{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T16:49:30Z","timestamp":1755794970693,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,3]]},"DOI":"10.1145\/3711896.3737122","type":"proceedings-article","created":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T21:07:39Z","timestamp":1754255259000},"page":"3622-3632","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Self-Tuning Self-Supervised Image Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7237-5117","authenticated-orcid":false,"given":"Jaemin","family":"Yoo","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2553-3148","authenticated-orcid":false,"given":"Lingxiao","family":"Zhao","sequence":"additional","affiliation":[{"name":"Mistral AI, Palo Alto, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3026-5731","authenticated-orcid":false,"given":"Leman","family":"Akoglu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,8,3]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Outlier Analysis","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal. 2016. Outlier Analysis (2nd ed.). Springer Publishing Company, Incorporated.","edition":"2"},{"key":"e_1_3_2_2_2_1","volume-title":"Amir Atapour Abarghouei, and Toby P. Breckon","author":"Akcay Samet","year":"2018","unstructured":"Samet Akcay, Amir Atapour Abarghouei, and Toby P. Breckon. 2018. GANomaly: Semi-supervised Anomaly Detection via Adversarial Training. In ACCV."},{"key":"e_1_3_2_2_3_1","unstructured":"Liron Bergman and Yedid Hoshen. 2020. Classification-Based Anomaly Detection for General Data. In ICLR."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Paul Bergmann Michael Fauser David Sattlegger and Carsten Steger. 2019. MVTec AD - A Comprehensive Real-World Dataset for Unsupervised Anomaly Detection. In CVPR.","DOI":"10.1109\/CVPR.2019.00982"},{"key":"e_1_3_2_2_5_1","unstructured":"Rishi Bommasani Drew A Hudson Ehsan Adeli Russ Altman Simran Arora Sydney von Arx Michael S Bernstein Jeannette Bohg Antoine Bosselut Emma Brunskill et al. 2021. On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258(2021)."},{"key":"e_1_3_2_2_6_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems Vol. 33 (2020) 1877-1901."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3065838"},{"key":"e_1_3_2_2_8_1","volume-title":"Masked Contrastive Learning for Anomaly Detection. In IJCAI. International Joint Conferences on Artificial Intelligence Organization, 1434-1441","author":"Cho Hyunsoo","year":"2021","unstructured":"Hyunsoo Cho, Jinseok Seol, and Sang-goo Lee. 2021. Masked Contrastive Learning for Anomaly Detection. In IJCAI. International Joint Conferences on Artificial Intelligence Organization, 1434-1441."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Alexis Conneau Kartikay Khandelwal Naman Goyal Vishrav Chaudhary Guillaume Wenzek Francisco Guzm\u00e1n Edouard Grave Myle Ott Luke Zettlemoyer and Veselin Stoyanov. 2020. Unsupervised Cross-lingual Representation Learning at Scale. In ACL.","DOI":"10.18653\/v1\/2020.acl-main.747"},{"key":"e_1_3_2_2_10_1","volume-title":"Le","author":"Cubuk Ekin D.","year":"2019","unstructured":"Ekin D. Cubuk, Barret Zoph, Dandelion Man\u00e9, Vijay Vasudevan, and Quoc V. Le. 2019. AutoAugment: Learning Augmentation Strategies From Data. In CVPR."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00359"},{"key":"e_1_3_2_2_12_1","volume-title":"Taylor","author":"Devries Terrance","year":"2017","unstructured":"Terrance Devries and Graham W. Taylor. 2017. Improved Regularization of Convolutional Neural Networks with Cutout. CoRR, Vol. abs\/1708.04552 (2017). arXiv:1708.04552 http:\/\/arxiv.org\/abs\/1708.04552"},{"key":"e_1_3_2_2_13_1","unstructured":"Izhak Golan and Ran El-Yaniv. 2018. Deep Anomaly Detection Using Geometric Transformations. In NeurIPS."},{"key":"e_1_3_2_2_14_1","volume-title":"Self-supervised Pretraining of Visual Features in the Wild. CoRR","author":"Goyal Priya","year":"1988","unstructured":"Priya Goyal, Mathilde Caron, Benjamin Lefaudeux, Min Xu, Pengchao Wang, Vivek Pai, Mannat Singh, Vitaliy Liptchinsky, Ishan Misra, Armand Joulin, and Piotr Bojanowski. 2021. Self-supervised Pretraining of Visual Features in the Wild. CoRR, Vol. abs\/2103.01988 (2021)."},{"key":"e_1_3_2_2_15_1","volume-title":"Smola","author":"Gretton Arthur","year":"2006","unstructured":"Arthur Gretton, Karsten M. Borgwardt, Malte J. Rasch, Bernhard Sch\u00f6lkopf, and Alexander J. Smola. 2006. A Kernel Method for the Two-Sample-Problem. In NIPS."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.2000.10486067"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Denis A. Gudovskiy Shun Ishizaka and Kazuki Kozuka. 2022. CFLOW-AD: Real-Time Unsupervised Anomaly Detection with Localization via Conditional Normalizing Flows. In WACV.","DOI":"10.1109\/WACV51458.2022.00188"},{"key":"e_1_3_2_2_18_1","unstructured":"Kaiming He Xinlei Chen Saining Xie Yanghao Li Piotr Doll\u00e1r and Ross Girshick. 2022. Masked autoencoders are scalable vision learners. In CVPR."},{"key":"e_1_3_2_2_19_1","volume-title":"Dietterich","author":"Hendrycks Dan","year":"2019","unstructured":"Dan Hendrycks, Mantas Mazeika, and Thomas G. Dietterich. 2019. Deep Anomaly Detection with Outlier Exposure. In ICLR."},{"key":"e_1_3_2_2_20_1","volume-title":"Thi Kieu Khanh Ho, and Narges Armanfard","author":"Hojjati Hadi","year":"2022","unstructured":"Hadi Hojjati, Thi Kieu Khanh Ho, and Narges Armanfard. 2022. Self-Supervised Anomaly Detection: A Survey and Outlook. arXiv:2205.05173(2022)."},{"key":"e_1_3_2_2_21_1","first-page":"2017","article-title":"Spatial Transformer Networks","author":"Jaderberg Max","year":"2015","unstructured":"Max Jaderberg, Karen Simonyan, Andrew Zisserman, and Koray Kavukcuoglu. 2015. Spatial Transformer Networks. In NIPS. 2017-2025.","journal-title":"NIPS."},{"key":"e_1_3_2_2_22_1","volume-title":"NeurIPS","volume":"36","author":"Jiang Kevin","year":"2023","unstructured":"Kevin Jiang, Weixin Liang, James Y Zou, and Yongchan Kwon. 2023. Opendataval: a unified benchmark for data valuation. NeurIPS, Vol. 36 (2023)."},{"key":"e_1_3_2_2_23_1","unstructured":"Yann LeCun and Ishan Misra. 2021. Self-supervised learning: The dark matter of intelligence. https:\/\/ai.facebook.com\/blog\/self-supervised-learning-the-dark-matter-of-intelligence"},{"key":"e_1_3_2_2_24_1","unstructured":"Chun-Liang Li Kihyuk Sohn Jinsung Yoon and Tomas Pfister. 2021. CutPaste: Self-Supervised Learning for Anomaly Detection and Localization. In CVPR."},{"key":"e_1_3_2_2_25_1","first-page":"857","article-title":"Self-supervised learning: Generative or contrastive","volume":"35","author":"Liu Xiao","year":"2021","unstructured":"Xiao Liu, Fanjin Zhang, Zhenyu Hou, Li Mian, Zhaoyu Wang, Jing Zhang, and Jie Tang. 2021. Self-supervised learning: Generative or contrastive. IEEE Transactions on Knowledge and Data Engineering, Vol. 35, 1 (2021), 857-876.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_3_2_2_26_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-022-01555-1"},{"key":"e_1_3_2_2_28_1","volume-title":"Deep learning for anomaly detection: A review. ACM computing surveys (CSUR)","author":"Pang Guansong","year":"2021","unstructured":"Guansong Pang, Chunhua Shen, Longbing Cao, and Anton Van Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM computing surveys (CSUR), Vol. 54, 2 (2021), 1-38."},{"key":"e_1_3_2_2_29_1","unstructured":"Lorenzo Perini Maja Rudolph Sabrina Schmedding and Chen Qiu. 2024. Uncertainty-aware Evaluation of Auxiliary Anomalies with the Expected Anomaly Posterior. arXiv preprint arXiv:2405.13699(2024)."},{"key":"e_1_3_2_2_30_1","unstructured":"Chen Qiu Timo Pfrommer Marius Kloft Stephan Mandt and Maja Rudolph. 2021. Neural Transformation Learning for Deep Anomaly Detection Beyond Images. In ICML."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"crossref","unstructured":"Oliver Rippel Patrick Mertens and Dorit Merhof. 2020. Modeling the Distribution of Normal Data in Pre-Trained Deep Features for Anomaly Detection. In ICPR.","DOI":"10.1109\/TIM.2021.3098381"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Marco Rudolph Tom Wehrbein Bodo Rosenhahn and Bastian Wandt. 2022. Fully Convolutional Cross-Scale-Flows for Image-based Defect Detection. In WACV.","DOI":"10.1109\/WACV51458.2022.00189"},{"key":"e_1_3_2_2_33_1","volume-title":"Robert A. Vandermeulen, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft.","author":"Ruff Lukas","year":"2018","unstructured":"Lukas Ruff, Nico G\u00f6rnitz, Lucas Deecke, Shoaib Ahmed Siddiqui, Robert A. Vandermeulen, Alexander Binder, Emmanuel M\u00fcller, and Marius Kloft. 2018. Deep One-Class Classification. In ICML."},{"key":"e_1_3_2_2_34_1","volume-title":"Self-Supervised Out-of-Distribution Detection and Localization with Natural Synthetic Anomalies (NSA). ArXiv","author":"Schl\u00fcter Hannah M.","year":"2021","unstructured":"Hannah M. Schl\u00fcter, Jeremy Tan, Benjamin Hou, and Bernhard Kainz. 2021. Self-Supervised Out-of-Distribution Detection and Localization with Natural Synthetic Anomalies (NSA). ArXiv, Vol. abs\/2109.15222 (2021)."},{"key":"e_1_3_2_2_35_1","volume-title":"SSD: A Unified Framework for Self-Supervised Outlier Detection. In ICLR.","author":"Sehwag Vikash","year":"2021","unstructured":"Vikash Sehwag, Mung Chiang, and Prateek Mittal. 2021. SSD: A Unified Framework for Self-Supervised Outlier Detection. In ICLR."},{"key":"e_1_3_2_2_36_1","unstructured":"Andreas Peter Steiner Alexander Kolesnikov Xiaohua Zhai Ross Wightman Jakob Uszkoreit and Lucas Beyer. 2022. How to train your ViT? Data Augmentation and Regularization in Vision Transformers. Transactions on Machine Learning Research(2022)."},{"key":"e_1_3_2_2_37_1","volume-title":"CSI: Novelty Detection via Contrastive Learning on Distributionally Shifted Instances. In NeurIPS.","author":"Tack Jihoon","year":"2020","unstructured":"Jihoon Tack, Sangwoo Mo, Jongheon Jeong, and Jinwoo Shin. 2020. CSI: Novelty Detection via Contrastive Learning on Distributionally Shifted Instances. In NeurIPS."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20053-3_30"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3046884"},{"key":"e_1_3_2_2_40_1","unstructured":"Jaemin Yoo Tiancheng Zhao and Leman Akoglu. 2023a. Data Augmentation is a Hyperparameter: Cherry-picked Self-Supervision for Unsupervised Anomaly Detection is Creating the Illusion of Success. Transactions on Machine Learning Research(2023). https:\/\/openreview.net\/forum?id=HyzCuCV1jH"},{"key":"e_1_3_2_2_41_1","volume-title":"DSV: An Alignment Validation Loss for Self-supervised Outlier Model Selection. In ECML PKDD.","author":"Yoo Jaemin","year":"2023","unstructured":"Jaemin Yoo, Yue Zhao, Lingxiao Zhao, and Leman Akoglu. 2023b. DSV: An Alignment Validation Loss for Self-supervised Outlier Model Selection. In ECML PKDD."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Houssam Zenati Manon Romain Chuan-Sheng Foo Bruno Lecouat and Vijay Chandrasekhar. 2018. Adversarially Learned Anomaly Detection. In ICDM.","DOI":"10.1109\/ICDM.2018.00088"},{"key":"e_1_3_2_2_43_1","unstructured":"Lingxiao Zhao and Leman Akoglu. 2020. PairNorm: Tackling Oversmoothing in GNNs. In ICLR. OpenReview.net. https:\/\/openreview.net\/forum?id=rkecl1rtwB"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Ce Zhou Qian Li Chen Li Jun Yu Yixin Liu Guangjing Wang Kai Zhang Cheng Ji Qiben Yan Lifang He et al. 2023. A comprehensive survey on pretrained foundation models: A history from Bert to Chatgpt. arXiv:2302.09419(2023).","DOI":"10.1007\/s13042-024-02443-6"},{"key":"e_1_3_2_2_45_1","volume-title":"Paffenroth","author":"Zhou Chong","year":"2017","unstructured":"Chong Zhou and Randy C. Paffenroth. 2017. Anomaly Detection with Robust Deep Autoencoders. In KDD."},{"key":"e_1_3_2_2_46_1","volume-title":"Wei Cheng, Cristian Lumezanu, Dae-ki Cho, and Haifeng Chen.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Dae-ki Cho, and Haifeng Chen. 2018. Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection. In ICLR."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"Toronto ON Canada","acronym":"KDD '25"},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711896.3737122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T14:42:07Z","timestamp":1755355327000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711896.3737122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,3]]},"references-count":46,"alternative-id":["10.1145\/3711896.3737122","10.1145\/3711896"],"URL":"https:\/\/doi.org\/10.1145\/3711896.3737122","relation":{},"subject":[],"published":{"date-parts":[[2025,8,3]]},"assertion":[{"value":"2025-08-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}