{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:33:30Z","timestamp":1770744810026,"version":"3.49.0"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031732010","type":"print"},{"value":"9783031732027","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73202-7_22","type":"book-chapter","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T14:18:07Z","timestamp":1732112287000},"page":"377-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Dissolving is Amplifying: Towards Fine-Grained Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Jian","family":"Shi","sequence":"first","affiliation":[]},{"given":"Pengyi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ni","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hakim","family":"Ghazzai","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Wonka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,21]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision \u2013 ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11363, pp. 622\u2013637. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: Skip-GANomaly: skip connected and adversarially trained encoder-decoder anomaly detection. In: 2019 International Joint Conference on Neural Networks (IJCNN). IEEE (2019)","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Batzner, K., Heckler, L., K\u00f6nig, R.: Efficientad: accurate visual anomaly detection at millisecond-level latencies. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 128\u2013138 (2024)","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"22_CR4","unstructured":"Brock, A., Donahue, J., Simonyan, K.: Large scale gan training for high fidelity natural image synthesis. arXiv preprint arXiv:1809.11096 (2018)"},{"key":"22_CR5","unstructured":"Caron, M., Misra, I., Mairal, J., Goyal, P., Bojanowski, P., Joulin, A.: Unsupervised learning of visual features by contrasting cluster assignments. In: Proceedings of Advances in Neural Information Processing Systems (NeurIPS) (2020)"},{"key":"22_CR6","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. arXiv preprint arXiv:1901.03407 (2019)"},{"key":"22_CR7","unstructured":"Chen, T., Kornblith, S., Norouzi, M., Hinton, G.: A simple framework for contrastive learning of visual representations. In: International Conference on Machine Learning, pp. 1597\u20131607. PMLR (2020)"},{"key":"22_CR8","unstructured":"Chen, T., Kornblith, S., Swersky, K., Norouzi, M., Hinton, G.: Big self-supervised models are strong semi-supervised learners. arXiv preprint arXiv:2006.10029 (2020)"},{"key":"22_CR9","unstructured":"Chen, X., Fan, H., Girshick, R., He, K.: Improved baselines with momentum contrastive learning. arXiv preprint arXiv:2003.04297 (2020)"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Chen, X., He, K.: Exploring simple siamese representation learning. In: 2021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.01549","DOI":"10.1109\/cvpr46437.2021.01549"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhou, X.S., Huang, T.S.: One-class svm for learning in image retrieval. In: Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), vol.\u00a01, pp. 34\u201337. IEEE (2001)","DOI":"10.1109\/ICIP.2001.958946"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Cheng, H., Liu, H., Gao, F., Chen, Z.: ADGAN: a scalable GAN-based architecture for image anomaly detection. In: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE (2020). https:\/\/doi.org\/10.1109\/itnec48623.2020.9085163","DOI":"10.1109\/itnec48623.2020.9085163"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Cho, H., Seol, J., Lee, S.G.: Masked contrastive learning for anomaly detection. In: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization (2021). https:\/\/doi.org\/10.24963\/ijcai.2021\/198","DOI":"10.24963\/ijcai.2021\/198"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Cohen, M.J., Avidan, S.: Transformaly - two (feature spaces) are better than one. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 4060\u20134069 (2022)","DOI":"10.1109\/CVPRW56347.2022.00451"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X.: Anomaly detection via reverse distillation from one-class embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9737\u20139746 (2022)","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"22_CR16","unstructured":"Dosovitskiy, A., Springenberg, J.T., Riedmiller, M., Brox, T.: Discriminative unsupervised feature learning with convolutional neural networks. In: Proceedings of the 27th International Conference on Neural Information Processing Systems, NIPS 2014, vol. 1, p. 766\u2013774. MIT Press (2014)"},{"key":"22_CR17","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.neucom.2018.09.013","volume":"321","author":"M Frid-Adar","year":"2018","unstructured":"Frid-Adar, M., Diamant, I., Klang, E., Amitai, M., Goldberger, J., Greenspan, H.: Gan-based synthetic medical image augmentation for increased cnn performance in liver lesion classification. Neurocomputing 321, 321\u2013331 (2018)","journal-title":"Neurocomputing"},{"key":"22_CR18","unstructured":"Golan, I., El-Yaniv, R.: Deep anomaly detection using geometric transformations. In: Proceedings of Advances in Neural Information Processing Systems (NeurIPS) (2018)"},{"key":"22_CR19","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (hbos): a fast unsupervised anomaly detection algorithm. KI-2012: Poster Demo Track 1, 59\u201363 (2012)"},{"key":"22_CR20","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems, vol.\u00a027. Curran Associates, Inc. (2014)"},{"key":"22_CR21","unstructured":"Grill, J.B., et al.: Bootstrap your own latent: a new approach to self-supervised learning (2020)"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Gudovskiy, D., Ishizaka, S., Kozuka, K.: Cflow-ad: real-time unsupervised anomaly detection with localization via conditional normalizing flows. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 98\u2013107 (2022)","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Han, C., et al.: Gan-based synthetic brain mr image generation. In: 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018), pp. 734\u2013738. IEEE (2018)","DOI":"10.1109\/ISBI.2018.8363678"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"He, K., Fan, H., Wu, Y., Xie, S., Girshick, R.: Momentum contrast for unsupervised visual representation learning. arXiv preprint arXiv:1911.05722 (2019)","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"22_CR25","doi-asserted-by":"publisher","first-page":"9375","DOI":"10.1109\/ACCESS.2017.2788044","volume":"6","author":"J Ker","year":"2017","unstructured":"Ker, J., Wang, L., Rao, J., Lim, T.: Deep learning applications in medical image analysis. IEEE Access 6, 9375\u20139389 (2017)","journal-title":"IEEE Access"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","volume":"10","author":"S Lee","year":"2022","unstructured":"Lee, S., Lee, S., Song, B.C.: CFA: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10, 78446\u201378454 (2022)","journal-title":"IEEE Access"},{"key":"22_CR27","unstructured":"Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders. In: International Conference on Learning Representations (2016). arXiv:1511.05644v2"},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"44259","DOI":"10.1109\/ACCESS.2022.3169594","volume":"10","author":"H Murase","year":"2022","unstructured":"Murase, H., Fukumizu, K.: Algan: anomaly detection by generating pseudo anomalous data via latent variables. IEEE Access 10, 44259\u201344270 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3169594","journal-title":"IEEE Access"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"Musa, T.H.A., Bouras, A.: Anomaly detection: a survey. In: Proceedings of Sixth International Congress on Information and Communication Technology, pp. 391\u2013401. Springer Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-2102-4_36","DOI":"10.1007\/978-981-16-2102-4_36"},{"issue":"2","key":"22_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Van Den Hengel, A.: Deep learning for anomaly detection. ACM Comput. Surv. 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv."},{"key":"22_CR31","unstructured":"Pang, G., Shen, C., Jin, H., van\u00a0den Hengel, A.: Deep weakly-supervised anomaly detection (2019)"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Pourreza, M., Mohammadi, B., Khaki, M., Bouindour, S., Snoussi, H., Sabokrou, M.: G2d: generate to detect anomaly. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 2003\u20132012 (2021)","DOI":"10.1109\/WACV48630.2021.00205"},{"key":"22_CR33","doi-asserted-by":"publisher","unstructured":"Rani, B.J.B.: Survey on applying GAN for anomaly detection. In: 2020 International Conference on Computer Communication and Informatics (ICCCI). IEEE (2020). https:\/\/doi.org\/10.1109\/iccci48352.2020.9104046","DOI":"10.1109\/iccci48352.2020.9104046"},{"key":"22_CR34","unstructured":"Reiss, T., Hoshen, Y.: Mean-shifted contrastive loss for anomaly detection. arXiv preprint arXiv:2106.03844 (2021)"},{"key":"22_CR35","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"22_CR36","unstructured":"Ruff, L., et al.: Deep one-class classification. In: Proceedings of the 35th International Conference on Machine Learning, vol.\u00a080, pp. 4393\u20134402 (2018)"},{"key":"22_CR37","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Khalooei, M., Fathy, M., Adeli, E.: Adversarially learned one-class classifier for novelty detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3379\u20133388 (2018)","DOI":"10.1109\/CVPR.2018.00356"},{"key":"22_CR38","doi-asserted-by":"crossref","unstructured":"Salehi, M., Sadjadi, N., Baselizadeh, S., Rohban, M.H., Rabiee, H.R.: Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14902\u201314912 (2021)","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"22_CR39","doi-asserted-by":"crossref","unstructured":"Salehinejad, H., Valaee, S., Dowdell, T., Colak, E., Barfett, J.: Generalization of deep neural networks for chest pathology classification in x-rays using generative adversarial networks. In: 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 990\u2013994. IEEE (2018)","DOI":"10.1109\/ICASSP.2018.8461430"},{"key":"22_CR40","doi-asserted-by":"crossref","unstructured":"Salem, M., Taheri, S., Yuan, J.S.: Anomaly generation using generative adversarial networks in host-based intrusion detection. In: 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 683\u2013687. IEEE (2018)","DOI":"10.1109\/UEMCON.2018.8796769"},{"key":"22_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., et al. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"22_CR42","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"22_CR43","doi-asserted-by":"crossref","unstructured":"Shekarizadeh, S., Rastgoo, R., Al-Kuwari, S., Sabokrou, M.: Deep-disaster: unsupervised disaster detection and localization using visual data (2022)","DOI":"10.1109\/ICPR56361.2022.9956722"},{"key":"22_CR44","first-page":"11839","volume":"33","author":"J Tack","year":"2020","unstructured":"Tack, J., Mo, S., Jeong, J., Shin, J.: CSI: novelty detection via contrastive learning on distributionally shifted instances. Adv. Neural. Inf. Process. Syst. 33, 11839\u201311852 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"22_CR45","doi-asserted-by":"crossref","unstructured":"Tailanian, M., Pardo, \u00c1., Mus\u00e9, P.: U-flow: a u-shaped normalizing flow for anomaly detection with unsupervised threshold. arXiv preprint arXiv:2211.12353 (2022)","DOI":"10.21203\/rs.3.rs-3367286\/v1"},{"issue":"1","key":"22_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00320-x","volume":"7","author":"S Thudumu","year":"2020","unstructured":"Thudumu, S., Branch, P., Jin, J., Singh, J.J.: A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7(1), 1\u201330 (2020)","journal-title":"J. Big Data"},{"key":"22_CR47","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-319-46478-7_31","volume-title":"Computer Vision \u2013 ECCV 2016","author":"Y Wen","year":"2016","unstructured":"Wen, Y., Zhang, K., Li, Z., Qiao, Yu.: A discriminative feature learning approach for deep face recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9911, pp. 499\u2013515. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46478-7_31"},{"key":"22_CR48","doi-asserted-by":"crossref","unstructured":"Williams, G., Baxter, R., He, H., Hawkins, S., Gu, L.: A comparative study of rnn for outlier detection in data mining. In: 2002 IEEE International Conference on Data Mining, 2002, Proceedings, pp. 709\u2013712. IEEE (2002)","DOI":"10.1109\/ICDM.2002.1184035"},{"key":"22_CR49","doi-asserted-by":"crossref","unstructured":"Wyatt, J., Leach, A., Schmon, S.M., Willcocks, C.G.: Anoddpm: anomaly detection with denoising diffusion probabilistic models using simplex noise. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 650\u2013656 (2022)","DOI":"10.1109\/CVPRW56347.2022.00080"},{"key":"22_CR50","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/tmm.2020.3046884","volume":"24","author":"F Ye","year":"2022","unstructured":"Ye, F., Huang, C., Cao, J., Li, M., Zhang, Y., Lu, C.: Attribute restoration framework for anomaly detection. IEEE Trans. Multimedia 24, 116\u2013127 (2022). https:\/\/doi.org\/10.1109\/tmm.2020.3046884","journal-title":"IEEE Trans. Multimedia"},{"key":"22_CR51","unstructured":"You, Z., et al.: A unified model for multi-class anomaly detection. In: Proceedings of Advances in Neural Information Processing Systems (NeurIPS) (2022)"},{"key":"22_CR52","unstructured":"Yu, J., et al.: Fastflow: unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:2111.07677 (2021)"},{"key":"22_CR53","doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Datasetgan: efficient labeled data factory with minimal human effort. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01001"},{"key":"22_CR54","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-3-319-97310-4_54","volume-title":"PRICAI 2018: Trends in Artificial Intelligence","author":"Z Zhao","year":"2018","unstructured":"Zhao, Z., Li, B., Dong, R., Zhao, P.: A surface defect detection method based on positive samples. In: Geng, X., Kang, B.-H. (eds.) PRICAI 2018. LNCS (LNAI), vol. 11013, pp. 473\u2013481. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-97310-4_54"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73202-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T15:11:48Z","timestamp":1732115508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73202-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,21]]},"ISBN":["9783031732010","9783031732027"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73202-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,21]]},"assertion":[{"value":"21 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}