{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:26:52Z","timestamp":1770917212325,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62033012"],"award-info":[{"award-number":["62033012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1109\/tai.2024.3385743","type":"journal-article","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T14:56:20Z","timestamp":1712328980000},"page":"4550-4561","source":"Crossref","is-referenced-by-count":2,"title":["Prioritized Local Matching Network for Cross-Category Few-Shot Anomaly Detection"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-8944-1135","authenticated-orcid":false,"given":"Huilin","family":"Deng","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0744-2074","authenticated-orcid":false,"given":"Hongchen","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5695-8291","authenticated-orcid":false,"given":"Wei","family":"Zhai","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9184-5313","authenticated-orcid":false,"given":"Yanming","family":"Guo","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2891-4379","authenticated-orcid":false,"given":"Yang","family":"Cao","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8706-3252","authenticated-orcid":false,"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, University of Science and Technology of China, Anhui, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3336590"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00495"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"ref6","article-title":"Pushing the limits of fewshot anomaly detection in industry vision: Graphcore","author":"Xie","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw59228.2023.00299"},{"key":"ref8","article-title":"Sub-image anomaly detection with deep pyramid correspondences","author":"Cohen","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00838"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_18"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2013.00668"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10803-005-0039-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2008.0337"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3470794"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00724"},{"key":"ref17","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.,","author":"Ruff","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3227142"},{"key":"ref19","article-title":"Fastflow: Unsupervised anomaly detection and localization via 2D normalizing flows","author":"Yu","year":"2021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01953"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220042"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58598-3_45"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3205870"},{"issue":"4","key":"ref24","article-title":"Few-shot semantic segmentation with prototype learning","volume":"3","author":"Dong","year":"2018","journal-title":"BMVC"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00929"},{"key":"ref26","first-page":"21984","article-title":"Few-shot segmentation via cycle-consistent transformer","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Zhang","year":"2021"},{"key":"ref27","first-page":"6941","article-title":"Hypercorrelation squeeze for few-shot segmentation","volume-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis.","author":"Min","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref29","article-title":"Optimizing patchcore for few\/many-shot anomaly detection","author":"Santos","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3212346"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3159510"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2022.100182"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01177"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT54235.2021.9631567"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58545-7_9"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00974"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.01126"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1802.02611"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.660"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00403"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00766"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2838132"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref49","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1613\/jair.3623"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983149"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3275132"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3325230"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"ref55","article-title":"Anomalyclip: Object-agnostic prompt learning for zero-shot anomaly detection","author":"Zhou","year":"2023"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/419"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3298303"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9078688\/10673734\/10494062.pdf?arnumber=10494062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:26Z","timestamp":1755911366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10494062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":57,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tai.2024.3385743","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]}}}