{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:48:32Z","timestamp":1770893312343,"version":"3.50.1"},"reference-count":191,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s12559-025-10517-y","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T06:39:30Z","timestamp":1763015970000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Industrial Anomaly Detection Based on Improved Diffusion Model: A Review"],"prefix":"10.1007","volume":"17","author":[{"given":"Jiahui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zidong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chuanbo","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Weibo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"10517_CR1","doi-asserted-by":"crossref","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP. Skip-ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In: Proceedings of the 2019 International Joint Conference on Neural Networks (IJCNN), 2019, p. 1\u20138.","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"10517_CR2","unstructured":"Azizi S, Kornblith S, Saharia C, Norouzi M, Fleet DJ. Synthetic data from diffusion models improves imagenet classification, 2023. arXiv preprint arXiv:2304.08466"},{"key":"10517_CR3","doi-asserted-by":"crossref","unstructured":"Avrahami O, Lischinski D, Fried O. Blended diffusion for text-driven editing of natural images, In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022. p. 18208\u201318.","DOI":"10.1109\/CVPR52688.2022.01767"},{"key":"10517_CR4","unstructured":"Amit T, Shaharbany T, Nachmani E, Wolf L. Segdiff: Image segmentation with diffusion probabilistic models, 2021. arXiv preprint arXiv:2112.00390"},{"key":"10517_CR5","doi-asserted-by":"crossref","unstructured":"Anuradha R, Swathi B, Nagpal A, Chaturvedi P, Kalra R, Alwan AA. Deep Learning for Anomaly Detection in Large-Scale Industrial Data. In: 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), 2023, vol. 10: IEEE, p. 1551\u20136.","DOI":"10.1109\/UPCON59197.2023.10434613"},{"key":"10517_CR6","unstructured":"Blattmann A, Dockhorn T, Kulal S, Mendelevitch D, Kilian M, Lorenz D, Levi Y, English Z, Voleti V, Letts A, Jampani V, Rombach R. Stable video diffusion: Scaling latent video diffusion models to large datasets, 2023. arXiv preprint arXiv:2311.15127"},{"key":"10517_CR7","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C. MVTec AD\u2013A comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2019. p. 9592\u2013600.","DOI":"10.1109\/CVPR.2019.00982"},{"key":"10517_CR8","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C. Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2020. p. 4183\u201392.","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"10517_CR9","doi-asserted-by":"crossref","unstructured":"Baitieva A, Hurych D, Besnier V, Bernard O. Supervised anomaly detection for complex industrial images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024. p. 17754\u201362.","DOI":"10.1109\/CVPR52733.2024.01681"},{"key":"10517_CR10","unstructured":"Bhosale A, Mukherjee S, Banerjee B, Cuzzolin F. Anomaly detection using Diffusion-based methods, 2024. arXiv preprint arXiv:2412.07539"},{"key":"10517_CR11","unstructured":"Bandara WGC, Nair NG, Patel V.M. Remote sensing change detection (segmentation) using denoising diffusion probabilistic models, arXiv e-prints, 2022. p. arXiv-2206."},{"key":"10517_CR12","unstructured":"Bercea CI, Neumayr M, Rueckert D, Schnabel JA. Mask, stitch, and re-sample: Enhancing robustness and generalizability in anomaly detection through automatic diffusion models, 2023. arXiv preprint arXiv:2305.19643"},{"key":"10517_CR13","unstructured":"Baranchuk D, Rubachev I, Voynov A, Khrulkov V, Babenko A. Label-efficient semantic segmentation with diffusion models, 2021. arXiv preprint arXiv:2112.03126"},{"key":"10517_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103459","volume":"129","author":"J Bozic","year":"2021","unstructured":"Bozic J, Tabernik D, Skocaj D. Mixed supervision for surface-defect detection: From weakly to fully supervised learning. Comput Ind. 2021;129:103459.","journal-title":"Comput. Ind."},{"issue":"9","key":"10517_CR15","doi-asserted-by":"publisher","first-page":"10850","DOI":"10.1109\/TPAMI.2023.3261988","volume":"45","author":"F-A Croitoru","year":"2023","unstructured":"Croitoru F-A, Hondru V, Ionescu RT, Shah M. Diffusion models in vision: A survey. IEEE Trans Pattern Anal Mach Intell. 2023;45(9):10850\u201369.","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10517_CR16","unstructured":"Carlini N, Hayes J, Nasr M, Jagielski M, Sehwag V, Tramer F, Balle B, Ippolito D, Wallace E. Extracting training data from diffusion models. In: 32nd USENIX Security Symposium (USENIX Security 23), 2023. p. 5253\u201370."},{"key":"10517_CR17","doi-asserted-by":"crossref","unstructured":"Chen H, Han Y, Misra D, Li X, Hu K, Zou D, Sugiyama M, Wang J, Raj B. Slight Corruption in Pre-training Data Makes Better Diffusion Models, 2024. arXiv preprint arXiv:2405.20494","DOI":"10.52202\/079017-4008"},{"key":"10517_CR18","doi-asserted-by":"crossref","unstructured":"Chen W, Hu J, Wu Z, Ma S. A survey on fault detection for networked systems under communication constraints. Syst. Sci. Control Eng. 2025;13(1):2460434.","DOI":"10.1080\/21642583.2025.2460434"},{"key":"10517_CR19","doi-asserted-by":"crossref","unstructured":"Choi J, Kim S, Jeong Y, Gwon Y, Yoon S. Ilvr: Conditioning method for denoising diffusion probabilistic models, 2021. arXiv preprint arXiv:2108.02938","DOI":"10.1109\/ICCV48922.2021.01410"},{"key":"10517_CR20","doi-asserted-by":"publisher","first-page":"55297","DOI":"10.1109\/ACCESS.2023.3282993","volume":"11","author":"Y Cui","year":"2023","unstructured":"Cui Y, Liu Z, Lian S. A survey on unsupervised anomaly detection algorithms for industrial images. IEEE Access. 2023;11:55297\u2013315.","journal-title":"IEEE Access"},{"key":"10517_CR21","doi-asserted-by":"publisher","first-page":"128288","DOI":"10.1109\/ACCESS.2023.3333242","volume":"11","author":"SF Chevtchenko","year":"2023","unstructured":"Chevtchenko SF, Rocha EDS, Dos Santos MCM, Mota RL, Vieira DM, De Andrade EC. Anomaly Detection in Industrial Machinery Using IoT Devices and Machine Learning: A Systematic Mapping. IEEE Access. 2023;11:128288\u2013305.","journal-title":"IEEE Access"},{"key":"10517_CR22","doi-asserted-by":"crossref","unstructured":"Chen S, Sun P, Song Y, Luo P. Diffusiondet: Diffusion model for object detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, 2023. p. 19830\u201343.","DOI":"10.1109\/ICCV51070.2023.01816"},{"key":"10517_CR23","unstructured":"Chen W, Tian L, Chen B, Dai L, Duan Z, Zhou M. Deep variational graph convolutional recurrent network for multivariate time series anomaly detection. In: International conference on machine learning. PMLR, 2022. p. 3621\u201333."},{"key":"10517_CR24","doi-asserted-by":"crossref","unstructured":"Cao H, Tan C, Gao Z, Xu Y, Chen G, H P-A. A survey on generative diffusion models. IEEE Trans. Knowl. Data Eng. 2024.","DOI":"10.1109\/TKDE.2024.3361474"},{"key":"10517_CR25","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Z, Ge Q, Dong H, Liu G-P. Quantized distributed economic dispatch for microgrids: Paillier encryption-decryption scheme. IEEE Trans Industr Inf. Apr. 2024;20(4):6552\u201362.","DOI":"10.1109\/TII.2023.3348816"},{"key":"10517_CR26","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Z, Zou L, Liu Q, Liu G-P. A regularized least-squares approach to event-based distributed robust filtering over sensor networks. Automatica, vol. 163, May 2024, Art. No. 111604, p. 11.","DOI":"10.1016\/j.automatica.2024.111604"},{"key":"10517_CR27","doi-asserted-by":"crossref","unstructured":"Chen S, Xu M, Ren J, Cong Y, He S, Xie Y, Sinha A, Luo P, Xiang T, Perez-Rua J.-M. GenTron: Diffusion Transformers for Image and Video Generation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024. p. 6441\u201351.","DOI":"10.1109\/CVPR52733.2024.00616"},{"issue":"4","key":"10517_CR28","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10462-025-11110-3","volume":"58","author":"H Chen","year":"2025","unstructured":"Chen H, Xiang Q, Hu J, Ye M, Yu C, Cheng H, et al. Comprehensive exploration of diffusion models in image generation: a survey. Artif Intell Rev. 2025;58(4):99.","journal-title":"Artif. Intell. Rev."},{"key":"10517_CR29","doi-asserted-by":"crossref","unstructured":"Deng Z, He X, Peng Y. Efficiency-optimized video diffusion models. In: Proceedings of the 31st ACM International Conference on Multimedia, 2023. p. 7295\u201303.","DOI":"10.1145\/3581783.3612406"},{"key":"10517_CR30","doi-asserted-by":"crossref","unstructured":"Dai D, Li J, Song Y, Yang F. Event-based recursive filtering for nonlinear bias-corrupted systems with amplify-and-forward relays. Syst. Sci. Control Eng. 2024;12(1):2332419.","DOI":"10.1080\/21642583.2024.2332419"},{"key":"10517_CR31","first-page":"8780","volume":"34","author":"P Dhariwal","year":"2021","unstructured":"Dhariwal P, Nichol A. Diffusion models beat gans on image synthesis. Adv Neural Inf Process Syst. 2021;34:8780\u201394.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"4","key":"10517_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-024-06045-1","volume":"55","author":"GK Erabati","year":"2025","unstructured":"Erabati GK, Araujo H. DDet3D: embracing 3D object detector with diffusion. Appl Intell. 2025;55(4):1\u201316.","journal-title":"Appl. Intell."},{"key":"10517_CR33","doi-asserted-by":"crossref","unstructured":"Ehab W, Huang L, Li Y. UNet and variants for medical image segmentation. Int. J. Netw. Dyn. Intell. 2024;3(2):100009.","DOI":"10.53941\/ijndi.2024.100009"},{"key":"10517_CR34","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.inffus.2020.10.001","volume":"67","author":"L Erhan","year":"2021","unstructured":"Erhan L, Ndubuaku M, Di Mauro M, Song W, Chen M, Fortino G, et al. Smart anomaly detection in sensor systems: A multi-perspective review. Inform Fusion. 2021;67:64\u201379.","journal-title":"Inform. Fusion"},{"key":"10517_CR35","doi-asserted-by":"crossref","unstructured":"Flaborea A, Collorone L, Di Melendugno GMDA, D\u2019Arrigo S, Prenkaj B, Galasso F. Multimodal motion conditioned diffusion model for skeleton-based video anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023. pp. 10318\u201329.","DOI":"10.1109\/ICCV51070.2023.00947"},{"key":"10517_CR36","doi-asserted-by":"crossref","unstructured":"Fang H, Han B, Zhang S, Zhou S, Hu C, Ye W-M. Data augmentation for object detection via controllable diffusion models. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 2024. p. 1257\u201366.","DOI":"10.1109\/WACV57701.2024.00129"},{"key":"10517_CR37","doi-asserted-by":"crossref","unstructured":"Fang W, Shen B, Pan A, Zou L, Song B. A cooperative stochastic configuration network based on differential evolutionary sparrow search algorithm for prediction. Syst. Sci. Control Eng. 2024;12(1):2314481.","DOI":"10.1080\/21642583.2024.2314481"},{"key":"10517_CR38","doi-asserted-by":"crossref","unstructured":"Fang J, Wang Z, Liu W, Lauria S, Zeng N, Prieto C, et al. A new particle swarm optimization algorithm for outlier detection: industrial data clustering in wire arc additive manufacturing. IEEE Trans Autom Sci Eng. Apr. 2024;21(2):1244\u201357.","DOI":"10.1109\/TASE.2022.3230080"},{"key":"10517_CR39","first-page":"91","volume-title":"European conference on computer vision","author":"M Fucka","year":"2025","unstructured":"Fucka M, Zavrtanik V, Skocaj D. TransFusion-A transparency-based diffusion model for anomaly detection. In: European conference on computer vision. Springer; 2025. p. 91\u2013108."},{"key":"10517_CR40","unstructured":"Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y. Generative adversarial nets. Adv. Neural Inform. Process. Syst. 2014;27."},{"key":"10517_CR41","unstructured":"Gao R, Holynski A, Henzler P, Brussee A, Martin-Brualla R, Srinivasan P, Barron JT, Poole B. Cat3d: Create anything in 3d with multi-view diffusion models, 2024. arXiv preprint arXiv:2405.10314"},{"issue":"13","key":"10517_CR42","doi-asserted-by":"publisher","first-page":"2688","DOI":"10.1080\/00207721.2024.2345199","volume":"55","author":"X Gao","year":"2024","unstructured":"Gao X, Deng F, Shang W, Zhao X, Li S. Attack-resilient asynchronous state estimation of interval type-2 fuzzy systems under stochastic protocols. Int J Syst Sci. 2024;55(13):2688\u2013700.","journal-title":"Int. J. Syst. Sci."},{"key":"10517_CR43","doi-asserted-by":"crossref","unstructured":"Geng H, Mousavi A, Markatos NG, Chen K, Gou X. Reliable cost prediction and control for intelligent manufacture: a key performance indicator perspective. Int. J. Netw. Dyn. Intell. 2024;3(1):100001.","DOI":"10.53941\/ijndi.2024.100001"},{"key":"10517_CR44","doi-asserted-by":"crossref","unstructured":"Graham MS, Pinaya WH, Tudosiu P-D, Nachev P, Ourselin S. Cardoso J. Denoising diffusion models for out-of-distribution detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023. p. 2948\u201357.","DOI":"10.1109\/CVPRW59228.2023.00296"},{"issue":"4","key":"10517_CR45","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173","volume":"11","author":"M Goldstein","year":"2016","unstructured":"Goldstein M, Uchida S. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS ONE. 2016;11(4):e0152173.","journal-title":"PLoS ONE"},{"key":"10517_CR46","doi-asserted-by":"crossref","unstructured":"Geng H, Wang Z, Hu J, Han Q-L, Cheng Y. Variance-constrained filter design with sensor resolution under Round-Robin communication protocol: an outlier-resistant mechanism. IEEE Transactions on Systems, Man, and Cybernetics: Systems. Jun. 2023;53(6):3762\u201373.","DOI":"10.1109\/TSMC.2023.3234461"},{"key":"10517_CR47","doi-asserted-by":"crossref","unstructured":"Hu T, Zhang J, Yi R, Du Y, Chen X, Liu L, Wang Y, Wang C. Anomalydiffusion: Few-shot anomaly image generation with diffusion model. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2024;38(8):8526\u201334.","DOI":"10.1609\/aaai.v38i8.28696"},{"key":"10517_CR48","doi-asserted-by":"crossref","unstructured":"He H, Zhang J, Chen H, Chen X, Li Z, Chen X, Wang Y, Wang C, Xie L. A diffusion-based framework for multi-class anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, 2024;38(8):p. 8472\u201380.","DOI":"10.1609\/aaai.v38i8.28690"},{"key":"10517_CR49","first-page":"6840","volume":"33","author":"J Ho","year":"2020","unstructured":"Ho J, Jain A, Abbeel P. Denoising diffusion probabilistic models. Adv Neural Inf Process Syst. 2020;33:6840\u201351.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR50","first-page":"99","volume-title":"International Conference on Ubiquitous Computing and Ambient Intelligence","author":"M Imad","year":"2024","unstructured":"Imad M, Cleland I, Nugent C, McAllister P. Integrating Traditional Machine Learning Approaches with Explainable Anomaly Detection for Multimodal Sensor Data. In: International Conference on Ubiquitous Computing and Ambient Intelligence. Springer; 2024. p. 99\u2013111."},{"key":"10517_CR51","doi-asserted-by":"crossref","unstructured":"Im J, Son Y, Hong JH. FUN-AD: Fully Unsupervised Learning for Anomaly Detection with Noisy Training Data, 2024. arXiv preprint arXiv:2411.16110","DOI":"10.1109\/WACV61041.2025.00915"},{"key":"10517_CR52","unstructured":"Ikeda Y, Tajiri K, Nakano Y, Watanabe K, Ishibashi K. Estimation of dimensions contributing to detected anomalies with variational autoencoders, 2018. arxiv preprint arxiv:1811.04576"},{"key":"10517_CR53","doi-asserted-by":"crossref","unstructured":"Islam K, Zaheer MZ, Mahmood A, Nandakumar K. DiffuseMix: Label-Preserving Data Augmentation with Diffusion Models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024. p. 27621\u201330.","DOI":"10.1109\/CVPR52733.2024.02608"},{"key":"10517_CR54","doi-asserted-by":"crossref","unstructured":"Jmila H, Khedher MI, El-Yacoubi M.A. The promise of applying machine learning techniques to network function virtualization. Int. J. Netw. Dyn. Intell. 2024;3(4):100020.","DOI":"10.53941\/ijndi.2024.100020"},{"key":"10517_CR55","unstructured":"Jiang X, Li J, Deng H, Liu Y, Gao B-B, Zhou Y, Li J, Wang C, Zhen F. MMAD: The First-Ever Comprehensive Benchmark for Multimodal Large Language Models in Industrial Anomaly Detection, 2024. arXiv preprint arXiv:2410.09453"},{"key":"10517_CR56","doi-asserted-by":"crossref","unstructured":"Jin Y, Peng J, He Q, Hu T, Chen H, Wu J, Zhu W, Chi M, Liu J, Wang Y, Wang C. DualAnoDiff: Dual-Interrelated Diffusion Model for Few-Shot Anomaly Image Generation, 2024. arXiv preprint arXiv:2408.13509","DOI":"10.1109\/CVPR52734.2025.02832"},{"key":"10517_CR57","doi-asserted-by":"crossref","unstructured":"Jeong H, Park GY, Ye JC. Vmc: Video motion customization using temporal attention adaption for text-to-video diffusion models. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024. p. 9212\u201321.","DOI":"10.1109\/CVPR52733.2024.00880"},{"key":"10517_CR58","doi-asserted-by":"crossref","unstructured":"Jiang B, Xie Y, Li J, Li N, Jiang Y, Xia S-T. CAGEN: Controllable Anomaly Generator using Diffusion Model. In: ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2024. p. 3110\u201314.","DOI":"10.1109\/ICASSP48485.2024.10447663"},{"key":"10517_CR59","unstructured":"Kingma, DP. Auto-encoding variational bayes, 2013. arXiv preprint arXiv:1312.6114"},{"key":"10517_CR60","first-page":"23593","volume":"35","author":"B Kawar","year":"2022","unstructured":"Kawar B, Elad M, Ermon S, Song J. Denoising diffusion restoration models. Adv Neural Inf Process Syst. 2022;35:23593\u2013606.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR61","unstructured":"Kawar B, Ganz R, Elad M. Enhancing diffusion-based image synthesis with robust classifier guidance, 2022. arXiv preprint arXiv:2208.08664"},{"key":"10517_CR62","first-page":"128","volume-title":"European Conference on Computer Vision","author":"J Kim","year":"2020","unstructured":"Kim J, Jeong K, Choi H, Seo K. GAN-based anomaly detection in imbalance problems. In: European Conference on Computer Vision. Springer; 2020. p. 128\u201345."},{"key":"10517_CR63","doi-asserted-by":"crossref","unstructured":"G. Kim, T. Kwon, and J. C. Ye, Diffusionclip: Text-guided diffusion models for robust image manipulation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022. p. 2426\u201335.","DOI":"10.1109\/CVPR52688.2022.00246"},{"key":"10517_CR64","unstructured":"Kong Z, Ping W. On fast sampling of diffusion probabilistic models, 2021. arXiv preprint arXiv:2106.00132"},{"key":"10517_CR65","unstructured":"Kong Z, Ping W, Huang J, Zhao K, Catanzaro B. Diffwave: A versatile diffusion model for audio synthesis, 2020. arXiv preprint arXiv:2009.09761"},{"key":"10517_CR66","unstructured":"Katsuoka T, Shiraishi T, Miwa D, Duy VNL, Takeuchi I. Statistical Test for Generated Hypotheses by Diffusion Models, 2024. arXiv preprint arXiv:2402.11789"},{"key":"10517_CR67","first-page":"21696","volume":"34","author":"D Kingma","year":"2021","unstructured":"Kingma D, Salimans T, Poole B, Ho J. Variational diffusion models. Adv Neural Inf Process Syst. 2021;34:21696\u2013707.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR68","unstructured":"Li X, Lai Z, Xu L, Guo J, Cao L, Zhang S, Dai B, Ji R. Dual3D: Efficient and Consistent Text-to-3D Generation with Dual-mode Multi-view Latent Diffusion, 2024. arXiv preprint arXiv:2405.09874"},{"key":"10517_CR69","first-page":"168","volume-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention","author":"Z Liang","year":"2023","unstructured":"Liang Z, Anthony H, Wagner F, Kamnitsas K. Modality cycles with masked conditional diffusion for unsupervised anomaly segmentation in mri. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer; 2023. p. 168\u201381."},{"key":"10517_CR70","doi-asserted-by":"crossref","unstructured":"Lu M, Chai Y, Xu K, Chen W, Ao F, Ji W. Multimodal fusion and knowledge distillation for improved anomaly detection. Vis. Comput. 2024;1\u20132.","DOI":"10.1007\/s00371-024-03723-6"},{"key":"10517_CR71","first-page":"328","volume-title":"European Conference on Computer Vision","author":"C Liu","year":"2024","unstructured":"Liu C, Chu Y-M, Hsieh T-I, Chen H-T, Liu T-L. Learning Diffusion Models for Multi-view Anomaly Detection. In: European Conference on Computer Vision. Springer; 2024. p. 328\u201345."},{"key":"10517_CR72","doi-asserted-by":"crossref","unstructured":"Lugmayr A, Danelljan M, Romero A, Yu F, Timofte R, Van Gool L. Repaint: Inpainting using denoising diffusion probabilistic models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022. p. 11461\u201371.","DOI":"10.1109\/CVPR52688.2022.01117"},{"key":"10517_CR73","first-page":"1","volume":"72","author":"Y Liu","year":"2023","unstructured":"Liu Y, Gao X, Wen JZ, Luo H. Unsupervised image anomaly detection and localization in industry based on self-updated memory and center clustering. IEEE Trans Instrum Meas. 2023;72:1\u201310.","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10517_CR74","doi-asserted-by":"crossref","unstructured":"Luo S, Hu W. Diffusion probabilistic models for 3d point cloud generation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2021. pp. 2837\u201345.","DOI":"10.1109\/CVPR46437.2021.00286"},{"key":"10517_CR75","unstructured":"Livernoche V, Jain V, Hezaveh Y, Ravanbakhsh S. On diffusion modeling for anomaly detection, 2023. arXiv preprint arXiv:2305.18593"},{"key":"10517_CR76","doi-asserted-by":"crossref","unstructured":"Li R, Li W, Yang Y, Wei H, Jiang J, Bai Q. Swinv2-imagen: Hierarchical vision transformer diffusion models for text-to-image generation. Neural Comput Appl. 2024;36(28):17245\u201360.","DOI":"10.1007\/s00521-023-09021-x"},{"issue":"1","key":"10517_CR77","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","volume":"21","author":"J Liu","year":"2024","unstructured":"Liu J, Xie G, Wang J, Li S, Wang C, Zheng F, et al. Deep industrial image anomaly detection: A survey. Machine Intelligence Research. 2024;21(1):104\u201335.","journal-title":"Machine Intelligence Research"},{"key":"10517_CR78","unstructured":"Liu K, Zhang H, Hu Z, Wang F, Yu PS. Data Augmentation for Supervised Graph Outlier Detection with Latent Diffusion Models, 2023. arXiv preprint arXiv:2312.17679"},{"key":"10517_CR79","doi-asserted-by":"crossref","unstructured":"Liu Z, Zhou Y, Xu Y, Wang Z. Simplenet: A simple network for image anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023. p. 20402\u201311.","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"10517_CR80","unstructured":"Li H, Zhang Z, Chen H, Wu L, Li B, Liu D, Wang M. A Novel Approach to Industrial Defect Generation through Blended Latent Diffusion Model with Online Adaptation, 2024. arXiv preprint arXiv:2402.19330"},{"key":"10517_CR81","doi-asserted-by":"crossref","unstructured":"Ma N, Goldstein M, Albergo MS, Boffi NM, Vanden-Eijnden E, Xie S. Sit: Exploring flow and diffusion-based generative models with scalable interpolant transformers, 2024. arXiv preprint arXiv:2401.08740","DOI":"10.1007\/978-3-031-72980-5_2"},{"issue":"2","key":"10517_CR82","doi-asserted-by":"publisher","first-page":"2774","DOI":"10.3390\/s150202774","volume":"15","author":"L Marti","year":"2015","unstructured":"Marti L, Sanchez-Pi N, Molina JM, Garcia ACB. Anomaly detection based on sensor data in petroleum industry applications. Sensors. 2015;15(2):2774\u201397.","journal-title":"Sensors"},{"key":"10517_CR83","doi-asserted-by":"crossref","unstructured":"Miao J, Tao H, Xie H, Sun J, Cao J. Reconstruction-based anomaly detection for multivariate time series using contrastive generative adversarial networks. Inform. Process. Manag. 2024;61(1):103569","DOI":"10.1016\/j.ipm.2023.103569"},{"key":"10517_CR84","doi-asserted-by":"crossref","unstructured":"Mishra P, Verk R, Fornasier D, Piciarelli C, Foresti GL. VT-ADL: A vision transformer network for image anomaly detection and localization. In: 2021 IEEE 30th International Symposium on Industrial Electronics (ISIE). IEEE, 2021. p. 01\u201306.","DOI":"10.1109\/ISIE45552.2021.9576231"},{"issue":"7","key":"10517_CR85","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/JAS.2023.123531","volume":"10","author":"G Ma","year":"2023","unstructured":"Ma G, Wang Z, Liu W, Fang J, Zhang Y, Ding H, et al. Estimating the state of health for lithium-ion batteries: a particle swarm optimization-assisted deep domain adaptation approach. IEEE\/CAA J Autom Sin. 2023;10(7):1530\u201343.","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"10517_CR86","doi-asserted-by":"crossref","unstructured":"Ma Z, Zhao L, Qi B, Zhou B. Neural Residual Diffusion Models for Deep Scalable Vision Generation, 2024. arXiv preprint arXiv:2406.13215","DOI":"10.52202\/079017-3729"},{"key":"10517_CR87","doi-asserted-by":"crossref","unstructured":"Ma L, Zhang H, Wang G, Yang C, Zhou L. Security coordination control for the belt conveyor systems with false data injection attacks. Int. J. Netw. Dyn. Intell. 2025;4(1):100001","DOI":"10.53941\/ijndi.2025.100001"},{"key":"10517_CR88","unstructured":"Nichol AQ, Dhariwal P. Improved denoising diffusion probabilistic models. In: International conference on machine learning. PMLR, 2021. p. 8162\u201371."},{"key":"10517_CR89","unstructured":"Nachmani E, Roman RS, Wolf L. Non gaussian denoising diffusion models, 2021. arXiv preprint arXiv:2106.07582"},{"key":"10517_CR90","doi-asserted-by":"crossref","unstructured":"ozdenizci O, Legenstein R. Restoring vision in adverse weather conditions with patch-based denoising diffusion models. IEEE Trans Pattern Anal. Mach. Intell. 2023;45(8):10346\u201357","DOI":"10.1109\/TPAMI.2023.3238179"},{"key":"10517_CR91","doi-asserted-by":"crossref","unstructured":"Pinaya WH, Pinaya WHL, Graham MS, Gray R, da Costa PF, Tudosiu P-D, Wright P, Mah YH, MacKinnon AD, Teo JT, Jager R, Werring D, Rees G, Nachev P, Ourselin S, Cardoso MJ. Fast unsupervised brain anomaly detection and segmentation with diffusion models. In: International Conference on Medical Image Computing and Computer-Assisted Intervention. Springer, 2022. p. 705\u201314.","DOI":"10.1007\/978-3-031-16452-1_67"},{"key":"10517_CR92","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123231","volume":"248","author":"J-H Park","year":"2024","unstructured":"Park J-H, Ju Y-J, Lee S-W. Explaining generative diffusion models via visual analysis for interpretable decision-making process. Expert Syst Appl. 2024;248:123231.","journal-title":"Expert Syst. Appl."},{"key":"10517_CR93","unstructured":"Pandey K, Mukherjee A, Rai P, Kumar A. VAEs meet diffusion models: Efficient and high-fidelity generation. In: NeurIPS 2021 Workshop on Deep Generative Models and Downstream Applications, 2021."},{"key":"10517_CR94","doi-asserted-by":"crossref","unstructured":"Peebles W, Xie S. Scalable diffusion models with transformers. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023. p. 4195\u2013205.","DOI":"10.1109\/ICCV51070.2023.00387"},{"issue":"13","key":"10517_CR95","doi-asserted-by":"publisher","first-page":"2677","DOI":"10.1080\/00207721.2024.2345196","volume":"55","author":"W Qian","year":"2024","unstructured":"Qian W, Lu D, Wu Y, Yuan M. Stability analysis of delayed load frequency control system based on a novel augmented functional. Int J Syst Sci. 2024;55(13):2677\u201387.","journal-title":"Int. J. Syst. Sci."},{"issue":"16","key":"10517_CR96","doi-asserted-by":"publisher","first-page":"3305","DOI":"10.1080\/00207721.2024.2427846","volume":"55","author":"B Qu","year":"2024","unstructured":"Qu B, Peng D, Shen Y, Zou L, Shen B. A survey on recent advances on dynamic state estimation for power systems. Int J Syst Sci. 2024;55(16):3305\u201321.","journal-title":"Int. J. Syst. Sci."},{"issue":"1","key":"10517_CR97","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1109\/TSG.2023.3271949","volume":"15","author":"B Qu","year":"2024","unstructured":"Qu B, Wang Z, Shen B, Dong H, Zhang X. Secure particle filtering with Paillier encryption-decryption scheme for cyber-physical multi-machine power grids. IEEE Trans Smart Grid. 2024;15(1):863\u201373.","journal-title":"IEEE Trans. Smart Grid"},{"key":"10517_CR98","doi-asserted-by":"crossref","unstructured":"Qu B, Wang Z, Shen B, Dong H. Outlier-resistant recursive state estimation for renewable-electricity-generation-based microgrids. IEEE Trans Industr Inf. 2023;19(5):7133\u201344.","DOI":"10.1109\/TII.2022.3205354"},{"key":"10517_CR99","doi-asserted-by":"crossref","unstructured":"Qu B, Wang Z, Shen B, Dong H Decentralized dynamic state estimation for multi-machine power systems with non-Gaussian noises: outlier detection and localization. Automatica, 2023;153(111010):10.","DOI":"10.1016\/j.automatica.2023.111010"},{"key":"10517_CR100","doi-asserted-by":"crossref","unstructured":"Qu B, Wang Z, Shen B, Dong H, Liu H. Anomaly-resistant decentralized state estimation under minimum error entropy with fiducial points for wide-area power systems. IEEE\/CAA J. Autom. Sin. 2024;11(1):74\u201387.","DOI":"10.1109\/JAS.2023.123795"},{"key":"10517_CR101","doi-asserted-by":"crossref","unstructured":"Qu B, Wang Z, Shen B, Dong H, Peng D. Adaptive decentralized state estimation for multi-machine power grids under measurement noises with unknown statistics. IEEE Trans. Ind. Inform. 2025;21(2):1655\u201364.","DOI":"10.1109\/TII.2024.3485791"},{"key":"10517_CR102","doi-asserted-by":"crossref","unstructured":"Ruan L, Ma Y, Yang H, He H, Liu B, Fu J, Yuan NJ, Jin Q, Guo B. Mm-diffusion: Learning multi-modal diffusion models for joint audio and video generation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2023. p. 10219\u201328.","DOI":"10.1109\/CVPR52729.2023.00985"},{"key":"10517_CR103","doi-asserted-by":"crossref","unstructured":"Rombach R, Blattmann A, Lorenz D, Esser P, Ommer B. High-resolution image synthesis with latent diffusion models. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2022. p. 10684\u201395.","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"10517_CR104","unstructured":"Ramesh A, Dhariwal P, Nichol A, Chu C, Chen M. Hierarchical text-conditional image generation with clip latents, 2022;1(2):3. arXiv preprint arXiv:2204.06125"},{"key":"10517_CR105","doi-asserted-by":"crossref","unstructured":"Ruiz N, Li Y, Jampani V, Pritch Y, Rubinstein M, Aberman K. Dreambooth: Fine tuning text-to-image diffusion models for subject-driven generation. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2023. p. 22500\u201310.","DOI":"10.1109\/CVPR52729.2023.02155"},{"key":"10517_CR106","doi-asserted-by":"crossref","unstructured":"Roth K, Pemula L, Zepeda J, Scholkopf B, Brox T, Gehler P. Towards total recall in industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022. p. 14318\u201328.","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"10517_CR107","unstructured":"Strudel R, Tallec C, Altche F, Du Y, Ganin Y, Mensch A, Grathwohl W, Savinov N, Dieleman S, Sifre L, Leblond R. Self-conditioned embedding diffusion for text generation, 2022. arXiv preprint arXiv:2211.04236"},{"key":"10517_CR108","doi-asserted-by":"crossref","unstructured":"El-Shorbagy MA, Bouaouda A, Nabwey HA, Abualigah L, Hashim FA. Bald eagle search algorithm: a comprehensive review with its variants and applications. Syst. Sci. Control Eng. 2024;12(1):2385310","DOI":"10.1080\/21642583.2024.2385310"},{"key":"10517_CR109","doi-asserted-by":"crossref","unstructured":"Saharia C, Chan W, Chang H, Lee CA, Ho J, Salimans T, Fleet DJ, Norouzi M. Palette: Image-to-image diffusion models. In: ACM SIGGRAPH 2022 Conference Proceedings, 2022. p. 1\u201310.","DOI":"10.1145\/3528233.3530757"},{"key":"10517_CR110","first-page":"1415","volume":"34","author":"Y Song","year":"2021","unstructured":"Song Y, Durkan C, Murray I, Ermon S. Maximum likelihood training of score-based diffusion models. Adv Neural Inf Process Syst. 2021;34:1415\u201328.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR111","unstructured":"Song Y, Ermon S. Generative modeling by estimating gradients of the data distribution. Adv. Neural Inform. Process. Syst. 2019;32."},{"key":"10517_CR112","first-page":"12438","volume":"33","author":"Y Song","year":"2020","unstructured":"Song Y, Ermon S. Improved techniques for training score-based generative models. Adv Neural Inf Process Syst. 2020;33:12438\u201348.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR113","unstructured":"Salimans T, Ho J. Progressive distillation for fast sampling of diffusion models, 2022. arXiv preprint arXiv:2202.00512"},{"issue":"4","key":"10517_CR114","first-page":"4713","volume":"45","author":"C Saharia","year":"2022","unstructured":"Saharia C, Ho J, Chan W, Salimans T, Fleet DJ, Norouzi M. Image super-resolution via iterative refinement. IEEE Trans Pattern Anal Mach Intell. 2022;45(4):4713\u201326.","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10517_CR115","doi-asserted-by":"crossref","unstructured":"Shi J, Li J. Concatenated vector representation with the asymmetric GloVe model. Int. J. Netw. Dyn. Intell. 2025;4(1):100002","DOI":"10.53941\/ijndi.2025.100002"},{"issue":"3","key":"10517_CR116","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118432","volume":"10","author":"T Saito","year":"2015","unstructured":"Saito T, Rehmsmeier M. The precision-recall plot is more informative than the ROC plot when evaluating binary classifiers on imbalanced datasets. PLoS ONE. 2015;10(3):e0118432.","journal-title":"PLoS ONE"},{"key":"10517_CR117","unstructured":"Song J, Meng C, Ermon S. Denoising diffusion implicit models, 2020. arXiv preprint arXiv:2010.02502"},{"key":"10517_CR118","unstructured":"San-Roman R, Nachmani E, Wolf L. Noise estimation for generative diffusion models, 2021. arXiv preprint arXiv:2104.02600"},{"issue":"14","key":"10517_CR119","doi-asserted-by":"publisher","first-page":"3017","DOI":"10.1080\/00207721.2024.2364294","volume":"55","author":"R Sakthivel","year":"2024","unstructured":"Sakthivel R, Parivallal A, Kwon O-M, Manickavalli S. Observer-based leader-following cluster consensus for positive multi-agent systems with input time-varying delay. Int J Syst Sci. 2024;55(14):3017\u201331.","journal-title":"Int. J. Syst. Sci."},{"key":"10517_CR120","unstructured":"Song Y, Sohl-Dickstein J, Kingma DP, Kumar A, Ermon S, Poole B. Score-based generative modeling through stochastic differential equations, 2020. arXiv preprint arXiv:2011.13456"},{"key":"10517_CR121","unstructured":"Sasaki H, Willcocks C, Breckon T. UNIT-DDPM: Unpaired image translation with denoising diffusion probabilistic models, 2021. arXiv preprint arXiv:2104.05358"},{"key":"10517_CR122","unstructured":"Sohl-Dickstein J, Weiss E, Maheswaranathan N, Ganguli S. Deep unsupervised learning using nonequilibrium thermodynamics. In: International Conference on Machine Learning. PMLR, 2015. p. 2256\u201365."},{"key":"10517_CR123","doi-asserted-by":"publisher","first-page":"161003","DOI":"10.1109\/ACCESS.2021.3131949","volume":"9","author":"M Sabuhi","year":"2021","unstructured":"Sabuhi M, Zhou M, Bezemer C-P, Musilek P. Applications of Generative Adversarial Networks in Anomaly Detection: A Systematic Literature Review. IEEE Access. 2021;9:161003\u201329.","journal-title":"IEEE Access"},{"key":"10517_CR124","unstructured":"Traub J. Representation learning with diffusion models, 2022. arXiv preprint arXiv:2210.11058"},{"key":"10517_CR125","doi-asserted-by":"crossref","unstructured":"Tang D, Cao X, Hou X, Jiang Z, Liu J, Meng D. CRS-diff: Controllable remote sensing image generation with diffusion model. IEEE Trans. Geosci. Remote Sens. 2024.","DOI":"10.1109\/TGRS.2024.3453414\/v3\/response1"},{"key":"10517_CR126","first-page":"1","volume":"71","author":"X Tao","year":"2022","unstructured":"Tao X, Gong X, Zhang X, Yan S, Adak C. Deep learning for unsupervised anomaly localization in industrial images: A survey. IEEE Trans Instrum Meas. 2022;71:1\u201321.","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10517_CR127","doi-asserted-by":"crossref","unstructured":"Tebbe J, Tayyub J. D3AD: Dynamic Denoising Diffusion Probabilistic Model for Anomaly Detection, 2024. arXiv preprint arXiv:2401.04463","DOI":"10.1109\/CVPRW63382.2024.00398"},{"key":"10517_CR128","unstructured":"Ulhaq A, Akhtar N. Efficient diffusion models for vision: A survey, 2022. arXiv preprint arXiv:2210.09292"},{"key":"10517_CR129","doi-asserted-by":"crossref","unstructured":"Velasquez D, Perez E, Oregui X, Artetxe A, Manteca J, Mansilla JE, Toro M, Maiza M. A hybrid machine-learning ensemble for anomaly detection in real-time industry 4.0 systems. IEEE Access, 2022;10:72024\u201372036.","DOI":"10.1109\/ACCESS.2022.3188102"},{"key":"10517_CR130","first-page":"35","volume-title":"International Conference on Medical image computing and computer-assisted intervention","author":"J Wolleb","year":"2022","unstructured":"Wolleb J, Bieder F, Sandkuhler R, Cattin PC. Diffusion models for medical anomaly detection. In: International Conference on Medical image computing and computer-assisted intervention. Springer; 2022. p. 35\u201345."},{"key":"10517_CR131","doi-asserted-by":"crossref","unstructured":"Wang Z, Bao J, Zhou W, Wang W, Hu H, Chen H, Li H. Dire for diffusion-generated image detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023;22445\u201322455.","DOI":"10.1109\/ICCV51070.2023.02051"},{"key":"10517_CR132","unstructured":"Watson D, Chan W, Ho J, Norouzi M. Learning fast samplers for diffusion models by differentiating through sample quality. In: International Conference on Learning Representations, 2022."},{"key":"10517_CR133","doi-asserted-by":"crossref","unstructured":"Wang H, Dai L, Tong J, Zhai Y. Odd: One-Class Anomaly Detection Via The Diffusion Model. In: 2023 IEEE International Conference on Image Processing (ICIP). IEEE, 2023. p. 3000\u20134.","DOI":"10.1109\/ICIP49359.2023.10222162"},{"key":"10517_CR134","unstructured":"Wang M, Ding H, Liew JH, Liu J, Zhao Y, Wei Y. Segrefiner: Towards model-agnostic segmentation refinement with discrete diffusion process, 2023. arXiv preprint arXiv:2312.12425"},{"key":"10517_CR135","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2024.104192","volume":"164","author":"C Wei","year":"2025","unstructured":"Wei C, Han H, Xia Y, Ji Z. TDAD: Self-supervised industrial anomaly detection with a two-stage diffusion model. Comput Ind. 2025;164:104192.","journal-title":"Comput. Ind."},{"issue":"6","key":"10517_CR136","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1080\/00207721.2024.2423033","volume":"56","author":"W Wang","year":"2025","unstructured":"Wang W, Kan X, Ding D, Liu H, Gao X. Distributed correntropy Kalman filtering over sensor networks with FlexRay-based protocols. Int J Syst Sci. 2025;56(6):1347\u201359.","journal-title":"Int. J. Syst. Sci."},{"key":"10517_CR137","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112364","volume":"302","author":"X Wang","year":"2024","unstructured":"Wang X, Li W, He X. MTDiff: Visual anomaly detection with multi-scale diffusion models. Knowl-Based Syst. 2024;302:112364.","journal-title":"Knowl.-Based Syst."},{"key":"10517_CR138","unstructured":"Wang Z, Li D, Jiang R. Diffusion Models in 3D Vision: A Survey, 2024. arXiv preprint arXiv:2410.04738"},{"key":"10517_CR139","doi-asserted-by":"crossref","unstructured":"Wang X, Lopez-Tapia S, Katsaggelos AK. Atmospheric turbulence correction via variational deep diffusion. In: 2023 IEEE 6th International Conference on Multimedia Information Processing and Retrieval (MIPR), IEEE, 2023. p. 1-4.","DOI":"10.1109\/MIPR59079.2023.00022"},{"key":"10517_CR140","doi-asserted-by":"crossref","unstructured":"Wyatt J, Leach A, Schmon SM, Willcocks C.G. Anoddpm: Anomaly detection with denoising diffusion probabilistic models using simplex noise. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2022, p. 650\u20136.","DOI":"10.1109\/CVPRW56347.2022.00080"},{"key":"10517_CR141","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.isprsjprs.2024.12.001","volume":"220","author":"C Wang","year":"2025","unstructured":"Wang C, Sun W. Semantic guided large scale factor remote sensing image super-resolution with generative diffusion prior. ISPRS J Photogramm Remote Sens. 2025;220:125\u201338.","journal-title":"ISPRS J. Photogramm. Remote. Sens."},{"key":"10517_CR142","doi-asserted-by":"crossref","unstructured":"Wang Y, Shen C, Huang J, Chen H. Model-free adaptive control for unmanned surface vessels: a literature review. Syst. Sci. Control Eng. 2024;12(1):2316170.","DOI":"10.1080\/21642583.2024.2316170"},{"key":"10517_CR143","unstructured":"Wilmet V, Verma S, Redl T, Sandaker H, Li Z. A comparison of supervised and unsupervised deep learning methods for anomaly detection in images, 2021. arXiv preprint arXiv:2107.09204"},{"issue":"1","key":"10517_CR144","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1109\/TMECH.2023.3287070","volume":"29","author":"C Wang","year":"2024","unstructured":"Wang C, Wang Z, Dong H. A novel prototype-assisted contrastive adversarial network for weak-shot learning with applications: handling weakly labeled data. IEEE\/ASME Trans Mechatron. 2024;29(1):533\u201343.","journal-title":"IEEE\/ASME Trans. Mechatron."},{"key":"10517_CR145","doi-asserted-by":"crossref","unstructured":"Wang C, Wang Z, Liu W, Shen Y, Dong H. A novel deep offline-to-online transfer learning framework for pipeline leakage detection with small samples. IEEE Trans. Instrumen. Meas. 2023;72(3503913):13.","DOI":"10.1109\/TIM.2022.3220302"},{"issue":"2","key":"10517_CR146","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1109\/TII.2023.3275701","volume":"20","author":"C Wang","year":"2024","unstructured":"Wang C, Wang Z, Ma L, Dong H, Sheng W. Subdomain-alignment data augmentation for pipeline fault diagnosis: an adversarial self-attention network. IEEE Trans Ind Inform. 2024;20(2):1374\u201384.","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10517_CR147","doi-asserted-by":"crossref","unstructured":"Wang Y, Wen C, Wu X. Fault detection and isolation of floating wind turbine pitch system based on Kalman filter and multi-attention 1DCNN. Syst. Sci. Control Eng. 2024;12(1):2362169.","DOI":"10.1080\/21642583.2024.2362169"},{"issue":"4","key":"10517_CR148","doi-asserted-by":"publisher","first-page":"3047","DOI":"10.1109\/TII.2024.3523538","volume":"21","author":"L Wang","year":"2025","unstructured":"Wang L, Wang Z, Xu C, Xu Y, Hua L. Advanced fault diagnosis method for DC-DC converters: leveraging the temporal continuity of electrical signals. IEEE Trans Ind Inform. 2025;21(4):3047\u201356.","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10517_CR149","doi-asserted-by":"crossref","unstructured":"Wang Y, Wang Z, Zou L, Chen Y, Yue D. Distributed proportional-integral fuzzy state estimation over sensor networks under energy-constrained denial-of-service attacks. IEEE Transactions on Cybernetics. Jan. 2024;54(1):641\u201354.","DOI":"10.1109\/TCYB.2023.3288829"},{"key":"10517_CR150","doi-asserted-by":"crossref","unstructured":"Wu P, Wang Z, Zheng B, Li H, Alsaadi FE, Zeng N. AGGN: attention-based glioma grading network with multi-scale feature extraction and multi-modal information fusion. Comput. Biol. Med. 2023;152(106457):10.","DOI":"10.1016\/j.compbiomed.2022.106457"},{"key":"10517_CR151","unstructured":"Wang K, Tang D, Zeng B, Yin Y, Xu Z, Zhou Y, Zang Z, Darrell T, Liu Z, You Y. Neural network diffusion, 2024. arXiv preprint arXiv:2402.13144"},{"issue":"1","key":"10517_CR152","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TIP.2018.2867941","volume":"28","author":"T Wang","year":"2018","unstructured":"Wang T, Yang J, Ji Z, Sun Q. Probabilistic diffusion for interactive image segmentation. IEEE Trans Image Process. 2018;28(1):330\u201342.","journal-title":"IEEE Trans. Image Process."},{"key":"10517_CR153","doi-asserted-by":"crossref","unstructured":"Wang C, Zhu W, Gao B-B, Gan Z, Zhang J, Gu Z, Qian S, Chen M, Ma L. Real-iad: A real-world multi-view dataset for benchmarking versatile industrial anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024, p. 22883\u201392.","DOI":"10.1109\/CVPR52733.2024.02159"},{"key":"10517_CR154","doi-asserted-by":"crossref","unstructured":"Wu Z, Zhu L, Yin Z, Xu X, Zhu J, Wei X, Yang X. MAFCD: Multi-level and adaptive conditional diffusion model for anomaly detection. Inform. Fusion, 2025. p. 102965.","DOI":"10.1016\/j.inffus.2025.102965"},{"key":"10517_CR155","doi-asserted-by":"crossref","unstructured":"Wen L, Zhang Y, Hu W, Li, X. The survey of industrial anomaly detection for industry 5.0. In: International Journal of Computer Integrated Manufacturing, 2024. p. 1\u201322.","DOI":"10.1080\/0951192X.2024.2397821"},{"key":"10517_CR156","doi-asserted-by":"crossref","unstructured":"Xiao C, Gou Z, Tai W, Zhang K, Zhou F. Imputation-based time-series anomaly detection with conditional weight-incremental diffusion models. In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023. p. 2742\u201351.","DOI":"10.1145\/3580305.3599391"},{"key":"10517_CR157","doi-asserted-by":"crossref","unstructured":"Xiao C, Jiang X, Du X, Yang W, Lu W, Wang X, Chetty K. Boundary-enhanced time series data imputation with long-term dependency diffusion models. Knowl.-Based Syst. 2024. p. 112917.","DOI":"10.1016\/j.knosys.2024.112917"},{"key":"10517_CR158","unstructured":"Xiao Z, Kreis K, Vahdat A. Tackling the generative learning trilemma with denoising diffusion gans. 2021. arXiv preprint arXiv:2112.07804"},{"key":"10517_CR159","doi-asserted-by":"crossref","unstructured":"Xue Y, Li M, Arabnejad H, Suleimenova D, Jahani A, Geiger BC, Boesjes F, Anagnostou A, Taylor SJE, Liu X, Groen, D. Many-objective simulation optimization for camp location problems in humanitarian logistics. Int. J. Netw. Dyn. Intell. 2024;3(3):100017","DOI":"10.53941\/ijndi.2024.100017"},{"key":"10517_CR160","doi-asserted-by":"crossref","unstructured":"Xiao C, Pang S, Xu X, Li X, Trajcevski G, Zhou F. Counterfactual data augmentation with denoising diffusion for graph anomaly detection. IEEE Trans. Comput. Soc. Syst. 2024.","DOI":"10.1109\/TCSS.2024.3403503"},{"issue":"4","key":"10517_CR161","doi-asserted-by":"publisher","first-page":"814","DOI":"10.1080\/00207721.2023.2293687","volume":"55","author":"J Xue","year":"2024","unstructured":"Xue J, Shen B. A survey on sparrow search algorithms and their applications. Int J Syst Sci. 2024;55(4):814\u201332.","journal-title":"Int. J. Syst. Sci."},{"key":"10517_CR162","doi-asserted-by":"crossref","unstructured":"Xie G, Wang J, Liu J, Lyu J, Liu Y, Wang C, Zheng F, Jing Y. Im-iad: Industrial image anomaly detection benchmark in manufacturing. IEEE Trans. Cybern. 2024.","DOI":"10.1109\/TCYB.2024.3357213"},{"key":"10517_CR163","first-page":"49445","volume":"36","author":"S Yoon","year":"2023","unstructured":"Yoon S, Jin Y-U, Noh Y-K, Park F. Energy-based models for anomaly detection: A manifold diffusion recovery approach. Adv Neural Inf Process Syst. 2023;36:49445\u201366.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR164","unstructured":"Yin H, Jiao G, Wu Q, Karlsson BF, Huang B, Lin CY. Lafite: Latent diffusion model with feature editing for unsupervised multi-class anomaly detection, 2023. arXiv preprint arXiv:2307.08059"},{"key":"10517_CR165","doi-asserted-by":"crossref","unstructured":"Yu Y, Li W, Bai L, Duan J, Zhang X. UTDM: a universal transformer-based diffusion model for multi-weather-degraded images restoration. Vis. Comput. 2024. p. 1\u20137.","DOI":"10.1007\/s00371-024-03659-x"},{"key":"10517_CR166","first-page":"1","volume-title":"European Conference on Computer Vision","author":"H Yao","year":"2024","unstructured":"Yao H, Liu M, Yin Z, Yan Z, Hong X, Zuo W. Glad: Towards better reconstruction with global and local adaptive diffusion models for unsupervised anomaly detection. In: European Conference on Computer Vision. Springer; 2024. p. 1\u201317."},{"key":"10517_CR167","unstructured":"Yang J, Shi Y, Qi Z. Dfr: Deep feature reconstruction for unsupervised anomaly segmentation, 2020. arXiv preprint arXiv:2012.07122"},{"key":"10517_CR168","doi-asserted-by":"crossref","unstructured":"Yang H, Zhu H, Li J, Chen J, Yin Z. Multi-category decomposition editing network for the accurate visual inspection of texture defects. IEEE Trans. Autom. Sci. Eng. 2023.","DOI":"10.1109\/TASE.2023.3295872"},{"key":"10517_CR169","doi-asserted-by":"crossref","unstructured":"Yan C, Zhang S, Liu Y, Pang G, Wang W. Feature prediction diffusion model for video anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023. p. 5527\u201337.","DOI":"10.1109\/ICCV51070.2023.00509"},{"key":"10517_CR170","doi-asserted-by":"crossref","unstructured":"Yang L, Zhang Z, Song Y, Hong S, Xu R, Zhao Y, et al. and MH. Yang, Diffusion models: A comprehensive survey of methods and applications, ACM Computing Surveys. 2023;56(4):1\u201339.","DOI":"10.1145\/3626235"},{"key":"10517_CR171","first-page":"3609","volume":"35","author":"M Zhao","year":"2022","unstructured":"Zhao M, Bao F, Li C, Zhu J. Egsde: Unpaired image-to-image translation via energy-guided stochastic differential equations. Adv Neural Inf Process Syst. 2022;35:3609\u201323.","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"10517_CR172","unstructured":"Zhu D, Chen D, Grossklags J, Fritz M. Data forensics in diffusion models: A systematic analysis of membership privacy, 2023. arXiv preprint arXiv:2302.07801"},{"key":"10517_CR173","unstructured":"Zhong L, Huang S, Yue J, Zhang J, Deng Z, Chi W, Shi Y. TauAD: MRI-free Tau Anomaly Detection in PET Imaging via Conditioned Diffusion Models, 2024. arXiv preprint arXiv:2405.13199"},{"key":"10517_CR174","first-page":"392","volume-title":"European Conference on Computer Vision","author":"Y Zou","year":"2022","unstructured":"Zou Y, Jeong J, Pemula L, Zhang D, Dabeer O. Spot-the-difference self-supervised pre-training for anomaly detection and segmentation. In: European Conference on Computer Vision. Springer; 2022. p. 392\u2013408."},{"key":"10517_CR175","doi-asserted-by":"crossref","unstructured":"Zang S, Jin H, Yu Q, Zhang S, Yu H. Video summarization using U-shaped non-local network. Int. J. Netw. Dyn. Intell. 2024;3(2):100013","DOI":"10.53941\/ijndi.2024.100013"},{"key":"10517_CR176","doi-asserted-by":"crossref","unstructured":"Zavrtanik V, Kristan M, Skocaj D. Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF international conference on computer vision, 2021. p. 8330\u20139.","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"10517_CR177","doi-asserted-by":"crossref","unstructured":"Zhang X, Li N, Li J, Dai T, Jiang Y, Xia S-T. Unsupervised surface anomaly detection with diffusion probabilistic model. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, 2023. p. 6782\u201391.","DOI":"10.1109\/ICCV51070.2023.00624"},{"key":"10517_CR178","doi-asserted-by":"crossref","unstructured":"Zhang R, Liu H, Liu Y, Tan H. Dynamic event-triggered state estimation for discrete-time delayed switched neural networks with constrained bit rate. Syst. Sci. Control Eng. 2024;12(1):2334304.","DOI":"10.1080\/21642583.2024.2334304"},{"key":"10517_CR179","doi-asserted-by":"crossref","unstructured":"Zhang Y, Liu G, Song X. Unscented recursive three-step filter based unbiased minimum-variance estimation for a class of nonlinear systems. Int J Syst Sci. 2025;56(2):227\u201336.","DOI":"10.1080\/00207721.2024.2392817"},{"key":"10517_CR180","unstructured":"Zhang C, Li S, Zhang H, Chen Y. Velc: A new variational autoencoder based model for time series anomaly detection, 2019. arXiv preprint arXiv:1907.01702"},{"issue":"2","key":"10517_CR181","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/TNNLS.2021.3102127","volume":"34","author":"K Zhu","year":"2023","unstructured":"Zhu K, Wang Z, Chen Y, Wei G. Neural-network-based set-membership fault estimation for 2-D systems under encoding-decoding mechanism. IEEE Trans Neural Netw Learn Syst. 2023;34(2):786\u201398.","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10517_CR182","first-page":"91","volume-title":"European Conference on Computer Vision","author":"Z Zhou","year":"2025","unstructured":"Zhou Z, Wang L, Fang N, Wang Z, Qiu L, Zhang S. R3D-AD: Reconstruction via Diffusion for 3D Anomaly Detection. In: European Conference on Computer Vision. Springer; 2025. p. 91\u2013107."},{"key":"10517_CR183","unstructured":"Zhang T, Wang Z, Huang J, Tasnim MM, Shi W. A survey of diffusion based image generation models: Issues and their solutions, 2023. arXiv preprint arXiv:2308.13142"},{"issue":"4","key":"10517_CR184","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1109\/TCYB.2021.3115459","volume":"53","author":"L Zou","year":"2023","unstructured":"Zou L, Wang Z, Han Q-L, Yue D. Tracking control under Round-Robin scheduling: handling impulsive transmission outliers. IEEE Trans Cybern. 2023;53(4):2288\u2013300.","journal-title":"IEEE Trans. Cybern."},{"key":"10517_CR185","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comcom.2023.12.031","volume":"216","author":"Q Zhao","year":"2024","unstructured":"Zhao Q, Wang Y, Lin Y, Yan S, Song W, Wang B, et al. Mixed noise-guided mutual constraint framework for unsupervised anomaly detection in smart industries. Comput Commun. 2024;216:45\u201353.","journal-title":"Comput. Commun."},{"key":"10517_CR186","doi-asserted-by":"crossref","unstructured":"Zou L, Wang Z, Shen B, Dong H. Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach. IEEE Trans Autom Control. Dec. 2023;68(12):8111\u20138.","DOI":"10.1109\/TAC.2023.3288624"},{"key":"10517_CR187","unstructured":"Zhang H, Wang Z, Wu Z, Jiang Y-G. DiffusionAD: Norm-guided one-step denoising diffusion for anomaly detection, 2023. arXiv preprint arXiv:2303.08730"},{"issue":"7","key":"10517_CR188","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/JAS.2024.124314","volume":"11","author":"Y Zhang","year":"2024","unstructured":"Zhang Y, Wang Z, Zou L, Chen Y, Lu G. Ultimately bounded output feedback control for networked nonlinear systems with unreliable communication channel: a buffer-aided strategy. IEEE\/CAA J Autom Sin. 2024;11(7):1566\u201378.","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"10517_CR189","doi-asserted-by":"crossref","unstructured":"Zhang Y, Wang Z, Zou L, Dong H, Yi X. Neural-network-based secure state estimation under energy-constrained denial-of-service attacks: an encoding-decoding scheme. IEEE Trans. Netw. Sci. Eng. 2023;10(4):2002\u201315.","DOI":"10.1109\/TNSE.2023.3237639"},{"key":"10517_CR190","doi-asserted-by":"crossref","unstructured":"Zhang X, Xu M, Zhou X. RealNet: A feature selection network with realistic synthetic anomaly for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 2024. p. 16699\u2013708.","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"10517_CR191","unstructured":"Zhang C, Zhang C, Zhang M, Kweon IS. Text-to-image diffusion models in generative ai: A survey, 2023. arXiv preprint arXiv:2303.07909"}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-025-10517-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12559-025-10517-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-025-10517-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:02:56Z","timestamp":1768914176000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12559-025-10517-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":191,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10517"],"URL":"https:\/\/doi.org\/10.1007\/s12559-025-10517-y","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"value":"1866-9956","type":"print"},{"value":"1866-9964","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"15 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article contains no studies with human participants or animals performed by authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"165"}}