{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T15:57:42Z","timestamp":1768233462733,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819557547","type":"print"},{"value":"9789819557554","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5755-4_39","type":"book-chapter","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T12:30:53Z","timestamp":1768221053000},"page":"569-582","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Few-Shot Industrial Anomaly Detection Based on\u00a0Text-Guided Image Feature Synthesis"],"prefix":"10.1007","author":[{"given":"Tianle","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yifan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Cangjin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jiadong","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,13]]},"reference":[{"issue":"2","key":"39_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"1","key":"39_CR2","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","volume":"21","author":"J Liu","year":"2024","unstructured":"Liu, J., et al.: Deep industrial image anomaly detection: a survey. Mach. Intell. Res. 21(1), 104\u2013135 (2024)","journal-title":"Mach. Intell. Res."},{"key":"39_CR3","unstructured":"Yang, T., Chang, L., Yan, J., Li, J., Wang, Z., Zhang, K.: A survey on foundation-model-based industrial defect detection. arXiv preprint arXiv:2502.19106 (2025)"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Chen, J., Wang, C., Hong, Y., Mi, R., Zhang, L.J., Wu, Y., Wang, H., Zhou, Y.: A survey on anomaly detection with few-shot learning. In: International Conference on Cognitive Computing, pp. 34\u201350. Springer (2024)","DOI":"10.1007\/978-3-031-77954-1_3"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Li, C.L., Sohn, K., Yoon, J., Pfister, T.: Cutpaste: Self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664\u20139674 (2021)","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhou, Y., Xu, Y., Wang, Z.: Simplenet: a simple network for image anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20402\u201320411 (2023)","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Q., Luo, H., Lv, C., Zhang, Z.: A unified anomaly synthesis strategy with gradient ascent for industrial anomaly detection and localization. In: European Conference on Computer Vision, pp. 37\u201354. Springer (2025)","DOI":"10.1007\/978-3-031-72855-6_3"},{"key":"39_CR9","first-page":"1","volume-title":"Multilevel saliency-guided self-supervised learning for image anomaly detection","author":"J Qin","year":"2024","unstructured":"Qin, J., Gu, C., Yu, J., Zhang, C.: Multilevel saliency-guided self-supervised learning for image anomaly detection, pp. 1\u201313. Signal, Image and Video Processing pp (2024)"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, M., Zhou, X.: Realnet: a feature selection network with realistic synthetic anomaly for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16699\u201316708 (2024)","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"39_CR11","doi-asserted-by":"crossref","unstructured":"Hu, T., et al.: Anomalydiffusion: few-shot anomaly image generation with diffusion model. In: Proceedings of the AAAI Conference on Artificial Intelligence. vol.\u00a038, pp. 8526\u20138534 (2024)","DOI":"10.1609\/aaai.v38i8.28696"},{"key":"39_CR12","unstructured":"Hu, J., et al.: Anomalyxfusion: multi-modal anomaly synthesis with diffusion. arXiv preprint arXiv:2404.19444 (2024)"},{"key":"39_CR13","unstructured":"Li, H., et al.: A novel approach to industrial defect generation through blended latent diffusion model with online adaptation. arXiv preprint arXiv:2402.19330 (2024)"},{"key":"39_CR14","unstructured":"Radford, A., et\u00a0al.: Learning transferable visual models from natural language supervision. In: International Conference on Machine Learning, pp. 8748\u20138763. PMLR (2021)"},{"key":"39_CR15","doi-asserted-by":"crossref","unstructured":"Jeong, J., Zou, Y., Kim, T., Zhang, D., Ravichandran, A., Dabeer, O.: Winclip: zero-\/few-shot anomaly classification and segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 19606\u201319616 (2023)","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., et al.: Promptad: learning prompts with only normal samples for few-shot anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16838\u201316848 (2024)","DOI":"10.1109\/CVPR52733.2024.01594"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Cao, Y., Zhang, J., Frittoli, L., Cheng, Y., Shen, W., Boracchi, G.: Adaclip: adapting clip with hybrid learnable prompts for zero-shot anomaly detection. In: European Conference on Computer Vision, pp. 55\u201372. Springer (2025)","DOI":"10.1109\/TCYB.2025.3536165"},{"key":"39_CR18","unstructured":"Zhou, Q., Pang, G., Tian, Y., He, S., Chen, J.: Anomalyclip: object-agnostic prompt learning for zero-shot anomaly detection. arXiv preprint arXiv:2310.18961 (2023)"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Qu, Z., et al.: VCP-clip: a visual context prompting model for zero-shot anomaly segmentation. arXiv preprint arXiv:2407.12276 (2024)","DOI":"10.1007\/978-3-031-72890-7_18"},{"key":"39_CR20","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"39_CR21","unstructured":"Yang, Z., et al.: The dawn of LMMS: preliminary explorations with GPT-4v (ision). arXiv preprint arXiv:2309.174219(1), 1 (2023)"},{"key":"39_CR22","unstructured":"Li, J., Li, D., Xiong, C., Hoi, S.: Blip: bootstrapping language-image pre-training for unified vision-language understanding and generation. In: International Conference on Machine Learning, pp. 12888\u201312900. PMLR (2022)"},{"issue":"9","key":"39_CR23","doi-asserted-by":"publisher","first-page":"2337","DOI":"10.1007\/s11263-022-01653-1","volume":"130","author":"K Zhou","year":"2022","unstructured":"Zhou, K., Yang, J., Loy, C.C., Liu, Z.: Learning to prompt for vision-language models. Int. J. Comput. Vision 130(9), 2337\u20132348 (2022)","journal-title":"Int. J. Comput. Vision"},{"key":"39_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, J., Loy, C.C., Liu, Z.: Conditional prompt learning for vision-language models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16816\u201316825 (2022)","DOI":"10.1109\/CVPR52688.2022.01631"},{"key":"39_CR25","doi-asserted-by":"crossref","unstructured":"Yao, H., Zhang, R., Xu, C.: Visual-language prompt tuning with knowledge-guided context optimization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6757\u20136767 (2023)","DOI":"10.1109\/CVPR52729.2023.00653"},{"key":"39_CR26","unstructured":"Sohl-Dickstein, J., Weiss, E., Maheswaranathan, N., Ganguli, S.: Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning, pp. 2256\u20132265. pmlr (2015)"},{"key":"39_CR27","doi-asserted-by":"crossref","unstructured":"Jiang, B., Xie, Y., Li, J., Li, N., Jiang, Y., Xia, S.T.: Cagen: controllable anomaly generator using diffusion model. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). pp. 3110\u20133114. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10447663"},{"key":"39_CR28","doi-asserted-by":"crossref","unstructured":"Rombach, R., Blattmann, A., Lorenz, D., Esser, P., Ommer, B.: High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10684\u201310695 (2022)","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"39_CR29","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"39_CR30","unstructured":"Xie, G., Wang, J., Liu, J., Zheng, F., Jin, Y.: Pushing the limits of fewshot anomaly detection in industry vision: graphcore. arXiv preprint arXiv:2301.12082 (2023)"},{"key":"39_CR31","doi-asserted-by":"crossref","unstructured":"Damm, S., Laszkiewicz, M., Lederer, J., Fischer, A.: Anomalydino: boosting patch-based few-shot anomaly detection with dinov2. In: Proceedings of the Winter Conference on Applications of Computer Vision (WACV 2025) (2025)","DOI":"10.1109\/WACV61041.2025.00136"},{"key":"39_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2025.111409","volume":"162","author":"Y Li","year":"2025","unstructured":"Li, Y., Wang, H., Duan, Y., Zhang, J., Li, X.: A closer look at the explainability of contrastive language-image pre-training. Patt. Recogn. 162, 111409 (2025)","journal-title":"Patt. Recogn."},{"key":"39_CR33","unstructured":"Oord, A.v.d., Li, Y., Vinyals, O.: Representation learning with contrastive predictive coding. arXiv preprint arXiv:1807.03748 (2018)"},{"key":"39_CR34","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: Mvtec ad\u2013a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)"},{"key":"39_CR35","doi-asserted-by":"crossref","unstructured":"Zou, Y., Jeong, J., Pemula, L., Zhang, D., Dabeer, O.: Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. In: European Conference on Computer Vision, pp. 392\u2013408. Springer (2022)","DOI":"10.1007\/978-3-031-20056-4_23"},{"issue":"1","key":"39_CR36","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1148\/radiology.143.1.7063747","volume":"143","author":"JA Hanley","year":"1982","unstructured":"Hanley, J.A., McNeil, B.J.: The meaning and use of the area under a receiver operating characteristic (roc) curve. Radiology 143(1), 29\u201336 (1982)","journal-title":"Radiology"},{"key":"39_CR37","unstructured":"Schuhmann, C., et al.: Laion-400m: open dataset of clip-filtered 400 million image-text pairs. arXiv preprint arXiv:2111.02114 (2021)"},{"key":"39_CR38","unstructured":"Tamura, M.: Random word data augmentation with clip for zero-shot anomaly detection. arXiv preprint arXiv:2308.11119 (2023)"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5755-4_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T12:31:27Z","timestamp":1768221087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5755-4_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819557547","9789819557554"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5755-4_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"13 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.prcv.cn\/index.asp","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}