{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:36:28Z","timestamp":1773977788704,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["24PTLYHZ00320"],"award-info":[{"award-number":["24PTLYHZ00320"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["23JCJQJC00070"],"award-info":[{"award-number":["23JCJQJC00070"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010665","name":"H2020 Marie Sk\u0142odowska-Curie Actions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["T2422015"],"award-info":[{"award-number":["T2422015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62306212"],"award-info":[{"award-number":["62306212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272342"],"award-info":[{"award-number":["62272342"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018694","name":"European Commission Marie Sklodowska-Curie Actions","doi-asserted-by":"publisher","award":["101111188"],"award-info":[{"award-number":["101111188"]}],"id":[{"id":"10.13039\/100018694","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.asoc.2026.114650","type":"journal-article","created":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:06:07Z","timestamp":1768291567000},"page":"114650","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Boundary-guided large-scale vision model for unified multi-domain industrial anomaly detection"],"prefix":"10.1016","volume":"191","author":[{"given":"Zixuan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2074-0228","authenticated-orcid":false,"given":"Fan","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Mianzhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.114650_bib0005","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112502","article-title":"Anomaly detection and segmentation in industrial images using multi-scale reverse distillation","volume":"168","author":"Liu","year":"2025","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"10.1016\/j.asoc.2026.114650_bib0010","doi-asserted-by":"crossref","first-page":"2720","DOI":"10.1109\/TCYB.2024.3357213","article-title":"Im-Iad: industrial image anomaly detection benchmark in manufacturing","volume":"54","author":"Xie","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.asoc.2026.114650_bib0015","doi-asserted-by":"crossref","first-page":"5789","DOI":"10.1007\/s00170-025-15473-3","article-title":"Intelligent systems applied to anomaly detection and diagnosis in product design and manufacturing: aerospace industry case study","volume":"137","author":"Andrade","year":"2025","journal-title":"Int. J. Adv. Manuf. Technol."},{"issue":"2","key":"10.1016\/j.asoc.2026.114650_bib0020","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1109\/TSM.2021.3137982","article-title":"Data visualization of anomaly detection in semiconductor processing tools","volume":"35","author":"Fan","year":"2021","journal-title":"IEEE Trans. Semicond. Manuf."},{"key":"10.1016\/j.asoc.2026.114650_bib0025","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.jmsy.2023.02.007","article-title":"Anomaly candidate extraction and detection for automatic quality inspection of metal casting products using high-resolution images","volume":"67","author":"Jung","year":"2023","journal-title":"J. Manuf. Syst."},{"key":"10.1016\/j.asoc.2026.114650_bib0030","article-title":"Multi-branch perturbation learning with constraint simulation for semi-supervised semantic segmentation","volume":"171","author":"Liu","year":"2025","journal-title":"Pattern Recognition"},{"issue":"3","key":"10.1016\/j.asoc.2026.114650_bib0035","doi-asserted-by":"crossref","first-page":"5493","DOI":"10.1109\/TCE.2024.3436010","article-title":"Prompt learning for light field semantic segmentation in the consumer-centric internet of intelligent computing things","volume":"70","author":"Jia","year":"2024","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.asoc.2026.114650_bib0040","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"3914","article-title":"Destseg: segmentation guided denoising student-teacher for anomaly detection","author":"Zhang","year":"2023"},{"issue":"2","key":"10.1016\/j.asoc.2026.114650_bib0045","first-page":"1","article-title":"A sam-guided two-stream lightweight model for anomaly detection","volume":"21","author":"Li","year":"2025","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"10.1016\/j.asoc.2026.114650_bib0050","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113176","article-title":"Sam-Lad: segment anything model meets zero-shot logic anomaly detection","volume":"314","author":"Peng","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.asoc.2026.114650_bib0055","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"4015","article-title":"Segment anything","author":"Kirillov","year":"2023"},{"issue":"12","key":"10.1016\/j.asoc.2026.114650_bib0060","doi-asserted-by":"crossref","first-page":"9424","DOI":"10.1109\/TII.2025.3598479","article-title":"Cascaded state space and contrastive learning for cross-domain few-shot segmentation","volume":"21","author":"Xiao","year":"2025","journal-title":"IEEE Trans. Ind. Informat."},{"key":"10.1016\/j.asoc.2026.114650_bib0065","series-title":"International Conference on Artificial Neural Networks","first-page":"432","article-title":"Enhancing generalization in convolutional neural networks through regularization with edge and line features","author":"Linse","year":"2024"},{"key":"10.1016\/j.asoc.2026.114650_bib0070","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"24511","article-title":"Revisiting reverse distillation for anomaly detection","author":"Tien","year":"2023"},{"key":"10.1016\/j.asoc.2026.114650_bib0075","first-page":"1","article-title":"Dual-branch learning with prior information for surface anomaly detection","volume":"72","author":"Wang","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"10.1016\/j.asoc.2026.114650_bib0080","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"24490","article-title":"Explicit boundary guided semi-push-pull contrastive learning for supervised anomaly detection","author":"Yao","year":"2023"},{"key":"10.1016\/j.asoc.2026.114650_bib0085","series-title":"NeurIPS","article-title":"Eliminating domain bias for federated learning in representation space","author":"Zhang","year":"2023"},{"key":"10.1016\/j.asoc.2026.114650_bib0090","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"7990","article-title":"Attract or distract: exploit the margin of open set","author":"Feng","year":"2019"},{"issue":"11","key":"10.1016\/j.asoc.2026.114650_bib0095","doi-asserted-by":"crossref","first-page":"11751","DOI":"10.1109\/TCSVT.2024.3420775","article-title":"Produce once, utilize twice for anomaly detection","volume":"34","author":"Wang","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.asoc.2026.114650_bib0100","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"8526","article-title":"Anomalydiffusion: few-shot anomaly image generation with diffusion model","volume":"vol. 38","author":"Hu","year":"2024"},{"key":"10.1016\/j.asoc.2026.114650_bib0105","series-title":"International Conference on Machine Learning","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","author":"Radford","year":"2021"},{"key":"10.1016\/j.asoc.2026.114650_bib0110","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.asoc.2026.114650_bib0115","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2024.129122","article-title":"Clipsam: CLIP and SAM collaboration for zero-shot anomaly segmentation","volume":"618","author":"Li","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.asoc.2026.114650_bib0120","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"1932","article-title":"Anomalygpt: detecting industrial anomalies using large vision-language models","volume":"vol. 38","author":"Gu","year":"2024"},{"key":"10.1016\/j.asoc.2026.114650_bib0125","author":"Zuo"},{"issue":"1","key":"10.1016\/j.asoc.2026.114650_bib0130","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1109\/TPAMI.2023.3322604","article-title":"Self-supervised masked convolutional transformer block for anomaly detection","volume":"46","author":"Madan","year":"2023","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.114650_bib0135","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9664","article-title":"Cutpaste: self-supervised learning for anomaly detection and localization","author":"Li","year":"2021"},{"key":"10.1016\/j.asoc.2026.114650_bib0140","author":"Hu"},{"key":"10.1016\/j.asoc.2026.114650_bib0145","series-title":"Proceedings of the 30th ACM International Conference on Multimedia","first-page":"3430","article-title":"Lfbcnet: light field boundary-aware and cascaded interaction network for salient object detection","author":"Wang","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0150","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TPAMI.1986.4767851","article-title":"A computational approach to edge detection","volume":"6","author":"Canny","year":"1986","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.114650_bib0155","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9592","article-title":"Mvtec ad\u2013a comprehensive real-world dataset for unsupervised anomaly detection","author":"Bergmann","year":"2019"},{"key":"10.1016\/j.asoc.2026.114650_bib0160","series-title":"European Conference on Computer Vision","first-page":"392","article-title":"Spot-the-difference self-supervised pre-training for anomaly detection and segmentation","author":"Zou","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0165","series-title":"2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","first-page":"66","article-title":"Deep learning-based defect detection of metal parts: evaluating current methods in complex conditions","author":"Jezek","year":"2021"},{"key":"10.1016\/j.asoc.2026.114650_bib0170","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"8330","article-title":"Draem-a discriminatively trained reconstruction embedding for surface anomaly detection","author":"Zavrtanik","year":"2021"},{"key":"10.1016\/j.asoc.2026.114650_bib0175","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"98","article-title":"Cflow-ad: real-time unsupervised anomaly detection with localization via conditional normalizing flows","author":"Gudovskiy","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0180","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"14318","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0185","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9737","article-title":"Anomaly detection via reverse distillation from one-class embedding","author":"Deng","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0190","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"8742","article-title":"A comprehensive augmentation framework for anomaly detection","volume":"vol. 38","author":"Lin","year":"2024"},{"key":"10.1016\/j.asoc.2026.114650_bib0195","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"11936","article-title":"Rethinking spatial dimensions of vision transformers","author":"Heo","year":"2021"},{"key":"10.1016\/j.asoc.2026.114650_bib0200","series-title":"European Conference on Computer Vision","first-page":"539","article-title":"Dsr\u2013a dual subspace re-projection network for surface anomaly detection","author":"Zavrtanik","year":"2022"},{"key":"10.1016\/j.asoc.2026.114650_bib0205","doi-asserted-by":"crossref","DOI":"10.1109\/TIM.2024.3427758","article-title":"A norm-constrained method for semantic and structured anomaly detection tasks","volume":"73","author":"Gao","year":"2024","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"1","key":"10.1016\/j.asoc.2026.114650_bib0210","doi-asserted-by":"crossref","first-page":"52","DOI":"10.70589\/JRTCSE.2023.1.8","article-title":"Enhancing mobile data security with zero-trust architecture and federated learning: a comprehensive approach to prevent data leakage on smart terminals","volume":"11","author":"Yenugula","year":"2023","journal-title":"J. Recent Trends Comput. Sci. Eng."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626000980?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626000980?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:45:06Z","timestamp":1773974706000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626000980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":42,"alternative-id":["S1568494626000980"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114650","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Boundary-guided large-scale vision model for unified multi-domain industrial anomaly detection","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.114650","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"114650"}}