{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:29:12Z","timestamp":1770917352240,"version":"3.50.1"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20482"],"award-info":[{"award-number":["U21A20482"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62303458"],"award-info":[{"award-number":["62303458"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62303461"],"award-info":[{"award-number":["62303461"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076240"],"award-info":[{"award-number":["62076240"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4222054"],"award-info":[{"award-number":["4222054"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["Y2023143"],"award-info":[{"award-number":["Y2023143"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Circuits Syst. Video Technol."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tcsvt.2024.3420775","type":"journal-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T18:47:16Z","timestamp":1719600436000},"page":"11751-11767","source":"Crossref","is-referenced-by-count":11,"title":["Produce Once, Utilize Twice for Anomaly Detection"],"prefix":"10.1109","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8892-2266","authenticated-orcid":false,"given":"Shuyuan","family":"Wang","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Automation, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7905-2860","authenticated-orcid":false,"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Automation, Beijing, China"}]},{"given":"Huiyuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Automation, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5319-1363","authenticated-orcid":false,"given":"Chengkan","family":"Lv","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Automation, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1659-7879","authenticated-orcid":false,"given":"Zhengtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, Institute of Automation, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i4.16420"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69544-6_23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00829"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00838"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref15","article-title":"Sub-image anomaly detection with deep pyramid correspondences","author":"Cohen","year":"2020","journal-title":"arXiv:2005.02357"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20056-4_23"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19821-2_31"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107706"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3322604"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3237562"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3327448"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3221622"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3211839"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3314801"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3190539"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3218587"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3297114"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2020.3039798"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3300458"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2020.3038413"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00150"},{"key":"ref39","first-page":"4393","article-title":"Deep one-class classification","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ruff"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"ref41","first-page":"1","article-title":"Glow: Generative flow with invertible 1\u00d71 convolutions","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Kingma"},{"key":"ref42","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref43","article-title":"Multi-scale memory comparison for zero-\/few-shot anomaly detection","author":"Huang","year":"2023","journal-title":"arXiv:2308.04789"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/325165.325247"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06430-2_33"},{"key":"ref47","volume-title":"Weakly Supervised Learning for Industrial Optical Inspection","author":"Wieler","year":"2007"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IROS47612.2022.9981509"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851808"},{"key":"ref50","article-title":"Iterative energy-based projection on a normal data manifold for anomaly localization","author":"Dehaene","year":"2020","journal-title":"arXiv:2002.03734"},{"key":"ref51","article-title":"DeSTSeg: Segmentation guided denoising student-teacher for anomaly detection","author":"Zhang","year":"2022","journal-title":"arXiv:2211.11317"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105835"},{"key":"ref53","first-page":"1","article-title":"Explainable deep one-class classification","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Liznerski"},{"key":"ref54","article-title":"Generalized out-of-distribution detection: A survey","author":"Yang","year":"2021","journal-title":"arXiv:2110.11334"},{"key":"ref55","article-title":"ReContrast: Domain-specific anomaly detection via contrastive reconstruction","author":"Guo","year":"2023","journal-title":"arXiv:2306.02602"},{"key":"ref56","article-title":"Reconstruction from edge image combined with color and gradient difference for industrial surface anomaly detection","author":"Liu","year":"2022","journal-title":"arXiv:2210.14485"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103459"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-023-1459-z"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3175888"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2023.3343937"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3349132"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3127716"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3159538"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3122801"},{"key":"ref65","first-page":"4571","article-title":"A unified model for multi-class anomaly detection","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"You"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01688"},{"key":"ref67","article-title":"Towards generic anomaly detection and understanding: Large-scale visual-linguistic model (GPT-4V) takes the lead","author":"Cao","year":"2023","journal-title":"arXiv:2311.02782"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT54235.2021.9631567"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00398"}],"container-title":["IEEE Transactions on Circuits and Systems for Video Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/76\/10768851\/10577185.pdf?arnumber=10577185","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:50:04Z","timestamp":1732737004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10577185\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":71,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcsvt.2024.3420775","relation":{},"ISSN":["1051-8215","1558-2205"],"issn-type":[{"value":"1051-8215","type":"print"},{"value":"1558-2205","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}