{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:16:59Z","timestamp":1767374219146,"version":"3.41.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:00:00Z","timestamp":1730246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Research and Development Project in Henan Province","award":["241111211100","241111211100","241111211100","241111211100","241111211100","241111211100"],"award-info":[{"award-number":["241111211100","241111211100","241111211100","241111211100","241111211100","241111211100"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Mach. Learn. &amp; Cyber."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s13042-024-02433-8","type":"journal-article","created":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:25:43Z","timestamp":1730323543000},"page":"3019-3034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["AM-CFDN: semi-supervised anomaly measure-based coal flow foreign object detection network"],"prefix":"10.1007","volume":"16","author":[{"given":"Weidong","family":"Li","sequence":"first","affiliation":[]},{"given":"Yongbo","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Chisheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xuehai","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jinlong","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Linyan","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,30]]},"reference":[{"key":"2433_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2023.102963","volume":"90","author":"A Kascenas","year":"2023","unstructured":"Kascenas A, Sanchez P, Schrempf P, Wang C, Clackett W, Mikhael SS, Voisey JP, Goatman K, Weir A, Pugeault N (2023) The role of noise in denoising models for anomaly detection in medical images. Med Image Anal 90:102963","journal-title":"Med Image Anal"},{"issue":"1","key":"2433_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.jksuci.2022.11.008","volume":"35","author":"A Cherif","year":"2023","unstructured":"Cherif A, Badhib A, Ammar H, Alshehri S, Kalkatawi M, Imine A (2023) Credit card fraud detection in the era of disruptive technologies: a systematic review. J King Saud Univ-Comput Inf Sci 35(1):145\u2013174","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"2433_CR3","doi-asserted-by":"crossref","unstructured":"Zhang L, Cushing R, Laat C, Grosso P (2021) A real-time intrusion detection system based on oc-svm for containerized applications. In: 2021 IEEE 24th International conference on computational Science and engineering (CSE). IEEE, 138\u2013145","DOI":"10.1109\/CSE53436.2021.00029"},{"issue":"9","key":"2433_CR4","doi-asserted-by":"publisher","first-page":"10651","DOI":"10.1007\/s10462-023-10438-y","volume":"56","author":"D Zhang","year":"2023","unstructured":"Zhang D, Hao X, Wang D, Qin C, Zhao B, Liang L, Liu W (2023) An efficient lightweight convolutional neural network for industrial surface defect detection. Artif Intell Rev 56(9):10651\u201310677","journal-title":"Artif Intell Rev"},{"key":"2433_CR5","doi-asserted-by":"crossref","unstructured":"Du Y, Zhang H, Liang L, Zhang J, Song B (2023) Applications of machine vision in coal mine fully mechanized tunneling faces: a review. IEEE Access","DOI":"10.1109\/ACCESS.2023.3317048"},{"key":"2433_CR6","doi-asserted-by":"crossref","unstructured":"Wang C, Chang L, Wang X-S, Zhang B, Stein A (2024) Interferometric synthetic aperture radar statistical inference in deformation measurement and geophysical inversion: a review. IEEE Geosci Remote Sens Mag","DOI":"10.1109\/MGRS.2023.3344159"},{"issue":"2","key":"2433_CR7","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s10994-019-05855-6","volume":"109","author":"JE Van Engelen","year":"2020","unstructured":"Van Engelen JE, Hoos HH (2020) A survey on semi-supervised learning. Mach Learn 109(2):373\u2013440","journal-title":"Mach Learn"},{"key":"2433_CR8","unstructured":"Jiang X, Xie G, Wang J, Liu Y, Wang C, Zheng F, Jin Y (2022) A survey of visual sensory anomaly detection. arXiv preprint arXiv:2202.07006"},{"key":"2433_CR9","doi-asserted-by":"crossref","unstructured":"Meng J, Wu Q, Zhang B (2023) Foreign object recognition method of coal mine conveyor belt based on lightweight network. In: 2023 4th International conference on intelligent computing and human-computer interaction (ICHCI). IEEE, 119\u2013123","DOI":"10.1109\/ICHCI58871.2023.10277899"},{"issue":"8","key":"2433_CR10","doi-asserted-by":"publisher","first-page":"2777","DOI":"10.1007\/s13042-023-01798-6","volume":"14","author":"T Ye","year":"2023","unstructured":"Ye T, Zheng Z, Li Y, Zhang X, Deng X, Ouyang Y, Zhao Z, Gao X (2023) An adaptive focused target feature fusion network for detection of foreign bodies in coal flow. Int J Mach Learn Cybern 14(8):2777\u20132791","journal-title":"Int J Mach Learn Cybern"},{"key":"2433_CR11","doi-asserted-by":"crossref","unstructured":"Wang S, Wang Y, Chang Y, Zhao R, She Y (2023) Ebse-yolo: high precision recognition algorithm for small target foreign object detection. IEEE Access","DOI":"10.1109\/ACCESS.2023.3284062"},{"key":"2433_CR12","doi-asserted-by":"crossref","unstructured":"Yang D, Miao C, Liu Y, Wang Y, Zheng Y (2024) Improved foreign object tracking algorithm in coal for belt conveyor gangue selection robot with yolov7 and deepsort. Measurement 114180","DOI":"10.1016\/j.measurement.2024.114180"},{"key":"2433_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2024.114468","volume":"229","author":"C Hou","year":"2024","unstructured":"Hou C, Qiao T, Dong H, Wu H (2024) Coal flow volume detection method for conveyor belt based on tof vision. Measurement 229:114468","journal-title":"Measurement"},{"key":"2433_CR14","doi-asserted-by":"crossref","unstructured":"Li X, Li W, Qiu K, Wang S, Zhao S (2023) Coal mine belt conveyor foreign object detection based on improved yolov8. In: 2023 IEEE 11th joint International information technology and artificial intelligence conference (ITAIC), vol. 11. IEEE, 209\u2013215","DOI":"10.1109\/ITAIC58329.2023.10409089"},{"key":"2433_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105835","volume":"119","author":"M Yang","year":"2023","unstructured":"Yang M, Wu P, Feng H (2023) Memseg: a semi-supervised method for image surface defect detection using differences and commonalities. Eng Appl Artif Intell 119:105835","journal-title":"Eng Appl Artif Intell"},{"issue":"3","key":"2433_CR16","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1029\/2021JB023598","volume":"127","author":"A Cai","year":"2022","unstructured":"Cai A, Qiu H, Niu F (2022) Semi-supervised surface wave tomography with wasserstein cycle-consistent gan: Method and application to southern california plate boundary region. J Geophys Res Solid Earth 127(3):2021\u2013023598","journal-title":"J Geophys Res Solid Earth"},{"key":"2433_CR17","doi-asserted-by":"crossref","unstructured":"Wei Q, Zhao W, Zheng X, Zeng Z (2023) Wafer map defect patterns semi-supervised classification using latent vector representation. In: 2023 IEEE International conference on cybernetics and intelligent systems (CIS) and IEEE conference on robotics, automation and mechatronics (RAM). IEEE, 192\u2013197","DOI":"10.1109\/CIS-RAM55796.2023.10370763"},{"key":"2433_CR18","doi-asserted-by":"crossref","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) Ganomaly: Semi-supervised anomaly detection via adversarial training. In: Computer vision\u2013ACCV 2018: 14th Asian conference on computer vision, Perth, Australia, December 2\u20136, 2018, Revised Selected Papers, Part III 14. Springer, 622\u2013637","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"2433_CR19","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.optlaseng.2019.01.011","volume":"117","author":"H Di","year":"2019","unstructured":"Di H, Ke X, Peng Z, Dongdong Z (2019) Surface defect classification of steels with a new semi-supervised learning method. Opt Lasers Eng 117:40\u201348","journal-title":"Opt Lasers Eng"},{"key":"2433_CR20","doi-asserted-by":"publisher","first-page":"88903","DOI":"10.1109\/ACCESS.2019.2920251","volume":"7","author":"J Bian","year":"2019","unstructured":"Bian J, Hui X, Sun S, Zhao X, Tan M (2019) A novel and efficient cvae-gan-based approach with informative manifold for semi-supervised anomaly detection. IEEE Access 7:88903\u201388916","journal-title":"IEEE Access"},{"key":"2433_CR21","doi-asserted-by":"crossref","unstructured":"Chu W-H, Kitani KM (2020) Neural batch sampling with reinforcement learning for semi-supervised anomaly detection. In: Computer vision\u2013ECCV 2020: 16th European conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXVI 16. Springer, 751\u2013766","DOI":"10.1007\/978-3-030-58574-7_45"},{"key":"2433_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106955","volume":"126","author":"S Zhao","year":"2023","unstructured":"Zhao S, Yu Z, Li S, Wang X, Marbach TG, Wang G, Liu X (2023) Meta pseudo labels for anomaly detection via partially observed anomalies. Eng Appl Artif Intell 126:106955","journal-title":"Eng Appl Artif Intell"},{"issue":"11","key":"2433_CR23","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.3390\/coatings12111707","volume":"12","author":"Y He","year":"2022","unstructured":"He Y, Wen X, Xu J (2022) A semi-supervised inspection approach of textured surface defects under limited labeled samples. Coatings 12(11):1707","journal-title":"Coatings"},{"key":"2433_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2019.101825","volume":"61","author":"Y Gao","year":"2020","unstructured":"Gao Y, Gao L, Li X, Yan X (2020) A semi-supervised convolutional neural network-based method for steel surface defect recognition. Robot Comput-Integr Manuf 61:101825","journal-title":"Robot Comput-Integr Manuf"},{"key":"2433_CR25","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.optlaseng.2019.06.020","volume":"122","author":"Y He","year":"2019","unstructured":"He Y, Song K, Dong H, Yan Y (2019) Semi-supervised defect classification of steel surface based on multi-training and generative adversarial network. Opt Lasers Eng 122:294\u2013302","journal-title":"Opt Lasers Eng"},{"issue":"1","key":"2433_CR26","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s44196-023-00328-0","volume":"16","author":"M Pei","year":"2023","unstructured":"Pei M, Liu N, Zhao B, Sun H (2023) Self-supervised learning for industrial image anomaly detection by simulating anomalous samples. Int J Comput Intell Syst 16(1):152","journal-title":"Int J Comput Intell Syst"},{"key":"2433_CR27","doi-asserted-by":"crossref","unstructured":"Chen H, Song Y, Zhuo Z, Zhou Y, Li Y-H, Xue H, McLoughlin I (2023) An effective anomalous sound detection method based on representation learning with simulated anomalies. In: ICASSP 2023-2023 IEEE International conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 1\u20135","DOI":"10.1109\/ICASSP49357.2023.10095398"},{"key":"2433_CR28","doi-asserted-by":"crossref","unstructured":"Gu Z, Zhu B, Zhu G, Chen Y, Tang M, Wang J (2024) Anomalygpt: Detecting industrial anomalies using large vision-language models. In: Proceedings of the AAAI conference on artificial intelligence, vol. 38, 1932\u20131940","DOI":"10.1609\/aaai.v38i3.27963"},{"key":"2433_CR29","doi-asserted-by":"crossref","unstructured":"Schl\u00fcter HM, Tan J, Hou B, Kainz B (2022) Natural synthetic anomalies for self-supervised anomaly detection and localization. In: European conference on computer vision. Springer, pp 474\u2013489","DOI":"10.1007\/978-3-031-19821-2_27"},{"key":"2433_CR30","unstructured":"Song J, Kong K, Park Y-I, Kim S-G, Kang S-J (2021) Anoseg: Anomaly segmentation network using self-supervised learning. arXiv preprint arXiv:2110.03396"},{"key":"2433_CR31","doi-asserted-by":"crossref","unstructured":"Li C-L, Sohn K, Yoon J, Pfister T (2021) Cutpaste: Self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 9664\u20139674","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"2433_CR32","doi-asserted-by":"crossref","unstructured":"Long J, Yang Y, Hua L, Ou Y (2022) Self-supervised augmented patches segmentation for anomaly detection. In: Proceedings of the Asian conference on computer Vision, 1926\u20131941","DOI":"10.1007\/978-3-031-26284-5_6"},{"key":"2433_CR33","doi-asserted-by":"crossref","unstructured":"Chiu L-L, Lai S-H (2023) Self-supervised normalizing flows for image anomaly detection and localization. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 2926\u20132935","DOI":"10.1109\/CVPRW59228.2023.00294"},{"key":"2433_CR34","doi-asserted-by":"crossref","unstructured":"Cui Y, Liu Z, Lian S (2023) A survey on unsupervised anomaly detection algorithms for industrial images. IEEE Access","DOI":"10.1109\/ACCESS.2023.3282993"},{"issue":"1","key":"2433_CR35","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/COMST.2022.3205643","volume":"25","author":"MU Hassan","year":"2022","unstructured":"Hassan MU, Rehmani MH, Chen J (2022) Anomaly detection in blockchain networks: a comprehensive survey. IEEE Commun Surv Tutor 25(1):289\u2013318","journal-title":"IEEE Commun Surv Tutor"},{"key":"2433_CR36","doi-asserted-by":"crossref","unstructured":"Wu X, Cao X, Wang P, Ma H, Zhang Y (2023) Multi-task allocation framework of coal gangue sorting robot system for the time-varying raw coal flow. Int J Coal Prep Util 1\u201325","DOI":"10.1080\/19392699.2023.2217657"},{"key":"2433_CR37","doi-asserted-by":"crossref","unstructured":"Ram\u00edrez-Sanz JM, Maestro-Prieto J-A, Arnaiz-Gonz\u00e1lez \u00c1, Bustillo A (2023) Semi-supervised learning for industrial fault detection and diagnosis: a systemic review. ISA Trans","DOI":"10.1016\/j.isatra.2023.09.027"},{"issue":"7","key":"2433_CR38","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1007\/s11004-022-10042-w","volume":"55","author":"Y Chen","year":"2023","unstructured":"Chen Y, Lu L (2023) The anomaly detector, semi-supervised classifier, and supervised classifier based on k-nearest neighbors in geochemical anomaly detection: a comparative study. Math Geosci 55(7):1011\u20131033","journal-title":"Math Geosci"},{"key":"2433_CR39","doi-asserted-by":"crossref","unstructured":"Defard T, Setkov A, Loesch A, Audigier R (2021) Padim: a patch distribution modeling framework for anomaly detection and localization. In: International conference on pattern recognition, pp. 475\u2013489 (2021). Springer","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"2433_CR40","doi-asserted-by":"crossref","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj D (2021) Draem-a discriminatively trained reconstruction embedding for surface anomaly detection. In: Proceedings of the IEEE\/CVF International conference on computer vision, 8330\u20138339","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"2433_CR41","doi-asserted-by":"crossref","unstructured":"Batzner K, Heckler L, K\u00f6nig R (2024) Efficientad: accurate visual anomaly detection at millisecond-level latencies. In: Proceedings of the IEEE\/CVF winter conference on applications of computer vision, 128\u2013138","DOI":"10.1109\/WACV57701.2024.00020"}],"container-title":["International Journal of Machine Learning and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02433-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13042-024-02433-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13042-024-02433-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:29:23Z","timestamp":1749270563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13042-024-02433-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,30]]},"references-count":41,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["2433"],"URL":"https:\/\/doi.org\/10.1007\/s13042-024-02433-8","relation":{},"ISSN":["1868-8071","1868-808X"],"issn-type":[{"type":"print","value":"1868-8071"},{"type":"electronic","value":"1868-808X"}],"subject":[],"published":{"date-parts":[[2024,10,30]]},"assertion":[{"value":"29 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}