{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:02:33Z","timestamp":1777042953660,"version":"3.51.4"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s00521-025-11367-3","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T13:44:03Z","timestamp":1749476643000},"page":"17031-17054","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-model anomaly detection for industrial inspection with dynamic loss weighting and soft-hard features loss"],"prefix":"10.1007","volume":"37","author":[{"given":"Willy Fitra","family":"Hendria","sequence":"first","affiliation":[]},{"given":"Hanbi","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Daeho","family":"Seo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"11367_CR1","doi-asserted-by":"publisher","DOI":"10.1145\/3439950","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Hengel AVD (2021) Deep learning for anomaly detection: a review. ACM Comput Surv. https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Comput Surv"},{"key":"11367_CR2","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2019) Mvtec ad\u2014a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 9592\u20139600","DOI":"10.1109\/CVPR.2019.00982"},{"key":"11367_CR3","unstructured":"Kotsiantis SB (2007) Supervised machine learning: a review of classification techniques. In: Proceedings of the 2007 conference on emerging artificial intelligence applications in computer engineering: real word AI systems with applications in EHealth, HCI, information retrieval and pervasive technologies. IOS Press, NLD, pp 3\u201324"},{"key":"11367_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2020) Uninformed students: student\u2013teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 4183\u20134192","DOI":"10.1109\/CVPR42600.2020.00424"},{"issue":"4","key":"11367_CR5","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","volume":"130","author":"P Bergmann","year":"2022","unstructured":"Bergmann P, Batzner K, Fauser M, Sattlegger D, Steger C (2022) Beyond dents and scratches: logical constraints in unsupervised anomaly detection and localization. Int J Comput Vis 130(4):947\u2013969","journal-title":"Int J Comput Vis"},{"key":"11367_CR6","doi-asserted-by":"crossref","unstructured":"Batzner K, Heckler L, K\u00f6nig R (2023) Efficientad: accurate visual anomaly detection at millisecond-level latencies. arXiv:2303.14535 [cs.CV]","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"11367_CR7","doi-asserted-by":"crossref","unstructured":"Wang Y, Peng J, Zhang J, Yi R, Wang Y, Wang C (2023) Multimodal industrial anomaly detection via hybrid fusion. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 8032\u20138041","DOI":"10.1109\/CVPR52729.2023.00776"},{"key":"11367_CR8","doi-asserted-by":"crossref","unstructured":"Thomine S, Snoussi H, Soua M (2023) Mixedteacher: knowledge distillation for fast inference textural anomaly detection. arXiv preprint arXiv:2306.09859","DOI":"10.5220\/0011633100003417"},{"key":"11367_CR9","doi-asserted-by":"publisher","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, pp 248\u2013255. https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"11367_CR10","first-page":"89","volume-title":"Internet of vehicles\u2014safe and intelligent mobility","author":"ML Han","year":"2015","unstructured":"Han ML, Lee J, Kang AR, Kang S, Park JK, Kim HK (2015) A statistical-based anomaly detection method for connected cars in internet of things environment. In: Hsu C-H, Xia F, Liu X, Wang S (eds) Internet of vehicles\u2014safe and intelligent mobility. Springer, Cham, pp 89\u201397"},{"key":"11367_CR11","doi-asserted-by":"publisher","unstructured":"Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K (2007) Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proceedings of the 2007 workshop on large scale attack defense. LSAD\u201907. Association for Computing Machinery, New York, NY, USA, pp 145\u2013152. https:\/\/doi.org\/10.1145\/1352664.1352675","DOI":"10.1145\/1352664.1352675"},{"issue":"1\u20132","key":"11367_CR12","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.14778\/1920841.1921021","volume":"3","author":"GH Orair","year":"2010","unstructured":"Orair GH, Teixeira CHC, Meira W, Wang Y, Parthasarathy S (2010) Distance-based outlier detection: consolidation and renewed bearing. Vldb 3(1\u20132):1469\u20131480. https:\/\/doi.org\/10.14778\/1920841.1921021","journal-title":"Vldb"},{"issue":"2","key":"11367_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"MM Breunig","year":"2000","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LoF: identifying density-based local outliers. ACM SIGMOD Record 29(2):93\u2013104. https:\/\/doi.org\/10.1145\/335191.335388","journal-title":"ACM SIGMOD Record"},{"key":"11367_CR14","doi-asserted-by":"publisher","unstructured":"Amer M, Goldstein M, Abdennadher S (2013) Enhancing one-class support vector machines for unsupervised anomaly detection. In: Proceedings of the ACM SIGKDD workshop on outlier detection and description. ODD\u201913. Association for computing machinery, New York, NY, USA, pp 8\u201315. https:\/\/doi.org\/10.1145\/2500853.2500857","DOI":"10.1145\/2500853.2500857"},{"key":"11367_CR15","doi-asserted-by":"publisher","unstructured":"Zhang M, Xu B, Gong J (2015) An anomaly detection model based on one-class SVM to detect network intrusions. In: 2015 11th international conference on mobile ad-hoc and sensor networks (MSN), pp 102\u2013107. https:\/\/doi.org\/10.1109\/MSN.2015.40","DOI":"10.1109\/MSN.2015.40"},{"key":"11367_CR16","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","volume-title":"Computer Vision - ACCV 2018","author":"S Akcay","year":"2019","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) Ganomaly: semi-supervised anomaly detection via adversarial training. In: Jawahar CV, Li H, Mori G, Schindler K (eds) Computer Vision - ACCV 2018. Springer, Cham, pp 622\u2013637"},{"key":"11367_CR17","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International conference on information processing in medical imaging. Springer, pp 146\u2013157","DOI":"10.1007\/978-3-319-59050-9_12"},{"issue":"1","key":"11367_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N G\u00f6rnitz","year":"2013","unstructured":"G\u00f6rnitz N, Kloft M, Rieck K, Brefeld U (2013) Toward supervised anomaly detection. J Artif Intell Res 46(1):235\u2013262","journal-title":"J Artif Intell Res"},{"issue":"6","key":"11367_CR19","doi-asserted-by":"publisher","first-page":"7781","DOI":"10.1109\/TPAMI.2022.3225476","volume":"45","author":"Z Chen","year":"2023","unstructured":"Chen Z, Duan J, Kang L, Qiu G (2023) Supervised anomaly detection via conditional generative adversarial network and ensemble active learning. IEEE Trans Pattern Anal Mach Intell 45(6):7781\u20137798. https:\/\/doi.org\/10.1109\/TPAMI.2022.3225476","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"1","key":"11367_CR20","first-page":"3","volume":"5","author":"MS Minhas","year":"2020","unstructured":"Minhas MS, Zelek J (2020) Semi-supervised anomaly detection using autoencoders. J Comput Vis Imaging Syst 5(1):3","journal-title":"J Comput Vis Imaging Syst"},{"key":"11367_CR21","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-031-20056-4_23","volume-title":"Computer vision - ECCV 2022","author":"Y Zou","year":"2022","unstructured":"Zou Y, Jeong J, Pemula L, Zhang D, Dabeer O (2022) Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. In: Avidan S, Brostow G, Ciss\u00e9 M, Farinella GM, Hassner T (eds) Computer vision - ECCV 2022. Springer, Cham, pp 392\u2013408"},{"key":"11367_CR22","doi-asserted-by":"crossref","unstructured":"Baur C, Wiestler B, Albarqouni S, Navab N: Deep autoencoding models for unsupervised anomaly segmentation in brain MR images. In: Brainlesion: Glioma, multiple sclerosis, stroke and traumatic brain injuries: 4th international workshop, BrainLes 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Revised Selected Papers, Part I 4. Springer, Berlin, pp 161\u2013169 (2019)","DOI":"10.1007\/978-3-030-11723-8_16"},{"key":"11367_CR23","doi-asserted-by":"crossref","unstructured":"Vasilev A, Golkov V, Meissner M, Lipp I, Sgarlata E, Tomassini V, Jones DK, Cremers D: q-space novelty detection with variational autoencoders. In: Computational diffusion MRI: MICCAI workshop, Shenzhen, China, October 2019. Springer, Berlin, pp 113\u2013124 (2020)","DOI":"10.1007\/978-3-030-52893-5_10"},{"key":"11367_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Langs G, Schmidt-Erfurth U (2019) f-AnoGAN: fast unsupervised anomaly detection with generative adversarial networks. Med image Anal 54:30\u201344","journal-title":"Med image Anal"},{"key":"11367_CR25","doi-asserted-by":"crossref","unstructured":"Defard T, Setkov A, Loesch A, Audigier R (2021) Padim: a patch distribution modeling framework for anomaly detection and localization. In: International conference on pattern recognition. Springer, pp 475\u2013489","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"11367_CR26","doi-asserted-by":"crossref","unstructured":"Roth K, Pemula L, Zepeda J, Sch\u00f6lkopf B, Brox T, Gehler P (2022) Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 14318\u201314328","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"11367_CR27","doi-asserted-by":"publisher","unstructured":"Burlina P, Joshi N, Wang I-J: Where\u2019s wally now? Deep generative and discriminative embeddings for novelty detection. In: 2019 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp 11499\u201311508 (2019). https:\/\/doi.org\/10.1109\/CVPR.2019.01177","DOI":"10.1109\/CVPR.2019.01177"},{"key":"11367_CR28","unstructured":"Tang C, Zhou S, Li Y, Dong Y, Wang L: Advancing pre-trained teacher: towards robust feature discrepancy for anomaly detection. arXiv preprint arXiv:2405.02068 (2024)"},{"key":"11367_CR29","first-page":"596","volume":"33","author":"K Sohn","year":"2020","unstructured":"Sohn K, Berthelot D, Carlini N, Zhang Z, Zhang H, Raffel CA, Cubuk ED, Kurakin A, Li C-L (2020) Fixmatch: simplifying semi-supervised learning with consistency and confidence. Adv Neural Inf Process Syst 33:596\u2013608","journal-title":"Adv Neural Inf Process Syst"},{"key":"11367_CR30","first-page":"18408","volume":"34","author":"B Zhang","year":"2021","unstructured":"Zhang B, Wang Y, Hou W, Wu H, Wang J, Okumura M, Shinozaki T (2021) Flexmatch: boosting semi-supervised learning with curriculum pseudo labeling. Adv Neural Inf Process Syst 34:18408\u201318419","journal-title":"Adv Neural Inf Process Syst"},{"key":"11367_CR31","doi-asserted-by":"publisher","unstructured":"Georgescu M-I, Brblu A, Ionescu RT, Shahbaz\u00a0Khan F, Popescu M, Shah M (2021) Anomaly detection in video via self-supervised and multi-task learning. In: 2021 IEEE\/CVF conference on computer vision and pattern recognition (CVPR), pp 12737\u201312747. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01255","DOI":"10.1109\/CVPR46437.2021.01255"},{"key":"11367_CR32","doi-asserted-by":"crossref","unstructured":"Salehi M, Sadjadi N, Baselizadeh S, Rohban MH, Rabiee HR (2021) Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 14902\u201314912","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"11367_CR33","doi-asserted-by":"publisher","DOI":"10.3390\/e23020201","author":"Q Xiao","year":"2021","unstructured":"Xiao Q, Wang J, Lin Y, Gongsa W, Hu G, Li M, Wang F (2021) Unsupervised anomaly detection with distillated teacher\u2013student network ensemble. Entropy. https:\/\/doi.org\/10.3390\/e23020201","journal-title":"Entropy"},{"key":"11367_CR34","doi-asserted-by":"crossref","unstructured":"Rudolph M, Wehrbein T, Rosenhahn B, Wandt B (2023) Asymmetric student\u2013teacher networks for industrial anomaly detection. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp 2592\u20132602","DOI":"10.1109\/WACV56688.2023.00262"},{"key":"11367_CR35","unstructured":"Hinton G, Vinyals O, Dean J (2015) Distilling the knowledge in a neural network. In: NIPS deep learning and representation learning workshop. http:\/\/arxiv.org\/abs\/1503.02531"},{"key":"11367_CR36","doi-asserted-by":"crossref","unstructured":"Wang G, Han S, Ding E, Huang D (2021) Student-teacher feature pyramid matching for anomaly detection. In: The British Machine Vision Conference (BMVC)","DOI":"10.5244\/C.35.349"},{"key":"11367_CR37","unstructured":"Simonyan K, Zisserman A (2015) Very deep convolutional networks for large-scale image recognition. In: Bengio Y, LeCun Y (eds) 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7\u20139, 2015, conference track proceedings. http:\/\/arxiv.org\/abs\/1409.1556"},{"key":"11367_CR38","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE conference on computer vision and pattern recognition (CVPR), pp 770\u2013778. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"11367_CR39","unstructured":"Tan M, Le Q (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: International conference on machine learning, PMLR, pp 6105\u20136114"},{"key":"11367_CR40","doi-asserted-by":"crossref","unstructured":"Zagoruyko S, Komodakis N: Wide residual networks. In: BMVC (2016)","DOI":"10.5244\/C.30.87"},{"issue":"8","key":"11367_CR41","doi-asserted-by":"publisher","first-page":"3668","DOI":"10.1109\/TCYB.2019.2950779","volume":"50","author":"S Sun","year":"2020","unstructured":"Sun S, Cao Z, Zhu H, Zhao J (2020) A survey of optimization methods from a machine learning perspective. IEEE Trans Cybern 50(8):3668\u20133681. https:\/\/doi.org\/10.1109\/TCYB.2019.2950779","journal-title":"IEEE Trans Cybern"},{"issue":"4","key":"11367_CR42","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s11263-020-01400-4","volume":"129","author":"P Bergmann","year":"2021","unstructured":"Bergmann P, Batzner K, Fauser M, Sattlegger D, Steger C (2021) The MVTec anomaly detection dataset: a comprehensive real-world dataset for unsupervised anomaly detection. Int J Comput Vis 129(4):1038\u20131059","journal-title":"Int J Comput Vis"},{"key":"11367_CR43","unstructured":"Paszke A, Gross S, Massa F, Lerer A, Bradbury J, Chanan G, Killeen T, Lin Z, Gimelshein NAntiga L, Desmaison A, Kopf A, Yang E, DeVito Z, Raison M, Tejani A, Chilamkurthy S, Steiner B, Fang L, Bai J, Chintala S (2019) PyTorch: an imperative style, high-performance deep learning library. In: Advances in neural information processing systems 32, pp 8024\u20138035"},{"key":"11367_CR44","unstructured":"Kingma DP, Ba J (2015) Adam: a method for stochastic optimization. In: Bengio Y, LeCun Y (eds) 3rd international conference on learning representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, conference track proceedings. http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"11367_CR45","unstructured":"Yu J, Zheng Y, Wang X, Li W, Wu Y, Zhao R, Wu L (2021) Fastflow: unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:2111.07677"},{"key":"11367_CR46","doi-asserted-by":"crossref","unstructured":"Deng H, Li X (2022) Anomaly detection via reverse distillation from one-class embedding. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 9737\u20139746","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"11367_CR47","doi-asserted-by":"crossref","unstructured":"Deng J, Dong W, Socher R, Li L-J, Li K, Fei-Fei L (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 248\u2013255","DOI":"10.1109\/CVPR.2009.5206848"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11367-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-025-11367-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-025-11367-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T18:58:53Z","timestamp":1757185133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-025-11367-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":47,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["11367"],"URL":"https:\/\/doi.org\/10.1007\/s00521-025-11367-3","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"22 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}