{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T04:25:20Z","timestamp":1769228720225,"version":"3.49.0"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T00:00:00Z","timestamp":1769040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2026,12]]},"DOI":"10.1007\/s10115-025-02678-x","type":"journal-article","created":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T05:22:12Z","timestamp":1769059332000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Few-shot anomaly detection via adaptive graph feature registration"],"prefix":"10.1007","volume":"68","author":[{"given":"Gaihua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Sijia","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Kehong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Keke","family":"Ren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,22]]},"reference":[{"key":"2678_CR1","doi-asserted-by":"publisher","unstructured":"Salehi M, Sadjadi N, Baselizadeh S, Rohban MH, Rabiee HR (2021) Multiresolution knowledge distillation for anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 14897\u201314907. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01466","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"2678_CR2","doi-asserted-by":"publisher","unstructured":"Zheng Y, Wang X, Deng R, Bao T, Zhao R, Wu L (2022) Focus your distribution: Coarse-to-fine non-contrastive learning for anomaly detection and localization. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICME52920.2022.9859925","DOI":"10.1109\/ICME52920.2022.9859925"},{"key":"2678_CR3","doi-asserted-by":"publisher","first-page":"221494","DOI":"10.1109\/ACCESS.2020.3043473","volume":"8","author":"H Chung","year":"2020","unstructured":"Chung H, Park J, Keum J, Ki H, Kang S (2020) Unsupervised anomaly detection using style distillation. IEEE Access 8:221494\u2013221502. https:\/\/doi.org\/10.1109\/ACCESS.2020.3043473","journal-title":"IEEE Access"},{"key":"2678_CR4","doi-asserted-by":"publisher","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj D (2021) Dr\u00e6m\u2014a discriminatively trained reconstruction embedding for surface anomaly detection. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 8310\u20138319 https:\/\/doi.org\/10.48550\/arXiv.2108.07610","DOI":"10.48550\/arXiv.2108.07610"},{"key":"2678_CR5","doi-asserted-by":"publisher","unstructured":"Livernoche V, Jain V, Hezaveh YD, Ravanbakhsh S (2023) On diffusion modeling for anomaly detection. arXiv preprint arXiv:2305.18593. https:\/\/doi.org\/10.48550\/arXiv:2305.18593","DOI":"10.48550\/arXiv:2305.18593"},{"key":"2678_CR6","doi-asserted-by":"publisher","unstructured":"He H, Zhang J, Chen H, Chen X, Li Z, Chen X, Wang Y, Wang C, Xie L (2023) Diad: A diffusion-based framework for multi-class anomaly detection. In: Proceedings of the AAAI conference on artificial intelligence. https:\/\/doi.org\/10.48550\/arXiv:2312.06607","DOI":"10.48550\/arXiv:2312.06607"},{"key":"2678_CR7","doi-asserted-by":"publisher","unstructured":"Cao T.T, Zhu J, Pang G (2023) Anomaly detection under distribution shift. In: 2023 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 6488\u20136500. https:\/\/doi.org\/10.48550\/arXiv.2303.13845","DOI":"10.48550\/arXiv.2303.13845"},{"key":"2678_CR8","doi-asserted-by":"publisher","unstructured":"Deng H, Li X (2022) Anomaly detection via reverse distillation from one-class embedding. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9727\u20139736. https:\/\/doi.org\/10.48550\/arXiv.2201.10703","DOI":"10.48550\/arXiv.2201.10703"},{"key":"2678_CR9","doi-asserted-by":"publisher","unstructured":"Tien TD, Nguyen AT, Tran NH, Huy TD, Duong STM, Nguyen CDT, Truong SQH (2023) Revisiting reverse distillation for anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 24511\u201324520. https:\/\/doi.org\/10.1109\/CVPR52729.2023.02348","DOI":"10.1109\/CVPR52729.2023.02348"},{"key":"2678_CR10","doi-asserted-by":"publisher","unstructured":"Tian Y, Liu Y, Pang G, Liu F, Chen Y, Carneiro G (2021) Pixel-wise energy-biased abstention learning for anomaly segmentation on complex urban driving scenes. In: European Conference on Computer Vision. https:\/\/doi.org\/10.48550\/arXiv:2111.12264","DOI":"10.48550\/arXiv:2111.12264"},{"issue":"3","key":"2678_CR11","doi-asserted-by":"publisher","first-page":"879","DOI":"10.1109\/TMI.2020.3040950","volume":"40","author":"J Zhang","year":"2021","unstructured":"Zhang J, Xie Y, Pang G, Liao Z, Verjans J, Li W, Sun Z, He J, Li Y, Shen C, Xia Y (2021) Viral pneumonia screening on chest x-rays using confidence-aware anomaly detection. IEEE Trans Med Imaging 40(3):879\u2013890. https:\/\/doi.org\/10.1109\/TMI.2020.3040950","journal-title":"IEEE Trans Med Imaging"},{"issue":"3","key":"2678_CR12","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TPAMI.2021.3125686","volume":"46","author":"J Su","year":"2024","unstructured":"Su J, Shen H, Peng L, Hu D (2024) Few-shot domain-adaptive anomaly detection for cross-site brain images. IEEE Trans Pattern Anal Mach Intell 46(3):1819\u20131835. https:\/\/doi.org\/10.1109\/TPAMI.2021.3125686","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2678_CR13","doi-asserted-by":"publisher","unstructured":"Huang C, Guan H, Jiang A, Zhang Y, Spratling MW, Wang Y (2022) Registration based few-shot anomaly detection. ArXiv abs\/2207.07361 https:\/\/doi.org\/10.48550\/arXiv:2207.07361","DOI":"10.48550\/arXiv:2207.07361"},{"key":"2678_CR14","doi-asserted-by":"publisher","unstructured":"Xie G, Wang J, Liu J, Zheng F, Jin Y (2023) Pushing the limits of fewshot anomaly detection in industry vision: Graphcore. ArXiv abs\/230112082 https:\/\/doi.org\/10.48550\/arXiv:2301.12082","DOI":"10.48550\/arXiv:2301.12082"},{"key":"2678_CR15","doi-asserted-by":"publisher","unstructured":"Roth K, Pemula L, Zepeda J, Scholkopf B, Brox T, Gehler P (2021) Towards total recall in industrial anomaly detection. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14298\u201314308. https:\/\/doi.org\/10.48550\/arXiv.2106.08265","DOI":"10.48550\/arXiv.2106.08265"},{"key":"2678_CR16","doi-asserted-by":"publisher","unstructured":"Chen X, He K (2021) Exploring simple siamese representation learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 15745\u201315753. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01549","DOI":"10.1109\/CVPR46437.2021.01549"},{"issue":"6","key":"2678_CR17","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TNNLS.2022.3162123","volume":"33","author":"G Pang","year":"2022","unstructured":"Pang G, Aggarwal C, Shen C, Sebe N (2022) Editorial deep learning for anomaly detection. IEEE Trans Neural Netw Learn Syst 33(6):2282\u20132286. https:\/\/doi.org\/10.1109\/TNNLS.2022.3162123","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"2678_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.111978","volume":"299","author":"Y Su","year":"2024","unstructured":"Su Y, Tan Y, Xing M, An S (2024) Vpe-wsvad: Visual prompt exemplars for weakly-supervised video anomaly detection. Knowl Based Syst 299:111978","journal-title":"Knowl Based Syst"},{"key":"2678_CR19","doi-asserted-by":"publisher","first-page":"7046","DOI":"10.1109\/TII.2025.3574406","volume":"21","author":"Y Su","year":"2025","unstructured":"Su Y, Li J, An S, Xu H, Peng W (2025) Dual-detector reoptimization for federated weakly supervised video anomaly detection via adaptive dynamic recursive mapping. IEEE Trans Industr Inf 21:7046\u20137056","journal-title":"IEEE Trans Industr Inf"},{"key":"2678_CR20","doi-asserted-by":"publisher","unstructured":"Jezek S, Jonak M, Burget R, Dvorak P, Skotak M (2021) Deep learning-based defect detection of metal parts: evaluating current methods in complex conditions. In: 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 66\u201371 . https:\/\/doi.org\/10.1109\/ICUMT54235.2021.9631567","DOI":"10.1109\/ICUMT54235.2021.9631567"},{"key":"2678_CR21","doi-asserted-by":"publisher","unstructured":"Pu B, Lan S, Wang W, Yang C, Pan W, Yang H, Ma, W (2023) Gannext: A new convolutional gan for anomaly detection. In: International Conference on Artificial Neural Networks. https:\/\/doi.org\/10.1007\/978-3-031-44213-1_4","DOI":"10.1007\/978-3-031-44213-1_4"},{"key":"2678_CR22","doi-asserted-by":"crossref","unstructured":"Yang J, Shi Y, Qi Z (2020) Dfr: Deep feature reconstruction for unsupervised anomaly segmentation. Neurocomputing 424:9\u201322. https:\/\/doi.org\/10.48550\/arXiv2012.07122","DOI":"10.1016\/j.neucom.2020.11.018"},{"issue":"4","key":"2678_CR23","doi-asserted-by":"publisher","first-page":"5173","DOI":"10.1109\/TASE.2023.3309629","volume":"21","author":"W Li","year":"2024","unstructured":"Li W, Gu C, Chen J, Ma C, Zhang X, Chen B, Wan S (2024) Dls-gan: Generative adversarial nets for defect location sensitive data augmentation. IEEE Trans Autom Sci Eng 21(4):5173\u20135189. https:\/\/doi.org\/10.1109\/TASE.2023.3309629","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"2678_CR24","doi-asserted-by":"publisher","unstructured":"Liu Z, Zhou Y, Xu Y, Wang, Z (2023) Simplenet: A simple network for image anomaly detection and localization. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 20402\u201320411. https:\/\/doi.org\/10.1109\/CVPR52729.2023.01954","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"2678_CR25","doi-asserted-by":"publisher","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour MR, Venkatesh S, Van Den Hengel A (2019) Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 1705\u20131714. https:\/\/doi.org\/10.1109\/ICCV.2019.00179","DOI":"10.1109\/ICCV.2019.00179"},{"key":"2678_CR26","doi-asserted-by":"publisher","unstructured":"Yan X, Zhang H, Xu X, Hu X, Heng P-A (2021) Learning semantic context from normal samples for unsupervised anomaly detection. In: Proceedings of the AAAI conference on artificial intelligence, https:\/\/doi.org\/10.1609\/aaai.v35i4.16420","DOI":"10.1609\/aaai.v35i4.16420"},{"key":"2678_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112364","volume":"302","author":"X Wang","year":"2024","unstructured":"Wang X, Li W, He X (2024) Mtdiff: Visual anomaly detection with multi-scale diffusion models. Knowl Based Syst 302:112364","journal-title":"Knowl Based Syst"},{"key":"2678_CR28","doi-asserted-by":"publisher","unstructured":"Yang M, Wu P, Liu J, Feng H (2022) Memseg: A semi-supervised method for image surface defect detection using differences and commonalities. Eng Appl Artif Intell 119:105835. https:\/\/doi.org\/10.48550\/arXiv.2205.00908","DOI":"10.48550\/arXiv.2205.00908"},{"key":"2678_CR29","doi-asserted-by":"publisher","unstructured":"Defard T, Setkov A, Loesch A, Audigier R (2020) Padim: a patch distribution modeling framework for anomaly detection and localization. In: ICPR Workshops. https:\/\/doi.org\/10.48550\/arXiv.2011.08785","DOI":"10.48550\/arXiv.2011.08785"},{"key":"2678_CR30","doi-asserted-by":"crossref","unstructured":"Rudolph M, Wehrbein T, Rosenhahn B, Wandt B (2021) Fully convolutional cross-scale-flows for image-based defect detection. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp. 1829\u20131838","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"2678_CR31","doi-asserted-by":"publisher","unstructured":"Kim J-H, Kim D-H, Yi S, Lee T (2021) Semi-orthogonal embedding for efficient unsupervised anomaly segmentation. ArXiv abs\/210514737 https:\/\/doi.org\/10.48550\/arXiv:2105.14737","DOI":"10.48550\/arXiv:2105.14737"},{"key":"2678_CR32","doi-asserted-by":"crossref","unstructured":"Abdali A, Bogus\u0142awski B, Drumetz L, Gripon V (2025) Anomalous samples for few-shot anomaly detection. ArXivabs\/2507.23712","DOI":"10.1016\/j.procs.2025.07.122"},{"key":"2678_CR33","doi-asserted-by":"publisher","unstructured":"Huang C, Guan H, Jiang A, Wang Y, Spratling M, Wang X, Zhang Y (2024) Few-shot anomaly detection via category-agnostic registration learning. In: IEEE transactions on neural networks and learning systems. https:\/\/doi.org\/10.48550\/arXiv.2406.08810","DOI":"10.48550\/arXiv.2406.08810"},{"key":"2678_CR34","doi-asserted-by":"publisher","unstructured":"Fang Z, Wang X, Li H, Liu J, Hu Q, Xiao J (2023) Fastrecon: Few-shot industrial anomaly detection via fast feature reconstruction. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 17435\u201317444. https:\/\/doi.org\/10.1109\/ICCV51070.2023.01603","DOI":"10.1109\/ICCV51070.2023.01603"},{"key":"2678_CR35","doi-asserted-by":"publisher","unstructured":"Zhang X, Xu M, Zhou X (2024) Realnet : A feature selection network with realistic synthetic anomaly for anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 16699\u201316708. https:\/\/doi.org\/10.1109\/CVPR52733.2024.01580","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"2678_CR36","doi-asserted-by":"publisher","unstructured":"Ho J, Jain A, Abbeel P (2020) Denoising diffusion probabilistic models. ArXiv abs\/200611239 https:\/\/doi.org\/10.48550\/arXiv:2006.11239","DOI":"10.48550\/arXiv:2006.11239"},{"key":"2678_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107676","volume":"166","author":"X Wang","year":"2024","unstructured":"Wang X, Li W, Lu C (2024) A mask guided cross data augmentation method for industrial defect detection. Future Gener Comput Syst 166:107676","journal-title":"Future Gener Comput Syst"},{"key":"2678_CR38","doi-asserted-by":"publisher","unstructured":"Li X, Zhang Z, Tan X, Chen C, Qu Y, Xie Y, Ma L (2024) Promptad: Learning prompts with only normal samples for few-shot anomaly detection. In: 2024 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 16848\u201316858. https:\/\/doi.org\/10.48550\/arXiv.2404.05231","DOI":"10.48550\/arXiv.2404.05231"},{"key":"2678_CR39","doi-asserted-by":"publisher","unstructured":"Zhou Q, Pang G, Tian Y, He S, Chen J (2023) Anomalyclip: Object-agnostic prompt learning for zero-shot anomaly detection. ArXiv abs\/231018961. https:\/\/doi.org\/10.48550\/arXiv:2310.18961","DOI":"10.48550\/arXiv:2310.18961"},{"issue":"3","key":"2678_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2024.06.007","volume":"38","author":"Z Hu","year":"2024","unstructured":"Hu Z, Zeng X, Li Y, Yin Z, Meng E, Zhu L, Kong X (2024) Few-shot anomaly detection with adaptive feature transformation and descriptor construction. Chinese J Aeronautics 38(3):103098","journal-title":"Chinese J Aeronautics"},{"key":"2678_CR41","unstructured":"Lv W, Su Q, Xu W (2025) One-for-all few-shot anomaly detection via instance-induced prompt learning. In: International Conference on Learning Representations (2025). https:\/\/api.semanticscholar.org\/CorpusID:278497701"},{"key":"2678_CR42","doi-asserted-by":"publisher","unstructured":"Li C.-L, Sohn K, Yoon J, Pfister T (2021) Cutpaste: Self-supervised learning for anomaly detection and localization. In: 021 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9659\u20139669. https:\/\/doi.org\/10.48550\/arXiv.2104.04015","DOI":"10.48550\/arXiv.2104.04015"},{"key":"2678_CR43","doi-asserted-by":"publisher","unstructured":"Cimpoi M, Maji S, Kokkinos I, Mohamed S, Vedaldi A (2013) Describing textures in the wild. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, pp. 3606\u20133613. https:\/\/doi.org\/10.48550\/arXiv.1311.3618","DOI":"10.48550\/arXiv.1311.3618"},{"key":"2678_CR44","doi-asserted-by":"publisher","unstructured":"Jaderberg M, Simonyan K, Zisserman A, Kavukcuoglu K (2015) Spatial transformer networks. ArXiv abs\/150602025. https:\/\/doi.org\/10.48550\/arXiv:1506.02025","DOI":"10.48550\/arXiv:1506.02025"},{"key":"2678_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2023.3248111","volume":"72","author":"X Xiang","year":"2023","unstructured":"Xiang X, Wang ZH, Zhang J, Xia Y-B, Chen P, Wang B (2023) Agca: An adaptive graph channel attention module for steel surface defect detection. IEEE Trans Instrum Meas 72:1\u201312. https:\/\/doi.org\/10.1109\/TIM.2023.3248111","journal-title":"IEEE Trans Instrum Meas"},{"key":"2678_CR46","unstructured":"Sener O, Savarese S (2017) Active learning for convolutional neural networks: A core-set approach. arXiv : Machine Learning Learning. arXiv. Mach"},{"key":"2678_CR47","doi-asserted-by":"publisher","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2019) Mvtec ad - a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 9584\u20139592. https:\/\/doi.org\/10.1109\/CVPR.2019.00982","DOI":"10.1109\/CVPR.2019.00982"},{"key":"2678_CR48","doi-asserted-by":"publisher","unstructured":"Sheynin S, Benaim S, Wolf L (2021) A hierarchical transformation-discriminating generative model for few shot anomaly detection. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 8475\u20138484. https:\/\/doi.org\/10.48550\/arXiv.2104.14535","DOI":"10.48550\/arXiv.2104.14535"},{"key":"2678_CR49","doi-asserted-by":"publisher","unstructured":"Rudolph M, Wandt B, Rosenhahn B (2021) Same same but differnet: Semi-supervised defect detection with normalizing flows. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp. 1906\u20131915. https:\/\/doi.org\/10.1109\/WACV48630.2021.00195","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"2678_CR50","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TMM.2020.3046884","volume":"24","author":"F Ye","year":"2022","unstructured":"Ye F, Huang C, Cao J, Li M, Zhang Y, Lu C (2022) Attribute restoration framework for anomaly detection. IEEE Trans Multimed 24:116\u2013127. https:\/\/doi.org\/10.1109\/TMM.2020.3046884","journal-title":"IEEE Trans Multimed"},{"key":"2678_CR51","unstructured":"Lee JY, Lee W-S, Choi J-Y, Lee Y, Yoon YS (2023) Few-shot anomaly detection with adversarial loss for robust feature representations. In: British Machine Vision Conference. https:\/\/api.semanticscholar.org\/CorpusID:265728870"},{"key":"2678_CR52","unstructured":"Gu Z, Yang T, Ma L (2023) Prototype-aware contrastive knowledge distillation for few-shot anomaly detection. In: British Machine Vision Conference. https:\/\/api.semanticscholar.org\/CorpusID:267000669"},{"key":"2678_CR53","doi-asserted-by":"publisher","unstructured":"Zheng Y, Wang X, Deng R, Bao T, Zhao R, Wu L (2021) Focus your distribution: Coarse-to-fine non-contrastive learning for anomaly detection and localization. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. https:\/\/doi.org\/10.48550\/arXiv.2110.04538 Focus to learn more","DOI":"10.48550\/arXiv.2110.04538"},{"key":"2678_CR54","doi-asserted-by":"publisher","unstructured":"Gudovskiy D, Ishizaka S, Kozuka K (2022) Cflow-ad, Real-time unsupervised anomaly detection with localization via conditional normalizing flows. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, pp. 1819\u20131828. https:\/\/doi.org\/10.1109\/WACV51458.2022.00188","DOI":"10.1109\/WACV51458.2022.00188"},{"issue":"3","key":"2678_CR55","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TPAMI.2014.2345401","volume":"37","author":"M-M Cheng","year":"2015","unstructured":"Cheng M-M, Mitra NJ, Huang X, Torr PHS, Hu S-M (2015) Global contrast based salient region detection. IEEE Trans Pattern Anal Mach Intell 37(3):569\u2013582. https:\/\/doi.org\/10.1109\/TPAMI.2014.2345401","journal-title":"IEEE Trans Pattern Anal Mach Intell"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02678-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-025-02678-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-025-02678-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T23:05:28Z","timestamp":1769209528000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-025-02678-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,22]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,12]]}},"alternative-id":["2678"],"URL":"https:\/\/doi.org\/10.1007\/s10115-025-02678-x","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,22]]},"assertion":[{"value":"19 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"65"}}