{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T06:04:36Z","timestamp":1775369076351,"version":"3.50.1"},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62001394"],"award-info":[{"award-number":["62001394"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962027"],"award-info":[{"award-number":["61962027"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62206244"],"award-info":[{"award-number":["62206244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62273353"],"award-info":[{"award-number":["62273353"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19B2037"],"award-info":[{"award-number":["U19B2037"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Key Program of the Ministry of Science and Technology of the People\u2019s Republic of China","doi-asserted-by":"publisher","award":["2022ZD-0118700"],"award-info":[{"award-number":["2022ZD-0118700"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Image Process."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tip.2024.3448263","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:53:47Z","timestamp":1726080827000},"page":"5606-5621","source":"Crossref","is-referenced-by-count":24,"title":["Target Before Shooting: Accurate Anomaly Detection and Localization Under One Millisecond via Cascade Patch Retrieval"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-1833","authenticated-orcid":false,"given":"Hanxi","family":"Li","sequence":"first","affiliation":[{"name":"College of Computer and Information Engineering, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6689-9438","authenticated-orcid":false,"given":"Jianfei","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer and Information Engineering, Jiangxi Normal University, Nanchang, Jiangxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-4088-1578","authenticated-orcid":false,"given":"Bo","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronics and Information, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4417-614X","authenticated-orcid":false,"given":"Hao","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3631-7929","authenticated-orcid":false,"given":"Yongbin","family":"Zheng","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Chunhua","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]}],"member":"263","reference":[{"issue":"3","key":"ref1","first-page":"582","article-title":"Support vector method for novelty detection","volume-title":"Proc. Adv. Neural Inform. Process. Syst.","volume":"12","author":"Scholkopf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"ref3","first-page":"4390","article-title":"Deep one-class classification","volume-title":"Proc. AAAI Conf. Artif. Intell.","volume":"80","author":"Ruff"},{"key":"ref4","first-page":"1","article-title":"Patch SVDD: Patch-level SVDD for anomaly detection and segmentation","volume-title":"Proc. ACCV","author":"Yi"},{"key":"ref5","first-page":"1","article-title":"Explainable deep one-class classification","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Liznerski"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3130074"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.11.030"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19915"},{"key":"ref10","article-title":"NICE: Non-linear independent components estimation","author":"Dinh","year":"2014","journal-title":"arXiv:1410.8516"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"ref12","article-title":"FastFlow: Unsupervised anomaly detection and localization via 2D normalizing flows","author":"Yu","year":"2021","journal-title":"arXiv:2111.07677"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-024-01193-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01359"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105835"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-022-01578-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00381"},{"key":"ref23","first-page":"1","article-title":"Deep autoencoding Gaussian mixture model for unsupervised anomaly detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zong"},{"key":"ref24","article-title":"Anomaly localization by modeling perceptual features","author":"Dehaene","year":"2020","journal-title":"arXiv:2008.05369"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.11.018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00867"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00433"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"ref29","article-title":"FAPM: Fast adaptive patch memory for real-time industrial anomaly detection","author":"Kim","year":"2022","journal-title":"arXiv:2211.07381"},{"key":"ref30","article-title":"PNI: Industrial anomaly detection using position and neighborhood information","author":"Bae","year":"2022","journal-title":"arXiv:2211.12634"},{"key":"ref31","article-title":"Pushing the limits of fewshot anomaly detection in industry vision: Graphcore","author":"Xie","year":"2023","journal-title":"arXiv:2301.12082"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1541\/ieejjia.21013871"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/CCC55666.2022.9902712"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859925"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01169"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"ref38","first-page":"8748","article-title":"Learning transferable visual models from natural language supervision","volume-title":"Proc. AAAI Conf. Artif. Intell.","author":"Radford"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00371"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01878"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00113"},{"key":"ref42","article-title":"AnomalyCLIP: Object-agnostic prompt learning for zero-shot anomaly detection","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Zhou"},{"key":"ref43","article-title":"ClipSAM: CLIP and SAM collaboration for zero-shot anomaly segmentation","author":"Li","year":"2024","journal-title":"arXiv:2401.12665"},{"key":"ref44","article-title":"Winning solution for the CVPR2023 visual anomaly and novelty detection challenge: Multimodal prompting for data-centric anomaly detection","author":"Cao","year":"2023","journal-title":"arXiv:2306.09067"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3468464"},{"key":"ref46","article-title":"Segment any anomaly without training via hybrid prompt regularization","author":"Cao","year":"2023","journal-title":"arXiv:2305.10724"},{"key":"ref47","article-title":"Segment anything in defect detection","author":"Hu","year":"2023","journal-title":"arXiv:2311.10245"},{"key":"ref48","article-title":"A SAM-guided two-stream lightweight model for anomaly detection","author":"Li","year":"2024","journal-title":"arXiv:2402.19145"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3218591"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46604-0_48"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301272"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.12231"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.572"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46466-4_15"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01189"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-016-0889-2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3078971.3078987"},{"key":"ref58","article-title":"Deep region hashing for efficient large-scale instance search from images","author":"Song","year":"2017","journal-title":"arXiv:1701.07901"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2017.2666812"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0810-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00525"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011113216584"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00707"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2926748"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00313"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2670143"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2934350"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3068644"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01487"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref71","article-title":"The MVTec 3D-AD dataset for unsupervised 3D anomaly detection and localization","author":"Bergmann","year":"2021","journal-title":"arXiv:2112.09045"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE45552.2021.9576231"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.100"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01562"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00776"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02346"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref79","article-title":"Decoupled weight decay regularization","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Loshchilov"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0118432"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00724"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01321"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3241579"},{"key":"ref85","article-title":"Efficient anomaly detection with budget annotation using semi-supervised residual transformer","author":"Li","year":"2023","journal-title":"arXiv:2306.03492"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00262"},{"key":"ref88","article-title":"Explainable deep few-shot anomaly detection with deviation networks","author":"Pang","year":"2021","journal-title":"arXiv:2108.00462"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.11929"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00310"},{"key":"ref92","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"97","author":"Tan"},{"issue":"4","key":"ref93","first-page":"5","article-title":"8-bit inference with tensorrt","volume-title":"Proc. GPU Technol. Conf.","volume":"2","author":"Migacz"},{"key":"ref94","first-page":"8024","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. NIPS","author":"Paszke"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"ref96","first-page":"1","article-title":"Unicom: Universal and compact representation learning for image retrieval","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"An"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01668"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2023.102930"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19842-7_15"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00373"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW60793.2023.00439"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01506"},{"key":"ref103","first-page":"1","article-title":"Maskomaly: Zero-shot mask anomaly segmentation","volume-title":"Proc. Brit. Mach. Vis. Conf.","author":"Ackermann"}],"container-title":["IEEE Transactions on Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/83\/10346232\/10678861.pdf?arnumber=10678861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T17:31:44Z","timestamp":1728581504000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10678861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/tip.2024.3448263","relation":{},"ISSN":["1057-7149","1941-0042"],"issn-type":[{"value":"1057-7149","type":"print"},{"value":"1941-0042","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}