{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:48:22Z","timestamp":1769741302583,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819556953","type":"print"},{"value":"9789819556960","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5696-0_27","type":"book-chapter","created":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:03:04Z","timestamp":1769695384000},"page":"383-397","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Semantic-Guided Denoising Knowledge Distillation Model for\u00a0Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Jia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Na","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Junpu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chunlei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhoufeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,30]]},"reference":[{"issue":"2","key":"27_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/asi7020018","volume":"7","author":"W-H Choi","year":"2024","unstructured":"Choi, W.-H., Kim, J.: Unsupervised learning approach for anomaly detection in industrial control systems. Appl. Syst. Innovation 7(2), 18 (2024)","journal-title":"Appl. Syst. Innovation"},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","volume":"130","author":"P Bergmann","year":"2022","unstructured":"Bergmann, P., Batzner, K., Fauser, M., Sattlegger, D., Steger, C.: Beyond dents and scratches: logical constraints in unsupervised anomaly detection and localization. Int. J. Comput. Vision 130(4), 947\u2013969 (2022)","journal-title":"Int. J. Comput. Vision"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Xiang, T., Zhang, Y., Lu, Y., Yuille, A.L., Zhang, C., Cai, W., Zhou, Z.: SQUID: deep feature in-painting for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 23890\u201323901 (2023)","DOI":"10.1109\/CVPR52729.2023.02288"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Bao, J., Sun, H., Deng, H., He, Y., Zhang, Z., Li, X.: BMAD: benchmarks for medical anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4042\u20134053 (2024)","DOI":"10.1109\/CVPRW63382.2024.00408"},{"issue":"3","key":"27_CR5","doi-asserted-by":"publisher","first-page":"1102","DOI":"10.1109\/TMI.2023.3327720","volume":"43","author":"J Guo","year":"2023","unstructured":"Guo, J., Lu, S., Jia, L., Zhang, W., Li, H.: Encoder-decoder contrast for unsupervised anomaly detection in medical images. IEEE Trans. Med. Imaging 43(3), 1102\u20131112 (2023)","journal-title":"IEEE Trans. Med. Imaging"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Samaila, Y.A., et al.: Video anomaly detection: a systematic review of issues and prospects. Neurocomputing 127726 (2024)","DOI":"10.1016\/j.neucom.2024.127726"},{"issue":"10","key":"27_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3729222","volume":"57","author":"J Liu","year":"2025","unstructured":"Liu, J., et al.: Networking systems for video anomaly detection: a tutorial and survey. ACM Comput. Surv. 57(10), 1\u201337 (2025)","journal-title":"ACM Comput. Surv."},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.1109\/TIP.2024.3374070","volume":"33","author":"P Wu","year":"2024","unstructured":"Wu, P., et al.: Toward video anomaly retrieval from video anomaly detection: new benchmarks and model. IEEE Trans. Image Process. 33, 2213\u20132225 (2024)","journal-title":"IEEE Trans. Image Process."},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: DRAEM\u2014a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Salehi, M., Sadjadi, N., Baselizadeh, S., Rohban, M.H., Rabiee, H.R.: Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14902\u201314912 (2021)","DOI":"10.1109\/CVPR46437.2021.01466"},{"issue":"5","key":"27_CR13","doi-asserted-by":"publisher","first-page":"2176","DOI":"10.1109\/TCSVT.2022.3218587","volume":"33","author":"Q Zhou","year":"2022","unstructured":"Zhou, Q., He, S., Liu, H., Chen, T., Chen, J.: Pull & Push: leveraging differential knowledge distillation for efficient unsupervised anomaly detection and localization. IEEE Trans. Circuits Syst. Video Technol. 33(5), 2176\u20132189 (2022)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Deng, H., Li, X.: Anomaly detection via reverse distillation from one-class embedding. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9737\u20139746 (2022)","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Wang, G., Han, S., Ding, E., Huang, D.: Student-teacher feature pyramid matching for anomaly detection. arXiv preprint arXiv:2103.04257 (2021)","DOI":"10.5244\/C.35.349"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Kim, J.-H., Kwon, G.-R.: Unsupervised visual anomaly detection using self-supervised pre-trained transformer. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3454753"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Pirnay, J., Chai, K.: Inpainting transformer for anomaly detection. In: International Conference on Image Analysis and Processing, pp. 394\u2013406. Springer (2022)","DOI":"10.1007\/978-3-031-06430-2_33"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zhu, F., Mi, Y., Chen, D., Xiong, G.: Simple-FPN: an image anomaly detection and localization network based on SimpleNet and feature pyramid. In: 2024 IEEE 4th International Conference on Digital Twins and Parallel Intelligence (DTPI), pp. 417\u2013422. IEEE (2024)","DOI":"10.1109\/DTPI61353.2024.10778849"},{"issue":"3","key":"27_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/s11063-024-11466-7","volume":"56","author":"C Huang","year":"2024","unstructured":"Huang, C., Kang, Z., Wu, H.: A prototype-based neural network for image anomaly detection and localization. Neural Process. Lett. 56(3), 169 (2024)","journal-title":"Neural Process. Lett."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Uninformed students: student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192 (2020)","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Tien, T.D., et al.: Revisiting reverse distillation for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 24511\u201324520 (2023)","DOI":"10.1109\/CVPR52729.2023.02348"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Li, C.-L., Sohn, K., Yoon, J., Pfister, T.: CutPaste: self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9664\u20139674 (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"27_CR23","doi-asserted-by":"publisher","first-page":"4327","DOI":"10.1109\/TIP.2023.3293772","volume":"32","author":"Y Liang","year":"2023","unstructured":"Liang, Y., Zhang, J., Zhao, S., Wu, R., Liu, Y., Pan, S.: Omni-frequency channel-selection representations for unsupervised anomaly detection. IEEE Trans. Image Process. 32, 4327\u20134340 (2023)","journal-title":"IEEE Trans. Image Process."},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: DSR\u2014a dual subspace re-projection network for surface anomaly detection. In: European Conference on Computer Vision (ECCV), pp. 539\u2013554 (2022)","DOI":"10.1007\/978-3-031-19821-2_31"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD\u2013a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"key":"27_CR26","doi-asserted-by":"crossref","unstructured":"Zou, Y., Jeong, J., Pemula, L., Zhang, D., Dabeer, O.: Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. In: European Conference on Computer Vision, pp. 392\u2013408. Springer (2022)","DOI":"10.1007\/978-3-031-20056-4_23"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Cimpoi, M., Maji, S., Kokkinos, I., Mohamed, S., Vedaldi, A.: Describing textures in the wild. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3606\u20133613 (2014)","DOI":"10.1109\/CVPR.2014.461"},{"key":"27_CR28","unstructured":"Cohen, N., Hoshen, Y.: Sub-image anomaly detection with deep pyramid correspondences. arXiv preprint arXiv:2005.02357 (2020)"},{"key":"27_CR29","unstructured":"Yu, J., et al.: FastFlow: Unsupervised anomaly detection and localization via 2D normalizing flows. arXiv preprint arXiv:2111.07677 (2021)"},{"key":"27_CR30","unstructured":"You, Z., et al.: A unified model for multi-class anomaly detection. In: Advances in Neural Information Processing Systems, vol. 35, pp. 4571\u20134584 (2022)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5696-0_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T14:03:16Z","timestamp":1769695396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5696-0_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819556953","9789819556960"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5696-0_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"30 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}