{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:39:13Z","timestamp":1774406353488,"version":"3.50.1"},"reference-count":42,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T00:00:00Z","timestamp":1761868800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006690","name":"Politecnico di Milano","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006690","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Signal Processing"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1016\/j.dsp.2025.105613","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T01:17:11Z","timestamp":1758590231000},"page":"105613","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PD","title":["Scaling anomaly detection with segmentation models"],"prefix":"10.1016","volume":"168","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3325-9225","authenticated-orcid":false,"given":"Stefano","family":"Samele","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Attorre","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Matteucci","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.dsp.2025.105613_bib0001","series-title":"Asian Conference on Computer Vision","first-page":"622","article-title":"Ganomaly: semi-supervised anomaly detection via adversarial training","author":"Akcay","year":"2018"},{"issue":"1","key":"10.1016\/j.dsp.2025.105613_bib0002","first-page":"1","article-title":"Variational autoencoder based anomaly detection using reconstruction probability","volume":"2","author":"An","year":"2015","journal-title":"Spec. Lect. IE"},{"key":"10.1016\/j.dsp.2025.105613_bib0003","series-title":"Papers with Code","author":"Authors","year":"2024"},{"key":"10.1016\/j.dsp.2025.105613_bib0004","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"6373","article-title":"Pni: industrial anomaly detection using position and neighborhood information","author":"Bae","year":"2023"},{"key":"10.1016\/j.dsp.2025.105613_bib0005","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"128","article-title":"Efficientad: accurate visual anomaly detection at millisecond-level latencies","author":"Batzner","year":"2024"},{"key":"10.1016\/j.dsp.2025.105613_bib0006","unstructured":"P. Bergmann, S. L\u00f6we, M. Fauser, D. Sattlegger, C. Steger, Improving unsupervised defect segmentation by applying structural similarity to autoencoders, CoRR, abs\/1807.02011, 2018. http:\/\/arxiv.org\/abs\/1807.02011."},{"key":"10.1016\/j.dsp.2025.105613_bib0007","series-title":"2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"9584","article-title":"Mvtec ad - a comprehensive real-world dataset for unsupervised anomaly detection","author":"Bergmann","year":"2019"},{"issue":"4","key":"10.1016\/j.dsp.2025.105613_bib0008","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","article-title":"Beyond dents and scratches: logical constraints in unsupervised anomaly detection and localization","volume":"130","author":"Bergmann","year":"2022","journal-title":"Int. J. Comput. Vis."},{"issue":"4","key":"10.1016\/j.dsp.2025.105613_bib0009","doi-asserted-by":"crossref","first-page":"834","DOI":"10.1109\/TPAMI.2017.2699184","article-title":"Deeplab: semantic image segmentation with deep convolutional nets, atrous convolution, and fully connected crfs","volume":"40","author":"Chen","year":"2017","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.dsp.2025.105613_bib0010","series-title":"International Conference on Pattern Recognition","first-page":"475","article-title":"Padim: a patch distribution modeling framework for anomaly detection and localization","author":"Defard","year":"2021"},{"key":"10.1016\/j.dsp.2025.105613_bib0011","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9737","article-title":"Anomaly detection via reverse distillation from one-class embedding","author":"Deng","year":"2022"},{"key":"10.1016\/j.dsp.2025.105613_bib0012","series-title":"2009 IEEE Conference on Computer Vision and Pattern Recognition","first-page":"248","article-title":"Imagenet: a large-scale hierarchical image database","author":"Deng","year":"2009"},{"key":"10.1016\/j.dsp.2025.105613_bib0013","series-title":"Imagenet: A Large-Scale Hierarchical Image Database","author":"Deng","year":"2009"},{"issue":"5","key":"10.1016\/j.dsp.2025.105613_bib0014","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1007\/s10851-019-00885-0","article-title":"Image anomalies: a review and synthesis of detection methods","volume":"61","author":"Ehret","year":"2019","journal-title":"J. Math. Imaging Vis."},{"key":"10.1016\/j.dsp.2025.105613_bib0015","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"770","article-title":"Deep residual learning for image recognition","author":"He","year":"2016"},{"key":"10.1016\/j.dsp.2025.105613_bib0016","series-title":"Proceedings of the IEEE International Conference on Computer Vision","first-page":"2961","article-title":"Mask r-cnn","author":"He","year":"2017"},{"key":"10.1016\/j.dsp.2025.105613_bib0017","series-title":"Dual Flow Reverse Distillation for Unsupervised Anomaly Detection","first-page":"105258","author":"Jiang","year":"2025"},{"key":"10.1016\/j.dsp.2025.105613_bib0018","doi-asserted-by":"crossref","first-page":"78446","DOI":"10.1109\/ACCESS.2022.3193699","article-title":"Cfa: coupled-hypersphere-based feature adaptation for target-oriented anomaly localization","volume":"10","author":"Lee","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.dsp.2025.105613_bib0019","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"9664","article-title":"Cutpaste: self-supervised learning for anomaly detection and localization","author":"Li","year":"2021"},{"key":"10.1016\/j.dsp.2025.105613_bib0020","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","first-page":"2117","article-title":"Feature pyramid networks for object detection","author":"Lin","year":"2017"},{"key":"10.1016\/j.dsp.2025.105613_bib0021","series-title":"International Conference on Learning Representations","article-title":"SGDR: stochastic gradient descent with warm restarts","author":"Loshchilov","year":"2017"},{"key":"10.1016\/j.dsp.2025.105613_bib0022","series-title":"2021 IEEE 30th International Symposium on Industrial Electronics (ISIE)","first-page":"1","article-title":"Vt-adl: a vision transformer network for image anomaly detection and localization","author":"Mishra","year":"2021"},{"key":"10.1016\/j.dsp.2025.105613_bib0023","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","article-title":"A review of novelty detection","volume":"99","author":"Pimentel","year":"2014","journal-title":"Signal Process."},{"key":"10.1016\/j.dsp.2025.105613_bib0024","article-title":"Faster r-cnn: towards real-time object detection with region proposal networks","volume":"28","author":"Ren","year":"2015","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.dsp.2025.105613_bib0025","unstructured":"D. Rezende, S. Mohamed, Variational inference with normalizing flows, Proceedings of the 32nd International Conference on Machine Learning 37 (PMLR) (2015) 7\u201309. Proceedings of Machine Learning Research, https:\/\/proceedings.mlr.press\/v37\/rezende15.html."},{"key":"10.1016\/j.dsp.2025.105613_bib0026","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","first-page":"14318","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"2022"},{"key":"10.1016\/j.dsp.2025.105613_bib0027","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision (WACV)","first-page":"1907","article-title":"Same same but differnet: semi-supervised defect detection with normalizing flows","author":"Rudolph","year":"2021"},{"key":"10.1016\/j.dsp.2025.105613_bib0028","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"1088","article-title":"Fully convolutional cross-scale-flows for image-based defect detection","author":"Rudolph","year":"2022"},{"key":"10.1016\/j.dsp.2025.105613_bib0029","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"2592","article-title":"Asymmetric student-teacher networks for industrial anomaly detection","author":"Rudolph","year":"2023"},{"key":"10.1016\/j.dsp.2025.105613_bib0030","series-title":"International Conference on Information Processing in Medical Imaging","first-page":"146","article-title":"Unsupervised anomaly detection with generative adversarial networks to guide marker discovery","author":"Schlegl","year":"2017"},{"key":"10.1016\/j.dsp.2025.105613_bib0031","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7352","article-title":"Fsce: few-shot object detection via contrastive proposal encoding","author":"Sun","year":"2021"},{"key":"10.1016\/j.dsp.2025.105613_bib0032","series-title":"International Conference on Machine Learning","first-page":"6105","article-title":"Rethinking model scaling for convolutional neural networks","author":"Tan","year":"2019"},{"key":"10.1016\/j.dsp.2025.105613_bib0033","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.patrec.2019.11.024","article-title":"Integrating prediction and reconstruction for anomaly detection","volume":"129","author":"Tang","year":"2020","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.dsp.2025.105613_bib0034","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2021.103201","article-title":"Lrgan: visual anomaly detection using gan with locality-preferred recoding","volume":"79","author":"Wang","year":"2021","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.dsp.2025.105613_bib0035","series-title":"Proceedings of the 37th International Conference on Machine Learning","first-page":"9919","article-title":"Frustratingly simple few-shot object detection","author":"Wang","year":"2020"},{"key":"10.1016\/j.dsp.2025.105613_bib0036","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2021.103279","article-title":"A semantically driven self-supervised algorithm for detecting anomalies in image sets","volume":"213","author":"Wheeler","year":"2021","journal-title":"Comput. Vis. Image Understand."},{"key":"10.1016\/j.dsp.2025.105613_bib0037","series-title":"Computer Vision-ECCV 2020: 16th European Conference","first-page":"456","article-title":"Multi-scale positive sample refinement for few-shot object detection","author":"Wu","year":"2020"},{"key":"10.1016\/j.dsp.2025.105613_bib0038","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2025.104454","article-title":"Memflow-ad: an anomaly detection and localization model based on memory module and normalizing flow","volume":"110","author":"Xie","year":"2025","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.dsp.2025.105613_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvcir.2023.103983","article-title":"Unsupervised industrial anomaly detection with diffusion models","volume":"97","author":"Xu","year":"2023","journal-title":"J. Vis. Commun. Image Represent."},{"key":"10.1016\/j.dsp.2025.105613_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.105835","article-title":"Memseg: a semi-supervised method for image surface defect detection using differences and commonalities","volume":"119","author":"Yang","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.dsp.2025.105613_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2020.107706","article-title":"Reconstruction by inpainting for visual anomaly detection","volume":"112","author":"Zavrtanik","year":"2021","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.dsp.2025.105613_bib0042","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","first-page":"8330","article-title":"Draem - a discriminatively trained reconstruction embedding for surface anomaly detection","author":"Zavrtanik","year":"2021"}],"container-title":["Digital Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200425006359?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1051200425006359?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T03:58:46Z","timestamp":1764475126000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1051200425006359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":42,"alternative-id":["S1051200425006359"],"URL":"https:\/\/doi.org\/10.1016\/j.dsp.2025.105613","relation":{},"ISSN":["1051-2004"],"issn-type":[{"value":"1051-2004","type":"print"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Scaling anomaly detection with segmentation models","name":"articletitle","label":"Article Title"},{"value":"Digital Signal Processing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.dsp.2025.105613","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier Inc.","name":"copyright","label":"Copyright"}],"article-number":"105613"}}