{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:46:05Z","timestamp":1730220365585,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/etfa45728.2021.9613387","type":"proceedings-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T19:13:36Z","timestamp":1638299616000},"page":"01-04","source":"Crossref","is-referenced-by-count":1,"title":["Leveraging pre-trained Segmentation Networks for Anomaly Segmentation"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Rippel","sequence":"first","affiliation":[]},{"given":"Dorit","family":"Merhof","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Padim: a patch distribution modeling framework for anomaly detection and localization","author":"defard","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref11","article-title":"Explainable deep one-class classification","author":"liznerski","year":"0","journal-title":"International Conference on Learning Representations"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"ref13","first-page":"1","article-title":"Deep high-resolution representation learning for visual recognition","author":"wang","year":"2020","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref14","article-title":"An analysis of pretraining on object detection","author":"li","year":"2019","journal-title":"ArXiv Preprint"},{"key":"ref15","first-page":"3833","article-title":"Rethinking pre-training and self-training","volume":"33","author":"zoph","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00277"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-009-0275-4"},{"key":"ref18","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume":"97","author":"tan","year":"2019","journal-title":"Proceedings of the 36th International Conference on Machine Learning ICML 2019 9&#x2013;15 June 2019 Long Beach California USA ser Proceedings of Machine Learning Research"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00720"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3052449"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01400-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR48806.2021.9412109"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1995.1017"},{"key":"ref9","article-title":"Sub-image anomaly detection with deep pyramid correspondences","author":"cohen","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2172\/1055636"},{"key":"ref20","first-page":"7167","article-title":"A simple unified framework for detecting out-of-distribution samples and adversarial attacks","author":"lee","year":"2018","journal-title":"Advances in neural information processing systems"},{"key":"ref22","article-title":"On the generalized distance in statistics","author":"mahalanobis","year":"1936","journal-title":"P Nat Inst Sci India"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613298"},{"key":"ref24","first-page":"107706","article-title":"Reconstruction by inpainting for visual anomaly detection","author":"zavrtanik","year":"2020","journal-title":"Pattern Recognition"},{"key":"ref23","first-page":"657","article-title":"A coherent interpretation of AUC as a measure of aggregated classification performance","author":"ferri","year":"0","journal-title":"Proceedings of the 28th International Conference on Machine Learning (ICML-11)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00867"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58520-4_29"}],"event":{"name":"2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2021,9,7]]},"location":"Vasteras, Sweden","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9613137\/9613141\/09613387.pdf?arnumber=9613387","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:52:33Z","timestamp":1652187153000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613387\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/etfa45728.2021.9613387","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}