{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T05:57:27Z","timestamp":1777874247489,"version":"3.51.4"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471175"],"award-info":[{"award-number":["62471175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["232300421023"],"award-info":[{"award-number":["232300421023"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.neucom.2026.133347","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T03:08:43Z","timestamp":1775099323000},"page":"133347","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Registration generation amalgamation network for few-shot anomaly detection"],"prefix":"10.1016","volume":"685","author":[{"given":"Haiyang","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1677-2586","authenticated-orcid":false,"given":"Yongsheng","family":"Dong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0932-8788","authenticated-orcid":false,"given":"Ruijuan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Lintao","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4718-3830","authenticated-orcid":false,"given":"Yaxin","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.neucom.2026.133347_bib0005","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","article-title":"Deep industrial image anomaly detection: a survey","volume":"21","author":"Liu","year":"2024","journal-title":"Mach. Intell. Res."},{"key":"10.1016\/j.neucom.2026.133347_bib0010","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"10743","article-title":"Few-shot image generation via cross-domain correspondence","author":"Ojha","year":"2021"},{"key":"10.1016\/j.neucom.2026.133347_bib0015","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"17481","article-title":"Fastrecon: few-shot industrial anomaly detection via fast feature reconstruction","author":"Fang","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0020","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"571","article-title":"Few-shot defect image generation via defect-aware feature manipulation","author":"Duan","year":"2023"},{"issue":"5","key":"10.1016\/j.neucom.2026.133347_bib0025","doi-asserted-by":"crossref","first-page":"2720","DOI":"10.1109\/TCYB.2024.3357213","article-title":"Im-iad: industrial image anomaly detection benchmark in manufacturing","volume":"54","author":"Xie","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.neucom.2026.133347_bib0030","series-title":"Proceedings of International Conference on Learning Representations","article-title":"Auto-encoding variational Bayes","author":"Kingma","year":"2014"},{"key":"10.1016\/j.neucom.2026.133347_bib0035","series-title":"Proceedings of the IEEE\/CVF Conference on Artificial Intelligence","first-page":"571","article-title":"Fewshot defect image generation via defect-aware feature manipulation","author":"Duan","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0040","first-page":"5998","article-title":"Attention is all you need","volume":"30","author":"Vaswani","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.neucom.2026.133347_bib0045","series-title":"Proceedings of the IEEE\/CVF European Conference on Computer Vision","article-title":"Few-shot anomaly-driven generation for anomaly classification and segmentation","author":"Gui","year":"2024"},{"key":"10.1016\/j.neucom.2026.133347_bib0050","doi-asserted-by":"crossref","first-page":"3388","DOI":"10.1109\/TIP.2019.2959741","article-title":"Multistage GAN for fabric defect detection","volume":"29","author":"Liu","year":"2020","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.neucom.2026.133347_bib0055","doi-asserted-by":"crossref","first-page":"2262","DOI":"10.1109\/TPAMI.2010.46","article-title":"Point set registration: coherent point drift","author":"Myronenko","year":"2010","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"10.1016\/j.neucom.2026.133347_bib0060","doi-asserted-by":"crossref","first-page":"3726","DOI":"10.1109\/TIP.2022.3175432","article-title":"DO-conv: depthwise over-parameterized convolutional layer","volume":"31","author":"Cao","year":"2022","journal-title":"IEEE Trans. Image Process."},{"key":"10.1016\/j.neucom.2026.133347_bib0065","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"8472","article-title":"A diffusion-based framework for multi-class anomaly detection","volume":"vol. 38","author":"He","year":"2024"},{"key":"10.1016\/j.neucom.2026.133347_bib0070","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"650","article-title":"Anoddpm: anomaly detection with denoising diffusion probabilistic models using simplex noise","author":"Wyatt","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0075","series-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention","first-page":"35","article-title":"Diffusion models for medical anomaly detection","author":"Wolleb","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0080","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"8330","article-title":"DR\u00c6M \u2013 a discriminatively trained reconstruction embedding for surface anomaly detection","author":"Vitjan","year":"2021"},{"key":"10.1016\/j.neucom.2026.133347_bib0085","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9664","article-title":"Cutpaste: self-supervised learning for anomaly detection and localization","author":"Li","year":"2021"},{"key":"10.1016\/j.neucom.2026.133347_bib0090","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"20402","article-title":"Simplenet: a simple network for image anomaly detection and localization","author":"Liu","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0095","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"2052","article-title":"ReConPatch: contrastive patch representation learning for industrial anomaly detection","author":"Hyun","year":"2024"},{"key":"10.1016\/j.neucom.2026.133347_bib0100","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9737","article-title":"Anomaly detection via reverse distillation from one-class embedding","author":"Deng","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0105","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"14318","article-title":"Towards total recall in industrial anomaly detection","author":"Karsten","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0110","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"1088","article-title":"Fully convolutional cross-scale-flows for imagebased defect detection","author":"Marco","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0115","series-title":"International Conference on Pattern Recognition","first-page":"475","article-title":"Padim: a patch distribution modeling framework for anomaly detection and localization","author":"Defard","year":"2021"},{"key":"10.1016\/j.neucom.2026.133347_bib0120","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"2592","article-title":"Asymmetric student-teacher networks for industrial anomaly detection","author":"Rudolph","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0125","author":"Xiao"},{"key":"10.1016\/j.neucom.2026.133347_bib0130","author":"Si"},{"key":"10.1016\/j.neucom.2026.133347_bib0135","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"10124","article-title":"Scaling up gans for text-to-image synthesis","author":"Kang","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0140","series-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","first-page":"18558","article-title":"Text2tex: text-driven texture synthesis via diffusion models","author":"Chen","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0145","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"22292","article-title":"Robust unsupervised stylegan image restoration","author":"Poirier-Ginter","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0150","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"8526","article-title":"Anomalydiffusion: few-shot anomaly image generation with diffusion model","author":"Hu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133347_bib0155","series-title":"Proceedings of the IEEE\/CVF European Conference on Computer Vision","first-page":"187","article-title":"Defect spectrum: a granular look of large-scale defect datasets with rich semantics","author":"Yang","year":"2025"},{"key":"10.1016\/j.neucom.2026.133347_bib0160","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"7388","article-title":"Catching both gray and black swans: open-set supervised anomaly detection","author":"Ding","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0165","series-title":"Proceedings of the European Conference on Computer Vision","first-page":"303","article-title":"Registration based few-shot anomaly detection","author":"Huang","year":"2022"},{"key":"10.1016\/j.neucom.2026.133347_bib0170","series-title":"Proceedings of International Conference on Learning Representations","article-title":"Pushing the limits of fewshot anomaly detection in industry vision: Graphcore","author":"Xie","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0175","article-title":"Sub-image anomaly detection with deep pyramid correspondences","volume":"abs\/2005.02357","author":"Cohen","year":"2020","journal-title":"Comput. Res. Repos."},{"key":"10.1016\/j.neucom.2026.133347_bib0180","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"25508","article-title":"Unseen visual anomaly generation","author":"Sun","year":"2025"},{"key":"10.1016\/j.neucom.2026.133347_bib0185","article-title":"Exposing outlier exposure: what can be learned from few, one, and zero outlier images","volume":"11","author":"Liznerski","year":"2022","journal-title":"IEEE Transactions on Machine Learning Research"},{"key":"10.1016\/j.neucom.2026.133347_bib0190","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"2978","article-title":"Fewsome: one-class few shot anomaly detection with siamese networks","author":"Belton","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0195","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"5564","article-title":"Zero-shot versus many-shot: unsupervised texture anomaly detection","author":"Aota","year":"2023"},{"key":"10.1016\/j.neucom.2026.133347_bib0200","doi-asserted-by":"crossref","DOI":"10.1016\/j.cviu.2024.103958","article-title":"Maeday: MAE for few and zero shot anomaly-detection","volume":"241","author":"Schwartz","year":"2024","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.neucom.2026.133347_bib0205","first-page":"1030","article-title":"A method of defect sample image generation based on point set matching","volume":"18","author":"Gao","year":"2023","journal-title":"CAAI Trans. Intell. Syst."},{"key":"10.1016\/j.neucom.2026.133347_bib0210","doi-asserted-by":"crossref","first-page":"24367","DOI":"10.1007\/s11042-020-09101-3","article-title":"A portrait photo-to-tattoo transform based on digital tattooing","volume":"79","author":"Xu","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"10.1016\/j.neucom.2026.133347_bib0215","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TCSVT.2021.3056725","article-title":"Learning a deep multi-scale feature ensemble and an edge-attention guidance for image fusion","volume":"32","author":"Liu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.neucom.2026.133347_bib0220","doi-asserted-by":"crossref","first-page":"11380","DOI":"10.1109\/TII.2022.3233674","article-title":"Speed: semantic prior and extremely efficient dilated convolution network for real-time metal surface defects detection","volume":"19","author":"Guo","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.neucom.2026.133347_bib0225","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9592","article-title":"Mvtec-Ad: a comprehensive real-world dataset for unsupervised anomaly detection","author":"Bergmann","year":"2019"},{"key":"10.1016\/j.neucom.2026.133347_bib0230","series-title":"International Congress on Ultra Modern Telecommunications and Control Systems and Workshops","first-page":"66","article-title":"Deep learning-based defect detection of metal parts: evaluating current methods in complex conditions","author":"Jezek","year":"2021"},{"key":"10.1016\/j.neucom.2026.133347_bib0235","series-title":"Proceedings of the IEEE\/CVF European Conference on Computer Vision","first-page":"454","article-title":"Learning to detect multi-class anomalies with just one normal image prompt","author":"Gao","year":"2024"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007447?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226007447?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:25:16Z","timestamp":1777577116000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226007447"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":47,"alternative-id":["S0925231226007447"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133347","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Registration generation amalgamation network for few-shot anomaly detection","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133347","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"133347"}}