{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T16:49:29Z","timestamp":1778258969030,"version":"3.51.4"},"publisher-location":"Cham","reference-count":50,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031730092","type":"print"},{"value":"9783031730108","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T00:00:00Z","timestamp":1731196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73010-8_13","type":"book-chapter","created":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T13:11:34Z","timestamp":1731157894000},"page":"210-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Few-Shot Anomaly-Driven Generation for\u00a0Anomaly Classification and\u00a0Segmentation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-5774-2555","authenticated-orcid":false,"given":"Guan","family":"Gui","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2572-8156","authenticated-orcid":false,"given":"Bin-Bin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4216-8090","authenticated-orcid":false,"given":"Chengjie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yunsheng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,10]]},"reference":[{"key":"13_CR1","unstructured":"Ahuja, N.A., Ndiour, I., Kalyanpur, T., Tickoo, O.: Probabilistic modeling of deep features for out-of-distribution and adversarial detection. In: NeurIPSW (2019)"},{"key":"13_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-031-53767-7_10","volume-title":"MICCAI 2023","author":"M Akrout","year":"2023","unstructured":"Akrout, M., et al.: Diffusion-based data augmentation for skin disease classification: impact across original medical datasets to fully synthetic images. In: Mukhopadhyay, A., Oksuz, I., Engelhardt, S., Zhu, D., Yuan, Y. (eds.) MICCAI 2023. LNCS, vol. 14533, pp. 99\u2013109. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-53767-7_10"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Avrahami, O., Fried, O., Lischinski, D.: Blended latent diffusion. In: CVPR (2022)","DOI":"10.1145\/3592450"},{"key":"13_CR4","unstructured":"Azizi, S., Kornblith, S., Saharia, C., Norouzi, M., Fleet, D.J.: Synthetic data from diffusion models improves imagenet classification. In: TMLR (2023)"},{"key":"13_CR5","unstructured":"Balaji, Y., et\u00a0al.: ediff-i: text-to-image diffusion models with an ensemble of expert denoisers. arXiv:2211.01324 (2022)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD: a comprehensive real-world dataset for unsupervised anomaly detection. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Chai, S., Zhuang, L., Yan, F.: Layoutdm: transformer-based diffusion model for layout generation. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.01760"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Choi, J., Kim, S., Jeong, Y., Gwon, Y., Yoon, S.: ILVR: conditioning method for denoising diffusion probabilistic models. In: ICCV (2021)","DOI":"10.1109\/ICCV48922.2021.01410"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Cimpoi, M., Maji, S., Kokkinos, I., Mohamed, S., Vedaldi, A.: Describing textures in the wild. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.461"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Davis, J., Goadrich, M.: The relationship between precision-recall and roc curves. In: ICML (2006)","DOI":"10.1145\/1143844.1143874"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: Padim: a patch distribution modeling framework for anomaly detection and localization. In: ICPR (2021)","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X.: Anomaly detection via reverse distillation from one-class embedding. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"13_CR13","unstructured":"Dhariwal, P., Nichol, A.: Diffusion models beat GANs on image synthesis. In: NeurIPS (2021)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Duan, Y., Hong, Y., Niu, L., Zhang, L.: Few-shot defect image generation via defect-aware feature manipulation. In: AAAI (2023)","DOI":"10.1609\/aaai.v37i1.25132"},{"key":"13_CR15","unstructured":"Gal, R., et al.: An image is worth one word: personalizing text-to-image generation using textual inversion. In: ICLR (2023)"},{"key":"13_CR16","unstructured":"Ho, J., Jain, A., Abbeel, P.: Denoising diffusion probabilistic models. In: NeurIPS (2020)"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Hu, T., et al.: Anomalydiffusion: few-shot anomaly image generation with diffusion model. In: AAAI (2024)","DOI":"10.1609\/aaai.v38i8.28696"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Kawar, B., et al.: Imagic: text-based real image editing with diffusion models. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.00582"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Lee, S., Lee, S., Song, B.C.: CFA: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10 (2022)","DOI":"10.1109\/ACCESS.2022.3193699"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Li, C.L., Sohn, K., Yoon, J., Pfister, T.: Cutpaste: self-supervised learning for anomaly detection and localization. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., et al.: GLIGEN: open-set grounded text-to-image generation. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.02156"},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Liu, X., et al.: More control for free! image synthesis with semantic diffusion guidance. In: WACV (2023)","DOI":"10.1109\/WACV56688.2023.00037"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhou, Y., Xu, Y., Wang, Z.: Simplenet: a simple network for image anomaly detection and localization. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Lugmayr, A., Danelljan, M., Romero, A., Yu, F., Timofte, R., Van\u00a0Gool, L.: Repaint: inpainting using denoising diffusion probabilistic models. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"13_CR26","unstructured":"Meng, C., et al.: Sdedit: guided image synthesis and editing with stochastic differential equations. In: ECCV (2021)"},{"key":"13_CR27","unstructured":"Mou, S., et al.: RGI: robust GAN-inversion for mask-free image inpainting and unsupervised pixel-wise anomaly detection. In: ICLR (2022)"},{"key":"13_CR28","unstructured":"Nichol, A., et al.: Glide: towards photorealistic image generation and editing with text-guided diffusion models. In: ICML (2021)"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Pan, Z., Yu, W., Yi, X., Khan, A., Yuan, F., Zheng, Y.: Recent progress on generative adversarial networks (GANS): a survey. IEEE Access 7 (2019)","DOI":"10.1109\/ACCESS.2019.2905015"},{"key":"13_CR30","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: ICML (2021)"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Reiss, T., Cohen, N., Bergman, L., Hoshen, Y.: Panda: adapting pretrained features for anomaly detection and segmentation. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"13_CR32","doi-asserted-by":"crossref","unstructured":"Ristea, N.C., et al.: Self-supervised predictive convolutional attentive block for anomaly detection. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01321"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: CVPR (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"13_CR34","doi-asserted-by":"crossref","unstructured":"Rother, C., Kolmogorov, V., Blake, A.: \u201cGrabCut\u201d interactive foreground extraction using iterated graph cuts. TOG 23(3) (2004)","DOI":"10.1145\/1015706.1015720"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wehrbein, T., Rosenhahn, B., Wandt, B.: Fully convolutional cross-scale-flows for image-based defect detection. In: WACV (2022)","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"Ruiz, N., Li, Y., Jampani, V., Pritch, Y., Rubinstein, M., Aberman, K.: Dreambooth: fine tuning text-to-image diffusion models for subject-driven generation. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"13_CR37","unstructured":"Saharia, C., et\u00a0al.: Photorealistic text-to-image diffusion models with deep language understanding. In: NeurIPS (2022)"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: IPMI (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Shi, J., Xiong, W., Lin, Z., Jung, H.J.: Instantbooth: personalized text-to-image generation without test-time finetuning. In: CVPR (2024)","DOI":"10.1109\/CVPR52733.2024.00816"},{"key":"13_CR40","unstructured":"Singh, V., Jandial, S., Chopra, A., Ramesh, S., Krishnamurthy, B., Balasubramanian, V.N.: On conditioning the input noise for controlled image generation with diffusion models. In: CVPRW (2022)"},{"key":"13_CR41","unstructured":"Trabucco, B., Doherty, K., Gurinas, M., Salakhutdinov, R.: Effective data augmentation with diffusion models. arXiv preprint arXiv:2302.07944 (2023)"},{"key":"13_CR42","doi-asserted-by":"crossref","unstructured":"Wang, T.C., Liu, M.Y., Zhu, J.Y., Tao, A., Kautz, J., Catanzaro, B.: High-resolution image synthesis and semantic manipulation with conditional GANs. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00917"},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yao, Q., Kwok, J.T., Ni, L.M.: Generalizing from a few examples: a survey on few-shot learning. ACM Comput. Surv. 53(3) (2020)","DOI":"10.1145\/3386252"},{"key":"13_CR44","doi-asserted-by":"crossref","unstructured":"Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. TIP 13(4) (2004)","DOI":"10.1109\/TIP.2003.819861"},{"key":"13_CR45","doi-asserted-by":"crossref","unstructured":"Yang, L., et al.: Diffusion models: a comprehensive survey of methods and applications. ACM Comput. Surv. 56(4) (2023)","DOI":"10.1145\/3626235"},{"key":"13_CR46","unstructured":"You, Z., et al.: A unified model for multi-class anomaly detection. In: NeurIPS (2022)"},{"key":"13_CR47","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: ICCV (2021)","DOI":"10.1016\/j.patcog.2020.107706"},{"key":"13_CR48","doi-asserted-by":"publisher","first-page":"107706","DOI":"10.1016\/j.patcog.2020.107706","volume":"112","author":"V Zavrtanik","year":"2021","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Reconstruction by inpainting for visual anomaly detection. Pattern Recogn. 112, 107706 (2021)","journal-title":"Pattern Recogn."},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, S., Li, X., Huang, P., Shan, J., Chen, T.: Destseg: segmentation guided denoising student-teacher for anomaly detection. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.00381"},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Zhou, Z.H.: A brief introduction to weakly supervised learning. Nat. Sci. Rev. 5(1) (2018)","DOI":"10.1093\/nsr\/nwx106"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73010-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,9]],"date-time":"2024-11-09T14:05:00Z","timestamp":1731161100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73010-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,10]]},"ISBN":["9783031730092","9783031730108"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73010-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,10]]},"assertion":[{"value":"10 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}