Abstract: Constructing an efficient and deployable anomaly detection system requires achieving high accuracy, low latency, and reliability. Existing methods either spend considerable time extracting ...