{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:40:02Z","timestamp":1771954802255,"version":"3.50.1"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031730122","type":"print"},{"value":"9783031730139","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73013-9_20","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T07:47:38Z","timestamp":1732607258000},"page":"345-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["MoEAD: A Parameter-Efficient Model for\u00a0Multi-class Anomaly Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-7909-7202","authenticated-orcid":false,"given":"Shiyuan","family":"Meng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7038-5896","authenticated-orcid":false,"given":"Wenchao","family":"Meng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-3844-7485","authenticated-orcid":false,"given":"Qihang","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4429-3549","authenticated-orcid":false,"given":"Shizhong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6742-4838","authenticated-orcid":false,"given":"Weiye","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Shibo","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/978-3-319-46478-7_32","volume-title":"Computer Vision \u2013 ECCV 2016","author":"K Ahmed","year":"2016","unstructured":"Ahmed, K., Baig, M.H., Torresani, L.: Network of experts for large-scale image categorization. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 516\u2013532. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_32"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39593-2_1","volume-title":"Statistical Language and Speech Processing","author":"Y Bengio","year":"2013","unstructured":"Bengio, Y.: Deep learning of representations: looking forward. In: Dediu, A.-H., Mart\u00edn-Vide, C., Mitkov, R., Truthe, B. (eds.) SLSP 2013. LNCS (LNAI), vol. 7978, pp. 1\u201337. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39593-2_1"},{"key":"20_CR3","unstructured":"Bengio, Y., Yao, L., Alain, G., Vincent, P.: Generalized denoising auto-encoders as generative models. In: Advances in Neural Information Processing Systems, vol. 26 (2013)"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD\u2013a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192 (2020)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 213\u2013229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"key":"20_CR7","unstructured":"Dehghani, M., Gouws, S., Vinyals, O., Uszkoreit, J., Kaiser, L.: Universal transformers. In: International Conference on Learning Representations (2018)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X.: Anomaly detection via reverse distillation from one-class embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9737\u20139746 (2022)","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"20_CR9","unstructured":"Dosovitskiy, A., et\u00a0al.: An image is worth $$16 \\times 16$$ words: transformers for image recognition at scale. In: International Conference on Learning Representations (2020)"},{"key":"20_CR10","unstructured":"Du, N., et\u00a0al.: Glam: efficient scaling of language models with mixture-of-experts. In: International Conference on Machine Learning, pp. 5547\u20135569. PMLR (2022)"},{"key":"20_CR11","unstructured":"Eigen, D., Ranzato, M., Sutskever, I.: Learning factored representations in a deep mixture of experts. arXiv preprint arXiv:1312.4314 (2013)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Esmaeilpour, S., Liu, B., Robertson, E., Shu, L.: Zero-shot out-of-distribution detection based on the pre-trained model clip. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 6568\u20136576 (2022)","DOI":"10.1609\/aaai.v36i6.20610"},{"issue":"1","key":"20_CR13","first-page":"5232","volume":"23","author":"W Fedus","year":"2022","unstructured":"Fedus, W., Zoph, B., Shazeer, N.: Switch transformers: scaling to trillion parameter models with simple and efficient sparsity. J. Mach. Learn. Res. 23(1), 5232\u20135270 (2022)","journal-title":"J. Mach. Learn. Res."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Gross, S., Ranzato, M., Szlam, A.: Hard mixtures of experts for large scale weakly supervised vision. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6865\u20136873 (2017)","DOI":"10.1109\/CVPR.2017.540"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"He, H., et al.: A diffusion-based framework for multi-class anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 8472\u20138480 (2024)","DOI":"10.1609\/aaai.v38i8.28690"},{"key":"20_CR17","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-031-20053-3_18","volume-title":"ECCV 2022","author":"C Huang","year":"2022","unstructured":"Huang, C., Guan, H., Jiang, A., Zhang, Y., Spratling, M., Wang, Y.F.: Registration based few-shot anomaly detection. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13684, pp. 303\u2013319. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-20053-3_18"},{"issue":"1","key":"20_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1162\/neco.1991.3.1.79","volume":"3","author":"RA Jacobs","year":"1991","unstructured":"Jacobs, R.A., Jordan, M.I., Nowlan, S.J., Hinton, G.E.: Adaptive mixtures of local experts. Neural Comput. 3(1), 79\u201387 (1991)","journal-title":"Neural Comput."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, J., Zou, Y., Kim, T., Zhang, D., Ravichandran, A., Dabeer, O.: Winclip: Zero-\/few-shot anomaly classification and segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 19606\u201319616 (2023)","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"20_CR20","unstructured":"Lan, Z., Chen, M., Goodman, S., Gimpel, K., Sharma, P., Soricut, R.: Albert: a lite BERT for self-supervised learning of language representations. arXiv preprint arXiv:1909.11942 (2019)"},{"key":"20_CR21","unstructured":"Lepikhin, D., et al.: Gshard: scaling giant models with conditional computation and automatic sharding. In: International Conference on Learning Representations (2020)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Li, C.L., Sohn, K., Yoon, J., Pfister, T.: Cutpaste: self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664\u20139674 (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Liang, Y., Zhang, J., Zhao, S., Wu, R., Liu, Y., Pan, S.: Omni-frequency channel-selection representations for unsupervised anomaly detection. IEEE Trans. Image Process. (2023)","DOI":"10.1109\/TIP.2023.3293772"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhou, Y., Xu, Y., Wang, Z.: Simplenet: a simple network for image anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20402\u201320411 (2023)","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"20_CR25","unstructured":"Loshchilov, I., Hutter, F.: Decoupled weight decay regularization. In: International Conference on Learning Representations (2018)"},{"key":"20_CR26","unstructured":"Lu, R., Wu, Y., Tian, L., Wang, D., Chen, B., Liu, X., Hu, R.: Hierarchical vector quantized transformer for multi-class unsupervised anomaly detection. In: Advances in Neural Information Processing Systems, vol. 36 (2024)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Mishra, P., Verk, R., Fornasier, D., Piciarelli, C., Foresti, G.L.: VT-ADL: a vision transformer network for image anomaly detection and localization. In: 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE), pp. 01\u201306. IEEE (2021)","DOI":"10.1109\/ISIE45552.2021.9576231"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Pavlitskaya, S., et al.: Using mixture of expert models to gain insights into semantic segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 342\u2013343 (2020)","DOI":"10.1109\/CVPRW50498.2020.00179"},{"key":"20_CR29","unstructured":"Riquelme, C., et al.: Scaling vision with sparse mixture of experts. In: Advances in Neural Information Processing Systems, vol. 34, pp. 8583\u20138595 (2021)"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"20_CR31","unstructured":"Shazeer, N., et al.: Outrageously large neural networks: the sparsely-gated mixture-of-experts layer. In: International Conference on Learning Representations (2016)"},{"key":"20_CR32","unstructured":"Tan, M., Le, Q.: EfficientNet: rethinking model scaling for convolutional neural networks. In: International Conference on Machine Learning, pp. 6105\u20136114. PMLR (2019)"},{"key":"20_CR33","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"20_CR34","doi-asserted-by":"crossref","unstructured":"Xue, F., Shi, Z., Wei, F., Lou, Y., Liu, Y., You, Y.: Go wider instead of deeper. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a036, pp. 8779\u20138787 (2022)","DOI":"10.1609\/aaai.v36i8.20858"},{"key":"20_CR35","unstructured":"You, Z., et al.: A unified model for multi-class anomaly detection. In: Advances in Neural Information Processing Systems, vol. 35, pp. 4571\u20134584 (2022)"},{"key":"20_CR36","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-031-30111-7_26","volume-title":"ICONIP 2022","author":"Z You","year":"2023","unstructured":"You, Z., Yang, K., Luo, W., Cui, L., Zheng, Y., Le, X.: ADTR: anomaly detection transformer with feature reconstruction. In: Tanveer, M., Agarwal, S., Ozawa, S., Ekbal, A., Jatowt, A. (eds.) ICONIP 2022. LNCS, vol. 13625, pp. 298\u2013310. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30111-7_26"},{"key":"20_CR37","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"20_CR38","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-031-19821-2_31","volume-title":"ECCV 2022","author":"V Zavrtanik","year":"2022","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: DSR \u2013 a dual subspace re-projection network for surface anomaly detection. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13691, pp. 539\u2013554. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-19821-2_31"},{"key":"20_CR39","doi-asserted-by":"crossref","unstructured":"Zhao, Y.: Omnial: a unified CNN framework for unsupervised anomaly localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 3924\u20133933 (2023)","DOI":"10.1109\/CVPR52729.2023.00382"},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Zhou, Q., He, S., Liu, H., Chen, T., Chen, J.: Pull & push: leveraging differential knowledge distillation for efficient unsupervised anomaly detection and localization. IEEE Trans. Circuits Syst. Video Technol. (2022)","DOI":"10.1109\/TCSVT.2022.3218587"},{"key":"20_CR41","unstructured":"Zhou, Q., Pang, G., Tian, Y., He, S., Chen, J.: Anomalyclip: object-agnostic prompt learning for zero-shot anomaly detection. In: The Twelfth International Conference on Learning Representations (2023)"},{"key":"20_CR42","series-title":"LNCS","first-page":"392","volume-title":"ECCV 2022","author":"Y Zou","year":"2022","unstructured":"Zou, Y., Jeong, J., Pemula, L., Zhang, D., Dabeer, O.: SPot-the-difference self-supervised pre-training for anomaly detection and segmentation. In: Avidan, S., Brostow, G., Ciss\u00e9, M., Farinella, G.M., Hassner, T. (eds.) ECCV 2022. LNCS, vol. 13690, pp. 392\u2013408. Springer, Cham (2022)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73013-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T08:31:29Z","timestamp":1732609889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73013-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9783031730122","9783031730139"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73013-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}