{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T18:39:00Z","timestamp":1771785540137,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Ningbo Science and Technology Innovation Project","award":["2022Z075"],"award-info":[{"award-number":["2022Z075"]}]},{"name":"Ningbo Science and Technology Innovation Project","award":["2023CX050006"],"award-info":[{"award-number":["2023CX050006"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802372"],"award-info":[{"award-number":["61802372"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Instrum. Meas."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tim.2024.3413170","type":"journal-article","created":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T17:34:59Z","timestamp":1718213699000},"page":"1-11","source":"Crossref","is-referenced-by-count":5,"title":["Patch Matching for Few-Shot Industrial Defect Detection"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6051-6803","authenticated-orcid":false,"given":"Ruiyun","family":"Chen","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering and the Key Laboratory of Mobile Network Application Technology of Zhejiang Province, Ningbo University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6952-3755","authenticated-orcid":false,"given":"Guitao","family":"Yu","sequence":"additional","affiliation":[{"name":"Healthy and Intelligent Kitchen Engineering Research Center of Zhejiang Province, Ningbo, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7267-3560","authenticated-orcid":false,"given":"Zhen","family":"Qin","sequence":"additional","affiliation":[{"name":"Healthy and Intelligent Kitchen Engineering Research Center of Zhejiang Province, Ningbo, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3563-5670","authenticated-orcid":false,"given":"Kangkang","family":"Song","sequence":"additional","affiliation":[{"name":"Ningbo Institute of Materials Technology and Engineering, Chinese Academy of Sciences, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-1391-8239","authenticated-orcid":false,"given":"Jianfei","family":"Tu","sequence":"additional","affiliation":[{"name":"College of Mechanical Engineering and Mechanics, Ningbo University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1211-2742","authenticated-orcid":false,"given":"Xianliang","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering and the Key Laboratory of Mobile Network Application Technology of Zhejiang Province, Ningbo University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4178-016X","authenticated-orcid":false,"given":"Dan","family":"Liang","sequence":"additional","affiliation":[{"name":"College of Mechanical Engineering and Mechanics, Ningbo University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7445-2638","authenticated-orcid":false,"given":"Chengbin","family":"Peng","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering and the Key Laboratory of Mobile Network Application Technology of Zhejiang Province, Ningbo University, Ningbo, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/28.871274"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IST48021.2019.9010098"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2019.2915404"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/VPPC46532.2019.8952236"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3268658"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2018.2873744"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/21642583.2023.2185916"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00433"},{"key":"ref10","article-title":"ESAD: End-to-end deep semi-supervised anomaly detection","author":"Huang","year":"2020","journal-title":"arXiv:2012.04905"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2355\/isijinternational.ISIJINT-2018-722"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2355\/isijinternational.ISIJINT-2023-118"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2021.3128208"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/s23187894"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/machines10060487"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3228392"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE45552.2021.9576231"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103459"},{"key":"ref23","article-title":"Iterative energybased projection on a normal data manifold for anomaly localization","author":"Dehaene","year":"2020","journal-title":"arXiv:2002.03734"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2019.01.010"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/wacv48630.2021.00032"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/iccv48922.2021.00867"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2021.3058147"},{"key":"ref29","article-title":"Improving unsupervised anomaly localization by applying multi-scale memories to autoencoders","author":"Yang","year":"2020","journal-title":"arXiv:2012.11113"},{"key":"ref30","article-title":"Clear memory-augmented auto-encoder for surface defect detection","author":"Luo","year":"2022","journal-title":"arXiv:2208.03879"},{"key":"ref31","article-title":"Deep nearest neighbor anomaly detection","author":"Bergman","year":"2020","journal-title":"arXiv:2002.10445"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00283"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2022.2094885"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1884\/1\/012024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_18"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330871"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00724"},{"key":"ref39","article-title":"Anomaly heterogeneity learning for open-set supervised anomaly detection","author":"Zhu","year":"2023","journal-title":"arXiv:2310.12790"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.00954"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i1.25132"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i8.28696"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.2014.461"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/325165.325247"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68449-5_36"},{"key":"ref49","article-title":"Explainable deep few-shot anomaly detection with deviation networks","author":"Pang","year":"2021","journal-title":"arXiv:2108.00462"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00113"}],"container-title":["IEEE Transactions on Instrumentation and Measurement"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/19\/10367905\/10555421.pdf?arnumber=10555421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T04:46:46Z","timestamp":1720241206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10555421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/tim.2024.3413170","relation":{},"ISSN":["0018-9456","1557-9662"],"issn-type":[{"value":"0018-9456","type":"print"},{"value":"1557-9662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}