{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T04:18:27Z","timestamp":1744345107286,"version":"3.40.4"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819784929"},{"type":"electronic","value":"9789819784936"}],"license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8493-6_21","type":"book-chapter","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T20:03:10Z","timestamp":1730404990000},"page":"294-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Anomaly Detection Using Spatial-Alignment and Multi-scale Fusion"],"prefix":"10.1007","author":[{"given":"Keming","family":"Jiao","sequence":"first","affiliation":[]},{"given":"Xincheng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baozhu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chongyang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,1]]},"reference":[{"issue":"6","key":"21_CR1","first-page":"33","volume":"29","author":"EH Adelson","year":"1984","unstructured":"Adelson, E.H., Anderson, C.H., Bergen, J.R., Burt, P.J., Ogden, J.M.: Pyramid methods in image processing. RCA Eng. 29(6), 33\u201341 (1984)","journal-title":"RCA Eng."},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD\u2014A comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600 (2019)","DOI":"10.1109\/CVPR.2019.00982"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Bergmann, P., L\u00f6we, S., Fauser, M., Sattlegger, D., Steger, C.: Improving unsupervised defect segmentation by applying structural similarity to autoencoders. arXiv:1807.02011 (2018)","DOI":"10.5220\/0007364503720380"},{"issue":"16","key":"21_CR4","doi-asserted-by":"publisher","first-page":"7657","DOI":"10.3390\/app11167657","volume":"11","author":"Y Chen","year":"2021","unstructured":"Chen, Y., Ding, Y., Zhao, F., Zhang, E., Wu, Z., Shao, L.: Surface defect detection methods for industrial products: a review. Appl. Sci. 11(16), 7657 (2021)","journal-title":"Appl. Sci."},{"key":"21_CR5","unstructured":"Cohen, N., Hoshen, Y.: Sub-image anomaly detection with deep pyramid correspondences. arXiv:2005.02357 (2020)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: PaDiM: a patch distribution modeling framework for anomaly detection and localization. In: International Conference on Pattern Recognition, pp. 475\u2013489. Springer (2021)","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security, pp. 77\u2013101 (2002)","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"21_CR9","unstructured":"Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., Bengio, Y.: Generative adversarial nets. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"21_CR11","unstructured":"Hinton, G., Vinyals, O., Dean, J.: Distilling the knowledge in a neural network. arXiv:1503.02531 (2015)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504\u2013507 (2006)","DOI":"10.1126\/science.1127647"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00371-018-1588-5","volume":"36","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Qiu, C., Yuan, K.: Surface defect saliency of magnetic tile. Vis. Comput. 36(1), 85\u201396 (2020)","journal-title":"Vis. Comput."},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kim, D., Park, C., Cho, S., Lee, S.: FAPM: fast adaptive patch memory for real-time industrial anomaly detection. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10096400"},{"key":"21_CR15","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 25 (2012)"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","volume":"10","author":"S Lee","year":"2022","unstructured":"Lee, S., Lee, S., Song, B.C.: CFA: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access 10, 78446\u201378454 (2022)","journal-title":"IEEE Access"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/2036466","volume":"2021","author":"B Liu","year":"2021","unstructured":"Liu, B., Chen, Y., Xie, J., Chen, B.: Industrial printing image defect detection using multi-edge feature fusion algorithm. Complexity 2021, 1\u201310 (2021)","journal-title":"Complexity"},{"issue":"4","key":"21_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s10921-015-0315-7","volume":"34","author":"D Mery","year":"2015","unstructured":"Mery, D., Riffo, V., Zscherpel, U., Mondrag\u00f3n, G., Lillo, I., Zuccar, I., Lobel, H., Carrasco, M.: GDXray: the database of X-ray images for nondestructive testing. J. Nondestr. Eval. 34(4), 42 (2015)","journal-title":"J. Nondestr. Eval."},{"issue":"2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surveys (CSUR) 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Reiss, T., Cohen, N., Bergman, L., Hoshen, Y.: PANDA: adapting pretrained features for anomaly detection and segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2806\u20132814 (2021)","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Rippel, O., Mertens, P., Merhof, D.: Modeling the distribution of normal data in pre-trained deep features for anomaly detection. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 6726\u20136733. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412109"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., Gehler, P.: Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14318\u201314328 (2022)","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Rublee, E., Rabaud, V., Konolige, K., Bradski, G.: ORB: An efficient alternative to sift or surf. In: 2011 International Conference on Computer Vision, pp. 2564\u20132571. IEEE (2011)","DOI":"10.1109\/ICCV.2011.6126544"},{"key":"21_CR24","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11263-007-0090-8","volume":"77","author":"BC Russell","year":"2008","unstructured":"Russell, B.C., Torralba, A., Murphy, K.P., Freeman, W.T.: LabelMe: a database and web-based tool for image annotation. Int. J. Comput. Vis. 77, 157\u2013173 (2008)","journal-title":"Int. J. Comput. Vis."},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International Conference on Information Processing in Medical Imaging, pp. 146\u2013157. Springer (2017)","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Vojir, T., \u0160ipka, T., Aljundi, R., Chumerin, N., Reino, D.O., Matas, J.: Road anomaly detection by partial image reconstruction with segmentation coupling. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 15651\u201315660 (2021)","DOI":"10.1109\/ICCV48922.2021.01536"},{"key":"21_CR28","unstructured":"Xie, G., Wang, J., Liu, J., Zheng, F., Jin, Y.: Pushing the limits of fewshot anomaly detection in industry vision: GraphCore. arXiv:2301.12082 (2023)"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: DRAEM\u2014A discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8330\u20138339 (2021)","DOI":"10.1109\/ICCV48922.2021.00822"},{"issue":"3","key":"21_CR30","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TAI.2021.3057027","volume":"1","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Feng, S., Wang, X., Wang, Y.: ZJU-Leaper: a benchmark dataset for fabric defect detection and a comparative study. IEEE Trans. Artif. Intell. 1(3), 219\u2013232 (2020)","journal-title":"IEEE Trans. Artif. Intell."},{"issue":"12","key":"21_CR31","doi-asserted-by":"publisher","first-page":"1440","DOI":"10.3390\/sym11121440","volume":"11","author":"E Zhang","year":"2019","unstructured":"Zhang, E., Li, B., Li, P., Chen, Y.: A deep learning based printing defect classification method with imbalanced samples. Symmetry 11(12), 1440 (2019)","journal-title":"Symmetry"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8493-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T19:08:47Z","timestamp":1744312127000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8493-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,1]]},"ISBN":["9789819784929","9789819784936"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8493-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,1]]},"assertion":[{"value":"1 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}