{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T21:37:43Z","timestamp":1773524263477,"version":"3.50.1"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031732089","type":"print"},{"value":"9783031732096","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-73209-6_12","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T15:02:57Z","timestamp":1730386977000},"page":"196-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Open-World Object-Based Anomaly Detection via\u00a0Self-Supervised Outlier Synthesis"],"prefix":"10.1007","author":[{"given":"Brian K. S.","family":"Isaac-Medina","sequence":"first","affiliation":[]},{"given":"Yona Falinie A.","family":"Gaus","sequence":"additional","affiliation":[]},{"given":"Neelanjan","family":"Bhowmik","sequence":"additional","affiliation":[]},{"given":"Toby P.","family":"Breckon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"issue":"9","key":"12_CR1","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1109\/TIFS.2018.2812196","volume":"13","author":"S Akcay","year":"2018","unstructured":"Akcay, S., Kundegorski, M., Willcocks, C., Breckon, T.: On using deep convolutional neural network architectures for automated object detection and classification within x-ray baggage security imagery. IEEE Trans. Inf. Forensics Secur. 13(9), 2203\u20132215 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision \u2013 ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay, S., Atapour-Abarghouei, A., Breckon, T.P.: GANomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11363, pp. 622\u2013637. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Barker, J.W., Breckon, T.P.: Panda: perceptually aware neural detection of anomalies. In: 2021 International Joint Conference on Neural Networks (IJCNN), pp.\u00a01\u20138. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534399"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192 (2020)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Bergmann, P., L\u00f6we, S., Fauser, M., Sattlegger, D., Steger, C.: Improving unsupervised defect segmentation by applying structural similarity to autoencoders. arXiv preprint arXiv:1807.02011 (2018)","DOI":"10.5220\/0007364503720380"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-030-58452-8_13","volume-title":"Computer Vision \u2013 ECCV 2020","author":"N Carion","year":"2020","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-End object detection with transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12346, pp. 213\u2013229. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Caron, M., Bojanowski, P., Joulin, A., Douze, M.: Deep clustering for unsupervised learning of visual features. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 132\u2013149 (2018)","DOI":"10.1007\/978-3-030-01264-9_9"},{"key":"12_CR8","unstructured":"Chan, R., et al.: Segmentmeifyoucan: a benchmark for anomaly segmentation. arXiv preprint arXiv:2104.14812 (2021)"},{"key":"12_CR9","unstructured":"Chen, K., et al.: MMDetection: open mmlab detection toolbox and benchmark. arXiv preprint arXiv:1906.07155 (2019)"},{"key":"12_CR10","unstructured":"Cohen, N., Hoshen, Y.: Sub-image anomaly detection with deep pyramid correspondences. arXiv preprint arXiv:2005.02357 (2020)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-030-68799-1_35","volume-title":"Pattern Recognition. ICPR International Workshops and Challenges","author":"T Defard","year":"2021","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: PaDiM: a patch distribution modeling framework for anomaly detection and localization. In: Del Bimbo, A., et al. (eds.) ICPR 2021. LNCS, vol. 12664, pp. 475\u2013489. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68799-1_35"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X.: Anomaly detection via reverse distillation from one-class embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9737\u20139746 (2022)","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"12_CR13","first-page":"20434","volume":"35","author":"X Du","year":"2022","unstructured":"Du, X., Gozum, G., Ming, Y., Li, Y.: Siren: shaping representations for detecting out-of-distribution objects. Adv. Neural. Inf. Process. Syst. 35, 20434\u201320449 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Du, X., Wang, X., Gozum, G., Li, Y.: Unknown-aware object detection: learning what you don\u2019t know from videos in the wild. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13678\u201313688 (2022)","DOI":"10.1109\/CVPR52688.2022.01331"},{"key":"12_CR15","unstructured":"Du, X., Wang, Z., Cai, M., Li, Y.: Vos: learning what you don\u2019t know by virtual outlier synthesis. arXiv preprint arXiv:2202.01197 (2022)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K., Winn, J., Zisserman, A.: The pascal visual object classes (voc) challenge. Int. J. Comput. Vision 88, 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Gaus, Y.F.A., Bhowmik, N., Isaac-Medina, B.K., Shum, H.P., Atapour-Abarghouei, A., Breckon, T.P.: Region-based appearance and flow characteristics for anomaly detection in infrared surveillance imagery. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2994\u20133004 (2023)","DOI":"10.1109\/CVPRW59228.2023.00301"},{"key":"12_CR18","unstructured":"Goodfellow, I., et al.: Generative adversarial nets. Adv. Neural Inf. Process. Syst. 27 (2014)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Gudovskiy, D., Ishizaka, S., Kozuka, K.: Cflow-ad: real-time unsupervised anomaly detection with localization via conditional normalizing flows. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 98\u2013107 (2022)","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Gupta, A., Narayan, S., Joseph, K., Khan, S., Khan, F.S., Shah, M.: Ow-detr: open-world detection transformer. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9235\u20139244 (2022)","DOI":"10.1109\/CVPR52688.2022.00902"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Huang, Z., Huang, L., Gong, Y., Huang, C., Wang, X.: Mask scoring r-cnn. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6409\u20136418 (2019)","DOI":"10.1109\/CVPR.2019.00657"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T., Khan, F.S., Georgescu, M.I., Shao, L.: Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7842\u20137851 (2019)","DOI":"10.1109\/CVPR.2019.00803"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Joseph, K., Khan, S., Khan, F.S., Balasubramanian, V.N.: Towards open world object detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5830\u20135840 (2021)","DOI":"10.1109\/CVPR46437.2021.00577"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Kim, D., Lin, T.Y., Angelova, A., Kweon, I.S., Kuo, W.: Learning open-world object proposals without learning to classify. IEEE Rob. Autom. Lett. (RA-L) (2022)","DOI":"10.1109\/LRA.2022.3146922"},{"issue":"6","key":"12_CR27","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Kumar, N., \u0160egvi\u0107, S., Eslami, A., Gumhold, S.: Normalizing flow based feature synthesis for outlier-aware object detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 5156\u20135165 (2023)","DOI":"10.1109\/CVPR52729.2023.00499"},{"key":"12_CR29","unstructured":"Lee, K., Lee, H., Lee, K., Shin, J.: Training confidence-calibrated classifiers for detecting out-of-distribution samples. arXiv preprint arXiv:1711.09325 (2017)"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","volume":"10","author":"S Lee","year":"2022","unstructured":"Lee, S., Lee, S., Song, B.C.: Cfa: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10, 78446\u201378454 (2022)","journal-title":"IEEE Access"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1016\/j.neucom.2012.03.040","volume":"119","author":"C Li","year":"2013","unstructured":"Li, C., Han, Z., Ye, Q., Jiao, J.: Visual abnormal behavior detection based on trajectory sparse reconstruction analysis. Neurocomputing 119, 94\u2013100 (2013)","journal-title":"Neurocomputing"},{"issue":"1","key":"12_CR32","first-page":"18","volume":"36","author":"W Li","year":"2013","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1007\/978-3-319-10602-1_48","volume-title":"Computer Vision \u2013 ECCV 2014","author":"T-Y Lin","year":"2014","unstructured":"Lin, T.-Y., et al.: Microsoft COCO: common objects in context. In: Fleet, D., Pajdla, T., Schiele, B., Tuytelaars, T. (eds.) ECCV 2014. LNCS, vol. 8693, pp. 740\u2013755. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10602-1_48"},{"key":"12_CR34","first-page":"21464","volume":"33","author":"W Liu","year":"2020","unstructured":"Liu, W., Wang, X., Owens, J., Li, Y.: Energy-based out-of-distribution detection. Adv. Neural. Inf. Process. Syst. 33, 21464\u201321475 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Liu, W., et al.: Towards visually explaining variational autoencoders. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 8642\u20138651 (2020)","DOI":"10.1109\/CVPR42600.2020.00867"},{"key":"12_CR37","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 fps in matlab. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked rnn framework. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 341\u2013349 (2017)","DOI":"10.1109\/ICCV.2017.45"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Miao, C., et al.: Sixray: a large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2119\u20132128 (2019)","DOI":"10.1109\/CVPR.2019.00222"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Morais, R., Le, V., Tran, T., Saha, B., Mansour, M., Venkatesh, S.: Learning regularity in skeleton trajectories for anomaly detection in videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 11996\u201312004 (2019)","DOI":"10.1109\/CVPR.2019.01227"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N., Meunier, J.: Anomaly detection in video sequence with appearance-motion correspondence. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1273\u20131283 (2019)","DOI":"10.1109\/ICCV.2019.00136"},{"key":"12_CR42","unstructured":"Nikolov, I.A., et al.: Seasons in drift: a long-term thermal imaging dataset for studying concept drift. In: Thirty-Fifth Conference on Neural Information Processing Systems (2021)"},{"key":"12_CR43","doi-asserted-by":"crossref","unstructured":"Park, H., Noh, J., Ham, B.: Learning memory-guided normality for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14372\u201314381 (2020)","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Radosavovic, I., Kosaraju, R.P., Girshick, R., He, K., Dollar, P.: Designing network design spaces. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)","DOI":"10.1109\/CVPR42600.2020.01044"},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh, M., Nabi, M., Sangineto, E., Marcenaro, L., Regazzoni, C., Sebe, N.: Abnormal event detection in videos using generative adversarial nets. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 1577\u20131581. IEEE (2017)","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"12_CR46","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster r-cnn: towards real-time object detection with region proposal networks. Adv. Neural Inf. Process. Syst. (2015)"},{"key":"12_CR47","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"12_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/978-3-030-03801-4_65","volume-title":"Advances in Visual Computing","author":"PR Roy","year":"2018","unstructured":"Roy, P.R., Bilodeau, G.-A.: Road user abnormal trajectory detection using a deep autoencoder. In: Bebis, G., et al. (eds.) ISVC 2018. LNCS, vol. 11241, pp. 748\u2013757. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03801-4_65"},{"key":"12_CR49","doi-asserted-by":"crossref","unstructured":"Roy, P.R., Bilodeau, G.A.: Adversarially learned abnormal trajectory classifier. In: 2019 16th Conference on Computer and Robot Vision (CRV), pp. 65\u201372. IEEE (2019)","DOI":"10.1109\/CRV.2019.00017"},{"key":"12_CR50","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wandt, B., Rosenhahn, B.: Same same but differnet: semi-supervised defect detection with normalizing flows. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 1907\u20131916 (2021)","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"12_CR51","unstructured":"Ruff, L., et al.: Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR (2018)"},{"key":"12_CR52","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Khalooei, M., Fathy, M., Adeli, E.: Adversarially learned one-class classifier for novelty detection. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3379\u20133388 (2018)","DOI":"10.1109\/CVPR.2018.00356"},{"key":"12_CR53","doi-asserted-by":"crossref","unstructured":"Salehi, M., Sadjadi, N., Baselizadeh, S., Rohban, M.H., Rabiee, H.R.: Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14902\u201314912 (2021)","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"12_CR54","first-page":"21038","volume":"33","author":"R Schirrmeister","year":"2020","unstructured":"Schirrmeister, R., Zhou, Y., Ball, T., Zhang, D.: Understanding anomaly detection with deep invertible networks through hierarchies of distributions and features. Adv. Neural. Inf. Process. Syst. 33, 21038\u201321049 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"12_CR55","doi-asserted-by":"publisher","unstructured":"Sculley, D.: Web-scale k-means clustering. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, pp. 1177\u20131178. Association for Computing Machinery, New York (2010). https:\/\/doi.org\/10.1145\/1772690.1772862","DOI":"10.1145\/1772690.1772862"},{"key":"12_CR56","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.neucom.2020.11.018","volume":"424","author":"Y Shi","year":"2021","unstructured":"Shi, Y., Yang, J., Qi, Z.: Unsupervised anomaly segmentation via deep feature reconstruction. Neurocomputing 424, 9\u201322 (2021)","journal-title":"Neurocomputing"},{"key":"12_CR57","unstructured":"Sricharan, K., Srivastava, A.: Building robust classifiers through generation of confident out of distribution examples. arXiv preprint arXiv:1812.00239 (2018)"},{"key":"12_CR58","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"12_CR59","doi-asserted-by":"crossref","unstructured":"Tian, Z., Shen, C., Chen, H., He, T.: Fcos: fully convolutional one-stage object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 9627\u20139636 (2019)","DOI":"10.1109\/ICCV.2019.00972"},{"key":"12_CR60","unstructured":"Vernekar, S., Gaurav, A., Abdelzad, V., Denouden, T., Salay, R., Czarnecki, K.: Out-of-distribution detection in classifiers via generation. arXiv preprint arXiv:1910.04241 (2019)"},{"key":"12_CR61","doi-asserted-by":"crossref","unstructured":"Wang, C.Y., Bochkovskiy, A., Liao, H.Y.M.: Yolov7: trainable bag-of-freebies sets new state-of-the-art for real-time object detectors. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7464\u20137475 (2023)","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"12_CR62","unstructured":"Wang, H., Zhang, X., Yang, S., Zhang, W.: Video anomaly detection by the duality of normality-granted optical flow. arXiv preprint arXiv:2105.04302 (2021)"},{"key":"12_CR63","doi-asserted-by":"crossref","unstructured":"Wilson, S., Fischer, T., Dayoub, F., Miller, D., S\u00fcnderhauf, N.: Safe: Sensitivity-aware features for out-of-distribution object detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 23565\u201323576 (2023)","DOI":"10.1109\/ICCV51070.2023.02154"},{"key":"12_CR64","unstructured":"Wu, Y., Kirillov, A., Massa, F., Lo, W.Y., Girshick, R.: Detectron2 (2019). https:\/\/github.com\/facebookresearch\/detectron2"},{"key":"12_CR65","doi-asserted-by":"publisher","unstructured":"Wu, Z., Lu, Y., Chen, X., Wu, Z., Kang, L., Yu, J.: Uc-owod: unknown-classified open world object detection. In: European Conference on Computer Vision, pp. 193\u2013210. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-20080-9_12","DOI":"10.1007\/978-3-031-20080-9_12"},{"key":"12_CR66","doi-asserted-by":"crossref","unstructured":"Yan, X., Zhang, H., Xu, X., Hu, X., Heng, P.A.: Learning semantic context from normal samples for unsupervised anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a035, pp. 3110\u20133118 (2021)","DOI":"10.1609\/aaai.v35i4.16420"},{"key":"12_CR67","doi-asserted-by":"crossref","unstructured":"Yi, J., Yoon, S.: Patch svdd: patch-level svdd for anomaly detection and segmentation. In: Proceedings of the Asian conference on computer vision (2020)","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"12_CR68","doi-asserted-by":"crossref","unstructured":"Yu, F., et al.: Bdd100k: a diverse driving dataset for heterogeneous multitask learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2636\u20132645 (2020)","DOI":"10.1109\/CVPR42600.2020.00271"},{"key":"12_CR69","unstructured":"Yu, J., et al.: Fastflow: unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:2111.07677 (2021)"},{"key":"12_CR70","unstructured":"Zaheer, M.Z., Lee, J.h., Astrid, M., Lee, S.I.: Old is gold: redefining the adversarially learned one-class classifier training paradigm. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14183\u201314193 (2020)"},{"key":"12_CR71","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"12_CR72","doi-asserted-by":"crossref","unstructured":"Zhao, X., Ma, Y., Wang, D., Shen, Y., Qiao, Y., Liu, X.: Revisiting open world object detection. IEEE Trans. Circuits Syst. Video Technol. (2023)","DOI":"10.1109\/TCSVT.2023.3326279"},{"key":"12_CR73","doi-asserted-by":"crossref","unstructured":"Zohar, O., Wang, K.C., Yeung, S.: Prob: probabilistic objectness for open world object detection. In: CVPR (2023)","DOI":"10.1109\/CVPR52729.2023.01101"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73209-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T12:22:27Z","timestamp":1744114947000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73209-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9783031732089","9783031732096"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73209-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}