{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T05:57:34Z","timestamp":1777874254760,"version":"3.51.4"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neurocomputing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.neucom.2026.133581","type":"journal-article","created":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T17:18:14Z","timestamp":1775841494000},"page":"133581","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A unified framework for image anomaly detection via reconstruction, segmentation and spatial relationship modeling"],"prefix":"10.1016","volume":"685","author":[{"given":"Ziniu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0427-1709","authenticated-orcid":false,"given":"Yuxi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Enrico","family":"Zio","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neucom.2026.133581_bib0005","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"128","article-title":"EfficientAD: accurate visual anomaly detection at millisecond-level latencies","author":"Batzner","year":"2024"},{"key":"10.1016\/j.neucom.2026.133581_bib0010","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"20402","article-title":"Simplenet: a simple network for image anomaly detection and localization","author":"Liu","year":"2023"},{"issue":"3","key":"10.1016\/j.neucom.2026.133581_bib0015","doi-asserted-by":"crossref","first-page":"3284","DOI":"10.1109\/TITS.2024.3522086","article-title":"CCLDet: a cross-modality and cross-domain low-light detector","volume":"26","author":"Shang","year":"2025","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.neucom.2026.133581_bib0020","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"14318","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"2022"},{"key":"10.1016\/j.neucom.2026.133581_bib0025","series-title":"European Conference on Computer Vision","first-page":"392","article-title":"Spot-the-difference self-supervised pre-training for anomaly detection and segmentation","author":"Zou","year":"2022"},{"key":"10.1016\/j.neucom.2026.133581_bib0030","series-title":"European Conference on Computer Vision","first-page":"37","article-title":"A unified anomaly synthesis strategy with gradient ascent for industrial anomaly detection and localization","author":"Chen","year":"2024"},{"key":"10.1016\/j.neucom.2026.133581_bib0035","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.129479","article-title":"A dual reverse distillation scheme for image anomaly detection","volume":"624","author":"Ge","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133581_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2025.131423","article-title":"KD-KI: knowledge distillation with knowledge infusion for anomaly detection and localization","author":"Huang","year":"2025","journal-title":"Neurocomputing"},{"key":"10.1016\/j.neucom.2026.133581_bib0045","series-title":"2024 IEEE International Conference on Image Processing (ICIP)","first-page":"842","article-title":"Puad: frustratingly simple method for robust anomaly detection","author":"Sugawara","year":"2024"},{"key":"10.1016\/j.neucom.2026.133581_bib0050","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"8591","article-title":"Few shot part segmentation reveals compositional logic for industrial anomaly detection","author":"Kim","year":"2024"},{"key":"10.1016\/j.neucom.2026.133581_bib0055","author":"Hsieh"},{"key":"10.1016\/j.neucom.2026.133581_bib0060","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9592","article-title":"MVTec AD\u2013a comprehensive real-world dataset for unsupervised anomaly detection","author":"Bergmann","year":"2019"},{"issue":"4","key":"10.1016\/j.neucom.2026.133581_bib0065","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1007\/s11263-022-01578-9","article-title":"Beyond dents and scratches: logical constraints in unsupervised anomaly detection and localization","volume":"130","author":"Bergmann","year":"2022","journal-title":"Int. J. Comput. Vis."},{"key":"10.1016\/j.neucom.2026.133581_bib0070","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"9737","article-title":"Anomaly detection via reverse distillation from one-class embedding","author":"Deng","year":"2022"},{"key":"10.1016\/j.neucom.2026.133581_bib0075","author":"Bergmann"},{"key":"10.1016\/j.neucom.2026.133581_bib0080","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.108278","article-title":"A method for fault detection in multi-component systems based on sparse autoencoder-based deep neural networks","volume":"220","author":"Yang","year":"2022","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"10.1016\/j.neucom.2026.133581_bib0085","article-title":"Multiple object tracking in satellite video with graph-based multiclue fusion tracker","volume":"62","author":"Chen","year":"2024","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"10.1016\/j.neucom.2026.133581_bib0090","author":"Liu"},{"issue":"12","key":"10.1016\/j.neucom.2026.133581_bib0095","doi-asserted-by":"crossref","first-page":"23408","DOI":"10.1109\/TITS.2022.3203871","article-title":"Generative adversarial networks with adaboost ensemble learning for anomaly detection in high-speed train automatic doors","volume":"23","author":"Xu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.neucom.2026.133581_bib0100","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113826","article-title":"Efficient real-time visual anomaly detection via frequency-aware diffusion model and information fusion","author":"Yao","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.neucom.2026.133581_bib0105","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2023.102161","article-title":"Component-aware anomaly detection framework for adjustable and logical industrial visual inspection","volume":"58","author":"Liu","year":"2023","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.neucom.2026.133581_bib0110","author":"Zhang"},{"key":"10.1016\/j.neucom.2026.133581_bib0115","series-title":"Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Volume 1: Statistics","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","volume":"vol. 5","author":"MacQueen","year":"1967"},{"key":"10.1016\/j.neucom.2026.133581_bib0120","series-title":"Proceedings of the Computer Vision and Pattern Recognition Conference","first-page":"15204","article-title":"Towards training-free anomaly detection with vision and language foundation models","author":"Zhang","year":"2025"},{"key":"10.1016\/j.neucom.2026.133581_bib0125","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"4129","article-title":"Logicad: explainable anomaly detection via VLM-based text feature extraction","author":"Jin","year":"2025"},{"key":"10.1016\/j.neucom.2026.133581_bib0130","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113176","article-title":"SAM-LAD: segment anything model meets zero-shot logic anomaly detection","volume":"314","author":"Peng","year":"2025","journal-title":"Knowl.-based Syst."},{"key":"10.1016\/j.neucom.2026.133581_bib0135","series-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","first-page":"17826","article-title":"Toward generalist anomaly detection via in-context residual learning with few-shot sample prompts","author":"Zhu","year":"2024"},{"key":"10.1016\/j.neucom.2026.133581_bib0140","article-title":"Set features for anomaly detection","author":"Cohen","year":"2024","journal-title":"Trans. Mach. Learn. Res."},{"key":"10.1016\/j.neucom.2026.133581_bib0145","author":"Yu"},{"key":"10.1016\/j.neucom.2026.133581_bib0150","series-title":"Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision","first-page":"2592","article-title":"Asymmetric student-teacher networks for industrial anomaly detection","author":"Rudolph","year":"2023"}],"container-title":["Neurocomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226009781?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0925231226009781?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T19:25:20Z","timestamp":1777577120000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0925231226009781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":30,"alternative-id":["S0925231226009781"],"URL":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133581","relation":{},"ISSN":["0925-2312"],"issn-type":[{"value":"0925-2312","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A unified framework for image anomaly detection via reconstruction, segmentation and spatial relationship modeling","name":"articletitle","label":"Article Title"},{"value":"Neurocomputing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neucom.2026.133581","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"133581"}}