{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T16:06:17Z","timestamp":1778515577286,"version":"3.51.4"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:00:00Z","timestamp":1773014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:00:00Z","timestamp":1773014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Vis"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1007\/s11263-026-02743-0","type":"journal-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:12:40Z","timestamp":1773076360000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The MVTec AD 2 Dataset: Advanced Scenarios for Unsupervised Anomaly Detection"],"prefix":"10.1007","volume":"134","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7574-8598","authenticated-orcid":false,"given":"Lars","family":"Heckler-Kram","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5811-7709","authenticated-orcid":false,"given":"Jan-Hendrik","family":"Neudeck","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9793-6783","authenticated-orcid":false,"given":"Ulla","family":"Scheler","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4169-6759","authenticated-orcid":false,"given":"Rebecca","family":"K\u00f6nig","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3426-1703","authenticated-orcid":false,"given":"Carsten","family":"Steger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,9]]},"reference":[{"key":"2743_CR1","doi-asserted-by":"crossref","unstructured":"Batzner, K., Heckler, L., & K\u00f6nig, R. (2024). EfficientAD: Accurate visual anomaly detection at millisecond-level latencies. IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV) (pp. 128\u2013138).","DOI":"10.1109\/WACV57701.2024.00020"},{"issue":"4","key":"2743_CR2","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s11263-020-01400-4","volume":"129","author":"P Bergmann","year":"2021","unstructured":"Bergmann, P., Batzner, K., Fauser, M., Sattlegger, D., & Steger, C. (2021). The MVTec Anomaly Detection Dataset: A Comprehensive Real-World Dataset for Unsupervised Anomaly Detection. International Journal of Computer Vision, 129(4), 1038\u20131059. https:\/\/doi.org\/10.1007\/s11263-020-01400-4","journal-title":"International Journal of Computer Vision"},{"issue":"4","key":"2743_CR3","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","volume":"130","author":"P Bergmann","year":"2022","unstructured":"Bergmann, P., Batzner, K., Fauser, M., Sattlegger, D., & Steger, C. (2022). Beyond dents and scratches: Logical constraints in unsupervised anomaly detection and localization. International Journal of Computer Vision, 130(4), 947\u2013969. https:\/\/doi.org\/10.1007\/s11263-022-01578-9","journal-title":"International Journal of Computer Vision"},{"key":"2743_CR4","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., & Steger, C. (2019). MVTec AD \u2014 A comprehensive real-world dataset for unsupervised anomaly detection. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 9584\u20139592).","DOI":"10.1109\/CVPR.2019.00982"},{"key":"2743_CR5","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Fauser, M., Sattlegger, D., & Steger, C. (2020). Uninformed students: Student\u2013teacher anomaly detection with discriminative latent embeddings. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 4182\u20134191).","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"2743_CR6","doi-asserted-by":"crossref","unstructured":"Bergmann, P., Jin, X., Sattlegger, D., & Steger, C. (2022). The MVTec 3D-AD dataset for unsupervised 3D anomaly detection and localization. Proceedings of the 17th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications \u2014 Volume 5: VISAPP (pp. 202\u2013213). SciTePress.","DOI":"10.5220\/0010865000003124"},{"key":"2743_CR7","doi-asserted-by":"crossref","unstructured":"Bergmann, P., L\u00f6we, S., Fauser, M., Sattlegger, D., & Steger, C. (2019). Improving unsupervised defect segmentation by applying structural similarity to autoencoders. Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications \u2014 Volume 5: VISAPP (pp. 372\u2013380). SciTePress.","DOI":"10.5220\/0007364503720380"},{"key":"2743_CR8","doi-asserted-by":"crossref","unstructured":"Blum, H., Sarlin, P.-E., Nieto, J., Siegwart, R., & Cadena, C. (2019). Fishyscapes: A benchmark for safe semantic segmentation in autonomous driving. IEEE International Conference on Computer Vision Workshops (ICCVW) (pp. 2403\u20132412).","DOI":"10.1109\/ICCVW.2019.00294"},{"key":"2743_CR9","doi-asserted-by":"crossref","unstructured":"Bonfiglioli, L., Toschi, M., Silvestri, D., Fioraio, N., & De\u00a0Gregorio, D. (2022). The Eyecandies dataset for unsupervised multimodal anomaly detection and localization. Proceedings of the 16th Asian Conference on Computer Vision (ACCV).","DOI":"10.1007\/978-3-031-26348-4_27"},{"key":"2743_CR10","unstructured":"Cohen, N., & Hoshen, Y. (2020). Sub-image anomaly detection with deep pyramid correspondences. arXiv preprint arXiv:2005.02357v1."},{"key":"2743_CR11","doi-asserted-by":"crossref","unstructured":"Costanzino, A., Ramirez, P.Z., Del\u00a0Moro, M., Aiezzo, A., Lisanti, G., Salti, S., & Di\u00a0Stefano, L. (2024). Test time training for industrial anomaly segmentation. IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (pp. 3910\u20133920).","DOI":"10.1109\/CVPRW63382.2024.00395"},{"key":"2743_CR12","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., & Audigier, R. (2020). PaDiM: A patch distribution modeling framework for anomaly detection and localization. Pattern Recognition. ICPR International Workshops and Challenges 2021, Proceedings, Part IV (pp. 475\u2013489). Springer.","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"2743_CR13","doi-asserted-by":"crossref","unstructured":"Deng, H., & Li, X. (2022). Anomaly detection via reverse distillation from one-class embedding. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 9737\u20139746).","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"2743_CR14","doi-asserted-by":"crossref","unstructured":"Fu\u010dka, M., Zavrtanik, V., & Sko\u010daj, D. (2025). Transfusion \u2013 a transparency-based diffusion model for anomaly detection. A.\u00a0Leonardis, E.\u00a0Ricci, S.\u00a0Roth, O.\u00a0Russakovsky, T.\u00a0Sattler, and G.\u00a0Varol (Eds.), Computer Vision \u2013 ECCV 2024 (pp. 91\u2013108). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-72761-0_6"},{"issue":"3","key":"2743_CR15","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1609\/aaai.v38i3.27963","volume":"38","author":"Z Gu","year":"2024","unstructured":"Gu, Z., Zhu, B., Zhu, G., Chen, Y., Tang, M., & Wang, J. (2024). AnomalyGPT: Detecting industrial anomalies using large vision-language models. Proceedings of the AAAI Conference on Artificial Intelligence, 38(3), 1932\u20131940. https:\/\/doi.org\/10.1609\/aaai.v38i3.27963","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"2743_CR16","doi-asserted-by":"crossref","unstructured":"Gudovskiy, D., Ishizaka, S., & Kozuka, K. (2022). CFLOW-AD: Real-time unsupervised anomaly detection with localization via conditional normalizing flows. IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV) (pp. 1819\u20131828).","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"2743_CR17","doi-asserted-by":"crossref","unstructured":"Guo, J., Lu, S., Zhang, W., Chen, F., Li, H., & Liao, H. (2025). Dinomaly: The less is more philosophy in multi-class unsupervised anomaly detection. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (p.20405-20415).","DOI":"10.1109\/CVPR52734.2025.01900"},{"key":"2743_CR18","unstructured":"Hendrycks, D., Basart, S., Mazeika, M., Mostajabi, M., Steinhardt, J., & Song, D. (2019). A benchmark for anomaly segmentation. arXiv preprint arXiv:1911.11132v1."},{"key":"2743_CR19","doi-asserted-by":"crossref","unstructured":"Jeong, J., Zou, Y., Kim, T., Zhang, D., Ravichandran, A., & Dabeer, O. (2023). Winclip: Zero-\/few-shot anomaly classification and segmentation. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 19606\u201319616).","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"2743_CR20","doi-asserted-by":"publisher","first-page":"5606","DOI":"10.1109\/TIP.2024.3448263","volume":"33","author":"H Li","year":"2024","unstructured":"Li, H., Hu, J., Li, B., Chen, H., Zheng, Y., & Shen, C. (2024). Target before shooting: Accurate anomaly detection and localization under one millisecond via cascade patch retrieval. IEEE Transactions on Image Processing, 33, 5606\u20135621. https:\/\/doi.org\/10.1109\/TIP.2024.3448263","journal-title":"IEEE Transactions on Image Processing"},{"issue":"1","key":"2743_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W-X Li","year":"2013","unstructured":"Li, W.-X., Mahadevan, V., & Vasconcelos, N. (2013). Anomaly detection and localization in crowded scenes. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(1), 18\u201332. https:\/\/doi.org\/10.1109\/TPAMI.2013.111","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"2743_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Z., Zhou, Y., Xu, Y., & Wang, Z. (2023). Simplenet: A simple network for image anomaly detection and localization. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 20402\u201320411).","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"2743_CR23","doi-asserted-by":"crossref","unstructured":"Luo, W., Cao, Y., Yao, H., Zhang, X., Lou, J., Cheng, Y., & Yu, W. (2025). Exploring intrinsic normal prototypes within a single image for universal anomaly detection. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 9974\u20139983).","DOI":"10.1109\/CVPR52734.2025.00932"},{"issue":"10","key":"2743_CR24","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1109\/TMI.2014.2377694","volume":"34","author":"BH Menze","year":"2015","unstructured":"Menze, B. H., Jakab, A., Bauer, S., Kalpathy-Cramer, J., Farahani, K., Kirby, J., et al. (2015). The multimodal brain tumor image segmentation benchmark (BRATS). IEEE Transactions on Medical Imaging, 34(10), 1993\u20132024. https:\/\/doi.org\/10.1109\/TMI.2014.2377694","journal-title":"IEEE Transactions on Medical Imaging"},{"key":"2743_CR25","unstructured":"Microsoft Corporation (2025). Azure OpenAI API reference. https:\/\/learn.microsoft.com\/en-us\/azure\/ai-foundry\/openai\/overview#image-input-tokens. (Version published 2025-07-31. Accessed 2025-10-31)"},{"key":"2743_CR26","unstructured":"Nazare, T.S., de Mello, R.F., & Ponti, M.A. (2018). Are pre-trained CNNs good feature extractors for anomaly detection in surveillance videos? arXiv preprint arXiv:1811.08495."},{"key":"2743_CR27","doi-asserted-by":"publisher","unstructured":"Peng, Y., Lin, X., Ma, N., Du, J., Liu, C., Liu, C., & Chen, Q. (2025). SAM-LAD: Segment anything model meets zero-shot logic anomaly detection. Knowledge-Based Systems, 314, article 113176, https:\/\/doi.org\/10.1016\/j.knosys.2025.113176","DOI":"10.1016\/j.knosys.2025.113176"},{"key":"2743_CR28","doi-asserted-by":"crossref","unstructured":"Roth, K., Pemula, L., Zepeda, J., Sch\u00f6lkopf, B., Brox, T., & Gehler, P.V. (2022). Towards total recall in industrial anomaly detection. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 14298\u201314308).","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"2743_CR29","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wehrbein, T., Rosenhahn, B., & Wandt, B. (2022). Fully convolutional cross-scale-flows for image-based defect detection. IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV) (pp. 1829\u20131838).","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"2743_CR30","doi-asserted-by":"crossref","unstructured":"Rudolph, M., Wehrbein, T., Rosenhahn, B., & Wandt, B. (2023). Asymmetric student\u2013teacher networks for industrial anomaly detection. IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV) (pp. 2591\u20132601).","DOI":"10.1109\/WACV56688.2023.00262"},{"key":"2743_CR31","unstructured":"Sadikaj, Y., Zhou, H., Halilaj, L., Schmid, S., Staab, S., & Plant, C. (2025). Multiads: Defect-aware supervision for multi-type anomaly detection and segmentation in zero-shot learning. IEEE\/CVF International Conference on Computer Vision (ICCV) (p.22978-22988)."},{"key":"2743_CR32","doi-asserted-by":"crossref","unstructured":"Schl\u00fcter, H.M., Tan, J., Hou, B., & Kainz, B. (2022). Natural synthetic anomalies for self-supervised anomaly detection and localization. S.\u00a0Avidan, G.\u00a0Brostow, M.\u00a0Ciss\u00e9, G.M.\u00a0Farinella, and T.\u00a0Hassner (Eds.), Computer Vision \u2013 ECCV 2022 (pp. 474\u2013489). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-19821-2_27"},{"key":"2743_CR33","doi-asserted-by":"publisher","unstructured":"Seeb\u00f6ck, P., Orlando, J. I., Schlegl, T., Waldstein, S. M., Bogunovic, H., Klimscha, S., & Schmidt-Erfurth, U. (2020). Exploiting epistemic uncertainty of anatomy segmentation for anomaly detection in retinal OCT. IEEE Transactions on Medical Imaging,39(1), 87\u20139. https:\/\/doi.org\/10.1109\/TMI.2019.2919951","DOI":"10.1109\/TMI.2019.2919951"},{"key":"2743_CR34","volume-title":"Machine vision algorithms and applications","author":"C Steger","year":"2018","unstructured":"Steger, C., Ulrich, M., & Wiedemann, C. (2018). Machine vision algorithms and applications (2nd ed.). Weinheim: Wiley-VCH.","edition":"2"},{"key":"2743_CR35","doi-asserted-by":"crossref","unstructured":"Tien, T.D., Nguyen, A.T., Tran, N.H., Huy, T.D., Duong, S.T., Nguyen, C.D.T., & Truong, S.Q.H. (2023). Revisiting reverse distillation for anomaly detection. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 24511\u201324520).","DOI":"10.1109\/CVPR52729.2023.02348"},{"key":"2743_CR36","doi-asserted-by":"crossref","unstructured":"Wang, C., Zhu, W., Gao, B.-B., Gan, Z., Zhang, J., Gu, Z., & Ma, L. (2024). Real-IAD: A real-world multi-view dataset for benchmarking versatile industrial anomaly detection. arXiv preprint arXiv:2403.12580.","DOI":"10.1109\/CVPR52733.2024.02159"},{"key":"2743_CR37","unstructured":"Yu, J., Zheng, Y., Wang, X., Li, W., Wu, Y., Zhao, R., & Wu, L. (2021). FastFlow: Unsupervised anomaly detection and localization via 2D normalizing flows. arXiv preprint arXiv:2111.07677v2."},{"key":"2743_CR38","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., & Sko\u010daj, D. (2022). DSR \u2014 A dual subspace re-projection network for surface anomaly detection. S.\u00a0Avidan, G.\u00a0Brostow, M.\u00a0Ciss\u00e9, G.M.\u00a0Farinella, and T.\u00a0Hassner (Eds.), Computer Vision \u2013 ECCV 2022 (pp. 539\u2013554). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-19821-2_31"},{"key":"2743_CR39","doi-asserted-by":"crossref","unstructured":"Zavrtanik, V., Kristan, M., & Sko\u010daj, D. (2021). DRAEM \u2014 A discriminatively trained reconstruction embedding for surface anomaly detection. IEEE\/CVF International Conference on Computer Vision (ICCV) (pp. 8330\u20138339).","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"2743_CR40","unstructured":"Zhang, H., Wang, Z., Wu, Z., & Jiang, Y.-G. (2023). DiffusionAD: Norm-guided one-step denoising diffusion for anomaly detection. arXiv preprint arXiv:2303.08730v3."},{"key":"2743_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, N., Li, J., Dai, T., Jiang, Y., & Xia, S.-T. (2023). Unsupervised surface anomaly detection with diffusion probabilistic model. IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 6782\u20136791).","DOI":"10.1109\/ICCV51070.2023.00624"},{"key":"2743_CR42","first-page":"44558","volume":"36","author":"Q Zhou","year":"2023","unstructured":"Zhou, Q., Li, W., Jiang, L., Wang, G., Zhou, G., Zhang, S., & Zhao, H. (2023). PAD: A dataset and benchmark for pose-agnostic anomaly detection. Advances in Neural Information Processing Systems, 36, 44558\u201344571.","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"2","key":"2743_CR43","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1109\/TNNLS.2023.3344118","volume":"36","author":"Y Zhou","year":"2024","unstructured":"Zhou, Y., Xu, X., Song, J., Shen, F., & Shen, H. T. (2024). MSFlow: Multiscale flow-based framework for unsupervised anomaly detection. IEEE Transactions on Neural Networks and Learning Systems, 36(2), 2437\u20132450. https:\/\/doi.org\/10.1109\/TNNLS.2023.3344118","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"2743_CR44","doi-asserted-by":"crossref","unstructured":"Zou, Y., Jeong, J., Pemula, L., Zhang, D., & Dabeer, O. (2022). Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. Computer Vision \u2013 ECCV 2022 (pp. 392\u2013408). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-20056-4_23"}],"container-title":["International Journal of Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-026-02743-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11263-026-02743-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11263-026-02743-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T05:45:05Z","timestamp":1776491105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11263-026-02743-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,9]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2026,4]]}},"alternative-id":["2743"],"URL":"https:\/\/doi.org\/10.1007\/s11263-026-02743-0","relation":{},"ISSN":["0920-5691","1573-1405"],"issn-type":[{"value":"0920-5691","type":"print"},{"value":"1573-1405","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,9]]},"assertion":[{"value":"23 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare they have no competing interests that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"175"}}