{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T04:08:05Z","timestamp":1751602085135,"version":"3.41.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11760-025-04394-z","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T15:57:24Z","timestamp":1750435044000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing industrial machine vision interpretability through saliency maps fusion"],"prefix":"10.1007","volume":"19","author":[{"given":"Xiaoshun","family":"Xu","sequence":"first","affiliation":[]},{"given":"Xuchun","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yunfei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinqiu","family":"Mo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Golnabi, H., Asadpour, A.: Design and application of industrial machine vision systems, Robotics and Computer-Integrated Manufacturing, (2007)","key":"4394_CR1","DOI":"10.1016\/j.rcim.2007.02.005"},{"unstructured":"Silva, R.L., et al.: Machine vision systems for industrial quality control inspections, 15th IFIP WG5.1 International Conference. PLM.: 2018 (2018)","key":"4394_CR2"},{"doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition, IEEE CVPR pp. 770\u2013778, 2016. (2016)","key":"4394_CR3","DOI":"10.1109\/CVPR.2016.90"},{"unstructured":"Vaswani, A., Shazeer, N., Parmar, N., et al.: Attention is all you need, NIPS.: 6000\u20136010, 2017. (2017)","key":"4394_CR4"},{"issue":"3","key":"4394_CR5","doi-asserted-by":"publisher","first-page":"2841","DOI":"10.1007\/s11760-023-02954-9","volume":"18","author":"J Xiong","year":"2024","unstructured":"Xiong, J., He, Z., Zhou, et al.: Photovoltaic glass edge defect detection based on improved squeezenet. Signal. Image Video Process. 18(3), 2841\u20132856 (2024). https:\/\/doi.org\/10.1007\/s11760-023-02954-9","journal-title":"Signal. Image Video Process."},{"issue":"1","key":"4394_CR6","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.vrih.2022.07.006","volume":"5","author":"M Zhang","year":"2023","unstructured":"Zhang, M., Tian, X.: Transformer architecture based on mutual attention for image-anomaly detection. Virtual Real. Intell. Hardw. 5(1), 57\u201367 (2023). https:\/\/doi.org\/10.1016\/j.vrih.2022.07.006","journal-title":"Virtual Real. Intell. Hardw."},{"key":"4394_CR7","first-page":"05501","volume":"2207","author":"\u200c\u200c\u200cJ","year":"2022","unstructured":"\u200c\u200c\u200cJ, Li, et al.: Next-ViT: Next generation vision transformer for efficient deployment in realistic industrial scenarios. Arxiv. 2207, 05501 (2022)","journal-title":"Arxiv"},{"issue":"12","key":"4394_CR8","doi-asserted-by":"publisher","first-page":"8585","DOI":"10.1007\/s11760-024-03492-8","volume":"18","author":"Y Zhang","year":"2024","unstructured":"Zhang, Y., Khairuddin, A.S.M., Chuah, J.H., et al.: An intelligent mangosteen grading system based on an improved convolutional neural network. Signal. Image Video Process. 18(12), 8585\u20138595 (2024). https:\/\/doi.org\/10.1007\/s11760-024-03492-8","journal-title":"Signal. Image Video Process."},{"doi-asserted-by":"crossref","unstructured":"Ban\u00fas, N., et al.: Jul.: Design and deployment of a generic software for managing industrial vision Systems, IEEE Transactions on Automation Science and Engineering, vol. 19, no. 3, pp. 2171\u20132186, (2022)","key":"4394_CR9","DOI":"10.1109\/TASE.2021.3078787"},{"key":"4394_CR10","doi-asserted-by":"publisher","first-page":"52138","DOI":"10.1109\/ACCESS.2018.2870052","volume":"6","author":"A Adadi","year":"2018","unstructured":"Adadi, A., et al.: Peeking inside the black-box: A survey on explainable artificial intelligence (XAI). IEEE Access. 6, 52138\u201352160 (2018)","journal-title":"IEEE Access."},{"doi-asserted-by":"crossref","unstructured":"Arrieta, A.B., et al.: Explainable artificial intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI, Information Fusion, vol. 58, pp. 82\u2013115 (2020)","key":"4394_CR11","DOI":"10.1016\/j.inffus.2019.12.012"},{"issue":"10","key":"4394_CR12","first-page":"2071","volume":"56","author":"S Ji","year":"2019","unstructured":"Ji, S., Li, J., et al.: A survey on techniques, applications and security of machine learning interpretability. J. Comput. Res. Dev. 56(10), 2071\u20132096 (2019)","journal-title":"J. Comput. Res. Dev."},{"doi-asserted-by":"crossref","unstructured":"Vermeire, T., et al.: How to choose an explainability method? Towards a methodical implementation of XAI in practice. Commun. Comput. Inform. Sci., pp. 521\u2013533 (2021)","key":"4394_CR13","DOI":"10.1007\/978-3-030-93736-2_39"},{"key":"4394_CR14","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s12559-014-9251-6","volume":"6","author":"L Dozal","year":"2014","unstructured":"Dozal, L., Olague, G., Clemente, E., et al.: Brain programming for the evolution of an artificial dorsal stream. Cogn. Comput. 6, 528\u2013557 (2014). https:\/\/doi.org\/10.1007\/s12559-014-9251-6","journal-title":"Cogn. Comput."},{"key":"4394_CR15","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-031-02462-7_38","volume":"Applications of","author":"R Pineda","year":"2022","unstructured":"Pineda, R., Olague, G., et al.: Brain programming and its resilience using a real-world database of a Snowy plover shorebird. Lect. Notes Comput. Sci. Applications of Evolutionary Computation, 603\u2013618 (2022). https:\/\/doi.org\/10.1007\/978-3-031-02462-7_38","journal-title":"Lect. Notes Comput. Sci."},{"issue":"20","key":"4394_CR16","doi-asserted-by":"publisher","first-page":"10686","DOI":"10.3390\/app122010686","volume":"12","author":"G Olague","year":"2022","unstructured":"Olague, G., Menendez-Clavijo, J.A., Olague, M., et al.: Automated design of salient object detection algorithms with brain programming. Appl. Sci. 12(20), 10686 (2022). https:\/\/doi.org\/10.3390\/app122010686","journal-title":"Appl. Sci."},{"issue":"4","key":"4394_CR17","first-page":"903","volume":"21","author":"R Labudzki","year":"2014","unstructured":"Labudzki, R., Legutko, S., Raos, P.: The essence and applications of machine vision. Tehnicki Vjesnik-technical Gaz. 21(4), 903\u2013909 (2014)","journal-title":"Tehnicki Vjesnik-technical Gaz."},{"issue":"6","key":"4394_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3533378","volume":"55","author":"A Paleyes","year":"2022","unstructured":"Paleyes, A., Urma, R.G., Lawrence, N.D.: Challenges in deploying machine learning:a survey of case studies. ACM Comput. Surveys. 55(6), 1\u201329 (2022)","journal-title":"ACM Comput. Surveys"},{"unstructured":"Stalder, S., Perraudin, N., Achanta, R., Perez-Cruz, et al.: What you see is what you classify: black box attributions. In Proceedings of the 36th International Conference on Neural Information Processing Systems. (2022)","key":"4394_CR19"},{"key":"4394_CR20","first-page":"443","volume":"437","author":"S Dereka","year":"2024","unstructured":"Dereka, S., Karpukhin, I., Zhdanov, M., Kolesnikov, S.: Diversifying deep ensembles: A saliency map approach for enhanced OOD detection, calibration, and accuracy. 2022 IEEE Int. Conf. Image Process. 437, 443 (2024)","journal-title":"2022 IEEE Int. Conf. Image Process."},{"doi-asserted-by":"publisher","unstructured":"Lowe, D.G.: Distinctive image features from Scale-Invariant keypoints. Int. J. Comput. Vision. 91\u2013110 (2004). https:\/\/doi.org\/10.1023\/b:visi.0000029664.99615.94","key":"4394_CR21","DOI":"10.1023\/b:visi.0000029664.99615.94"},{"doi-asserted-by":"publisher","unstructured":"Gao, Z., Yi, R., Qin, Z., et al.: Learning accurate template matching with differentiable coarse-to-fine correspondence refinement. Comput. Visual Media. 309\u2013330 (2024). https:\/\/doi.org\/10.1007\/s41095-023-0333-9","key":"4394_CR22","DOI":"10.1007\/s41095-023-0333-9"},{"doi-asserted-by":"crossref","unstructured":"Fong, R.C., Vedaldi, A.: Interpretable explanations of black boxes by meaningful perturbation, 2017 IEEE International Conference on Computer Vision (ICCV), pp. 3449\u20133457 (2017)","key":"4394_CR23","DOI":"10.1109\/ICCV.2017.371"},{"unstructured":"Petsiuk, V., et al.: RISE: Randomized input sampling for explanation of black-box models, British Machine Vision Conference, (2018)","key":"4394_CR24"},{"doi-asserted-by":"crossref","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vision (2015)","key":"4394_CR25","DOI":"10.1007\/s11263-015-0816-y"},{"doi-asserted-by":"crossref","unstructured":"Benesty, J., Chen, J., Huang, Y.: On the importance of the pearson correlation coefficient in noise reduction. IEEE Trans. Audio Speech Lang. Process. 16(4), 757\u2013765 (May 2008)","key":"4394_CR26","DOI":"10.1109\/TASL.2008.919072"},{"doi-asserted-by":"crossref","unstructured":"\u200cN. Riche, M., Duvinage, M., Mancas, et al.: Saliency and human fixations: state-of-the-art and study of comparison metrics, ICCV.: (2013)","key":"4394_CR27","DOI":"10.1109\/ICCV.2013.147"},{"issue":"11","key":"4394_CR28","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/34.730558","volume":"20","author":"L Itti","year":"1998","unstructured":"Itti, L., Koch, C., Niebur, E.: A model of saliency-based visual attention for rapid scene analysis. IEEE Trans. Pattern Anal. Mach. Intell. 20(11), 1254\u20131259 (1998)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"unstructured":"Hua, W., et al.: Dual-band image fusion for infrared and visible images based on image visual saliency, Optical Instruments, (2016)","key":"4394_CR29"},{"doi-asserted-by":"crossref","unstructured":"Valocky, F., Drahos, P., Haffner, O.: Measure distance between camera and object using camera sensor, Cybernetics & Informatics (K&I), 2020. (2020)","key":"4394_CR30","DOI":"10.1109\/KI48306.2020.9039879"},{"unstructured":"Course, M.V.O., Horn, B.: MIT Open Course Ware. (2020). https:\/\/ocw.mit.edu\/courses\/6-801-machine-vision-fall-2020\/resources\/ mit6_801f20_lec15_1080p\/","key":"4394_CR31"},{"doi-asserted-by":"crossref","unstructured":"Affes, E., Bouslimani, Y., Ghribi, M., et al.: Detection and location of sheet metal parts for industrial robots, IEEE International Symposium on Robotic and Sensors Environments, (2021)","key":"4394_CR32","DOI":"10.1109\/ROSE52750.2021.9611765"},{"doi-asserted-by":"crossref","unstructured":"Bergmann, P., Batzner, K., Fauser, M., et al.: The MVTec anomaly detection dataset: A comprehensive real-world dataset for unsupervised anomaly detection. Int. J. Comput. Vision,: 1038\u20131059. (2021)","key":"4394_CR33","DOI":"10.1007\/s11263-020-01400-4"},{"issue":"10","key":"4394_CR34","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1007\/s11263-017-1059-x","volume":"126","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Bargal, S.A., Lin, Z., Brandt, J., Shen, X., et al.: Top-down neural attention by excitation backprop. Int. J. Comput. Vision. 126(10), 1084\u20131102 (2017)","journal-title":"Int. J. Comput. Vision"},{"doi-asserted-by":"crossref","unstructured":"Li, X., et al.: An experimental study of quantitative evaluations on saliency methods, In Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining, 3200\u20133208 (2021)","key":"4394_CR35","DOI":"10.1145\/3447548.3467148"},{"unstructured":"Stalder, S., Perraudin, N., Achanta, R., P\u00e9rez-Cruz, F., et al.: What you see is what you classify: Black box attributions. In Adv. Neural. Inf. Process. Syst. (2022)","key":"4394_CR36"},{"issue":"2","key":"4394_CR37","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/s11263-019-01228-7","volume":"128","author":"RR Selvaraju","year":"2020","unstructured":"Selvaraju, R.R., et al.: Grad-CAM: Visual explanations from deep networks via gradient-based localization. Int. J. Comput. Vision. 128(2), 336\u2013359 (2020)","journal-title":"Int. J. Comput. Vision"},{"doi-asserted-by":"crossref","unstructured":"Bargal, S.A., et al.: Nov.: Guided Zoom: Zooming into Network Evidence to Refine Fine-Grained Model Decisions. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 43, no. 11, pp. 4196\u20134202, 1 (2021)","key":"4394_CR38","DOI":"10.1109\/TPAMI.2021.3054303"},{"key":"4394_CR39","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1109\/TETC.2023.3316549","volume":"11","author":"G Olague","year":"2023","unstructured":"Olague, G., Pineda, R., Ibarra-Vazquez, G., et al.: Adversarial attacks assessment of salient object detection via symbolic learning. IEEE Trans. Emerg. Top. Comput. 11, 1018\u20131030 (2023). https:\/\/doi.org\/10.1109\/TETC.2023.3316549","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4394_CR40","doi-asserted-by":"publisher","first-page":"111043","DOI":"10.1016\/j.dib.2024.111043","volume":"57","author":"M Olague","year":"2024","unstructured":"Olague, M., Olague, G., Pineda, R., et al.: Salient object detection dataset with adversarial attacks for genetic programming and neural networks. Data Brief. 57, 111043 (2024). https:\/\/doi.org\/10.1016\/j.dib.2024.111043","journal-title":"Data Brief."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04394-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04394-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04394-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T14:42:57Z","timestamp":1751553777000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04394-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["4394"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04394-z","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"22 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"768"}}