{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T13:40:02Z","timestamp":1747921202646,"version":"3.41.0"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928048","type":"print"},{"value":"9783031928055","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92805-5_23","type":"book-chapter","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T12:58:38Z","timestamp":1747918718000},"page":"360-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Sequential PatchCore: Anomaly Detection for Surface Inspection Using Synthetic Impurities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-5230-4157","authenticated-orcid":false,"given":"Runzhou","family":"Mao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1858-5978","authenticated-orcid":false,"given":"Juraj","family":"Fulir","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1669-8549","authenticated-orcid":false,"given":"Christoph","family":"Garth","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2102-2618","authenticated-orcid":false,"given":"Petra","family":"Gospodneti\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,12]]},"reference":[{"key":"23_CR1","unstructured":"Surface defects. https:\/\/www.giessereilexikon.com\/en\/foundry-lexicon\/Encyclopedia\/show\/surface-defects-4742\/?cHash=a86b2613d7ca58d8085eac445fe6579a"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Akcay, S., Ameln, D., Vaidya, A., Lakshmanan, B., Ahuja, N., Genc, U.: Anomalib: a deep learning library for anomaly detection. In: 2022 IEEE International Conference on Image Processing (ICIP), pp. 1706\u20131710. IEEE (2022)","DOI":"10.1109\/ICIP46576.2022.9897283"},{"key":"23_CR3","doi-asserted-by":"publisher","unstructured":"Aust, J., Mitrovic, A., Pons, D.: Assessment of the effect of cleanliness on the visual inspection of aircraft engine blades: an eye tracking study. Sensors 21(18) (2021). https:\/\/doi.org\/10.3390\/s21186135","DOI":"10.3390\/s21186135"},{"key":"23_CR4","doi-asserted-by":"publisher","unstructured":"Becket, W., Badler, N.I.: Imperfection for realistic image synthesis. J. Vis. Comput. Anim. 1 (1990). https:\/\/doi.org\/10.1002\/vis.4340010108","DOI":"10.1002\/vis.4340010108"},{"key":"23_CR5","unstructured":"Bosch, C.: Realistic image synthesis of surface scratches and grooves (2007)"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Bosnar, L.: Procedural modeling and image synthesis for virtual surface inspection planning, Doctoral thesis, Rheinland-Pf\u00e4lzische Technische Universit\u00e4t Kaiserslautern-Landau (2024). https:\/\/doi.org\/10.26204\/KLUEDO\/8211","DOI":"10.26204\/KLUEDO\/8211"},{"key":"23_CR7","doi-asserted-by":"publisher","unstructured":"Bosnar, L., Hagen, H., Gospodnetic, P.: Procedural defect modeling for virtual surface inspection environments. IEEE Comput. Graph. Appl. 43 (2023). https:\/\/doi.org\/10.1109\/MCG.2023.3243276","DOI":"10.1109\/MCG.2023.3243276"},{"key":"23_CR8","doi-asserted-by":"publisher","unstructured":"Bosnar, L., Rauhut, M., Hagen, H., Gospodnetic, P.: Texture synthesis for surface inspection (2022). https:\/\/doi.org\/10.36730\/2022.1.levia.4","DOI":"10.36730\/2022.1.levia.4"},{"key":"23_CR9","doi-asserted-by":"publisher","unstructured":"Bosnar, L., et al.: Image synthesis pipeline for surface inspection (2020). https:\/\/doi.org\/10.31219\/osf.io\/kqt8w","DOI":"10.31219\/osf.io\/kqt8w"},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Chen, Y., Ding, Y., Zhao, F., Zhang, E., Wu, Z., Shao, L.: Surface defect detection methods for industrial products: a review. Appl. Sci. 11(16) (2021). https:\/\/doi.org\/10.3390\/app11167657","DOI":"10.3390\/app11167657"},{"key":"23_CR11","unstructured":"Cohen, N., Hoshen, Y.: Sub-image anomaly detection with deep pyramid correspondences. arXiv preprint arXiv:2005.02357 (2020)"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"55297","DOI":"10.1109\/ACCESS.2023.3282993","volume":"11","author":"Y Cui","year":"2023","unstructured":"Cui, Y., Liu, Z., Lian, S.: A survey on unsupervised anomaly detection algorithms for industrial images. IEEE Access 11, 55297\u201355315 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3282993","journal-title":"IEEE Access"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"109691","DOI":"10.1016\/j.foodcont.2023.109691","volume":"149","author":"D Daeschel","year":"2023","unstructured":"Daeschel, D., Singh Rana, Y., Chen, L., Cai, S., Dando, R., Snyder, A.B.: Visual inspection of surface sanitation: defining the conditions that enhance the human threshold for detection of food residues. Food Control 149, 109691 (2023). https:\/\/doi.org\/10.1016\/j.foodcont.2023.109691","journal-title":"Food Control"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Damm, S., Laszkiewicz, M., Lederer, J., Fischer, A.: AnomalyDINO: boosting patch-based few-shot anomaly detection with DINOv2. arXiv preprint arXiv:2405.14529 (2024)","DOI":"10.1109\/WACV61041.2025.00136"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: PaDiM: a patch distribution modeling framework for anomaly detection and localization. arXiv preprint arXiv:2011.08785 (2020)","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, pp. 248\u2013255 (2009). https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Ebert, D.S., Musgrave, F.K., Peachey, D., Perlin, K., Worley, S.: Texturing and Modeling: A Procedural Approach, 3rd edn. Morgan Kaufmann Publishers Inc. (2002)","DOI":"10.1016\/B978-155860848-1\/50029-2"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Fulir, J., Bosnar, L., Hagen, H., Gospodneti\u0107, P.: Synthetic data for defect segmentation on complex metal surfaces. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4424\u20134434 (2023). https:\/\/doi.org\/10.1109\/CVPRW59228.2023.00465","DOI":"10.1109\/CVPRW59228.2023.00465"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"23_CR20","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"issue":"13","key":"23_CR21","doi-asserted-by":"publisher","first-page":"5922","DOI":"10.3390\/s23135922","volume":"23","author":"X He","year":"2023","unstructured":"He, X., Luo, Z., Li, Q., Chen, H., Li, F.: DG-GAN: a high quality defect image generation method for defect detection. Sensors 23(13), 5922 (2023). https:\/\/doi.org\/10.3390\/s23135922","journal-title":"Sensors"},{"key":"23_CR22","doi-asserted-by":"publisher","unstructured":"Hou, J., Zhang, Y., Zhong, Q., Xie, D., Pu, S., Zhou, H.: Divide-and-assemble: learning block-wise memory for unsupervised anomaly detection. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 8771\u20138780 (2021). https:\/\/doi.org\/10.1109\/ICCV48922.2021.00867","DOI":"10.1109\/ICCV48922.2021.00867"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Howard, A., et al.: Searching for MobileNetV3. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV) (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"23_CR24","doi-asserted-by":"publisher","unstructured":"Ishikawa, T., Kamata, K., Takeshima, Y., Kakimoto, M.: Rusting and corroding simulation taking into account chemical reaction processes. In: ACM SIGGRAPH 2016 Posters (2016). https:\/\/doi.org\/10.1145\/2945078.2945143","DOI":"10.1145\/2945078.2945143"},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Kim, D., Park, C., Cho, S., Lee, S.: FAPM: fast adaptive patch memory for real-time industrial anomaly detection. In: ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135 (2023). https:\/\/doi.org\/10.1109\/ICASSP49357.2023.10096400","DOI":"10.1109\/ICASSP49357.2023.10096400"},{"key":"23_CR26","doi-asserted-by":"publisher","unstructured":"Kohli, R., Mittal, K.L.: Developments in surface contamination and cleaning: applications of cleaning techniques (2018). https:\/\/doi.org\/10.1016\/C2017-0-02437-0","DOI":"10.1016\/C2017-0-02437-0"},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","volume":"10","author":"S Lee","year":"2022","unstructured":"Lee, S., Lee, S., Song, B.C.: CFA: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10, 78446\u201378454 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3193699","journal-title":"IEEE Access"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Li, H., Hu, J., Li, B., Chen, H., Zheng, Y., Shen, C.: Target before shooting: accurate anomaly detection and localization under one millisecond via cascade patch retrieval. arXiv preprint arXiv:2308.06748 (2023)","DOI":"10.1109\/TIP.2024.3448263"},{"issue":"4","key":"23_CR29","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","volume":"35","author":"Q Li","year":"2023","unstructured":"Li, Q., et al.: A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 35(4), 3347\u20133366 (2023). https:\/\/doi.org\/10.1109\/TKDE.2021.3124599","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"23_CR30","doi-asserted-by":"publisher","unstructured":"Li, W., et al.: Towards continual adaptation in industrial anomaly detection. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 2871\u20132880. MM \u201922, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3503161.3548232","DOI":"10.1145\/3503161.3548232"},{"key":"23_CR31","unstructured":"Liu, J., et al.: Deep industrial image anomaly detection: a survey. arXiv preprint arXiv:2301.11514 (2023)"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gu, J., Wang, K., Zhu, Z., Jiang, W., You, Y.: DREAM: efficient dataset distillation by representative matching. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 17314\u201317324 (2023)","DOI":"10.1109\/ICCV51070.2023.01588"},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"Liu, Z., Zhou, Y., Xu, Y., Wang, Z.: SimpleNet: a simple network for image anomaly detection and localization. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 20402\u201320411 (2023). https:\/\/doi.org\/10.1109\/CVPR52729.2023.01954","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"23_CR34","doi-asserted-by":"publisher","unstructured":"Moonen, S., Vanherle, B., Hoog, J.D., Bourgana, T., Bey-Temsamani, A., Michiels, N.: CAD2Render: a modular toolkit for GPU-accelerated photorealistic synthetic data generation for the manufacturing industry. In: Proceedings - 2023 IEEE\/CVF Winter Conference on Applications of Computer Vision Workshops, WACVW 2023 (2023). https:\/\/doi.org\/10.1109\/WACVW58289.2023.00065","DOI":"10.1109\/WACVW58289.2023.00065"},{"key":"23_CR35","unstructured":"Nord, A.: Example based procedural distribution tool (2014). https:\/\/www.diva-portal.org\/smash\/get\/diva2:763228\/FULLTEXT01.pdf"},{"key":"23_CR36","doi-asserted-by":"publisher","unstructured":"Perlin, K.: Image synthesizer. ACM Comput. Graph. 19 (1985). https:\/\/doi.org\/10.1145\/325165.325247","DOI":"10.1145\/325165.325247"},{"issue":"1","key":"23_CR37","doi-asserted-by":"publisher","first-page":"5137139","DOI":"10.1155\/2019\/5137139","volume":"2019","author":"B Ramalingam","year":"2019","unstructured":"Ramalingam, B., et al.: Visual inspection of the aircraft surface using a teleoperated reconfigurable climbing robot and enhanced deep learning technique. Int. J. Aerosp. Eng. 2019(1), 5137139 (2019). https:\/\/doi.org\/10.1155\/2019\/5137139","journal-title":"Int. J. Aerosp. Eng."},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Rippel, O., Mertens, P., Merhof, D.: Modeling the distribution of normal data in pre-trained deep features for anomaly detection. arXiv preprint arXiv:2005.14140 (2020)","DOI":"10.1109\/TIM.2021.3098381"},{"key":"23_CR39","doi-asserted-by":"publisher","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14298\u201314308 (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01392","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"23_CR40","doi-asserted-by":"publisher","unstructured":"Saiku, R., Sato, J., Yamada, T., Ito, K.: Enhancing anomaly detection performance and acceleration. IEEJ J. Ind. Appl. 11 (2022). https:\/\/doi.org\/10.1541\/ieejjia.21013871","DOI":"10.1541\/ieejjia.21013871"},{"key":"23_CR41","unstructured":"Schladitz, K., et al.: Simulation of microstructures and machine learning. In: CMDS14 Springer Proceedings in Mathematics and Statistics, Paris (2023)"},{"key":"23_CR42","doi-asserted-by":"publisher","unstructured":"Schw\u00e4rzler, M.: Rendering imperfections: dust, scratches, aging,... (2007). https:\/\/doi.org\/10.13140\/RG.2.2.13631.10407","DOI":"10.13140\/RG.2.2.13631.10407"},{"key":"23_CR43","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Bengio, Y., LeCun, Y. (eds.) 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings (2015). http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"23_CR44","unstructured":"Sinha, S., Zhang, H., Goyal, A., Bengio, Y., Larochelle, H., Odena, A.: Small-GAN: speeding up GAN training using core-sets. In: III, H.D., Singh, A. (eds.) Proceedings of the 37th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0119, pp. 9005\u20139015. PMLR (2020). https:\/\/proceedings.mlr.press\/v119\/sinha20b.html"},{"key":"23_CR45","unstructured":"Sun, H., Cao, Y., Fink, O.: CUT: a controllable, universal, and training-free visual anomaly generation framework. arXiv preprint arXiv:2406.01078 (2024)"},{"key":"23_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2022.3196436","volume":"71","author":"X Tao","year":"2022","unstructured":"Tao, X., Gong, X., Zhang, X., Yan, S., Adak, C.: Deep learning for unsupervised anomaly localization in industrial images: a survey. IEEE Trans. Instrum. Meas. 71, 1\u201321 (2022). https:\/\/doi.org\/10.1109\/TIM.2022.3196436","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"23_CR47","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.jare.2021.03.015","volume":"35","author":"AA Tulbure","year":"2022","unstructured":"Tulbure, A.A., Tulbure, A.A., Dulf, E.H.: A review on modern defect detection models using DCNNs - deep convolutional neural networks. J. Adv. Res. 35, 33\u201348 (2022). https:\/\/doi.org\/10.1016\/j.jare.2021.03.015","journal-title":"J. Adv. Res."},{"key":"23_CR48","doi-asserted-by":"publisher","unstructured":"Wada, K.: Labelme: image polygonal annotation with Python. https:\/\/doi.org\/10.5281\/zenodo.5711226","DOI":"10.5281\/zenodo.5711226"},{"key":"23_CR49","doi-asserted-by":"crossref","unstructured":"Wagenstetter, M., et al.: Synthetically generated images for industrial anomaly detection. In: Proceedings of IEEE International Conference on Emerging Technologies and Factory Automation (2024)","DOI":"10.1109\/ETFA61755.2024.10710816"},{"issue":"6","key":"23_CR50","doi-asserted-by":"publisher","first-page":"6182","DOI":"10.1109\/TIE.2021.3094452","volume":"69","author":"Q Wan","year":"2022","unstructured":"Wan, Q., Gao, L., Li, X., Wen, L.: Industrial image anomaly localization based on gaussian clustering of pretrained feature. IEEE Trans. Industr. Electron. 69(6), 6182\u20136192 (2022). https:\/\/doi.org\/10.1109\/TIE.2021.3094452","journal-title":"IEEE Trans. Industr. Electron."},{"key":"23_CR51","doi-asserted-by":"publisher","unstructured":"Wei, J., Shen, F., Lv, C., Zhang, Z., Zhang, F., Yang, H.: Diversified and multi-class controllable industrial defect synthesis for data augmentation and transfer. In: 2023 IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2023). https:\/\/doi.org\/10.1109\/CVPRW59228.2023.00467","DOI":"10.1109\/CVPRW59228.2023.00467"},{"issue":"1","key":"23_CR52","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3390\/coatings13010017","volume":"13","author":"X Wen","year":"2023","unstructured":"Wen, X., Shan, J., He, Y., Song, K.: Steel surface defect recognition: a survey. Coatings 13(1), 17 (2023). https:\/\/doi.org\/10.3390\/coatings13010017","journal-title":"Coatings"},{"key":"23_CR53","series-title":"Eurographics","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-7091-6858-5_13","volume-title":"Rendering Techniques \u201997","author":"T-T Wong","year":"1997","unstructured":"Wong, T.-T., Ng, W.-Y., Heng, P.-A.: A geometry dependent texture generation framework for simulating surface imperfections. In: Dorsey, J., Slusallek, P. (eds.) EGSR 1997. E, pp. 139\u2013150. Springer, Vienna (1997). https:\/\/doi.org\/10.1007\/978-3-7091-6858-5_13"},{"key":"23_CR54","unstructured":"Xie, G., Wang, J., Liu, J., Zheng, F., Jin, Y.: Pushing the limits of Fewshot anomaly detection in industry vision: Graphcore. arXiv preprint arXiv:2301.12082 (2023)"},{"key":"23_CR55","doi-asserted-by":"publisher","unstructured":"Yang, J., Wang, H., Song, Z., Guo, F., Yue, H.: Efficient textile anomaly detection via memory guided distillation network. J. Intell. Manuf. (2024). https:\/\/doi.org\/10.1007\/s10845-024-02445-9","DOI":"10.1007\/s10845-024-02445-9"},{"key":"23_CR56","doi-asserted-by":"crossref","unstructured":"Yao, H., Cao, Y., Luo, W., Zhang, W., Yu, W., Shen, W.: Prior normality prompt transformer for multi-class industrial image anomaly detection. arXiv preprint arXiv:2406.11507 (2024)","DOI":"10.1109\/TII.2024.3413322"},{"key":"23_CR57","doi-asserted-by":"crossref","unstructured":"Yi, J., Yoon, S.: Patch SVDD: patch-level SVDD for anomaly detection and segmentation. In: Proceedings of the Asian Conference on Computer Vision (ACCV) (2020)","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"23_CR58","doi-asserted-by":"crossref","unstructured":"Zagoruyko, S., Komodakis, N.: Wide residual networks. arXiv preprint arXiv:1605.07146 (2016)","DOI":"10.5244\/C.30.87"},{"key":"23_CR59","doi-asserted-by":"publisher","unstructured":"Zhang, G., Cui, K., Hung, T.Y., Lu, S.: Defect-GAN: high-fidelity defect synthesis for automated defect inspection (2021). https:\/\/doi.org\/10.1109\/WACV48630.2021.00257","DOI":"10.1109\/WACV48630.2021.00257"},{"key":"23_CR60","doi-asserted-by":"crossref","unstructured":"Zhang, H., Wu, Z., Wang, Z., Chen, Z., Jiang, Y.G.: Prototypical residual networks for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16281\u201316291 (2023)","DOI":"10.1109\/CVPR52729.2023.01562"},{"key":"23_CR61","doi-asserted-by":"publisher","unstructured":"Zheng, Y., Chen, Y., Fei, G., Dorsey, J., Wu, E.: Simulation of textile stains. IEEE Trans. Vis. Comput. Graph. 25 (2019). https:\/\/doi.org\/10.1109\/TVCG.2018.2832039","DOI":"10.1109\/TVCG.2018.2832039"},{"key":"23_CR62","doi-asserted-by":"crossref","unstructured":"Zhu, X., Bilal, T., M\u00e5rtensson, P., Hanson, L., Bj\u00f6rkman, M., Maki, A.: Towards sim-to-real industrial parts classification with synthetic dataset. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, pp. 4454\u20134463 (2023)","DOI":"10.1109\/CVPRW59228.2023.00468"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92805-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T12:58:57Z","timestamp":1747918737000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92805-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928048","9783031928055"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92805-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"12 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2024.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}