{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:59:56Z","timestamp":1776887996246,"version":"3.51.2"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T00:00:00Z","timestamp":1701475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R &D Program of China","doi-asserted-by":"crossref","award":["2021YFB3900902"],"award-info":[{"award-number":["2021YFB3900902"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202501"],"award-info":[{"award-number":["62202501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2003208"],"award-info":[{"award-number":["U2003208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018627","name":"Science and Technology Support Plan for Youth Innovation of Colleges and Universities of Shandong Province of China","doi-asserted-by":"publisher","award":["2022JJ40638"],"award-info":[{"award-number":["2022JJ40638"]}],"id":[{"id":"10.13039\/501100018627","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018627","name":"Science and Technology Support Plan for Youth Innovation of Colleges and Universities of Shandong Province of China","doi-asserted-by":"publisher","award":["2016TP1003"],"award-info":[{"award-number":["2016TP1003"]}],"id":[{"id":"10.13039\/501100018627","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund of Science and Technology on Parallel, Distributed Processing Laboratory","award":["WDZC20215250116"],"award-info":[{"award-number":["WDZC20215250116"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the domain of intelligent manufacturing, automatic anomaly detection plays a pivotal role and holds great significance for improving production efficiency and product quality. However, the scarcity and uncertainty of anomalous data pose significant challenges in this field. Data augmentation methods, such as Cutout, which are widely adopted in existing methodologies, tend to generate patterned data, leading to biased data and compromised detection performance. To deal with this issue, we propose an approach termed self-supervised anomaly detection with pixel-point random walk (P2 Random Walk), which combines data augmentation and Siamese neural networks. We develop a pixel-level data augmentation technique to enhance the randomness of generated data and establish a two-stage anomaly classification framework. The effectiveness of the P2 Random Walk method has been demonstrated on the MVTec dataset, achieving an AUROC of 96.2% and 96.3% for classification and segmentation, respectively, by using only data augmentation-based techniques. Specifically, our method outperforms other state-of-the-art methods in several categories, improving the AUROC for classification and segmentation by 0.5% and 0.3%, respectively, which demonstrates the high performance and strong academic value of our method in anomaly detection tasks.<\/jats:p>","DOI":"10.1007\/s40747-023-01285-z","type":"journal-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T02:02:17Z","timestamp":1701482537000},"page":"2541-2555","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["P2 random walk: self-supervised anomaly detection with pixel-point random walk"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2756-1540","authenticated-orcid":false,"given":"Liujie","family":"Hua","sequence":"first","affiliation":[]},{"given":"Qianqian","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0163-0007","authenticated-orcid":false,"given":"Jun","family":"Long","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,2]]},"reference":[{"issue":"Suppl 1","key":"1285_CR1","doi-asserted-by":"publisher","first-page":"949","DOI":"10.1007\/s10586-017-1117-8","volume":"22","author":"D Kwon","year":"2019","unstructured":"Kwon D, Kim H, Kim J, Suh SC, Kim I, Kim KJ (2019) A survey of deep learning-based network anomaly detection. Clust Comput 22(Suppl 1):949\u2013961","journal-title":"Clust Comput"},{"issue":"2","key":"1285_CR2","doi-asserted-by":"publisher","first-page":"1525","DOI":"10.1007\/s40747-021-00600-w","volume":"8","author":"Q Zhang","year":"2022","unstructured":"Zhang Q, Zhang M, Gamanayake C, Yuen C, Geng Z, Jayasekara H, Woo C-W, Low J, Liu X, Guan YL (2022) Deep learning based solder joint defect detection on industrial printed circuit board x-ray images. Complex Intell Syst 8(2):1525\u20131537","journal-title":"Complex Intell Syst"},{"key":"1285_CR3","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"1285_CR4","unstructured":"Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui SA, Binder A, M\u00fcller E, Kloft M (2018) Deep one-class classification. In: International Conference on Machine Learning, pp. 4393\u20134402. PMLR"},{"key":"1285_CR5","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2020) Uninformed students: Student-teacher anomaly detection with discriminative latent embeddings. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 4183\u20134192","DOI":"10.1109\/CVPR42600.2020.00424"},{"issue":"1","key":"1285_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0197-0","volume":"6","author":"C Shorten","year":"2019","unstructured":"Shorten C, Khoshgoftaar TM (2019) A survey on image data augmentation for deep learning. J Big Data 6(1):1\u201348","journal-title":"J Big Data"},{"issue":"8","key":"1285_CR7","doi-asserted-by":"publisher","first-page":"5171","DOI":"10.1109\/TII.2021.3122801","volume":"18","author":"C Huang","year":"2021","unstructured":"Huang C, Wu Z, Wen J, Xu Y, Jiang Q, Wang Y (2021) Abnormal event detection using deep contrastive learning for intelligent video surveillance system. IEEE Trans Industr Inf 18(8):5171\u20135179","journal-title":"IEEE Trans Industr Inf"},{"key":"1285_CR8","doi-asserted-by":"crossref","unstructured":"Shi X, Zhu Y, Li L, Li J (2023) Mcsad: A monte carlo-based end-to-end scheduling anomaly detection method for distributed real-time systems. Simulation Modelling Practice and Theory, 102746","DOI":"10.1016\/j.simpat.2023.102746"},{"key":"1285_CR9","unstructured":"DeVries T, Taylor GW (2017) Improved regularization of convolutional neural networks with cutout. arXiv preprint arXiv:1708.04552"},{"issue":"5","key":"1285_CR10","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JPROC.2021.3052449","volume":"109","author":"L Ruff","year":"2021","unstructured":"Ruff L, Kauffmann JR, Vandermeulen RA, Montavon G, Samek W, Kloft M, Dietterich TG, M\u00fcller K-R (2021) A unifying review of deep and shallow anomaly detection. Proc IEEE 109(5):756\u2013795","journal-title":"Proc IEEE"},{"key":"1285_CR11","doi-asserted-by":"crossref","unstructured":"Ristea N-C, Madan N, Ionescu RT, Nasrollahi K, Khan FS, Moeslund TB, Shah M (2022) Self-supervised predictive convolutional attentive block for anomaly detection. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp 13576\u201313586","DOI":"10.1109\/CVPR52688.2022.01321"},{"key":"1285_CR12","doi-asserted-by":"publisher","first-page":"102618","DOI":"10.1016\/j.simpat.2022.102618","volume":"120","author":"M Al Samara","year":"2022","unstructured":"Al Samara M, Bennis I, Abouaissa A, Lorenz P (2022) Enhanced efficient outlier detection and classification approach for wsns. Simul Model Pract Theory 120:102618","journal-title":"Simul Model Pract Theory"},{"key":"1285_CR13","doi-asserted-by":"crossref","unstructured":"Lei J, Hu X, Wang Y, Liu D (2023) Pyramidflow: High-resolution defect contrastive localization using pyramid normalizing flow. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14143\u201314152","DOI":"10.1109\/CVPR52729.2023.01359"},{"key":"1285_CR14","doi-asserted-by":"crossref","unstructured":"Ak\u00e7ay S, Atapour-Abarghouei A, Breckon TP (2019) Skip-ganomaly: Skip connected and adversarially trained encoder-decoder anomaly detection. In: 2019 International Joint Conference on Neural Networks (IJCNN), pp. 1\u20138. IEEE","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"1285_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.neunet.2021.12.008","volume":"147","author":"L Chen","year":"2022","unstructured":"Chen L, You Z, Zhang N, Xi J, Le X (2022) Utrad: Anomaly detection and localization with u-transformer. Neural Netw 147:53\u201362","journal-title":"Neural Netw"},{"key":"1285_CR16","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.procs.2022.01.057","volume":"199","author":"J Yang","year":"2022","unstructured":"Yang J, Xu R, Qi Z, Shi Y (2022) Visual anomaly detection for images: A systematic survey. Proc Comput Sci 199:471\u2013478","journal-title":"Proc Comput Sci"},{"key":"1285_CR17","doi-asserted-by":"crossref","unstructured":"Yi J, Yoon S (2020) Patch svdd: Patch-level svdd for anomaly detection and segmentation. In: Proceedings of the Asian Conference on Computer Vision","DOI":"10.1007\/978-3-030-69544-6_23"},{"issue":"4","key":"1285_CR18","doi-asserted-by":"publisher","first-page":"045033","DOI":"10.1088\/2632-2153\/aca87d","volume":"3","author":"W Lee","year":"2022","unstructured":"Lee W, Cho E, Kim W, Choi H, Beck KS, Yoon HJ, Baek J, Choi J-H (2022) No-reference perceptual ct image quality assessment based on a self-supervised learning framework. Mach Learn Sci Technol 3(4):045033","journal-title":"Mach Learn Sci Technol"},{"key":"1285_CR19","doi-asserted-by":"crossref","unstructured":"Chen Y, Tian Y, Pang G, Carneiro G (2022) Deep one-class classification via interpolated gaussian descriptor. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 383\u2013392","DOI":"10.1609\/aaai.v36i1.19915"},{"key":"1285_CR20","unstructured":"Bergman L, Hoshen Y (2020) Classification-based anomaly detection for general data. arXiv preprint arXiv:2005.02359"},{"key":"1285_CR21","doi-asserted-by":"crossref","unstructured":"Chen Y, Zhou XS, Huang TS (2001) One-class svm for learning in image retrieval. In: Proceedings 2001 International Conference on Image Processing (Cat. No. 01CH37205), vol. 1, pp. 34\u201337. IEEE","DOI":"10.1109\/ICIP.2001.958946"},{"key":"1285_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2021.04.089","volume":"453","author":"Y Zhou","year":"2021","unstructured":"Zhou Y, Liang X, Zhang W, Zhang L, Song X (2021) Vae-based deep svdd for anomaly detection. Neurocomputing 453:131\u2013140","journal-title":"Neurocomputing"},{"key":"1285_CR23","unstructured":"Dai H, Li J, Kuang Y, Liao J, Zhang Q, Kang Y (2021) Multiscale fuzzy entropy and PSO-SVM based fault diagnoses for airborne fuel pumps. Hum-Centric Comput Inform Sci 11(25):1\u201310"},{"key":"1285_CR24","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Lian D, Tang J, Duan L, Peng X, Gao S (2019) Video anomaly detection with sparse coding inspired deep neural networks. IEEE Trans Pattern Anal Mach Intell 43(3):1070\u20131084","DOI":"10.1109\/TPAMI.2019.2944377"},{"key":"1285_CR25","unstructured":"Sohn K, Li C-L, Yoon J, Jin M, Pfister T (2020) Learning and evaluating representations for deep one-class classification. arXiv preprint arXiv:2011.02578"},{"key":"1285_CR26","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1109\/TCI.2021.3119954","volume":"7","author":"H Zhang","year":"2021","unstructured":"Zhang H, Yuan J, Tian X, Ma J (2021) Gan-fm: Infrared and visible image fusion using gan with full-scale skip connection and dual markovian discriminators. IEEE Transact Comput Imaging 7:1134\u20131147","journal-title":"IEEE Transact Comput Imaging"},{"key":"1285_CR27","doi-asserted-by":"crossref","unstructured":"Li C-L, Sohn K, Yoon J, Pfister T (2021) Cutpaste: Self-supervised learning for anomaly detection and localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664\u20139674","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"1285_CR28","doi-asserted-by":"crossref","unstructured":"Ermaliuc M, Stamate D, Magoulas GD, Pu I (2021) Creating ensembles of generative adversarial network discriminators for one-class classification. In: Proceedings of the 22nd Engineering Applications of Neural Networks Conference: EANN 2021, pp. 13\u201323. Springer","DOI":"10.1007\/978-3-030-80568-5_2"},{"issue":"6","key":"1285_CR29","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1109\/TIM.2018.2795178","volume":"67","author":"S Mei","year":"2018","unstructured":"Mei S, Yang H, Yin Z (2018) An unsupervised-learning-based approach for automated defect inspection on textured surfaces. IEEE Trans Instrum Meas 67(6):1266\u20131277","journal-title":"IEEE Trans Instrum Meas"},{"key":"1285_CR30","unstructured":"Dehaene D, Frigo O, Combrexelle S, Eline P (2020) Iterative energy-based projection on a normal data manifold for anomaly localization. arXiv preprint arXiv:2002.03734"},{"key":"1285_CR31","doi-asserted-by":"publisher","first-page":"107706","DOI":"10.1016\/j.patcog.2020.107706","volume":"112","author":"V Zavrtanik","year":"2021","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj D (2021) Reconstruction by inpainting for visual anomaly detection. Pattern Recogn 112:107706","journal-title":"Pattern Recogn"},{"key":"1285_CR32","unstructured":"Wang J, Wang L, He S, Alfarraj O, Tolba A, Sherratt RS (2022) Sa-rfr: self-attention based recurrent feature reasoning for image inpainting with large missing area. Hum-Centric Comput Inform Sci 12"},{"key":"1285_CR33","doi-asserted-by":"crossref","unstructured":"Xia X, Pan X, Li N, He X, Ma L, Zhang X, Ding N (2022) Gan-based anomaly detection: a review. Neurocomputing 493:497\u2013535","DOI":"10.1016\/j.neucom.2021.12.093"},{"key":"1285_CR34","doi-asserted-by":"crossref","unstructured":"Akcay S, Abarghouei AA, Breckon TP (2018) Ganomaly: Semi-supervised anomaly detection via adversarial training. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) Computer Vision - ACCV 2018 - 14th Asian Conference on Computer Vision, Perth, Australia, December 2-6, 2018, pp. 622\u2013637","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"1285_CR35","doi-asserted-by":"crossref","unstructured":"Lu H, Du M, Qian K, He X, Wang K (2021) Gan-based data augmentation strategy for sensor anomaly detection in industrial robots. IEEE Sens J 22(18):17464\u201317474","DOI":"10.1109\/JSEN.2021.3069452"},{"key":"1285_CR36","doi-asserted-by":"crossref","unstructured":"Ghiasi G, Cui Y, Srinivas A, Qian R, Lin T-Y, Cubuk ED, Le QV, Zoph B (2021) Simple copy-paste is a strong data augmentation method for instance segmentation. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2918\u20132928","DOI":"10.1109\/CVPR46437.2021.00294"},{"key":"1285_CR37","doi-asserted-by":"publisher","first-page":"108234","DOI":"10.1016\/j.patcog.2021.108234","volume":"121","author":"X Zhang","year":"2022","unstructured":"Zhang X, Mu J, Zhang X, Liu H, Zong L, Li Y (2022) Deep anomaly detection with self-supervised learning and adversarial training. Pattern Recogn 121:108234","journal-title":"Pattern Recogn"},{"key":"1285_CR38","doi-asserted-by":"crossref","unstructured":"Liu Y, Li Z, Pan S, Gong C, Zhou C, Karypis G (2021) Anomaly detection on attributed networks via contrastive self-supervised learning. IEEE Trans Neural Netw Learn Syst 33(6):2378\u20132392","DOI":"10.1109\/TNNLS.2021.3068344"},{"key":"1285_CR39","doi-asserted-by":"crossref","unstructured":"Bergmann P, Fauser M, Sattlegger D, Steger C (2019) Mvtec ad\u2013a comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9592\u20139600","DOI":"10.1109\/CVPR.2019.00982"},{"key":"1285_CR40","doi-asserted-by":"crossref","unstructured":"Ruff L, Kauffmann JR, Vandermeulen RA, Montavon G, Samek W, Kloft M, Dietterich TG, M\u00fcller K (2021) A unifying review of deep and shallow anomaly detection. Proc IEEE 109(5):756\u2013795","DOI":"10.1109\/JPROC.2021.3052449"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01285-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01285-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01285-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T19:09:28Z","timestamp":1730747368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01285-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,2]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1285"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01285-z","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,2]]},"assertion":[{"value":"26 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors have no conflicts of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors declare that this work does not include humans and animals, as well as did not collect data from human subjects.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}}]}}