{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T11:45:51Z","timestamp":1762429551029,"version":"3.44.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s00371-025-04073-7","type":"journal-article","created":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T02:47:10Z","timestamp":1751338030000},"page":"10857-10872","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight self-supervised anomaly detection via feature space synthesis for industrial applications"],"prefix":"10.1007","volume":"41","author":[{"given":"Shen-Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Rui-Sheng","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,1]]},"reference":[{"key":"4073_CR1","doi-asserted-by":"publisher","unstructured":"Kim, D., et al. \"Fapm: fast adaptive patch memory for real-time industrial anomaly detection.\" In: ICASSP 2023\u20132023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, (2023). https:\/\/doi.org\/10.1109\/icassp49357.2023.10096400","DOI":"10.1109\/icassp49357.2023.10096400"},{"key":"4073_CR2","doi-asserted-by":"publisher","unstructured":"Yamada, S., Satoshi K., and Kazuhiro H. \"Reconstructed student-teacher and discriminative networks for anomaly detection.\"In: 2022 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE, (2022) https:\/\/doi.org\/10.1109\/iros47612.2022.9981509","DOI":"10.1109\/iros47612.2022.9981509"},{"issue":"1","key":"4073_CR3","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TII.2021.3085669","volume":"18","author":"J Li","year":"2021","unstructured":"Li, J., Chen, J., Sheng, B., Li, P., Yang, P., Feng, D.D., Qi, J.: Automatic detection and classification system of domestic waste via multimodel cascaded convolutional neural network. IEEE Trans. Indus. Inf. 18(1), 163\u201373 (2021)","journal-title":"IEEE Trans. Indus. Inf."},{"key":"4073_CR4","doi-asserted-by":"publisher","unstructured":"Li, Jingyao, et al. \"Rethinking out-of-distribution (ood) detection: masked image modeling is all you need.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. (2023). https:\/\/doi.org\/10.1109\/cvpr52729.2023.01114","DOI":"10.1109\/cvpr52729.2023.01114"},{"key":"4073_CR5","doi-asserted-by":"publisher","first-page":"7068","DOI":"10.1109\/ijcnn52387.2021.9533899","volume":"34","author":"S Fort","year":"2021","unstructured":"Fort, S., Ren, J., Lakshminarayanan, B.: Exploring the limits of out-of-distribution detection. Adv. Neural. Inf. Process. Syst. 34, 7068\u20137081 (2021). https:\/\/doi.org\/10.1109\/ijcnn52387.2021.9533899","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"4073_CR6","doi-asserted-by":"publisher","unstructured":"Zhou, Y. \"Rethinking reconstruction autoencoder-based out-of-distribution detection.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2022). https:\/\/doi.org\/10.1109\/cvpr52688.2022.00723","DOI":"10.1109\/cvpr52688.2022.00723"},{"issue":"9\u201310","key":"4073_CR7","doi-asserted-by":"publisher","first-page":"962","DOI":"10.1177\/0040517520966733","volume":"91","author":"Q Zhou","year":"2021","unstructured":"Zhou, Q., et al.: Semi-supervised fabric defect detection based on image reconstruction and density estimation. Text. Res. J. 91(9\u201310), 962\u2013972 (2021). https:\/\/doi.org\/10.1177\/0040517520966733","journal-title":"Text. Res. J."},{"key":"4073_CR8","doi-asserted-by":"publisher","unstructured":"Chen, Y., et al. \"LGFDR: local and global feature denoising reconstruction for unsupervised anomaly detection.\" The Visual Computer (2024): 1\u201314. https:\/\/doi.org\/10.1007\/s00371-024-03281-x","DOI":"10.1007\/s00371-024-03281-x"},{"key":"4073_CR9","doi-asserted-by":"publisher","unstructured":"Zavrtanik, V., Matej K., and Danijel S. \"Draem-a discriminatively trained reconstruction embedding for surface anomaly detection.\" In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (2021). https:\/\/doi.org\/10.1109\/iccv48922.2021.00822","DOI":"10.1109\/iccv48922.2021.00822"},{"key":"4073_CR10","doi-asserted-by":"publisher","unstructured":"Pourreza, M., et al. \"G2d: Generate to detect anomaly.\" In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (2021). https:\/\/doi.org\/10.1109\/wacv48630.2021.00205","DOI":"10.1109\/wacv48630.2021.00205"},{"key":"4073_CR11","doi-asserted-by":"publisher","unstructured":"Cohen, N., and Yedid H. \"Sub-image anomaly detection with deep pyramid correspondences.\"\u00a0arXiv preprint arXiv:2005.02357\u00a0(2020). https:\/\/doi.org\/10.48550\/arXiv.2005.02357","DOI":"10.48550\/arXiv.2005.02357"},{"key":"4073_CR12","doi-asserted-by":"publisher","unstructured":"Defard, T., et al. \"Padim: a patch distribution modeling framework for anomaly detection and localization.\" In: International Conference on Pattern Recognition. Cham: Springer International Publishing, (2021). https:\/\/doi.org\/10.1007\/978-3-030-68799-1_35","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"4073_CR13","doi-asserted-by":"publisher","unstructured":"Dehaene, D., et al. \"Iterative energy-based projection on a normal data manifold for anomaly localization.\"\u00a0arXiv preprint arXiv:2002.03734\u00a0(2020). https:\/\/doi.org\/10.48550\/arXiv.2002.03734","DOI":"10.48550\/arXiv.2002.03734"},{"key":"4073_CR14","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., et al.: f-AnoGAN: fast unsupervised anomaly detection with generative adversarial networks. Med. Image Anal. 54, 30\u201344 (2019). https:\/\/doi.org\/10.1016\/j.media.2019.01.010","journal-title":"Med. Image Anal."},{"issue":"1","key":"4073_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.vrih.2022.07.006","volume":"5","author":"M Zhang","year":"2023","unstructured":"Zhang, M., Tian, X.: Transformer architecture based on mutual attention for image-anomaly detection. Virtual Real. Intell. Hardware 5(1), 57\u201367 (2023). https:\/\/doi.org\/10.1016\/j.vrih.2022.07.006","journal-title":"Virtual Real. Intell. Hardware"},{"key":"4073_CR16","doi-asserted-by":"publisher","unstructured":"Deng, H., and Xingyu L. \"Anomaly detection via reverse distillation from one-class embedding.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2022). https:\/\/doi.org\/10.1109\/cvpr52688.2022.00951","DOI":"10.1109\/cvpr52688.2022.00951"},{"key":"4073_CR17","doi-asserted-by":"publisher","unstructured":"Rudolph, M., et al. \"Fully convolutional cross-scale-flows for image-based defect detection.\" In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. (2022). https:\/\/doi.org\/10.1109\/wacv51458.2022.00189","DOI":"10.1109\/wacv51458.2022.00189"},{"key":"4073_CR18","doi-asserted-by":"publisher","unstructured":"Rudolph, M., Bastian W., and Bodo R. \"Same same but differnet: semi-supervised defect detection with normalizing flows.\" In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (2021). https:\/\/doi.org\/10.1109\/wacv48630.2021.00195","DOI":"10.1109\/wacv48630.2021.00195"},{"key":"4073_CR19","doi-asserted-by":"publisher","unstructured":"Bae, J., Lee, J-H, and Kim, S. \"PNI: industrial anomaly detection using position and neighborhood information\". In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (2023) https:\/\/doi.org\/10.1109\/iccv51070.2023.00586","DOI":"10.1109\/iccv51070.2023.00586"},{"key":"4073_CR20","doi-asserted-by":"publisher","first-page":"107706","DOI":"10.1016\/j.patcog.2020.107706","volume":"112","author":"V Zavrtanik","year":"2021","unstructured":"Zavrtanik, V., Kristan, M., Sko\u010daj, D.: Reconstruction by inpainting for visual anomaly detection. Pattern Recogn. 112, 107706 (2021). https:\/\/doi.org\/10.1016\/j.patcog.2020.107706","journal-title":"Pattern Recogn."},{"key":"4073_CR21","doi-asserted-by":"publisher","unstructured":"Zenati, H., et al. \"Efficient gan-based anomaly detection.\"\u00a0arXiv preprint arXiv: 1802.06222\u00a0(2018). https:\/\/doi.org\/10.48550\/arXiv.1802.06222","DOI":"10.48550\/arXiv.1802.06222"},{"key":"4073_CR22","doi-asserted-by":"publisher","unstructured":"Li, C. -L., et al. \"Cutpaste: self-supervised learning for anomaly detection and localization.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.00954","DOI":"10.1109\/cvpr46437.2021.00954"},{"issue":"1","key":"4073_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00371-018-1588-5","volume":"36","author":"Y Huang","year":"2020","unstructured":"Huang, Y., Qiu, C., Yuan, K.: Surface defect saliency of magnetic tile. Vis. Comput. 36(1), 85\u201396 (2020). https:\/\/doi.org\/10.1007\/s00371-018-1588-5","journal-title":"Vis. Comput."},{"issue":"10","key":"4073_CR24","doi-asserted-by":"publisher","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","volume":"25","author":"S Lee","year":"2022","unstructured":"Lee, S., Lee, S., Song, B.C.: Cfa: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization. IEEE Access. 25(10), 78446\u201354 (2022)","journal-title":"IEEE Access."},{"key":"4073_CR25","doi-asserted-by":"publisher","unstructured":"Reiss, T., et al. \"Panda: adapting pretrained features for anomaly detection and segmentation.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. (2021). https:\/\/doi.org\/10.1109\/cvpr46437.2021.00283","DOI":"10.1109\/cvpr46437.2021.00283"},{"key":"4073_CR26","doi-asserted-by":"publisher","unstructured":"Xiao, F., Ruoyu S., and Jicong F. \"Restricted generative projection for one-class classification and anomaly detection.\"\u00a0arXiv preprint arXiv:2307.04097 (2023). https:\/\/doi.org\/10.48550\/arXiv.2307.04097","DOI":"10.48550\/arXiv.2307.04097"},{"key":"4073_CR27","doi-asserted-by":"publisher","unstructured":"Gudovskiy, D., Shun I., and Kazuki K. \"Cflow-ad: real-time unsupervised anomaly detection with localization via conditional normalizing flows.\"In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision. (2022). https:\/\/doi.org\/10.1109\/wacv51458.2022.00188","DOI":"10.1109\/wacv51458.2022.00188"},{"key":"4073_CR28","doi-asserted-by":"publisher","unstructured":"Lei, J., et al. \"Pyramidflow: high-resolution defect contrastive localization using pyramid normalizing flow.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2023. https:\/\/doi.org\/10.1109\/cvpr52729.2023.01359","DOI":"10.1109\/cvpr52729.2023.01359"},{"key":"4073_CR29","doi-asserted-by":"publisher","unstructured":"Roth, K., et al. \"Towards total recall in industrial anomaly detection.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. (2022). https:\/\/doi.org\/10.1109\/cvpr52688.2022.01392","DOI":"10.1109\/cvpr52688.2022.01392"},{"key":"4073_CR30","doi-asserted-by":"publisher","unstructured":"Hou, J., et al. \"Divide-and-assemble: learning block-wise memory for unsupervised anomaly detection.\" In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. (2021). https:\/\/doi.org\/10.1109\/iccv48922.2021.00867","DOI":"10.1109\/iccv48922.2021.00867"},{"key":"4073_CR31","doi-asserted-by":"publisher","unstructured":"Zhang, X., et al. \"Destseg: segmentation guided denoising student-teacher for anomaly detection.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. (2023) https:\/\/doi.org\/10.1109\/cvpr52729.2023.00381","DOI":"10.1109\/cvpr52729.2023.00381"},{"key":"4073_CR32","doi-asserted-by":"publisher","unstructured":"Wang, G., et al. \"Student-teacher feature pyramid matching for anomaly detection.\"\u00a0arXiv preprint arXiv:2103.04257\u00a0(2021). https:\/\/doi.org\/10.48550\/arXiv.2103.04257","DOI":"10.48550\/arXiv.2103.04257"},{"key":"4073_CR33","doi-asserted-by":"publisher","unstructured":"Chan, R., et al. \"Segmentmeifyoucan: a benchmark for anomaly segmentation.\" arXiv preprint arXiv: 2104.14812 (2021). https:\/\/doi.org\/10.48550\/arXiv.2104.14812","DOI":"10.48550\/arXiv.2104.14812"},{"key":"4073_CR34","doi-asserted-by":"publisher","unstructured":"Chan, R., Rottmann, M., and Gottschalk, H. \"Entropy maximization and meta classification for out-of-distribution detection in semantic segmentation.\" In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. (2021). https:\/\/doi.org\/10.1109\/iccv48922.2021.00508","DOI":"10.1109\/iccv48922.2021.00508"},{"key":"4073_CR35","doi-asserted-by":"publisher","unstructured":"Bergmann, P., et al. \"MVTec AD--A comprehensive real-world dataset for unsupervised anomaly detection.\" In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2019). https:\/\/doi.org\/10.1109\/cvpr.2019.00982","DOI":"10.1109\/cvpr.2019.00982"},{"key":"4073_CR36","doi-asserted-by":"publisher","unstructured":"Zou, Y, et al. \"Spot-the-difference self-supervised pre-training for anomaly detection and segmentation.\" In: European Conference on Computer Vision. Cham: Springer Nature Switzerland, (2022). https:\/\/doi.org\/10.1007\/978-3-031-20056-4_23","DOI":"10.1007\/978-3-031-20056-4_23"},{"key":"4073_CR37","doi-asserted-by":"publisher","unstructured":"Jezek, S., et al. \"Deep learning-based defect detection of metal parts: evaluating current methods in complex conditions.\" In: 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). IEEE, (2021). https:\/\/doi.org\/10.1109\/ICUMT54235.2021.9631567","DOI":"10.1109\/ICUMT54235.2021.9631567"},{"key":"4073_CR38","doi-asserted-by":"publisher","unstructured":"Deng, J., et al. \"Imagenet: a large-scale hierarchical image database.\" In: 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, (2009). https:\/\/doi.org\/10.1109\/cvprw.2009.5206848","DOI":"10.1109\/cvprw.2009.5206848"},{"key":"4073_CR39","doi-asserted-by":"publisher","first-page":"105835","DOI":"10.1016\/j.engappai.2023.105835","volume":"119","author":"M Yang","year":"2023","unstructured":"Yang, M., Peng, Wu., Feng, H.: MemSeg: a semi-supervised method for image surface defect detection using differences and commonalities. Eng. Appl. Artif. Intell. 119, 105835 (2023). https:\/\/doi.org\/10.1016\/j.engappai.2023.105835","journal-title":"Eng. Appl. Artif. Intell."},{"key":"4073_CR40","doi-asserted-by":"publisher","unstructured":"Zhou, Y., et al. \"Msflow: Multiscale flow-based framework for unsupervised anomaly detection.\" In: IEEE Transactions on Neural Networks and Learning Systems (2024). https:\/\/doi.org\/10.1109\/tnnls.2023.3344118","DOI":"10.1109\/tnnls.2023.3344118"},{"key":"4073_CR41","doi-asserted-by":"publisher","unstructured":"Liu, Z., et al. \"Simplenet: a simple network for image anomaly detection and localization.\"In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (2023). https:\/\/doi.org\/10.1109\/cvpr52729.2023.01954","DOI":"10.1109\/cvpr52729.2023.01954"},{"key":"4073_CR42","doi-asserted-by":"publisher","unstructured":"Zhang, H., et al. \"Diffusion AD: norm-guided one-step denoising diffusion for anomaly detection.\"\u00a0arXiv preprint arXiv:2303.08730\u00a0(2023). https:\/\/doi.org\/10.48550\/arXiv.2303.08730","DOI":"10.48550\/arXiv.2303.08730"},{"key":"4073_CR43","doi-asserted-by":"publisher","unstructured":"Yu, J., et al. \"Fastflow: unsupervised anomaly detection and localization via 2d normalizing flows.\"\u00a0arXiv preprint arXiv:2111.07677. (2021). https:\/\/doi.org\/10.48550\/arXiv.2111.07677","DOI":"10.48550\/arXiv.2111.07677"},{"key":"4073_CR44","doi-asserted-by":"publisher","unstructured":"Rudolph, M., et al. \"Asymmetric student-teacher networks for industrial anomaly detection.\" In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (2023). https:\/\/doi.org\/10.1109\/wacv56688.2023.00262","DOI":"10.1109\/wacv56688.2023.00262"},{"key":"4073_CR45","doi-asserted-by":"publisher","unstructured":"Mousakhan, A., Thomas B., and Jawad T. \"Anomaly detection with conditioned denoising diffusion models.\" arXiv preprint arXiv:2305.15956 (2023). https:\/\/doi.org\/10.48550\/arXiv.2305.15956","DOI":"10.48550\/arXiv.2305.15956"},{"key":"4073_CR46","doi-asserted-by":"publisher","unstructured":"Pietrosanti, G. M., et al. \"Benchmarking the spatial robustness of DNNs via natural and adversarial localized corruptions.\" arXiv preprint arXiv:2504.01632 (2025). https:\/\/doi.org\/10.1109\/vcip49819.2020.9301856","DOI":"10.1109\/vcip49819.2020.9301856"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04073-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-025-04073-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-025-04073-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,24]],"date-time":"2025-09-24T14:03:21Z","timestamp":1758722601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-025-04073-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,1]]},"references-count":46,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["4073"],"URL":"https:\/\/doi.org\/10.1007\/s00371-025-04073-7","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"type":"print","value":"0178-2789"},{"type":"electronic","value":"1432-2315"}],"subject":[],"published":{"date-parts":[[2025,7,1]]},"assertion":[{"value":"17 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}