{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T20:13:05Z","timestamp":1777925585127,"version":"3.51.4"},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["52305590"],"award-info":[{"award-number":["52305590"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62576313"],"award-info":[{"award-number":["62576313"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62501532"],"award-info":[{"award-number":["62501532"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100022963","name":"Key Research and Development Program of Zhejiang Province","doi-asserted-by":"publisher","award":["2026C01016"],"award-info":[{"award-number":["2026C01016"]}],"id":[{"id":"10.13039\/100022963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Province Natural Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Neural Networks"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.neunet.2026.108859","type":"journal-article","created":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T16:10:00Z","timestamp":1773504600000},"page":"108859","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Improving anomaly detection with foundation-model synthesis and wavelet-domain attention"],"prefix":"10.1016","volume":"200","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2441-4393","authenticated-orcid":false,"given":"Wensheng","family":"Wu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1785-7847","authenticated-orcid":false,"given":"Zheming","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3579-9130","authenticated-orcid":false,"given":"Ziqian","family":"Lu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3324-1756","authenticated-orcid":false,"given":"Zewei","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3829-1942","authenticated-orcid":false,"given":"Xuecheng","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7144-1511","authenticated-orcid":false,"given":"Zhao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4361-956X","authenticated-orcid":false,"given":"Jungong","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0294-2099","authenticated-orcid":false,"given":"Yunlong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.neunet.2026.108859_bib0001","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F. L., Almeida, D., Altenschmidt, J., Altman, S., Anadkat, S. et al. (2023). GPT-4 technical report. arXiv Preprint arXiv: 2303.08774."},{"key":"10.1016\/j.neunet.2026.108859_bib0002","series-title":"IEEE\/CVF conference on computer vision and pattern recognition conference","first-page":"128","article-title":"Efficientad: Accurate visual anomaly detection at millisecond-level latencies","author":"Batzner","year":"2024"},{"key":"10.1016\/j.neunet.2026.108859_bib0003","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"9592","article-title":"MVTec ad-a comprehensive real-world dataset for unsupervised anomaly detection","author":"Bergmann","year":"2019"},{"key":"10.1016\/j.neunet.2026.108859_bib0004","series-title":"Proc. AAAI conf. artif. intell.","first-page":"801","article-title":"Learning generalized segmentation for foggy-scenes by bi-directional wavelet guidance","volume":"vol. 38","author":"Bi","year":"2024"},{"issue":"11","key":"10.1016\/j.neunet.2026.108859_bib0005","doi-asserted-by":"crossref","first-page":"10674","DOI":"10.1109\/TII.2023.3241579","article-title":"Collaborative discrepancy optimization for reliable image anomaly localization","volume":"19","author":"Cao","year":"2023","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"10.1016\/j.neunet.2026.108859_bib0006","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.1109\/TIP.2007.894242","article-title":"Direction-adaptive discrete wavelet transform for image compression","volume":"16","author":"Chang","year":"2007","journal-title":"IEEE Transactions on Image Processing"},{"key":"10.1016\/j.neunet.2026.108859_bib0007","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.neunet.2021.12.008","article-title":"Utrad: Anomaly detection and localization with u-transformer","volume":"147","author":"Chen","year":"2022","journal-title":"Neural Networks"},{"key":"10.1016\/j.neunet.2026.108859_bib0008","series-title":"Proc. eur. conf. comput. vis.","first-page":"37","article-title":"A unified anomaly synthesis strategy with gradient ascent for industrial anomaly detection and localization","author":"Chen","year":"2024"},{"key":"10.1016\/j.neunet.2026.108859_bib0009","series-title":"Int. conf. pattern recognit.","first-page":"475","article-title":"Padim: A patch distribution modeling framework for anomaly detection and localization","author":"Defard","year":"2021"},{"key":"10.1016\/j.neunet.2026.108859_bib0010","series-title":"Proc. int. conf. learn. represent.","article-title":"An image is worth 16x16 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2021"},{"key":"10.1016\/j.neunet.2026.108859_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.optlaseng.2024.108457","article-title":"Efficient visual anomaly detection model with adaptive wavelet transform","volume":"182","author":"Du","year":"2024","journal-title":"Optics and Lasers in Engineering"},{"key":"10.1016\/j.neunet.2026.108859_bib0012","series-title":"Proc. AAAI conf. artif. intell.","first-page":"571","article-title":"Few-shot defect image generation via defect-aware feature manipulation","volume":"vol. 37","author":"Duan","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0013","series-title":"Proc. eur. conf. comput. vis.","first-page":"363","article-title":"Wavelet convolutions for large receptive fields","author":"Finder","year":"2024"},{"key":"10.1016\/j.neunet.2026.108859_bib0014","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijleo.2019.164123","article-title":"A wavelet transform-based image segmentation method","volume":"208","author":"Gao","year":"2020","journal-title":"Optik"},{"key":"10.1016\/j.neunet.2026.108859_bib0015","series-title":"Proc. IEEE\/CVF winter conf. appl. comput. vis.","first-page":"98","article-title":"CFLOW-ad: Real-time unsupervised anomaly detection with localization via conditional normalizing flows","author":"Gudovskiy","year":"2022"},{"key":"10.1016\/j.neunet.2026.108859_bib0016","series-title":"Proceedings of the IEEE\/CVF international conference on computer vision","first-page":"6447","article-title":"Template-guided hierarchical feature restoration for anomaly detection","author":"Guo","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0017","series-title":"Proceedings of the computer vision and pattern recognition conference","first-page":"20405","article-title":"Dinomaly: The less is more philosophy in multi-class unsupervised anomaly detection","author":"Guo","year":"2025"},{"issue":"3","key":"10.1016\/j.neunet.2026.108859_bib0018","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/s41095-022-0271-y","article-title":"Attention mechanisms in computer vision: A survey","volume":"8","author":"Guo","year":"2022","journal-title":"Computational Visual Media"},{"key":"10.1016\/j.neunet.2026.108859_bib0019","first-page":"71162","article-title":"Mambaad: Exploring state space models for multi-class unsupervised anomaly detection","volume":"37","author":"He","year":"2024","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108859_bib0020","first-page":"6626","article-title":"Gans trained by a two time-scale update rule converge to a local nash equilibrium","volume":"30","author":"Heusel","year":"2017","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.neunet.2026.108859_bib0021","series-title":"Proc. IEEE conf. comput. vis. pattern recognit.","first-page":"7132","article-title":"Squeeze-and-excitation networks","author":"Hu","year":"2018"},{"key":"10.1016\/j.neunet.2026.108859_bib0022","series-title":"Proc. AAAI conf. artif. intell.","first-page":"8526","article-title":"Anomalydiffusion: Few-shot anomaly image generation with diffusion model","volume":"vol. 38","author":"Hu","year":"2024"},{"issue":"4","key":"10.1016\/j.neunet.2026.108859_bib0023","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1007\/s11263-020-01421-z","article-title":"Selective wavelet attention learning for single image deraining","volume":"129","author":"Huang","year":"2021","journal-title":"International Journal of Computer Vision"},{"issue":"1","key":"10.1016\/j.neunet.2026.108859_bib0024","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TII.2024.3459612","article-title":"Unsupervised wind turbine blade damage detection with memory-aided denoising reconstruction","volume":"21","author":"Jia","year":"2025","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.neunet.2026.108859_bib0025","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2025.107439","article-title":"Localize-diffusion based dual-branch anomaly detection","volume":"188","author":"Jiang","year":"2025","journal-title":"Neural Networks"},{"issue":"2","key":"10.1016\/j.neunet.2026.108859_bib0026","doi-asserted-by":"crossref","first-page":"2200","DOI":"10.1109\/TII.2022.3199228","article-title":"Masked swin transformer unet for industrial anomaly detection","volume":"19","author":"Jiang","year":"2022","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10.1016\/j.neunet.2026.108859_bib0027","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"4015","article-title":"Segment anything","author":"Kirillov","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0028","series-title":"2014 11th int. comput. conf. wavelet active media technol. inf. process.","first-page":"261","article-title":"Image edge detection scheme using wavelet transform","author":"Kumar","year":"2014"},{"key":"10.1016\/j.neunet.2026.108859_bib0029","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"9664","article-title":"CutPaste: Self-supervised learning for anomaly detection and localization","author":"Li","year":"2021"},{"key":"10.1016\/j.neunet.2026.108859_bib0030","series-title":"Proc. IEEE conf. comput. vis. pattern recognit. workshops","first-page":"773","article-title":"Multi-level wavelet-CNN for image restoration","author":"Liu","year":"2018"},{"key":"10.1016\/j.neunet.2026.108859_bib0031","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"20402","article-title":"SimpleNet: A simple network for image anomaly detection and localization","author":"Liu","year":"2023"},{"issue":"3","key":"10.1016\/j.neunet.2026.108859_bib0032","first-page":"1611","article-title":"Defect image sample generation with GAN for improving defect recognition","volume":"17","author":"Niu","year":"2020","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"key":"10.1016\/j.neunet.2026.108859_bib0033","doi-asserted-by":"crossref","DOI":"10.1016\/j.neunet.2024.106788","article-title":"Context-aware feature reconstruction for class-incremental anomaly detection and localization","volume":"181","author":"Pang","year":"2025","journal-title":"Neural Networks"},{"key":"10.1016\/j.neunet.2026.108859_bib0034","series-title":"Proc. 12th int. conf. learn. represent.","article-title":"SDXL: Improving latent diffusion models for high-resolution image synthesis","author":"Podell","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0035","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"13576","article-title":"Self-supervised predictive convolutional attentive block for anomaly detection","author":"Ristea","year":"2022"},{"key":"10.1016\/j.neunet.2026.108859_bib0036","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"14318","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"2022"},{"key":"10.1016\/j.neunet.2026.108859_bib0037","series-title":"Proc. IEEE\/CVF winter conf. appl. comput. vis.","first-page":"2592","article-title":"Asymmetric student-teacher networks for industrial anomaly detection","author":"Rudolph","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0038","series-title":"Proc. eur. conf. comput. vis.","first-page":"474","article-title":"Natural synthetic anomalies for self-supervised anomaly detection and localization","author":"Schl\u00fcter","year":"2022"},{"key":"10.1016\/j.neunet.2026.108859_bib0039","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.109050","article-title":"Multi-stage image denoising with the wavelet transform","volume":"134","author":"Tian","year":"2023","journal-title":"Pattern Recognition"},{"key":"10.1016\/j.neunet.2026.108859_bib0040","doi-asserted-by":"crossref","unstructured":"Tien, T. D., Nguyen, A. T., Tran, N. H., Huy, T. D., Duong, S., Nguyen, C. D. T., & Truong, S. Q. H. (2023). Revisiting reverse distillation for anomaly detection. In Proceedings of the IEEE\/CVF Computer Vision and Pattern Recognition Conference (pp. 24511\u201324520).","DOI":"10.1109\/CVPR52729.2023.02348"},{"key":"10.1016\/j.neunet.2026.108859_bib0041","series-title":"Proc. eur. conf. comput. vis.","first-page":"3","article-title":"Cbam: Convolutional block attention module","author":"Woo","year":"2018"},{"key":"10.1016\/j.neunet.2026.108859_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.105835","article-title":"MemSeg: A semi-supervised method for image surface defect detection using differences and commonalities","volume":"119","author":"Yang","year":"2023","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"4","key":"10.1016\/j.neunet.2026.108859_bib0043","doi-asserted-by":"crossref","first-page":"1899","DOI":"10.1109\/TCSVT.2022.3218735","article-title":"Dual wavelet attention networks for image classification","volume":"33","author":"Yang","year":"2022","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.1016\/j.neunet.2026.108859_bib0044","series-title":"Proc. eur. conf. comput. vis.","first-page":"1","article-title":"Glad: Towards better reconstruction with global and local adaptive diffusion models for unsupervised anomaly detection","author":"Yao","year":"2024"},{"key":"10.1016\/j.neunet.2026.108859_bib0045","series-title":"Proc. IEEE\/CVF int. conf. comput. vis.","first-page":"8330","article-title":"Draem-a discriminatively trained reconstruction embedding for surface anomaly detection","author":"Zavrtanik","year":"2021"},{"key":"10.1016\/j.neunet.2026.108859_bib0046","series-title":"Proc. IEEE\/CVF winter conf. appl. comput. vis.","first-page":"2524","article-title":"Defect-GAN: High-fidelity defect synthesis for automated defect inspection","author":"Zhang","year":"2021"},{"key":"10.1016\/j.neunet.2026.108859_bib0047","series-title":"Proceedings of the IEEE computer vision and pattern recognition conference","first-page":"586","article-title":"The unreasonable effectiveness of deep features as a perceptual metric","author":"Zhang","year":"2018"},{"key":"10.1016\/j.neunet.2026.108859_bib0048","doi-asserted-by":"crossref","first-page":"8813","DOI":"10.1109\/JSTARS.2025.3551093","article-title":"STWANet: Spatio-temporal wavelet attention aggregation network for remote sensing change detection","volume":"18","author":"Zhang","year":"2025","journal-title":"IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing"},{"key":"10.1016\/j.neunet.2026.108859_bib0049","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"16699","article-title":"RealNet: A feature selection network with realistic synthetic anomaly for anomaly detection","author":"Zhang","year":"2024"},{"issue":"3","key":"10.1016\/j.neunet.2026.108859_bib0050","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1007\/s00530-022-00889-8","article-title":"Wavelet-attention CNN for image classification","volume":"28","author":"Zhao","year":"2022","journal-title":"Multimedia Systems"},{"key":"10.1016\/j.neunet.2026.108859_bib0051","series-title":"IEEE\/CVF Conference on computer vision and pattern recognition conference","first-page":"3924","article-title":"Omnial: A unified CNN framework for unsupervised anomaly localization","author":"Zhao","year":"2023"},{"key":"10.1016\/j.neunet.2026.108859_bib0052","series-title":"Proc. eur. conf. comput. vis.","first-page":"392","article-title":"Spot-the-difference self-supervised pre-training for anomaly detection and segmentation","author":"Zou","year":"2022"}],"container-title":["Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608026003205?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0893608026003205?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T21:49:58Z","timestamp":1777672198000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0893608026003205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":52,"alternative-id":["S0893608026003205"],"URL":"https:\/\/doi.org\/10.1016\/j.neunet.2026.108859","relation":{},"ISSN":["0893-6080"],"issn-type":[{"value":"0893-6080","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Improving anomaly detection with foundation-model synthesis and wavelet-domain attention","name":"articletitle","label":"Article Title"},{"value":"Neural Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.neunet.2026.108859","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108859"}}