{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:29:09Z","timestamp":1773775749913,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T00:00:00Z","timestamp":1700438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s10994-023-06415-9","type":"journal-article","created":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T16:03:09Z","timestamp":1700496189000},"page":"4381-4406","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Composite score for anomaly detection in imbalanced real-world industrial dataset"],"prefix":"10.1007","volume":"113","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0467-6991","authenticated-orcid":false,"given":"Arnaud","family":"Bougaham","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"El Adoui","sequence":"additional","affiliation":[]},{"given":"Isabelle","family":"Linden","sequence":"additional","affiliation":[]},{"given":"Beno\u00eet","family":"Fr\u00e9nay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,20]]},"reference":[{"key":"6415_CR1","doi-asserted-by":"publisher","first-page":"183192","DOI":"10.1109\/ACCESS.2020.3029127","volume":"8","author":"M Abd Al Rahman","year":"2020","unstructured":"Abd Al Rahman, M., & Mousavi, A. (2020). A review and analysis of automatic optical inspection and quality monitoring methods in electronics industry. IEEE Access, 8, 183192\u2013183271.","journal-title":"IEEE Access"},{"key":"6415_CR2","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jnca.2016.04.007","volume":"68","author":"A Abdallah","year":"2016","unstructured":"Abdallah, A., Maarof, M. A., & Zainal, A. (2016). Fraud detection system: A survey. Journal of Network and Computer Applications, 68, 90\u2013113.","journal-title":"Journal of Network and Computer Applications"},{"key":"6415_CR3","doi-asserted-by":"crossref","unstructured":"Akcay, S., Atapour-Abarghouei, A., & Breckon, T. P. (2019). Ganomaly: Semi-supervised anomaly detection via adversarial training. In: Computer Vision\u2014ACCV 2018: 14th Asian conference on computer vision, Perth, Australia, December 2\u20136, 2018, revised selected papers, Part III 14 (pp. 622\u2013637). Springer: Berlin","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"6415_CR4","doi-asserted-by":"crossref","unstructured":"Ak\u00e7ay, S., Atapour-Abarghouei, A., & Breckon, T.P. (2019). Skip-ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In: 2019 International Joint Conference on Neural Networks (IJCNN) (pp. 1\u20138). IEEE.","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"6415_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.procir.2021.10.042","volume":"103","author":"M Babic","year":"2021","unstructured":"Babic, M., Farahani, M. A., & Wuest, T. (2021). Image based quality inspection in smart manufacturing systems: A literature review. Procedia CIRP, 103, 262\u2013267.","journal-title":"Procedia CIRP"},{"key":"6415_CR6","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., & Steger, C. (2019). Mvtec ad\u2014A comprehensive real-world dataset for unsupervised anomaly detection. In Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (pp. 9592\u20139600).","DOI":"10.1109\/CVPR.2019.00982"},{"issue":"2","key":"6415_CR7","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra, J., & Bengio, Y. (2012). Random search for hyper-parameter optimization. Journal of Machine Learning Research, 13(2), 281\u2013305.","journal-title":"Journal of Machine Learning Research"},{"key":"6415_CR8","unstructured":"Bougaham, A., Bibal, A., Linden, I., & Frenay, B. (2021). Ganodip-gan anomaly detection through intermediate patches: A PCBA manufacturing case. In Third international workshop on learning with imbalanced domains: Theory and applications (pp. 104\u2013117). PMLR."},{"key":"6415_CR9","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla, N. V., Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research, 16, 321\u2013357.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"6415_CR10","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/s00170-006-0730-0","volume":"35","author":"A Crispin","year":"2007","unstructured":"Crispin, A., & Rankov, V. (2007). Automated inspection of PCB components using a genetic algorithm template-matching approach. The International Journal of Advanced Manufacturing Technology, 35, 293\u2013300.","journal-title":"The International Journal of Advanced Manufacturing Technology"},{"key":"6415_CR11","unstructured":"Down, M., Czubak, F., Gruska, G., Stahley, S., & Benham, D. (2010). Measurement system analysis. In AIAG Reference Manual: Chrysler Group LLC, Ford Motor Company, and General Motors Corporation, Southfield (pp. 103\u2013123)."},{"issue":"5","key":"6415_CR12","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1167\/11.5.14","volume":"11","author":"MP Eckstein","year":"2011","unstructured":"Eckstein, M. P. (2011). Visual search: A retrospective. Journal of Vision, 11(5), 14\u201314.","journal-title":"Journal of Vision"},{"key":"6415_CR13","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.patcog.2016.03.028","volume":"58","author":"SM Erfani","year":"2016","unstructured":"Erfani, S. M., Rajasegarar, S., Karunasekera, S., & Leckie, C. (2016). High-dimensional and large-scale anomaly detection using a linear one-class svm with deep learning. Pattern Recognition, 58, 121\u2013134.","journal-title":"Pattern Recognition"},{"key":"6415_CR14","doi-asserted-by":"crossref","unstructured":"Esser, P., Rombach, R., & Ommer, B. (2021). Taming transformers for high-resolution image synthesis. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 12873\u201312883.","DOI":"10.1109\/CVPR46437.2021.01268"},{"key":"6415_CR15","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1016\/j.procir.2020.04.069","volume":"93","author":"M-A Filz","year":"2020","unstructured":"Filz, M.-A., Herrmann, C., & Thiede, S. (2020). Simulation-based assessment of quality inspection strategies on manufacturing systems. Procedia CIRP, 93, 777\u2013782.","journal-title":"Procedia CIRP"},{"key":"6415_CR16","doi-asserted-by":"crossref","unstructured":"Han, C., Hayashi, H., Rundo, L., Araki, R., Shimoda, W., Muramatsu, S., Furukawa, Y., Mauri, G., & Nakayama, H. (2018). Gan-based synthetic brain MR image generation. In 2018 IEEE 15th International Symposium on Biomedical Imaging (ISBI 2018) (pp. 734\u2013738). IEEE.","DOI":"10.1109\/ISBI.2018.8363678"},{"key":"6415_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.rinp.2021.105045","volume":"31","author":"JN Hasoon","year":"2021","unstructured":"Hasoon, J. N., Fadel, A. H., Hameed, R. S., Mostafa, S. A., Khalaf, B. A., Mohammed, M. A., & Nedoma, J. (2021). Covid-19 anomaly detection and classification method based on supervised machine learning of chest x-ray images. Results in Physics, 31, 105045.","journal-title":"Results in Physics"},{"key":"6415_CR18","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., & Hochreiter, S. (2017). GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: Advances in neural information processing systems (Vol. 30)."},{"key":"6415_CR19","doi-asserted-by":"crossref","unstructured":"Isola, P., Zhu, J.-Y., Zhou, T., & Efros, A.A. (2017). Image-to-image translation with conditional adversarial networks. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1125\u20131134).","DOI":"10.1109\/CVPR.2017.632"},{"key":"6415_CR20","doi-asserted-by":"crossref","unstructured":"Jia, H., Shi, J., & Chang, T.-S. (2004). An intelligent real-time vision system for surface defect detection. In Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004. (vol. 3, pp. 239\u2013242). IEEE.","DOI":"10.1109\/ICPR.2004.1334512"},{"key":"6415_CR21","unstructured":"Karami, E., Prasad, S., & Shehata, M. (2017). Image matching using sift, surf, brief and orb: Performance comparison for distorted images. arXiv e-prints, 1710."},{"issue":"2","key":"6415_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran, B. R., Thomas, D. M., & Parakkal, R. (2018). An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. Journal of Imaging, 4(2), 36.","journal-title":"Journal of Imaging"},{"key":"6415_CR23","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/j.asoc.2013.08.014","volume":"14","author":"B Krawczyk","year":"2014","unstructured":"Krawczyk, B., Wo\u017aniak, M., & Schaefer, G. (2014). Cost-sensitive decision tree ensembles for effective imbalanced classification. Applied Soft Computing, 14, 554\u2013562.","journal-title":"Applied Soft Computing"},{"key":"6415_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03905-6","author":"H Li","year":"2022","unstructured":"Li, H., & Li, Y. (2022). Anomaly detection methods based on GAN: A survey. Applied Intelligence. https:\/\/doi.org\/10.1007\/s10489-022-03905-6","journal-title":"Applied Intelligence"},{"key":"6415_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106324","volume":"136","author":"J Liu","year":"2021","unstructured":"Liu, J., Song, K., Feng, M., Yan, Y., Tu, Z., & Zhu, L. (2021). Semi-supervised anomaly detection with dual prototypes autoencoder for industrial surface inspection. Optics and Lasers in Engineering, 136, 106324.","journal-title":"Optics and Lasers in Engineering"},{"issue":"7","key":"6415_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MAES.2010.5546306","volume":"25","author":"S Matteoli","year":"2010","unstructured":"Matteoli, S., Diani, M., & Corsini, G. (2010). A tutorial overview of anomaly detection in hyperspectral images. IEEE Aerospace and Electronic Systems Magazine, 25(7), 5\u201328.","journal-title":"IEEE Aerospace and Electronic Systems Magazine"},{"key":"6415_CR27","unstructured":"Razavi, A., Van\u00a0den Oord, A., & Vinyals, O. (2019). Generating diverse high-fidelity images with VQ-VAE-2. In Advances in neural information processing systems (Vol. 32)"},{"issue":"2","key":"6415_CR28","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1007\/s40684-021-00343-6","volume":"9","author":"Z Ren","year":"2022","unstructured":"Ren, Z., Fang, F., Yan, N., & Wu, Y. (2022). State of the art in defect detection based on machine vision. International Journal of Precision Engineering and Manufacturing-Green Technology, 9(2), 661\u2013691.","journal-title":"International Journal of Precision Engineering and Manufacturing-Green Technology"},{"key":"6415_CR29","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., & Gehler, P. (2021). Towards total recall in industrial anomaly detection. arXiv preprint arXiv:2106.08265","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"6415_CR30","unstructured":"Salimans, T., Goodfellow, I., Zaremba, W., Cheung, V., Radford, A., & Chen, X. (2016). Improved techniques for training GANs. In: Advances in neural information processing systems (Vol. 29)."},{"key":"6415_CR31","unstructured":"Sangalli, S., Erdil, E., H\u00f6tker, A., Donati, O., & Konukoglu, E. (2021). Constrained optimization to train neural networks on critical and under-represented classes. In Advances in neural information processing systems (Vol. 34)."},{"key":"6415_CR32","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.media.2019.01.010","volume":"54","author":"T Schlegl","year":"2019","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S. M., Langs, G., & Schmidt-Erfurth, U. (2019). f-AnoGAN: Fast unsupervised anomaly detection with generative adversarial networks. Medical Image Analysis, 54, 30\u201344.","journal-title":"Medical Image Analysis"},{"key":"6415_CR33","doi-asserted-by":"crossref","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., & Langs, G. (2017). Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: International conference on information processing in medical imaging (pp. 146\u2013157). Springer: Berlin","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"6415_CR34","doi-asserted-by":"crossref","unstructured":"Sridhar, P., Arivan, S., Akshay, R., & Farhathullah, R. (2022). Anomaly detection using CNN with SVM. In 2022 8th international conference on smart structures and systems (ICSSS) (pp. 1\u20134). IEEE.","DOI":"10.1109\/ICSSS54381.2022.9782229"},{"key":"6415_CR35","unstructured":"Van Den Oord, A., Vinyals, O., & Kavukcuoglu, K. (2017). Neural discrete representation learning. In Advances in neural information processing systems (Vol. 30)."},{"key":"6415_CR36","doi-asserted-by":"crossref","unstructured":"Vergara-Villegas, O. O., Cruz-S\u00e1nchez, V. G., de Jes\u00fas\u00a0Ochoa-Dom\u00ednguez, H., de Jes\u00fas\u00a0Nandayapa-Alfaro, M., & Flores-Abad, \u00c1. (2014). Automatic product quality inspection using computer vision systems. In Lean manufacturing in the developing world: Methodology, case studies and trends from Latin America (pp. 135\u2013156).","DOI":"10.1007\/978-3-319-04951-9_7"},{"key":"6415_CR37","doi-asserted-by":"publisher","first-page":"10817","DOI":"10.1109\/ACCESS.2016.2631658","volume":"5","author":"W-C Wang","year":"2016","unstructured":"Wang, W.-C., Chen, S.-L., Chen, L.-B., & Chang, W.-J. (2016). A machine vision based automatic optical inspection system for measuring drilling quality of printed circuit boards. IEEE Access, 5, 10817\u201310833.","journal-title":"IEEE Access"},{"key":"6415_CR38","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.jmsy.2018.01.003","volume":"48","author":"J Wang","year":"2018","unstructured":"Wang, J., Ma, Y., Zhang, L., Gao, R. X., & Wu, D. (2018). Deep learning for smart manufacturing: Methods and applications. Journal of Manufacturing Systems, 48, 144\u2013156.","journal-title":"Journal of Manufacturing Systems"},{"key":"6415_CR39","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.neucom.2021.12.093","volume":"493","author":"X Xia","year":"2022","unstructured":"Xia, X., Pan, X., Li, N., He, X., Ma, L., Zhang, X., & Ding, N. (2022). Gan-based anomaly detection: A review. Neurocomputing, 493, 497\u2013535.","journal-title":"Neurocomputing"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-023-06415-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10994-023-06415-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-023-06415-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T18:10:07Z","timestamp":1764267007000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10994-023-06415-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,20]]},"references-count":39,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["6415"],"URL":"https:\/\/doi.org\/10.1007\/s10994-023-06415-9","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,20]]},"assertion":[{"value":"7 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing or conflict of interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The authors declare that this work is original, is not under consideration for publication elsewhere and has not been published previously. The authors approve the manuscript enclosed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors consent to the publication of this work.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}