResearch, I built a system where Claude Code acts as an autonomous ML researcher on tabular binary clas...

Reddit - Machine Learning · 1 min ·
Machine Learning

[D] Data curation and targeted replacement as a pre-training alignment and controllability method

Hi, r/MachineLearning: has much research been done in large-scale training scenarios where undesirable data has been replaced before trai...

Reddit - Machine Learning · 1 min ·

[P] Implemented TurboQuant in Python

Spent ~2 days implementing this paper: TurboQuant: Online Vector Quantization with Near-optimal Distortion Rate Repo: github.com/yashkc20...

Reddit - Machine Learning · 1 min ·

No comments

No comments yet. Be the first to comment!

Stay updated with AI News

Get the latest news, tools, and insights delivered to your inbox.

Daily or weekly digest • Unsubscribe anytime