{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:21:20Z","timestamp":1775838080183,"version":"3.50.1"},"reference-count":168,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10489-025-06689-7","type":"journal-article","created":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T08:12:14Z","timestamp":1756368734000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Industrial-application-oriented 2D image and 3D object anomaly detection technology: a comprehensive review"],"prefix":"10.1007","volume":"55","author":[{"given":"Gang","family":"Li","sequence":"first","affiliation":[]},{"given":"Chengrun","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Min","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jiachen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Delong","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4911-276X","authenticated-orcid":false,"given":"Mingle","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,28]]},"reference":[{"key":"6689_CR1","doi-asserted-by":"crossref","unstructured":"Napoletano P, Piccoli F, Schettini R (2018) \u201cAnomaly Detection in Nanofibrous Materials by CNN-Based Self-Similarity.\u201d Sensors (Basel, Switzerland) 18: n. pag","DOI":"10.3390\/s18010209"},{"key":"6689_CR2","doi-asserted-by":"crossref","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein S M (2017) Ursula Margarethe Schmidt-Erfurth and Georg Langs. \u201cUnsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery.\u201d Inf Process Med Imaging","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"6689_CR3","doi-asserted-by":"crossref","unstructured":"Bergmann P, L\u00f6we S, Fauser M, Sattlegger D, Steger C (2018) \u201cImproving Unsupervised Defect Segmentation by Applying Structural Similarity to Autoencoders.\u201d arXiv:1807.02011 n. page","DOI":"10.5220\/0007364503720380"},{"key":"6689_CR4","doi-asserted-by":"crossref","unstructured":"Jihun Y, Yoon S (2020) Patch SVDD: Patch-Level SVDD for Anomaly Detection and Segmentation. ACCV (6):375-390","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"6689_CR5","unstructured":"Tal R, Cohen N, Bergman L, Hoshen Y (2021) PANDA: Adapting Pretrained Features for Anomaly Detection and Segmentation. CVPR 2806-2814"},{"key":"6689_CR6","doi-asserted-by":"crossref","unstructured":"Xuan Z, Li S, Li X, Huang P, Shan J, Chen T (2023) DeSTSeg: Segmentation Guided Denoising Student-Teacher for Anomaly Detection. CVPR 3914-3923","DOI":"10.1109\/CVPR52729.2023.00381"},{"key":"6689_CR7","doi-asserted-by":"crossref","unstructured":"Redmon J, Divvala S K, Girshick R B, Farhadi A (2016) You Only Look Once: Unified, Real-Time Object Detection. CVPR 779-788","DOI":"10.1109\/CVPR.2016.91"},{"issue":"6","key":"6689_CR8","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"R Shaoqing","year":"2017","unstructured":"Shaoqing R, He K, Girshick RB, Sun J (2017) Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137\u20131149","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"6689_CR9","unstructured":"Salehi M, Sadjadi N, Baselizadeh S, Rohban M H, Rabiee H R Multiresolution Knowledge Distillation for Anomaly Detection. 14902-14912"},{"key":"6689_CR10","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhou Y, Xu Y, Wang Z SimpleNet: A Simple Network for Image Anomaly Detection and Localization. 20402-20411","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"6689_CR11","doi-asserted-by":"publisher","unstructured":"Lv C, Shen F, Zhang Z, et al (2022) A review of the current status of research on image anomaly detection[J]. J Automat 48(6):27. https:\/\/doi.org\/10.16383\/j.aas.c200956","DOI":"10.16383\/j.aas.c200956"},{"key":"6689_CR12","first-page":"1","volume":"71","author":"X Tao","year":"2022","unstructured":"Tao X, Gong X, Zhang X, Yan S, Adak C (2022) Deep Learning for Unsupervised Anomaly Localization in Industrial Images: A Survey. IEEE Trans Instrum Meas 71:1\u201321","journal-title":"IEEE Trans Instrum Meas"},{"key":"6689_CR13","doi-asserted-by":"publisher","first-page":"55297","DOI":"10.1109\/ACCESS.2023.3282993","volume":"11","author":"Y Cui","year":"2023","unstructured":"Cui Y, Liu Z, Lian S (2023) A Survey on Unsupervised Anomaly Detection Algorithms for Industrial Images. IEEE Access 11:55297\u201355315","journal-title":"IEEE Access"},{"key":"6689_CR14","unstructured":"Yunkang C, Xu X, Zhang J, Cheng Y, Huang X, Pang G, Shen W (2024) \u201cA Survey on Visual Anomaly Detection: Challenge, Method, and Prospect.\u201d arXiv:2401.16402 n. pag"},{"key":"6689_CR15","doi-asserted-by":"crossref","unstructured":"Xie G, Wang J, Liu J, Lyu J, Liu Y, Wang C, Zheng F, Jin Y (2024) IM-IAD: Industrial Image Anomaly Detection Benchmark in Manufacturing. IEEE Trans Cybern 54(5):[111]2720-2733","DOI":"10.1109\/TCYB.2024.3357213"},{"key":"6689_CR16","doi-asserted-by":"crossref","unstructured":"Rani A, Arroyo D O, Durdevic P (2024) Advancements in Point Cloud-Based 3D Defect Detection and Classification for Industrial Systems: A Comprehen Surv. CoRR arXiv:2402.12923","DOI":"10.2139\/ssrn.4740505"},{"key":"6689_CR17","first-page":"14298","volume-title":"Peter V","author":"K Roth","year":"2022","unstructured":"Roth K, Pemula L, Zepeda J, Sch\u00f6lkopf B, Brox T (2022) Peter V. Towards Total Recall in Industrial Anomaly Detection. CVPR, Gehler, pp 14298\u201314308"},{"key":"6689_CR18","unstructured":"Santos J, Tran T, Rippel O (2023) Optimizing PatchCore for Few\/many-shot Anomaly Detection. CoRR arXiv:2307.10792"},{"key":"6689_CR19","first-page":"303","volume":"24","author":"C Huang","year":"2022","unstructured":"Huang C, Guan H, Jiang A, Zhang Y, Spratling MW, Wang Y-F (2022) Registration Based Few-Shot Anomaly Detection. ECCV 24:303\u2013319","journal-title":"Registration Based Few-Shot Anomaly Detection. ECCV"},{"key":"6689_CR20","doi-asserted-by":"crossref","unstructured":"Bai Y, Zhang J, Dong Y, Tian G, Liu L, Cao Y, Wang Y, Wang C (2024) Dual-path Frequency Discriminators for Few-shot Anomaly Detection. CoRR arXiv:2403.04151","DOI":"10.2139\/ssrn.4862099"},{"key":"6689_CR21","doi-asserted-by":"crossref","unstructured":"Fang Z, Wang X, Li H, Liu J, Hu Q, Xiao J (2023) FastRecon: Few-shot Industrial Anomaly Detection via Fast Feature Reconstruction. ICCV 17435-17444","DOI":"10.1109\/ICCV51070.2023.01603"},{"key":"6689_CR22","doi-asserted-by":"crossref","unstructured":"Belton N, Hagos M T, Lawlor A, Curran K M (2023) FewSOME: One-Class Few Shot Anomaly Detection with Siamese Networks. CVPR Workshops 2978-2987","DOI":"10.1109\/CVPRW59228.2023.00299"},{"key":"6689_CR23","doi-asserted-by":"publisher","first-page":"2090","DOI":"10.1109\/TIP.2024.3374048","volume":"33","author":"J Liao","year":"2024","unstructured":"Liao J, Xun X (2024) Manh Cuong Nguyen, Adam Goodge, Chuan Sheng Foo: COFT-AD: COntrastive Fine-Tuning for Few-Shot Anomaly Detection. IEEE Trans Image Process 33:2090\u20132103","journal-title":"IEEE Trans Image Process"},{"key":"6689_CR24","first-page":"8475","volume-title":"Sagie Benaim","author":"S Sheynin","year":"2021","unstructured":"Sheynin S (2021) Sagie Benaim. A Hierarchical Transformation-Discriminating Generative Model for Few Shot Anomaly Detection. ICCV, Lior Wolf, pp 8475\u20138484"},{"key":"6689_CR25","doi-asserted-by":"crossref","unstructured":"Wang S, Li Q, Luo H, Lv C, Zhang Z (2023) Produce Once, Utilize Twice for Anomaly Detection. CoRR arXiv:2312.12913","DOI":"10.1109\/TCSVT.2024.3420775"},{"key":"6689_CR26","first-page":"571","volume-title":"Li Niu","author":"Y Duan","year":"2023","unstructured":"Duan Y, Hong Y (2023) Li Niu. Few-Shot Defect Image Generation via Defect-Aware Feature Manipulation. AAAI, Liqing Zhang, pp 571\u2013578"},{"key":"6689_CR27","doi-asserted-by":"crossref","unstructured":"Lee M, Choi J (2024) Text-Guided Variational Image Generation for Industrial Anomaly Detection and Segmentation. CoRR arXiv:2403.06247","DOI":"10.1109\/CVPR52733.2024.02504"},{"key":"6689_CR28","doi-asserted-by":"crossref","unstructured":"Li X, Zhang Z, Tan X, Chen C, Qu Y, Xie Y, Ma L (2024) PromptAD: Learning Prompts with only Normal Samples for Few-Shot Anomaly Detection. CoRR arXiv:2404.05231","DOI":"10.1109\/CVPR52733.2024.01594"},{"key":"6689_CR29","doi-asserted-by":"crossref","unstructured":"Damm S, Laszkiewicz M, Lederer J, Fischer A (2024) AnomalyDINO: Boosting Patch-based Few-shot Anomaly Detection with DINOv2. CoRR arXiv:2405.14529","DOI":"10.1109\/WACV61041.2025.00136"},{"key":"6689_CR30","unstructured":"Oquab M, Darcet T, Moutakanni T, Vo H, Szafraniec M, Khalidov V, Fernandez P, Haziza D, Massa F, El-Nouby A, Assran M, Ballas N, Galuba W, Howes R, Huang P-Y, Li S-W, Misra I, Rabbat M G, Sharma V, Synnaeve G, Xu H, J\u00e9gou H, Mairal J, Labatut P, Joulin A, Bojanowski P (2023) DINOv2: Learning Robust Visual Features without Supervision. CoRR arXiv:2304.07193"},{"key":"6689_CR31","unstructured":"Radford A, Kim J W, Hallacy C, Ramesh A, Goh G, Agarwal S, Sastry G, Askell A, Mishkin P, Clark J, Krueger G, Sutskever I (2021) Learning Transferable Visual Models From Natural Language Supervision. ICML 8748-8763"},{"key":"6689_CR32","unstructured":"Tamura M (2023) Random Word Data Augmentation with CLIP for Zero-Shot Anomaly Detection. BMVC 18-21"},{"key":"6689_CR33","doi-asserted-by":"crossref","unstructured":"Jeong J, Zou Y, Kim T, Zhang D, Ravichandran A, Dabeer O (2023) WinCLIP: Zero-\/Few-Shot Anomaly Classification and Segmentation. CVPR 19606-19616","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"6689_CR34","unstructured":"Hanqiu D, Zhang Z, Bao J, Li X (2023) \u201cBootstrap Fine-Grained Vision-Language Alignment for Unified Zero-Shot Anomaly Localization.\u201d"},{"key":"6689_CR35","doi-asserted-by":"crossref","unstructured":"Chen X, Zhang J, Tian G, He H, Zhang W, Wang Y, Wang C, Wu Y, Liu Y (2023) CLIP-AD: A Language-Guided Staged Dual-Path Model for Zero-shot Anomaly Detection. CoRR arXiv:2311.00453","DOI":"10.1007\/978-981-97-9003-6_2"},{"key":"6689_CR36","doi-asserted-by":"crossref","unstructured":"Li Y, Goodge A D, Liu F, Foo C-S (2024) PromptAD: Zero-shot Anomaly Detection using Text Prompts. WACV 1082-1091","DOI":"10.1109\/WACV57701.2024.00113"},{"key":"6689_CR37","unstructured":"Zhou Q, Pang G, Tian Y, He S, Chen J (2023) AnomalyCLIP: Object-agnostic Prompt Learning for Zero-shot Anomaly Detection. CoRR arXiv:2310.18961"},{"key":"6689_CR38","unstructured":"Zhang Z, Deng H, Bao J, Li X (2024) Dual-Image Enhanced CLIP for Zero-Shot Anomaly Detection. CoRR arXiv:2405.04782"},{"key":"6689_CR39","doi-asserted-by":"crossref","unstructured":"Gu Z, Zhu B, Zhu G, Chen Y, Li H, Tang M, Wang J (2024) FiLo: Zero-Shot Anomaly Detection by Fine-Grained Description and High-Quality Localization. CoRR arXiv:2404.13671","DOI":"10.1145\/3664647.3680685"},{"key":"6689_CR40","volume-title":"Maja Rudolph","author":"A Li","year":"2023","unstructured":"Li A, Qiu C, Kloft M, Smyth P (2023) Maja Rudolph. Zero-Shot Anomaly Detection via Batch Normalization, NeurIPS, Stephan Mandt"},{"key":"6689_CR41","unstructured":"Yun P, Lin X, Ma N, Du J, Liu C, Liu C, Chen Q (2024) \u201cSAM-LAD: Segment Anything Model Meets Zero-Shot Logic Anomaly Detection.\u201d"},{"key":"6689_CR42","unstructured":"Li X, Huang Z, Xue F, Zhou Y (2024) MuSc: Zero-Shot Industrial Anomaly Classification and Segmentation with Mutual Scoring of the Unlabeled Images. CoRR arXiv:2401.16753"},{"key":"6689_CR43","doi-asserted-by":"crossref","unstructured":"Liu J, Wang F (2023) mixed attention auto encoder for multi-class industrial anomaly detection. CoRR arXiv:2309.12700","DOI":"10.1109\/ICASSP48485.2024.10446794"},{"key":"6689_CR44","unstructured":"Qiangwei W, Li H, Tian C, Wen L, Li X (2024) \u201cAEKD: Unsupervised auto-encoder knowledge distillation for industrial anomaly detection.\u201d J Manufact Syst n. pag"},{"key":"6689_CR45","doi-asserted-by":"crossref","unstructured":"Gu Z, Liu L, Chen X, Yi R, Zhang J, Wang Y, Wang C, Shu A, Jiang G, Ma L (2023) Remembering Normality: Memory-guided Knowledge Distillation for Unsupervised Anomaly Detection. ICCV 16355-16363","DOI":"10.1109\/ICCV51070.2023.01503"},{"key":"6689_CR46","doi-asserted-by":"crossref","unstructured":"Tien T D, Nguyen A T, Tran N H, Huy T D, Duong S T M, Nguyen C D Tr, Truong S Q H (2023) Revisiting Reverse Distillation for Anomaly Detection. CVPR 24511-24520","DOI":"10.1109\/CVPR52729.2023.02348"},{"key":"6689_CR47","unstructured":"Mousakhan A, Brox T, Tayyub J (2023) Anomaly Detection with Conditioned Denoising Diffusion Models. CoRR arXiv:2305.15956"},{"key":"6689_CR48","first-page":"16120","volume-title":"Chi-Wing Fu","author":"L Fanbin","year":"2023","unstructured":"Fanbin L, Yao X (2023) Chi-Wing Fu. Removing Anomalies as Noises for Industrial Defect Localization. ICCV, Jiaya Jia, pp 16120\u201316129"},{"key":"6689_CR49","unstructured":"Yin H, Jiao G, Wu Q, Karlsson B F, Huang B, Lin C-Y (2023) LafitE: Latent Diffusion Model with Feature Editing for Unsupervised Multi-class Anomaly Detection. CoRR arXiv:2307.08059"},{"key":"6689_CR50","first-page":"8472","volume-title":"Chengjie Wang","author":"H He","year":"2024","unstructured":"He H, Zhang J, Chen H, Chen X, Zhishan LX, Wang CY (2024) Chengjie Wang. A Diffusion-Based Framework for Multi-Class Anomaly Detection. AAAI, Lei Xie, pp 8472\u20138480"},{"key":"6689_CR51","doi-asserted-by":"crossref","unstructured":"Yao H, Liu M, Wang H, Yin Z, Yan Z, Hong X, Zuo W (2024) GLAD: Towards Better Reconstruction with Global and Local Adaptive Diffusion Models for Unsupervised Anomaly Detection. CoRR arXiv:2406.07487","DOI":"10.1007\/978-3-031-73209-6_1"},{"key":"6689_CR52","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/TIP.2022.3228497","volume":"32","author":"X Wu","year":"2022","unstructured":"Wu X, Hong D, Chanussot J (2022) UIU-Net: U-Net in U-Net for infrared small object detection[J]. IEEE Trans Image Process 32:364\u2013376","journal-title":"IEEE Trans Image Process"},{"key":"6689_CR53","doi-asserted-by":"publisher","first-page":"5921","DOI":"10.1109\/TIP.2023.3326396","volume":"32","author":"F Liu","year":"2023","unstructured":"Liu F, Gao C, Chen F et al (2023) Infrared small and dim target detection with transformer under complex backgrounds[J]. IEEE Trans Image Process 32:5921\u20135932","journal-title":"IEEE Trans Image Process"},{"key":"6689_CR54","doi-asserted-by":"crossref","unstructured":"Xu S, Zheng S C, Xu W, et al (2024) HCF-Net: Hierarchical Context Fusion Network for Infrared Small Object Detection[J]. arXiv:2403.10778","DOI":"10.1109\/ICME57554.2024.10687431"},{"key":"6689_CR55","first-page":"1","volume":"61","author":"C Li","year":"2023","unstructured":"Li C, Zhang B, Hong D et al (2023) LRR-Net: An interpretable deep unfolding network for hyperspectral anomaly detection[J]. IEEE Trans Geosci Remote Sens 61:1\u201312","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"6689_CR56","doi-asserted-by":"crossref","unstructured":"Li C, Zhang B, Hong D, et al (2024) Learning Disentangled Priors for Hyperspectral Anomaly Detection: A Coupling Model-Driven and Data-Driven Paradigm[J]. IEEE Trans Neural Netw Learn Syst","DOI":"10.1109\/TNNLS.2024.3401589"},{"key":"6689_CR57","doi-asserted-by":"crossref","unstructured":"Li H, Chen Z, Xu Y, et al (2024) Hyperbolic Anomaly Detection[C]\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 17511-17520","DOI":"10.1109\/CVPR52733.2024.01658"},{"key":"6689_CR58","unstructured":"Sim\u00f5es F, Kowerko D, Schlosser T, et al (2024) Attention Modules Improve Image-Level Anomaly Detection for Industrial Inspection: A DifferNet Case Study[C]. Proceed IEEE\/CVF Winter Conf Appl Comput Vis 8246-8255"},{"key":"6689_CR59","doi-asserted-by":"crossref","unstructured":"Li C-L, Sohn K, Yoon J, Pfister T (2021) CutPaste: Self-Supervised Learning for Anomaly Detection and Localization. CVPR 9664-9674","DOI":"10.1109\/CVPR46437.2021.00954"},{"issue":"10","key":"6689_CR60","doi-asserted-by":"publisher","first-page":"1542","DOI":"10.3724\/SP.J.1089.2022.19730","volume":"34","author":"Y Chen","year":"2022","unstructured":"Chen Y, Chen L, Wenbin Y, Zhu J (2022) Knowledge Distillation Anomaly Detection with Multi-Scale Feature Fusion[J]. J Comput-Aided Design Comput Graph 34(10):1542\u20131549. https:\/\/doi.org\/10.3724\/SP.J.1089.2022.19730","journal-title":"J Comput-Aided Design Comput Graph"},{"key":"6689_CR61","doi-asserted-by":"crossref","unstructured":"Wang F, Jiang M, Qian C, Yang S, Li C, Zhang H, Wang X, Tang X (2017) Residual Attention Network for Image Classification. CVPR 6450-6458","DOI":"10.1109\/CVPR.2017.683"},{"key":"6689_CR62","doi-asserted-by":"crossref","unstructured":"Chen Q, Luo H, Lv C, et al (2025) A unified anomaly synthesis strategy with gradient ascent for industrial anomaly detection and localization[C]. European Conf Comput Vis. Springer, Cham, 37-54","DOI":"10.1007\/978-3-031-72855-6_3"},{"key":"6689_CR63","doi-asserted-by":"crossref","unstructured":"Tang J, Lu H, Xu X, et al (2025) An incremental unified framework for small defect inspection[C]. European Conf Comput Vis. Springer, Cham, 307-324","DOI":"10.1007\/978-3-031-72751-1_18"},{"issue":"3","key":"6689_CR64","doi-asserted-by":"publisher","first-page":"3986","DOI":"10.1109\/TII.2023.3318302","volume":"20","author":"Y Cai","year":"2024","unstructured":"Cai Y, Liang D, Luo D, He X, Yang X, Bai X (2024) A Discrepancy Aware Framework for Robust Anomaly Detection. IEEE Trans Ind Inf 20(3):3986\u20133995","journal-title":"IEEE Trans Ind Inf"},{"key":"6689_CR65","first-page":"148","volume-title":"Masanori Suganuma","author":"J Zhang","year":"2024","unstructured":"Zhang J (2024) Masanori Suganuma. Contextual Affinity Distillation for Image Anomaly Detection. WACV, Takayuki Okatani, pp 148\u2013157"},{"key":"6689_CR66","doi-asserted-by":"crossref","unstructured":"Madan N, Ristea N-C, Ionescu R T, Nasrollahi K, Khan F S, Moeslund T B, Shah M (2024) Self-Supervised Masked Convolutional Transformer Block for Anomaly Detection. IEEE Trans. Pattern Anal Mach Intell 46(1): 525-542","DOI":"10.1109\/TPAMI.2023.3322604"},{"key":"6689_CR67","unstructured":"Yan F, Jiang X, Lu Y, Cui L, Li S, Cao J, Xu M, Tao D (2023) Global Context Aggregation Network for Lightweight Saliency Detection of Surface Defects. CoRR arXiv:2309.12641"},{"key":"6689_CR68","unstructured":"Wang Q, Hu H, Zhou Y (2024) MemoryMamba: Memory-Augmented State Space Model for Defect Recognition. CoRR arXiv:2405.03673"},{"key":"6689_CR69","doi-asserted-by":"crossref","unstructured":"He L, Jiang Z, Peng J, Liu L, Du Q, Hu X, Zhu W, Chi M, Wang Y, Wang C (2024) Learning Unified Reference Representation for Unsupervised Multi-class Anomaly Detection. CoRR arXiv:2403.11561","DOI":"10.1007\/978-3-031-72855-6_13"},{"key":"6689_CR70","doi-asserted-by":"crossref","unstructured":"Ho C H, Peng K C, Vasconcelos N (2024) Long-Tailed Anomaly Detection with Learnable Class Names[C]. Proceed IEEE\/CVF Conf Comput Vis Pattern Recogn 12435-12446","DOI":"10.1109\/CVPR52733.2024.01182"},{"key":"6689_CR71","doi-asserted-by":"crossref","unstructured":"Hyun J, Kim S, Jeon G, et al (2024) ReConPatch: Contrastive patch representation learning for industrial anomaly detection[C]. Proceed IEEE\/CVF Winter Conf Appl Comput Vis 2052-2061","DOI":"10.1109\/WACV57701.2024.00205"},{"key":"6689_CR72","doi-asserted-by":"crossref","unstructured":"Fu\u010dka M, Zavrtanik V, Sko\u010daj D (2023) TransFusion\u2013A Transparency-Based Diffusion Model for Anomaly Detection[J]. arxiv:2311.09999","DOI":"10.1007\/978-3-031-72761-0_6"},{"key":"6689_CR73","doi-asserted-by":"crossref","unstructured":"Zhou K, Xiao Y, Yang J, Cheng J, Liu W, Luo W, Gu Z, Liu J, Gao S (2020) Encoding Structure-Texture Relation with P-Net for Anomaly Detection in Retinal Images. ECCV (20): 360-377","DOI":"10.1007\/978-3-030-58565-5_22"},{"key":"6689_CR74","doi-asserted-by":"publisher","first-page":"3027","DOI":"10.1109\/TIP.2023.3275538","volume":"32","author":"W Zhou","year":"2023","unstructured":"Zhou W, Sun F, Jiang Q et al (2023) WaveNet: Wavelet network with knowledge distillation for RGB-T salient object detection[J]. IEEE Trans Image Process 32:3027\u20133039","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"6689_CR75","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1109\/TCSVT.2021.3077058","volume":"32","author":"W Zhou","year":"2021","unstructured":"Zhou W, Guo Q, Lei J et al (2021) ECFFNet: Effective and consistent feature fusion network for RGB-T salient object detection[J]. IEEE Trans Circ Syst Video Technol 32(3):1224\u20131235","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"6689_CR76","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TGRS.2020.3040277","volume":"60","author":"X Wu","year":"2021","unstructured":"Wu X, Hong D, Chanussot J (2021) Convolutional neural networks for multimodal remote sensing data classification[J]. IEEE Trans Geosci Remote Sens 60:1\u201310","journal-title":"IEEE Trans Geosci Remote Sens"},{"key":"6689_CR77","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.1109\/TIP.2023.3242775","volume":"32","author":"W Zhou","year":"2023","unstructured":"Zhou W, Zhu Y, Lei J et al (2023) LSNet: Lightweight spatial boosting network for detecting salient objects in RGB-thermal images[J]. IEEE Trans Image Process 32:1329\u20131340","journal-title":"IEEE Trans Image Process"},{"key":"6689_CR78","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/TMM.2021.3077767","volume":"24","author":"W Zhou","year":"2021","unstructured":"Zhou W, Zhu Y, Lei J et al (2021) CCAFNet: Crossflow and cross-scale adaptive fusion network for detecting salient objects in RGB-D images[J]. IEEE Trans Multimed 24:2192\u20132204","journal-title":"IEEE Trans Multimed"},{"key":"6689_CR79","unstructured":"Hui Z, Wang Z, Wu Z, Jiang Y-G (2023) \u201cDiffusionAD: Norm-guided One-step Denoising Diffusion for Anomaly Detection.\u201d"},{"issue":"2","key":"6689_CR80","doi-asserted-by":"publisher","first-page":"2200","DOI":"10.1109\/TII.2022.3199228","volume":"19","author":"J Jiang","year":"2023","unstructured":"Jiang J, Zhu J, Bilal M, Cui Y, Kumar N, Dou R, Feng S, Xiaolong X (2023) Masked Swin Transformer Unet for Industrial Anomaly Detection. IEEE Trans Ind Inf 19(2):2200\u20132209","journal-title":"IEEE Trans Ind Inf"},{"key":"6689_CR81","doi-asserted-by":"crossref","unstructured":"Omnial Z Y (2023) A unified cnn framework for unsupervised anomaly localization[C]. Proceed IEEE\/CVF Conf Comput Vis Pattern Recogn 3924-3933","DOI":"10.1109\/CVPR52729.2023.00382"},{"key":"6689_CR82","doi-asserted-by":"crossref","unstructured":"Muhammed O, Nur A, Mercimek M, Kaymakci O T (2021) \u201cAnomaly localization in regular textures based on deep convolutional generative adversarial networks.\u201d Appl Intell 52:1556 - 1565","DOI":"10.1007\/s10489-021-02475-3"},{"key":"6689_CR83","doi-asserted-by":"crossref","unstructured":"Aota T, Tong L T T, Okatani T (2023) Zero-shot versus Many-shot: Unsupervised Texture Anomaly Detection. WACV 5553-5561","DOI":"10.1109\/WACV56688.2023.00552"},{"key":"6689_CR84","doi-asserted-by":"crossref","unstructured":"Ardelean A-T, Weyrich T (2024) High-Fidelity Zero-Shot Texture Anomaly Localization Using Feature Correspondence Analysis. WACV 1123-1133","DOI":"10.1109\/WACV57701.2024.00117"},{"key":"6689_CR85","unstructured":"Guoxiang T, Li Q, Song Y (2024) \u201cEnhanced multi-scale features mutual mapping fusion based on reverse knowledge distillation for industrial anomaly detection and localization.\u201d IEEE Trans Big Data n. pag"},{"key":"6689_CR86","doi-asserted-by":"crossref","unstructured":"Li W-J, Zhan J, Wang J, Xia B, Gao B-B, Liu J, Wang C, Zheng F (2022) \u201cTowards Continual Adaptation in Industrial Anomaly Detection.\u201d Proceed 30th ACM Int Conf Multimed n. pag","DOI":"10.1145\/3503161.3548232"},{"key":"6689_CR87","unstructured":"Gao H, Luo H, Shen F, Zhang Z (2023) Towards Total Online Unsupervised Anomaly Detection and Localization in Industrial Vision. CoRR arXiv:2305.15652"},{"key":"6689_CR88","unstructured":"Wentao F, Shangguan W, Bouguila N (2023) \u201cContinuous image anomaly detection based on contrastive lifelong learning.\u201d Appl Intell 1-15"},{"key":"6689_CR89","unstructured":"Jiaqi L, Wu K, Nie Q, Chen Y, Gao B-B, Liu Y, Wang J, Wang C, Zheng F (2024) \u201cUnsupervised Continual Anomaly Detection with Contrastively-learned Prompt.\u201d AAAI Conf Artif Intell"},{"key":"6689_CR90","unstructured":"Yang Z, Li L, Lin K, Wang J, Lin C-C, Liu Z, Wang L (2023) The Dawn of LMMs: Preliminary Explorations with GPT-4V(ision). CoRR arXiv:2309.17421"},{"key":"6689_CR91","unstructured":"Cao Y, Xu X, Sun C, Huang X, Shen W (2023) Towards Generic Anomaly Detection and Understanding: Large-scale Visual-linguistic Model (GPT-4V) Takes the Lead. CoRR arXiv:2311.02782"},{"key":"6689_CR92","doi-asserted-by":"crossref","unstructured":"Zhang J, Chen X, Xue Z, Wang Y, Wang C, Liu Y (2023) Exploring Grounding Potential of VQA-oriented GPT-4V for Zero-shot Anomaly Detection. CoRR arXiv:2311.02612","DOI":"10.1007\/978-981-97-9003-6_1"},{"key":"6689_CR93","doi-asserted-by":"crossref","unstructured":"Zhu J, Cai S, Deng F, Wu J (2024) Do LLMs Understand Visual Anomalies? Uncovering LLM Capabilities in Zero-shot Anomaly Detection. CoRR arXiv:2404.09654","DOI":"10.1145\/3664647.3681190"},{"key":"6689_CR94","unstructured":"Zhu D, Chen J, Shen X, Li X, Elhoseiny M (2023) MiniGPT-4: Enhancing Vision-Language Understanding with Advanced Large Language Models. CoRR arXiv:2304.10592"},{"key":"6689_CR95","unstructured":"Li Y, Wang H, Yuan S, Liu M, Zhao D, Guo Y, Xu C, Shi G, Zuo W (2023) Myriad: Large Multimodal Model by Applying Vision Experts for Industrial Anomaly Detection. CoRR arXiv:2310.19070"},{"key":"6689_CR96","doi-asserted-by":"crossref","unstructured":"Gu Z, Zhu B, Zhu G, Chen Y, Tang M, Wang J (2024) AnomalyGPT: Detecting Industrial Anomalies Using Large Vision-Language Models. AAAI 1932-1940","DOI":"10.1609\/aaai.v38i3.27963"},{"key":"6689_CR97","doi-asserted-by":"crossref","unstructured":"Xu X, Cao Y, Chen Y, Shen W, Huang X (2024) Customizing Visual-Language Foundation Models for Multi-modal Anomaly Detection and Reasoning. CoRR arXiv:2403.11083","DOI":"10.1109\/CSCWD64889.2025.11033177"},{"key":"6689_CR98","doi-asserted-by":"crossref","unstructured":"Kerbl B, Kopanas G, Leimk\u00fchler T, Drettakis G (2023) 3D Gaussian Splatting for Real-Time Radiance Field Rendering. ACM Trans Graph 42(4): 139:1-139:14","DOI":"10.1145\/3592433"},{"key":"6689_CR99","doi-asserted-by":"crossref","unstructured":"Chen R, Xie G, Liu J, Wang J, Luo Z, Wang J, Zheng F (2023) EasyNet: An Easy Network for 3D Industrial Anomaly Detection. ACM Multimed 7038-7046","DOI":"10.1145\/3581783.3611876"},{"key":"6689_CR100","doi-asserted-by":"publisher","first-page":"9956","DOI":"10.1007\/s10489-024-05700-x","volume":"54","author":"Z Li","year":"2024","unstructured":"Li Z, Ge Y, Wang X, Meng L (2024) 3D Industrial anomaly detection via dual reconstruction network. Appl Intell 54:9956\u20139970","journal-title":"Appl Intell"},{"key":"6689_CR101","doi-asserted-by":"crossref","unstructured":"Li W, Xu X, Gu Y, Zheng B, Gao S, Wu Y (2023) Towards Scalable 3D Anomaly Detection and Localization: A Benchmark via 3D Anomaly Synthesis and A Self-Supervised Learning Network. CoRR arXiv:2311.14897","DOI":"10.1109\/CVPR52733.2024.02096"},{"key":"6689_CR102","doi-asserted-by":"crossref","unstructured":"Bergmann P, Sattlegger D (2023) Anomaly Detection in 3D Point Clouds using Deep Geometric Descriptors. WACV 2612-2622","DOI":"10.1109\/WACV56688.2023.00264"},{"key":"6689_CR103","first-page":"8445","volume-title":"Yabiao Wang","author":"G Zhihao","year":"2024","unstructured":"Zhihao G, Zhang J, Liang LX, Chen JP, Gan Z, Jiang G, Shu A (2024) Yabiao Wang. Rethinking Reverse Distillation for Multi-Modal Anomaly Detection. AAAI, Lizhuang Ma, pp 8445\u20138453"},{"key":"6689_CR104","unstructured":"Sui W, Lichau D, Lef\u00e8vre J, Phelippeau H (2024) Cross-Modal Distillation in Industrial Anomaly Detection: Exploring Efficient Multi-Modal IAD. CoRR arXiv:2405.13571"},{"key":"6689_CR105","doi-asserted-by":"crossref","unstructured":"Qin J, Chunzhi G, Jun Y, Zhang C (2023) Teacher-student network for 3D point cloud anomaly detection with few normal samples. Expert Syst Appl 228:120371","DOI":"10.1016\/j.eswa.2023.120371"},{"key":"6689_CR106","first-page":"2591","volume-title":"Bodo Rosenhahn","author":"M Rudolph","year":"2023","unstructured":"Rudolph M, Wehrbein T (2023) Bodo Rosenhahn. Asymmetric Student-Teacher Networks for Industrial Anomaly Detection. WACV, Bastian Wandt, pp 2591\u20132601"},{"key":"6689_CR107","doi-asserted-by":"crossref","unstructured":"Zhao B, Xiong Q, Zhang X, Guo J, Liu Q, Xing X, Xu X (2024) PointCore: Efficient Unsupervised Point Cloud Anomaly Detector Using Local-Global Features. CoRR arXiv:2403.01804","DOI":"10.2139\/ssrn.5070444"},{"key":"6689_CR108","doi-asserted-by":"crossref","unstructured":"Cao Y, Xu X, Shen W (2023) Complementary Pseudo Multimodal Feature for Point Cloud Anomaly Detection. CoRR arXiv:2303.13194","DOI":"10.1016\/j.patcog.2024.110761"},{"key":"6689_CR109","unstructured":"Chengyu T, Du J (2023) \u201cPointSGRADE: Sparse Learning with Graph Representation for Anomaly Detection by Using Unstructured 3D Point Cloud Data.\u201d IISE Trans n. pag"},{"key":"6689_CR110","doi-asserted-by":"crossref","unstructured":"Junfeng J, Wang H (2023) \u201cDefect segmentation with local embedding in industrial 3D point clouds based on transformer.\u201d Measure Sci Technol 35: n. pag","DOI":"10.1088\/1361-6501\/ad1289"},{"key":"6689_CR111","unstructured":"Chu Y-M, Liu C, Hsieh T-I, Chen H-T, Liu T-L (2023) Shape-Guided Dual-Memory Learning for 3D Anomaly Detection. ICML 6185-6194"},{"key":"6689_CR112","doi-asserted-by":"crossref","unstructured":"Tu Y, Zhang B, Liu L, Li Y, Chen X, Zhang J, Wang Y, Wang C, Zhao C (2024) Self-supervised Feature Adaptation for 3D Industrial Anomaly Detection. CoRR arXiv:2401.03145","DOI":"10.1007\/978-3-031-72627-9_5"},{"key":"6689_CR113","unstructured":"Eliahu H, Hoshen Y (2022) \u201cBack to the Feature: Classical 3D Features are (Almost) All You Need for 3D Anomaly Detection.\u201d 2023 IEEE\/CVF Conf Comput Vis Pattern Recogn Workshops (CVPRW) 2968-2977"},{"key":"6689_CR114","doi-asserted-by":"crossref","unstructured":"Wang J, Wang X, Hao R, Yin H, Huang B, Xiao X, Liu J (2024) Incremental Template Neighborhood Matching for 3D anomaly detection. Neurocomput 581:127483","DOI":"10.1016\/j.neucom.2024.127483"},{"key":"6689_CR115","first-page":"8032","volume-title":"Yabiao Wang","author":"Y Wang","year":"2023","unstructured":"Wang Y, Peng J, Zhang J, Yi R (2023) Yabiao Wang. Multimodal Industrial Anomaly Detection via Hybrid Fusion. CVPR, Chengjie Wang, pp 8032\u20138041"},{"key":"6689_CR116","doi-asserted-by":"crossref","unstructured":"Zhou Z, Wang L, Fang N, et al (2025) R3D-AD: Reconstruction via Diffusion for 3D Anomaly Detection[C]. European Conf Comput Vis. Springer, Cham, 91-107","DOI":"10.1007\/978-3-031-72764-1_6"},{"issue":"10","key":"6689_CR117","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.3390\/s17102262","volume":"17","author":"A Carlos","year":"2017","unstructured":"Carlos A (2017) Madrigal, John Willian Branch, Alejandro Restrepo Martinez, Domingo Mery: A Method for Automatic Surface Inspection Using a Model-Based 3D Descriptor. Sensors 17(10):2262","journal-title":"Sensors"},{"key":"6689_CR118","doi-asserted-by":"crossref","unstructured":"Igor J, Pham H-H, Orteu J-J, Gilblas R, Harvent J, Xavier Maurice, Brethes L (2017) \u201c3D Point Cloud Analysis for Detection and Characterization of Defects on Airplane Exterior Surface.\u201d J Nondestruct Eval 36 n. pag","DOI":"10.1007\/s10921-017-0453-1"},{"key":"6689_CR119","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s40684-022-00433-z","volume":"10","author":"Y He","year":"2022","unstructured":"He Y, Ma W, Li Y, Hao C, Wang Y, Wang Y (2022) An Octree-Based Two-Step Method of Surface Defects Detection for Remanufacture. Int J Precis Eng Manufact-Green Technol 10:311\u2013326","journal-title":"Int J Precis Eng Manufact-Green Technol"},{"key":"6689_CR120","doi-asserted-by":"crossref","unstructured":"Zong Y, Liang J, Wang H, Ren M, Zhang M, Li W, Lu W, Meitu Y (2021) An intelligent and automated 3D surface defect detection system for quantitative 3D estimation and feature classification of material surface defects. Opt Lasers Eng 144:106633","DOI":"10.1016\/j.optlaseng.2021.106633"},{"key":"6689_CR121","doi-asserted-by":"crossref","unstructured":"Xiaohui C, Xie W, Siddiqui M A, Li C R (2020) \u201cDefect detection method for rail surface based on line-structured light.\u201d Measure 159: 107771","DOI":"10.1016\/j.measurement.2020.107771"},{"key":"6689_CR122","doi-asserted-by":"crossref","unstructured":"Zavrtanik V, Kristan M, Skocaj D (2024) Cheating Depth: Enhancing 3D Surface Anomaly Detection via Depth Simulation. WACV 2153-2161","DOI":"10.1109\/WACV57701.2024.00216"},{"key":"6689_CR123","doi-asserted-by":"crossref","unstructured":"Mildenhall B, Srinivasan P P, Tancik M, Barron J T, Ramamoorthi R, Ng R (2020) NeRF: Representing Scenes as Neural Radiance Fields for View Synthesis. ECCV (1): 405-421","DOI":"10.1007\/978-3-030-58452-8_24"},{"key":"6689_CR124","unstructured":"Zhou Q, Li W, Jiang L, Wang G, Zhou G, Zhang S, Zhao H (2023) PAD: A Dataset and Benchmark for Pose-agnostic Anomaly Detection. NeurIPS"},{"key":"6689_CR125","doi-asserted-by":"crossref","unstructured":"Kruse M, Rudolph M, Woiwode D, Rosenhahn B (2024) SplatPose Detect: Pose-Agnostic 3D Anomaly Detection. CoRR arXiv:2404.06832","DOI":"10.1109\/CVPRW63382.2024.00399"},{"issue":"3","key":"6689_CR126","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/s10845-019-01476-x","volume":"31","author":"D Tabernik","year":"2020","unstructured":"Tabernik D, Sela S, Skvarc J, Skocaj D (2020) Segmentation-based deep-learning method for surface-defect detection. J Intell Manuf 31(3):759\u2013776","journal-title":"J Intell Manuf"},{"key":"6689_CR127","doi-asserted-by":"crossref","unstructured":"Bozic J, Tabernik D, Skocaj D (2021) Mixed supervision for surface-defect detection: From weakly to fully supervised learning. Comput Ind 129:103459","DOI":"10.1016\/j.compind.2021.103459"},{"key":"6689_CR128","doi-asserted-by":"crossref","unstructured":"Mishra P, Verk R, Fornasier D, Piciarelli C, Foresti G L (2021) VT-ADL: A Vision Transformer Network for Image Anomaly Detection and Localization. ISIE 1-6","DOI":"10.1109\/ISIE45552.2021.9576231"},{"key":"6689_CR129","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2019) MVTec AD - A Comprehensive Real-World Dataset for Unsupervised Anomaly Detection. CVPR 9592-9600","DOI":"10.1109\/CVPR.2019.00982"},{"issue":"4","key":"6689_CR130","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","volume":"130","author":"P Bergmann","year":"2022","unstructured":"Bergmann P, Batzner K, Fauser M, Sattlegger D, Steger C (2022) Beyond Dents and Scratches: Logical Constraints in Unsupervised Anomaly Detection and Localization. Int J Comput Vis 130(4):947\u2013969","journal-title":"Int J Comput Vis"},{"key":"6689_CR131","doi-asserted-by":"crossref","unstructured":"Zou Y, Jeong J, Pemula L, Zhang D, Dabeer O (2022) SPot-the-Difference Self-supervised Pre-training for Anomaly Detection and Segmentation. ECCV (30):392-408","DOI":"10.1007\/978-3-031-20056-4_23"},{"key":"6689_CR132","doi-asserted-by":"crossref","unstructured":"Bonfiglioli L, Toschi M, Silvestri D, Fioraio N, De Gregorio D (2022) The eyecandies dataset for unsupervised multimodal anomaly detection and localization. In: Proceedings of the Asian Conference on Computer Vision (pp 3586-3602)","DOI":"10.1007\/978-3-031-26348-4_27"},{"key":"6689_CR133","unstructured":"Zhou Q, Li W, Jiang L, Wang G, Zhou G, Zhang S, Zhao H (2023) PAD: A Dataset and Benchmark for Pose-agnostic Anomaly Detection. NeurIPS"},{"key":"6689_CR134","doi-asserted-by":"crossref","unstructured":"Wang C, Zhu W, Gao B-B, Gan Z, Zhang J, Gu Z, Qian S, Chen M, Ma L (2024) Real-IAD: A Real-World Multi-View Dataset for Benchmarking Versatile Industrial Anomaly Detection. CoRR arXiv:2403.12580","DOI":"10.1109\/CVPR52733.2024.02159"},{"key":"6689_CR135","doi-asserted-by":"crossref","unstructured":"Bergmann P, Jin X, Sattlegger D, Steger C (2022) The MVTec 3D-AD Dataset for Unsupervised 3D Anomaly Detection and Localization. VISIGRAPP (5: VISAPP) 202-213","DOI":"10.5220\/0010865000003124"},{"key":"6689_CR136","doi-asserted-by":"crossref","unstructured":"Li W, Xu X, Gu Y, Zheng B, Gao S, Wu Y (2024) Towards Scalable 3D Anomaly Detection and Localization: A Benchmark via 3D Anomaly Synthesis and A Self-Supervised Learning Network. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (pp 22207-22216)","DOI":"10.1109\/CVPR52733.2024.02096"},{"key":"6689_CR137","unstructured":"Qin J, Gu C, Yu J, Zhang C (2023) Image-Pointcloud Fusion based Anomaly Detection using PD-REAL Dataset. CoRR arXiv:2311.04095"},{"key":"6689_CR138","unstructured":"Liu J, Xie G, Chen R, Li X, Wang J, Liu Y, Wang C, Zheng F (2023) Real3D-AD: A Dataset of Point Cloud Anomaly Detection. NeurIPS"},{"key":"6689_CR139","unstructured":"Bertoldo J P C, Ameln D, Vaidya A, Ak\u00e7ay S (2024) AUPIMO: Redefining Visual Anomaly Detection Benchmarks with High Speed and Low Tolerance. CoRR arXiv:2401.01984"},{"key":"6689_CR140","first-page":"10657","volume-title":"Avinash Ravichandran","author":"K Lee","year":"2019","unstructured":"Lee K, Maji S (2019) Avinash Ravichandran. Meta-Learning With Differentiable Convex Optimization. CVPR, Stefano Soatto, pp 10657\u201310665"},{"key":"6689_CR141","unstructured":"Vanschoren J \u201cMeta-Learning: A Survey.\u201d ArXiv arXiv:1810.03548 n. pag"},{"key":"6689_CR142","doi-asserted-by":"crossref","unstructured":"Schl\u00fcter H M, Tan J, Hou B, Kainz B (2022) Natural Synthetic Anomalies for Self-supervised Anomaly Detection and Localization. ECCV (31):474-489","DOI":"10.1007\/978-3-031-19821-2_27"},{"key":"6689_CR143","doi-asserted-by":"crossref","unstructured":"Li W, Zheng B, Xu X, Gan J, Lu F, Li X, Ni N, Tian Z, Huang X, Gao S, Wu Y (2024) Multi-Sensor Object Anomaly Detection: Unifying Appearance, Geometry, and Internal Properties. CoRR arXiv:2412.14592","DOI":"10.1109\/CVPR52734.2025.00933"},{"key":"6689_CR144","doi-asserted-by":"crossref","unstructured":"Yang E, Xing P, Sun H, Guo W, Ma Y, Li Z, Zeng D (2025) 3CAD: A Large-Scale Real-World 3C Product Dataset for Unsupervised Anomaly Detection. In: Proceedings of the AAAI Conference on Artificial Intelligence (Vol 39, No 9, pp 9175-9183)","DOI":"10.1609\/aaai.v39i9.32993"},{"key":"6689_CR145","doi-asserted-by":"crossref","unstructured":"Zhang X, Xu M, Zhou X (2024) RealNet: A Feature Selection Network with Realistic Synthetic Anomaly for Anomaly Detection. CVPR 16699-16708","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"6689_CR146","doi-asserted-by":"crossref","unstructured":"Jin Y, Peng J, He Q, Hu T, Chen H, Wu J, Zhu W, Chi M, Liu J, Wang Y, Wang C (2024) DualAnoDiff: Dual-Interrelated Diffusion Model for Few-Shot Anomaly Image Generation. CoRR arXiv:2408.13509","DOI":"10.1109\/CVPR52734.2025.02832"},{"key":"6689_CR147","unstructured":"Dai Z, Zeng S, Liu H, Li X, Xue F, Zhou Y (2024) SeaS: Few-shot Industrial Anomaly Image Generation with Separation and Sharing Fine-tuning. CoRR arXiv:2410.14987"},{"key":"6689_CR148","unstructured":"Ying Z (2025) \"AnomalyHybrid: A Domain-agnostic Generative Framework for General Anomaly Detection.\" preprint arXiv:2504.04340"},{"key":"6689_CR149","doi-asserted-by":"crossref","unstructured":"Song J, Park D, Baek K, Lee S, Choi J, Kim E, Yoon S (2025). DefectFill: Realistic Defect Generation with Inpainting Diffusion Model for Visual Inspection. arXiv:2503.13985","DOI":"10.1109\/CVPR52734.2025.01744"},{"key":"6689_CR150","unstructured":"Lai h, Lu Y, Li X, Lin J, Qu Y, Cao L, Li M, Ji R (2025) AnomalyPainter: Vision-Language-Diffusion Synergy for Zero-Shot Realistic and Diverse Industrial Anomaly Synthesis. CoRR arXiv:2503.07253"},{"key":"6689_CR151","doi-asserted-by":"crossref","unstructured":"Gu Z, Zhu B, Zhu G, Chen Y, Tang M, Wang J (2024) UniVAD: A Training-free Unified Model for Few-shot Visual Anomaly Detection. CoRR arXiv:2412.03342","DOI":"10.1109\/CVPR52734.2025.01415"},{"key":"6689_CR152","doi-asserted-by":"crossref","unstructured":"Zhang Z, Zhao Z, Zhang X, Sun C, Chen X (2023) Industrial anomaly detection with domain shift: A real-world dataset and masked multi-scale reconstruction. Comput Ind 151:103990","DOI":"10.1016\/j.compind.2023.103990"},{"key":"6689_CR153","first-page":"6488","volume-title":"Jiawen Zhu","author":"T Cao","year":"2023","unstructured":"Cao T (2023) Jiawen Zhu. Anomaly Detection under Distribution Shift. ICCV, Guansong Pang, pp 6488\u20136500"},{"key":"6689_CR154","doi-asserted-by":"crossref","unstructured":"Chen Z, Luo X, Wang W, Zhao Z, Su F, Men A (2025) Filter or Compensate: Towards Invariant Representation from Distribution Shift for Anomaly Detection. AAAI 2420-2428","DOI":"10.1609\/aaai.v39i3.32243"},{"key":"6689_CR155","doi-asserted-by":"crossref","unstructured":"Kashiani H, Talemi N A, Afghah F (2024) ROADS: Robust Prompt-driven Multi-Class Anomaly Detection under Domain Shift. CoRR arXiv:2411.16049","DOI":"10.1109\/WACV61041.2025.00768"},{"key":"6689_CR156","unstructured":"Liao J, Xu X, Su Y, Tu R-C, Liu Y, Tao D, Yang X (2025) Robust Distribution Alignment for Industrial Anomaly Detection under Distribution Shift. CoRR arXiv:2503.14910"},{"key":"6689_CR157","doi-asserted-by":"crossref","unstructured":"Dong X, Zhang C, Wang J, Chen Y, Wang D (2024) Real-time detection of surface cracking defects for large-sized stamped parts. Comput Indust 159:104105","DOI":"10.1016\/j.compind.2024.104105"},{"key":"6689_CR158","doi-asserted-by":"crossref","unstructured":"Dong X, Zhang C, Wang D, Guo Q, Deng X, Li C (2025) Inspection of cracking in stamping parts surfaces using anomaly detection. Eng Appl Artif Intell 143:110006","DOI":"10.1016\/j.engappai.2025.110006"},{"key":"6689_CR159","doi-asserted-by":"crossref","unstructured":"Zhang F, Wu T, Liu S, Zhu Y, Chen L, Natsuki T (2024) Real-time defect detection of saw chains on automatic assembly lines based on residual networks and knowledge coding. Eng Appl Artif Intell 128:107507","DOI":"10.1016\/j.engappai.2023.107507"},{"key":"6689_CR160","doi-asserted-by":"crossref","unstructured":"Ma Z, Li J, Wong W K (2025) \"Patch distance based auto-encoder for industrial anomaly detection.\" Expert Syst Appl 126537","DOI":"10.1016\/j.eswa.2025.126537"},{"key":"6689_CR161","doi-asserted-by":"crossref","unstructured":"Alexaki E, Papaioannidis C, Mygdalis V, et al (2025) Padnet: a Patch-Based Anomaly Detection Framework for Industrial Pipeline Damage Detection[C]. ICASSP 2025-2025 IEEE Int Conf Acoustics, Speech and Signal Process (ICASSP). IEEE, 1-5","DOI":"10.1109\/ICASSP49660.2025.10889385"},{"key":"6689_CR162","doi-asserted-by":"crossref","unstructured":"Ye X, et al (2024) \"Wind turbine blade defect detection with a semi-supervised deep learning framework.\" Eng Appl Artif Intell 136:108908","DOI":"10.1016\/j.engappai.2024.108908"},{"key":"6689_CR163","doi-asserted-by":"crossref","unstructured":"Guo J, Lu S, Zhang W, Li H (2024) Dinomaly: The Less Is More Philosophy in Multi-Class Unsupervised Anomaly Detection. CoRR arXiv:2405.14325","DOI":"10.1109\/CVPR52734.2025.01900"},{"key":"6689_CR164","unstructured":"He H, Bai Y, Zhang J, He Q, Chen H, Gan Z, Wang C, Li X, Tian G, Xie L (2024) MambaAD: Exploring State Space Models for Multi-class Unsupervised Anomaly Detection. NeurIPS"},{"key":"6689_CR165","doi-asserted-by":"crossref","unstructured":"Huang Z, et al (2025) \"Cross-modal knowledge transfer for 3D point clouds via graph offset prediction.\" Pattern Recogn 162: 111351","DOI":"10.1016\/j.patcog.2025.111351"},{"key":"6689_CR166","doi-asserted-by":"crossref","unstructured":"Hao M, et al (2024) \"Coarse to fine-based image\u2013point cloud fusion network for 3D object detection.\" Inf Fusion 112: 102551","DOI":"10.1016\/j.inffus.2024.102551"},{"key":"6689_CR167","doi-asserted-by":"crossref","unstructured":"Hang R, et al (2023) \"3D human pose and shape estimation via de-occlusion multi-task learning.\" Neurocomput 548: 126284","DOI":"10.1016\/j.neucom.2023.126284"},{"key":"6689_CR168","unstructured":"Xi J, et al. \"MMAD: A Comprehensive Benchmark for Multimodal Large Language Models in Industrial Anomaly Detection.\" The Thirteenth International Conference on Learning Representations"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06689-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06689-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06689-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T14:33:22Z","timestamp":1758983602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06689-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":168,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["6689"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06689-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"31 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study did not involve human participants, and therefore, ethical approval was not required.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval and Consent to Participate"}},{"value":"The authors declare no conflict of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}],"article-number":"938"}}