{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:56:53Z","timestamp":1775066213699,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China award","award":["62206122,82261138629,62302309"],"award-info":[{"award-number":["62206122,82261138629,62302309"]}]},{"name":"Guangdong Provincial Key Laboratory award","award":["2023B1212060076"],"award-info":[{"award-number":["2023B1212060076"]}]},{"name":"Internal Fund of National Engineering Laboratory for Big Data System Computing Technology award","award":["SZU-BDSC-IF2024-08"],"award-info":[{"award-number":["SZU-BDSC-IF2024-08"]}]},{"name":"Tencent Rhinoceros Birds - Scientific Research Foundation for Young Teachers of Shenzhen University award"},{"name":"Shenzhen Municipal Science and Technology Innovation Council award","award":["JCYJ20220531101412030"],"award-info":[{"award-number":["JCYJ20220531101412030"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3680919","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:49Z","timestamp":1729925989000},"page":"4680-4689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5980-4501","authenticated-orcid":false,"given":"Hongze","family":"Zhu","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9820-0478","authenticated-orcid":false,"given":"Guoyang","family":"Xie","sequence":"additional","affiliation":[{"name":"Department of Computer Science, City University of Hong Kong &amp; Department of Intelligent Manufacturing, CATL, Hong Kong SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6648-793X","authenticated-orcid":false,"given":"Chengbin","family":"Hou","sequence":"additional","affiliation":[{"name":"Fuzhou Fuyao Institute for Advanced Study, Fuyao University of Science and Technology, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0594-6404","authenticated-orcid":false,"given":"Tao","family":"Dai","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4519-5089","authenticated-orcid":false,"given":"Can","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5916-8965","authenticated-orcid":false,"given":"Jinbao","family":"Wang","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University &amp; Guangdong Provincial Key Laboratory of Intelligent Information Processing, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1420-0815","authenticated-orcid":false,"given":"Linlin","family":"Shen","sequence":"additional","affiliation":[{"name":"Shenzhen University &amp; Shenzhen Institute of Artificial Intelligence and Robotics for Society, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00967"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00982"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00424"},{"key":"e_1_3_2_1_4_1","volume-title":"The mvtec 3d-ad dataset for unsupervised 3d anomaly detection and localization. arXiv preprint arXiv:2112.09045","author":"Bergmann Paul","year":"2021","unstructured":"Paul Bergmann, Xin Jin, David Sattlegger, and Carsten Steger. 2021. The mvtec 3d-ad dataset for unsupervised 3d anomaly detection and localization. arXiv preprint arXiv:2112.09045 (2021)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00264"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Asian Conference on Computer Vision. 3586--3602","author":"Bonfiglioli Luca","year":"2022","unstructured":"Luca Bonfiglioli, Marco Toschi, Davide Silvestri, Nicola Fioraio, and Daniele De Gregorio. 2022. The eyecandies dataset for unsupervised multimodal anomaly detection and localization. In Proceedings of the Asian Conference on Computer Vision. 3586--3602."},{"key":"e_1_3_2_1_7_1","volume-title":"International conference on learning representations.","author":"Cai Xingyu","year":"2020","unstructured":"Xingyu Cai, Jiaji Huang, Yuchen Bian, and Kenneth Church. 2020. Isotropy in the contextual embedding space: Clusters and manifolds. In International conference on learning representations."},{"key":"e_1_3_2_1_8_1","volume-title":"andWeiming Shen","author":"Cao Yunkang","year":"2023","unstructured":"Yunkang Cao, Xiaohao Xu, andWeiming Shen. 2023. Complementary pseudo multimodal feature for point cloud anomaly detection. arXiv preprint arXiv:2303.13194 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3611876"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00951"},{"key":"e_1_3_2_1_12_1","volume-title":"How contextual are contextualized word representations? Comparing the geometry of BERT, ELMo, and GPT-2 embeddings. arXiv preprint arXiv:1909.00512","author":"Ethayarajh Kawin","year":"2019","unstructured":"Kawin Ethayarajh. 2019. How contextual are contextualized word representations? Comparing the geometry of BERT, ELMo, and GPT-2 embeddings. arXiv preprint arXiv:1909.00512 (2019)."},{"key":"e_1_3_2_1_13_1","volume-title":"Representation degeneration problem in training natural language generation models. arXiv preprint arXiv:1907.12009","author":"Gao Jun","year":"2019","unstructured":"Jun Gao, Di He, Xu Tan, Tao Qin, Liwei Wang, and Tie-Yan Liu. 2019. Representation degeneration problem in training natural language generation models. arXiv preprint arXiv:1907.12009 (2019)."},{"key":"e_1_3_2_1_14_1","volume-title":"Simcse: Simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821","author":"Gao Tianyu","year":"2021","unstructured":"Tianyu Gao, Xingcheng Yao, and Danqi Chen. 2021. Simcse: Simple contrastive learning of sentence embeddings. arXiv preprint arXiv:2104.08821 (2021)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"e_1_3_2_1_16_1","volume-title":"Deep learning for 3d point clouds: A survey","author":"Guo Yulan","year":"2020","unstructured":"Yulan Guo, Hanyun Wang, Qingyong Hu, Hao Liu, Li Liu, and Mohammed Bennamoun. 2020. Deep learning for 3d point clouds: A survey. IEEE transactions on pattern analysis and machine intelligence 43, 12 (2020), 4338--4364."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00298"},{"key":"e_1_3_2_1_18_1","first-page":"15433","article-title":"Softpatch: Unsupervised anomaly detection with noisy data","volume":"35","author":"Jiang Xi","year":"2022","unstructured":"Xi Jiang, Jianlin Liu, Jinbao Wang, Qiang Nie, Kai Wu, Yong Liu, Chengjie Wang, and Feng Zheng. 2022. Softpatch: Unsupervised anomaly detection with noisy data. Advances in Neural Information Processing Systems 35 (2022), 15433--15445.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01359"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00954"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.02096"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548232"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20040"},{"key":"e_1_3_2_1_24_1","volume-title":"Real3d-ad: A dataset of point cloud anomaly detection. Advances in Neural Information Processing Systems 36","author":"Liu Jiaqi","year":"2024","unstructured":"Jiaqi Liu, Guoyang Xie, Ruitao Chen, Xinpeng Li, JinbaoWang, Yong Liu, Chengjie Wang, and Feng Zheng. 2024. Real3d-ad: A dataset of point cloud anomaly detection. Advances in Neural Information Processing Systems 36 (2024)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-023-1459-z"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00914"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01954"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the fifth Berkeley symposium on mathematical statistics and probability","volume":"1","author":"James","unstructured":"James MacQueen et al. 1967. Some methods for classification and analysis of multivariate observations. In Proceedings of the fifth Berkeley symposium on mathematical statistics and probability, Vol. 1. Oakland, CA, USA, 281--297."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01392"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00195"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00262"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152473"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01466"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19821-2_27"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/336\/1\/012017"},{"key":"e_1_3_2_1_36_1","volume-title":"Student-teacher feature pyramid matching for anomaly detection. arXiv preprint arXiv:2103.04257","author":"Wang Guodong","year":"2021","unstructured":"Guodong Wang, Shumin Han, Errui Ding, and Di Huang. 2021. Student-teacher feature pyramid matching for anomaly detection. arXiv preprint arXiv:2103.04257 (2021)."},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Learning Representations.","author":"Wang Lingxiao","year":"2019","unstructured":"Lingxiao Wang, Jing Huang, Kevin Huang, Ziniu Hu, Guangtao Wang, and Quanquan Gu. 2019. Improving neural language generation with spectrum control. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00776"},{"key":"e_1_3_2_1_39_1","volume-title":"Im-iad: Industrial image anomaly detection benchmark in manufacturing","author":"Xie Guoyang","year":"2024","unstructured":"Guoyang Xie, Jinbao Wang, Jiaqi Liu, Jiayi Lyu, Yong Liu, Chengjie Wang, Feng Zheng, and Yaochu Jin. 2024. Im-iad: Industrial image anomaly detection benchmark in manufacturing. IEEE Transactions on Cybernetics (2024)."},{"key":"e_1_3_2_1_40_1","volume-title":"Pushing the limits of fewshot anomaly detection in industry vision: Graphcore. arXiv preprint arXiv:2301.12082","author":"Xie Guoyang","year":"2023","unstructured":"Guoyang Xie, Jinbao Wang, Jiaqi Liu, Feng Zheng, and Yaochu Jin. 2023. Pushing the limits of fewshot anomaly detection in industry vision: Graphcore. arXiv preprint arXiv:2301.12082 (2023)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00822"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19821-2_31"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1088\/1361--6501"}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3680919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:34Z","timestamp":1750295854000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3680919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":43,"alternative-id":["10.1145\/3664647.3680919","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3680919","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}