{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T17:56:09Z","timestamp":1776880569881,"version":"3.51.2"},"reference-count":170,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Robot. AI"],"abstract":"<jats:p>Industrial automation is rapidly evolving, encompassing tasks from initial assembly to final product quality inspection. Accurate anomaly detection is crucial for ensuring the reliability and robustness of automated systems. The intelligence of an industrial automation system is directly linked to its ability to detect and rectify abnormalities, thereby maintaining optimal performance. To advance intelligent manufacturing, sophisticated methods for high-quality process inspection are indispensable. This paper presents a systematic review of existing deep learning methodologies specifically designed for image anomaly detection in the context of industrial manufacturing. Through a comprehensive comparison, traditional techniques are evaluated against state-of-the-art advancements in deep learning-based anomaly detection methodologies, including supervised, unsupervised, and semi-supervised learning methods. Addressing inherent challenges such as real-time processing constraints and imbalanced datasets, this review offers a systematic analysis and mitigation strategies. Additionally, we explore popular anomaly detection datasets for surface defect detection and industrial anomaly detection, along with a critical examination of common evaluation metrics used in image anomaly detection. This review includes an analysis of the performance of current anomaly detection methods on various datasets, elucidating strengths and limitations across different scenarios. Moreover, we delve into the domain of drone-based, manipulator-based and AGV-based anomaly detections using deep learning techniques, highlighting the innovative applications of these methodologies. Lastly, the paper offers scholarly rigor and foresight by addressing emerging challenges and charting a course for future research opportunities, providing valuable insights to researchers in the field of deep learning-based surface defect detection and industrial image anomaly detection.<\/jats:p>","DOI":"10.3389\/frobt.2025.1554196","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T09:15:07Z","timestamp":1750670107000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["A systematic survey: role of deep learning-based image anomaly detection in industrial inspection contexts"],"prefix":"10.3389","volume":"12","author":[{"given":"Vinita","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Amit","family":"Shukla","sequence":"additional","affiliation":[]},{"given":"Surya Prakash","family":"S. K.","sequence":"additional","affiliation":[]},{"given":"Shraddha","family":"Shukla","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"B1","unstructured":"Ganomaly: semi-supervised anomaly detection via adversarial training\n          \n          \n            \n              Akcay\n              S.\n            \n            \n              Atapour-Abarghouei\n              A.\n            \n            \n              Breckon\n              T. P.\n            \n          \n          CoRR\n          \n          2018"},{"key":"B2","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/978-3-030-20893-6_39","article-title":"Ganomaly: semi-supervised anomaly detection via adversarial training","volume":"11363","author":"Akcay","year":"2019","journal-title":"Lecture Notes Comput. Sci."},{"key":"B3","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.procs.2018.07.025","article-title":"Vision-based robot manipulator for industrial applications","volume":"133","author":"Ali","year":"2018","journal-title":"Procedia Comput. Sci."},{"key":"B4","article-title":"Transfer representation-learning for anomaly detection","author":"Andrews","year":"2016"},{"key":"B5","doi-asserted-by":"publisher","first-page":"4323","DOI":"10.1007\/s10994-022-06153-4","article-title":"Latent Out: an unsupervised deep anomaly detection approach exploiting latent space distribution","volume":"112","author":"Angiulli","year":"2023","journal-title":"Mach. Learn"},{"key":"B6","doi-asserted-by":"publisher","first-page":"75085","DOI":"10.1007\/s11042-023-17832-2","article-title":"Multi-class classification of breast cancer abnormality using transfer learning","volume":"83","author":"Ani","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"B7","doi-asserted-by":"publisher","first-page":"107697","DOI":"10.1016\/j.engappai.2023.107697","article-title":"Surface defect detection methods for industrial products with imbalanced samples: a review of progress in the 2020s","volume":"130","author":"Bai","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"B8","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s00371-019-01647-0","article-title":"Crowd anomaly detection and localization using histogram of magnitude and momentum","volume":"36","author":"Bansod","year":"2020","journal-title":"Vis. Comput."},{"key":"B9","doi-asserted-by":"publisher","first-page":"1588","DOI":"10.3390\/s22041588","article-title":"A machine vision\u2013based pipe leakage detection system for automated power plant maintenance","volume":"22","author":"Bao","year":"2022","journal-title":"Sensors"},{"key":"B10","first-page":"993","article-title":"Miad: a maintenance inspection dataset for unsupervised anomaly detection","volume-title":"Proceedings of the IEEE\/CVF international conference on computer vision","author":"Bao","year":"2023"},{"key":"B11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/isbi56570.2024.10635828","article-title":"Diffusion models with ensembled structure-based anomaly scoring for unsupervised anomaly detection","author":"Behrendt","year":"2024","journal-title":"arXiv"},{"key":"B12","doi-asserted-by":"crossref","first-page":"9584","DOI":"10.1109\/CVPR.2019.00982","article-title":"Mvtec ad \u2013 a comprehensive real-world dataset for unsupervised anomaly detection","volume-title":"2019 IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","author":"Bergmann","year":"2019"},{"key":"B13","doi-asserted-by":"crossref","DOI":"10.1109\/CVPR42600.2020.00424","article-title":"Uninformed students: student-teacher anomaly detection with discriminative latent embeddings","volume-title":"2020 IEEE\/CVF conference on computer vision and pattern recognition (CVPR) (IEEE)","author":"Bergmann","year":"2020"},{"key":"B14","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s11263-020-01400-4","article-title":"The mvtec anomaly detection dataset: a comprehensive real-world dataset for unsupervised anomaly detection","volume":"129","author":"Bergmann","year":"2021","journal-title":"Int. J. Comput. Vis."},{"key":"B15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10845-024-02483-3","article-title":"An overview of traditional and advanced methods to detect part defects in additive manufacturing processes","author":"Bhandarkar","year":"2024","journal-title":"J. Intelligent Manuf"},{"key":"B16","doi-asserted-by":"publisher","first-page":"040801","DOI":"10.1115\/1.4049535","article-title":"Image-based surface defect detection using deep learning: a review","volume":"21","author":"Bhatt","year":"2021","journal-title":"J. Comput. Inf. Sci. Eng."},{"key":"B17","first-page":"200048","article-title":"A benchmark for visual identification of defective solar cells in electroluminescence imagery","author":"Brabec","year":"2018","journal-title":"Systems and Soft Computing"},{"key":"B18","doi-asserted-by":"publisher","first-page":"100182","DOI":"10.1016\/j.jcomc.2021.100182","article-title":"Automated fiber placement: a review of history, current technologies, and future paths forward","volume":"6","author":"Brasington","year":"2021","journal-title":"Compos. Part C. Open Access"},{"key":"B19","doi-asserted-by":"publisher","first-page":"6488","DOI":"10.1109\/iccv51070.2023.00599","article-title":"Anomaly detection under distribution shift","author":"Cao","year":"","journal-title":"arXiv"},{"key":"B20","doi-asserted-by":"publisher","first-page":"10674","DOI":"10.1109\/TII.2023.3241579","article-title":"Collaborative discrepancy optimization for reliable image anomaly localization","volume":"19","author":"Cao","year":"","journal-title":"IEEE Trans. Industrial Inf."},{"key":"B21","doi-asserted-by":"crossref","first-page":"3939","DOI":"10.1109\/ICPR48806.2021.9412253","article-title":"Combining gans and autoencoders for efficient anomaly detection","volume-title":"2020 25th international conference on pattern recognition (ICPR)","author":"Carrara","year":"2021"},{"key":"B22","article-title":"Structural attention-based recurrent variational autoencoder for highway vehicle anomaly detection","author":"Chakraborty","year":"2023"},{"key":"B23","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.1109\/TMI.2020.3045295","article-title":"Mama net: multi-scale attention memory autoencoder network for anomaly detection","volume":"40","author":"Chen","year":"2021","journal-title":"IEEE Trans. Med. Imaging"},{"key":"B24","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/LSP.2023.3245947","article-title":"Learning traces by yourself: blind image forgery localization via anomaly detection with vit-vae","volume":"30","author":"Chen","year":"","journal-title":"IEEE Signal Process. Lett."},{"key":"B25","doi-asserted-by":"publisher","first-page":"109162","DOI":"10.1016\/j.ress.2023.109162","article-title":"Adaptive transfer learning for multimode process monitoring and unsupervised anomaly detection in steam turbines","volume":"234","author":"Chen","year":"","journal-title":"Reliab. Eng. and Syst. Saf."},{"key":"B26","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1007\/s11042-022-13568-7","article-title":"Fabric defect detection based on separate convolutional unet","volume":"82","author":"Cheng","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"B27","doi-asserted-by":"publisher","first-page":"3101","DOI":"10.1007\/s11042-022-13568-7","article-title":"Fabric defect detection based on separate convolutional unet","volume":"82","author":"Cheng","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"B28","article-title":"Transformaly \u2013 two (feature spaces) are better than one","author":"Cohen","year":"2022","journal-title":"CoRR"},{"key":"B29","doi-asserted-by":"publisher","first-page":"55297","DOI":"10.1109\/access.2023.3282993","article-title":"A survey on unsupervised anomaly detection algorithms for industrial images","volume":"11","author":"Cui","year":"2023","journal-title":"IEEE Access"},{"key":"B31","doi-asserted-by":"publisher","first-page":"193","DOI":"10.3390\/jimaging9100193","article-title":"A systematic review on deep learning with cnns applied to surface defect detection","volume":"9","author":"Cumbajin","year":"2023","journal-title":"J. Imaging"},{"key":"B32","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.3390\/s20051459","article-title":"Visual-based defect detection and classification approaches for industrial applications\u2013a survey","volume":"20","author":"Czimmermann","year":"2020","journal-title":"Sensors"},{"key":"B33","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.solener.2019.02.067","article-title":"Automatic classification of defective photovoltaic module cells in electroluminescence images","volume":"185","author":"Deitsch","year":"2019","journal-title":"Sol. Energy"},{"key":"B34","doi-asserted-by":"publisher","first-page":"7378","DOI":"10.1109\/cvpr52688.2022.00724","article-title":"Catching both gray and black swans: open-set supervised anomaly detection","author":"Ding","year":"2022","journal-title":"arXiv"},{"key":"B35","article-title":"Autonomous detection of concrete cracks on bridge decks and fatigue cracks on steel members","author":"Dorafshan","year":"2017"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.34024.47363","article-title":"Automatic surface crack detection in concrete structures using otsu thresholding and morphological operations","author":"Dorafshan","year":"2016"},{"key":"B37","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/ICUAS.2018.8453409","article-title":"Deep learning neural networks for suas-assisted structural inspections: feasibility and application","volume-title":"2018 international conference on unmanned aircraft systems (ICUAS)","author":"Dorafshan","year":"2018"},{"key":"B38","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.neunet.2023.05.032","article-title":"Vlad: task-agnostic vae-based lifelong anomaly detection","volume":"165","author":"Faber","year":"2023","journal-title":"Neural Netw."},{"key":"B39","doi-asserted-by":"publisher","first-page":"107976","DOI":"10.1016\/j.engappai.2024.107976","article-title":"Efficient object tracking algorithm based on lightweight siamese networks","volume":"133","author":"Feng","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"B40","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1016\/j.jmsy.2024.04.021","article-title":"Leveraging small-scale datasets for additive manufacturing process modeling and part certification: current practice and remaining gaps","volume":"75","author":"Fullington","year":"2024","journal-title":"J. Manuf. Syst."},{"key":"B41","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.1109\/IROS40897.2019.8968473","article-title":"Empowered optical inspection by using robotic manipulator in industrial applications","volume-title":"2019 IEEE\/RSJ international conference on intelligent robots and systems (IROS)","author":"Galdelli","year":"2019"},{"key":"B42","doi-asserted-by":"publisher","first-page":"102507","DOI":"10.1016\/j.rcim.2022.102507","article-title":"A hierarchical training-convolutional neural network with feature alignment for steel surface defect recognition","volume":"81","author":"Gao","year":"2023","journal-title":"Robotics Computer-Integrated Manuf."},{"key":"B43","doi-asserted-by":"publisher","first-page":"111","DOI":"10.3390\/jimaging10050111","article-title":"Autoencoder-based unsupervised surface defect detection using two-stage training","volume":"10","author":"Getachew Shiferaw","year":"2024","journal-title":"J. Imaging"},{"key":"B44","doi-asserted-by":"publisher","first-page":"1277152","DOI":"10.3389\/fmtec.2024.1277152","article-title":"Anomaly detection in automated fibre placement: learning with data limitations","volume":"4","author":"Ghamisi","year":"2024","journal-title":"Front. Manuf. Technol."},{"key":"B45","doi-asserted-by":"publisher","first-page":"108065","DOI":"10.1016\/j.compeleceng.2022.108065","article-title":"Two-step residual-error based approach for anomaly detection in engineering systems using variational autoencoders","volume":"101","author":"Gonz\u00e1lez-Mu\u00f1iz","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"B46","volume-title":"Severstal: steel defect detection","author":"Grishin","year":"2019"},{"key":"B47","article-title":"CFLOW-AD: real-time unsupervised anomaly detection with localization via conditional normalizing flows","author":"Gudovskiy","year":"2021","journal-title":"CoRR"},{"key":"B48","doi-asserted-by":"publisher","first-page":"105186","DOI":"10.1016\/j.autcon.2023.105186","article-title":"Surface defect detection of civil structures using images: review from data perspective","volume":"158","author":"Guo","year":"2024","journal-title":"Automation Constr."},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2022-95698","article-title":"Vision-based autonomous inspection of vertical structures using unmanned aerial vehicle (uav)","author":"Gupta","year":"2022","journal-title":"Am. Soc. Mech. Struct"},{"key":"B50","article-title":"CRD: collaborative representation distance for practical anomaly detection","author":"Han","year":"2023","journal-title":"arXiv preprint"},{"key":"B51","doi-asserted-by":"publisher","first-page":"4090","DOI":"10.1609\/aaai.v35i5.16530","article-title":"Gan ensemble for anomaly detection","volume":"35","author":"Han","year":"2021","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"B52","first-page":"13545","article-title":"Normalizing flows for human pose anomaly detection","volume-title":"Proceedings of the IEEE\/CVF international conference on computer vision (ICCV)","author":"Hirschorn","year":"2023"},{"key":"B53","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/ICMSP58539.2023.10170994","article-title":"A feature defusion network for surface anomaly detection of industrial products","volume-title":"2023 5th international conference on intelligent control, measurement and signal processing (ICMSP)","author":"Hu","year":"2023"},{"key":"B54","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/COASE.2018.8560423","article-title":"Surface defect saliency of magnetic tile","volume-title":"2018 IEEE 14th international conference on automation science and engineering (CASE)","author":"Huang","year":"2018"},{"key":"B56","doi-asserted-by":"publisher","first-page":"25","DOI":"10.3390\/informatics11020025","article-title":"A survey of vision-based methods for surface defects\u2019detection and classification in steel products","volume":"11","author":"Ibrahim","year":"2024","journal-title":"Informatics"},{"key":"B57","doi-asserted-by":"publisher","first-page":"40","DOI":"10.3390\/technologies11020040","article-title":"A review of deep transfer learning and recent advancements","volume":"11","author":"Iman","year":"2023","journal-title":"Technologies"},{"key":"B58","doi-asserted-by":"publisher","first-page":"3232","DOI":"10.1109\/ACCESS.2023.3234745","article-title":"Sa-patchcore: anomaly detection in dataset with co-occurrence relationships using self-attention","volume":"11","author":"Ishida","year":"2023","journal-title":"IEEE Access"},{"key":"B59","doi-asserted-by":"publisher","first-page":"123410","DOI":"10.1016\/j.eswa.2024.123410","article-title":"Y-gan: learning dual data representations for anomaly detection in images","volume":"248","author":"Ivanovska","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"B60","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1007\/s10845-020-01710-x","article-title":"Synthetic data augmentation for surface defect detection and classification using deep learning","volume":"33","author":"Jain","year":"2022","journal-title":"J. Intell. Manuf."},{"key":"B61","doi-asserted-by":"publisher","first-page":"116495","DOI":"10.1016\/j.enconman.2022.116495","article-title":"Automatic detection, classification and localization of defects inlargephotovoltaic plants using unmanned aerial vehicles (uav) based infrared (ir) and rgb imaging","volume":"276","author":"Jeffrey Kuo","year":"2023","journal-title":"Energy Convers. Manag."},{"key":"B62","doi-asserted-by":"publisher","first-page":"103911","DOI":"10.1016\/j.compind.2023.103911","article-title":"Deep cnn-based visual defect detection: survey of current literature","volume":"148","author":"Jha","year":"2023","journal-title":"Comput. Industry"},{"key":"B63","doi-asserted-by":"publisher","DOI":"10.3389\/fnbot.2022.1046867","article-title":"Anomaly detection in images with shared autoencoders","volume":"16","author":"Jia","year":"2023","journal-title":"Front. Neurorobotics"},{"key":"B64","doi-asserted-by":"publisher","first-page":"60490","DOI":"10.1109\/ACCESS.2023.3286548","article-title":"Interpretability-aware industrial anomaly detection using autoencoders","volume":"11","author":"Jiang","year":"2023","journal-title":"IEEE Access"},{"key":"B65","first-page":"653","article-title":"Denoising autoencoders for unsupervised anomaly detection in brain mri","volume-title":"Proceedings of the 5th international conference on medical imaging with deep learning","author":"Kascenas","year":"2022"},{"key":"B66","first-page":"2366","article-title":"Complementary set variational autoencoder for supervised anomaly detection","author":"Kawachi","year":"2018"},{"key":"B67","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s13243-020-00091-x","article-title":"Vision guided robotic inspection for parts in manufacturing and remanufacturing industry","volume":"11","author":"Khan","year":"2021","journal-title":"J. Remanufacturing"},{"key":"B68","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-030-65414-6_11","article-title":"Gan-based anomaly detection in imbalance problems","author":"Kim","year":"2020","journal-title":"arXiv"},{"key":"B69","article-title":"Semi-orthogonal embedding for efficient unsupervised anomaly segmentation","author":"Kim","year":"2021","journal-title":"arXiv preprint"},{"key":"B70","first-page":"1","article-title":"Threat object-based anomaly detection in x-ray images using gan-based ensembles","author":"Kolte","year":"2023","journal-title":"Neural Comput. Appl."},{"key":"B71","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.3390\/math12101439","article-title":"Gan-based anomaly detection tailored for classifiers","volume":"12","author":"Kr\u00e1lik","year":"2024","journal-title":"Mathematics"},{"key":"B72","article-title":"Surface abnormality detection in medical and inspection systems using energy variations in co-occurrence matrixes","author":"Krishnand","year":"2022"},{"key":"B73","doi-asserted-by":"publisher","first-page":"107914","DOI":"10.1016\/j.compbiomed.2023.107914","article-title":"Fusion of transfer learning models with lstm for detection of breast cancer using ultrasound images","volume":"169","author":"Lanjewar","year":"2024","journal-title":"Comput. Biol. Med."},{"key":"B74","doi-asserted-by":"publisher","first-page":"46717","DOI":"10.1109\/ACCESS.2022.3171559","article-title":"Anovit: unsupervised anomaly detection and localization with vision transformer-based encoder-decoder","volume":"10","author":"Lee","year":"2022","journal-title":"IEEE Access"},{"key":"B75","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.ifacol.2018.09.412","article-title":"Real-time detection of steel strip surface defects based on improved yolo detection network","volume":"51","author":"Li","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"B76","first-page":"19882","article-title":"Deep anomaly detection under labeling budget constraints","volume-title":"Proceedings of the 40th international conference on machine learning","author":"Li","year":"2023"},{"key":"B77","doi-asserted-by":"publisher","first-page":"121533","DOI":"10.1016\/j.eswa.2023.121533","article-title":"Controlled graph neural networks with denoising diffusion for anomaly detection","volume":"237","author":"Li","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"B78","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.neucom.2021.07.045","article-title":"Pruning and quantization for deep neural network acceleration: a survey","volume":"461","author":"Liang","year":"2021","journal-title":"Neurocomputing"},{"key":"B79","doi-asserted-by":"publisher","first-page":"104544","DOI":"10.1016\/j.autcon.2022.104544","article-title":"Pavement anomaly detection based on transformer and self-supervised learning","volume":"143","author":"Lin","year":"2022","journal-title":"Automation Constr."},{"key":"B80","doi-asserted-by":"publisher","first-page":"2125","DOI":"10.1007\/s12652-021-03425-0","article-title":"DDR-ID: dual deep reconstruction networks based image decomposition for anomaly detection","volume":"14","author":"Lin","year":"2023","journal-title":"J. Ambient. Intell. Hum. Comput."},{"key":"B81","first-page":"4120","article-title":"Mixed-attention auto encoder for multi-class industrial anomaly detection","volume-title":"ICASSP 2024 - 2024 IEEE international conference on acoustics, speech and signal processing","author":"Liu","year":"2024"},{"key":"B82","doi-asserted-by":"publisher","first-page":"103972","DOI":"10.1016\/j.compind.2023.103972","article-title":"Deep attention smote: data augmentation with a learnable interpolation factor for imbalanced anomaly detection of gas turbines","volume":"151","author":"Liu","year":"","journal-title":"Comput. Industry"},{"key":"B83","doi-asserted-by":"publisher","first-page":"120284","DOI":"10.1016\/j.eswa.2023.120284","article-title":"Anomaly-gan: a data augmentation method for train surface anomaly detection","volume":"228","author":"Liu","year":"","journal-title":"Expert Syst. Appl."},{"key":"B84","doi-asserted-by":"publisher","first-page":"12147","DOI":"10.1109\/cvpr52729.2023.01169","article-title":"Diversity-measurable anomaly detection","author":"Liu","year":"","journal-title":"arXiv"},{"key":"B85","first-page":"20402","article-title":"Simplenet: a simple network for image anomaly detection and localization","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR)","author":"Liu","year":""},{"key":"B86","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/s11633-023-1459-z","article-title":"Deep industrial image anomaly detection: a survey","volume":"21","author":"Liu","year":"2024","journal-title":"Mach. Intell. Res."},{"key":"B87","doi-asserted-by":"publisher","first-page":"104389","DOI":"10.1016\/j.autcon.2022.104389","article-title":"Automatic image-based brick segmentation and crack detection of masonry walls using machine learning","volume":"140","author":"Loverdos","year":"2022","journal-title":"Automation Constr."},{"key":"B88","doi-asserted-by":"publisher","first-page":"102366","DOI":"10.1016\/j.compmedimag.2024.102366","article-title":"Patchcl-ae: anomaly detection for medical images using patch-wise contrastive learning-based auto-encoder","volume":"114","author":"Lu","year":"","journal-title":"Comput. Med. Imaging Graph."},{"key":"B89","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1109\/TIP.2024.3381435","article-title":"Anomaly detection for medical images using heterogeneous auto-encoder","volume":"33","author":"Lu","year":"","journal-title":"IEEE Trans. Image Process."},{"key":"B90","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1109\/TASE.2022.3141186","article-title":"A deep convolutional autoencoder-based approach for anomaly detection with industrial, non-images, 2-dimensional data: a semiconductor manufacturing case study","volume":"19","author":"Maggipinto","year":"2022","journal-title":"IEEE Trans. Automation Sci. Eng."},{"key":"B91","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.3390\/s23031105","article-title":"Transfer learning on small datasets for improved fall detection","volume":"23","author":"Maray","year":"2023","journal-title":"Sensors"},{"key":"B92","first-page":"1764","article-title":"Anomaly detection through latent space restoration using vector quantized variational autoencoders. In","volume-title":"IEEE 18th international symposium on biomedical imaging ISBI","author":"Marimont","year":"2021"},{"key":"B93","doi-asserted-by":"publisher","first-page":"123210","DOI":"10.1016\/j.eswa.2024.123210","article-title":"A convolutional neural network approach for image-based anomaly detection in smart agriculture","volume":"247","author":"Mendoza-Bernal","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"B94","doi-asserted-by":"publisher","first-page":"106099","DOI":"10.1016\/j.jobe.2023.106099","article-title":"Anomaly detection using a model-agnostic meta-learning-based variational auto-encoder for facility management","volume":"68","author":"Moon","year":"2023","journal-title":"J. Build. Eng."},{"key":"B95","doi-asserted-by":"publisher","first-page":"100779","DOI":"10.1016\/j.imu.2021.100779","article-title":"Data augmentation using generative adversarial networks (gans) for gan-based detection of pneumonia and covid-19 in chest x-ray images","volume":"27","author":"Motamed","year":"2021","journal-title":"Inf. Med. Unlocked"},{"key":"B96","article-title":"Anomaly detection with conditioned denoising diffusion models","author":"Mousakhan","year":"2023"},{"key":"B97","doi-asserted-by":"publisher","first-page":"107954","DOI":"10.1016\/j.cmpb.2023.107954","article-title":"Enhancing ai-cdss with u-anogan: tackling data imbalance","volume":"244","author":"Mun","year":"2024","journal-title":"Comput. Methods Programs Biomed."},{"key":"B98","doi-asserted-by":"publisher","first-page":"11188","DOI":"10.1109\/cvpr.2019.01145","article-title":"Meta-learning convolutional neural architectures for multi-target concrete defect classification with the concrete defect bridge image dataset","author":"Mundt","year":"2019","journal-title":"arXiv"},{"key":"B99","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1109\/ICAR46387.2019.8981649","article-title":"Towards a virtual reality interface for remote robotic teleoperation","volume-title":"2019 19th international conference on advanced robotics (ICAR)","author":"Naceri","year":"2019"},{"key":"B100","article-title":"An introduction to convolutional neural networks","author":"O\u2019Shea","year":"2015","journal-title":"CoRR"},{"key":"B101","doi-asserted-by":"publisher","first-page":"102366","DOI":"10.1016\/j.bspc.2020.102366","article-title":"A deep learning model using data augmentation for detection of architectural distortion in whole and patches of images","volume":"65","author":"Oyelade","year":"2021","journal-title":"Biomed. Signal Process. Control"},{"key":"B102","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/ICRAS62427.2024.10654478","article-title":"Autonomous sensor-based control of aerial manipulator for horizontal pipe structure tracking with continuous contact","volume-title":"2024 8th international conference on robotics and automation sciences (ICRAS)","author":"Pandya","year":"2024"},{"key":"B103","article-title":"Explainable deep few-shot anomaly detection with deviation networks","author":"Pang","year":"2021","journal-title":"CoRR"},{"key":"B104","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/978-3-030-29859-3_63","article-title":"Surface defect modelling using co-occurrence matrix and fast fourier transformation","volume-title":"Hybrid artificial intelligent systems","author":"Pastor-L\u00f3pez","year":"2019"},{"key":"B105","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1109\/ICRMS.2018.00085","article-title":"Research on bridge crack detection with neural network based image processing methods","volume-title":"2018 12th international conference on reliability, maintainability, and safety (ICRMS)","author":"Peng","year":"2018"},{"key":"B106","doi-asserted-by":"publisher","first-page":"122361","DOI":"10.1016\/j.eswa.2023.122361","article-title":"Industrial surface defect detection and localization using multi-scale information focusing and enhancement ganomaly","volume":"238","author":"Peng","year":"","journal-title":"Expert Syst. Appl."},{"key":"B107","doi-asserted-by":"publisher","first-page":"264","DOI":"10.3390\/s24010264","article-title":"Industrial product surface anomaly detection with realistic synthetic anomalies based on defect map prediction","volume":"24","author":"Peng","year":"","journal-title":"Sensors"},{"key":"B108","doi-asserted-by":"publisher","first-page":"335","DOI":"10.3390\/s16030335","article-title":"Robot guidance using machine vision techniques in industrial environments: a comparative review","volume":"16","author":"P\u00e9rez","year":"2016","journal-title":"Sensors"},{"key":"B109","first-page":"1783","article-title":"One-class svm on siamese neural network latent space for unsupervised anomaly detection on brain mri white matter hyperintensities","volume-title":"Medical imaging with deep learning","author":"Pinon","year":"2024"},{"key":"B110","doi-asserted-by":"publisher","first-page":"200048","DOI":"10.1016\/j.sasc.2023.200048","article-title":"A benchmark dataset for defect detection and classification in electroluminescence images of pv modules using semantic segmentation","volume":"5","author":"Pratt","year":"2023","journal-title":"Syst. Soft Comput."},{"key":"B111","doi-asserted-by":"publisher","first-page":"101026","DOI":"10.1016\/j.rineng.2023.101026","article-title":"Video anomaly detection system using deep convolutional and recurrent models","volume":"18","author":"Qasim","year":"2023","journal-title":"Results Eng."},{"key":"B112","article-title":"Network traffic anomaly detection using recurrent neural networks","author":"Radford","year":"2018","journal-title":"CoRR"},{"key":"B113","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s00779-021-01586-5","article-title":"A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance","volume":"28","author":"Rezaee","year":"2021","journal-title":"Personal. Ubiquitous Comput."},{"key":"B114","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/icuas57906.2023.10156565","article-title":"A vision-based approach for unmanned aerial vehicles to track industrial pipes for inspection tasks","author":"Roos-Hoefgeest","year":"2023","journal-title":"arXiv"},{"key":"B115","doi-asserted-by":"publisher","first-page":"14298","DOI":"10.1109\/cvpr52688.2022.01392","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"","journal-title":"arXiv"},{"key":"B116","doi-asserted-by":"publisher","first-page":"14298","DOI":"10.1109\/cvpr52688.2022.01392","article-title":"Towards total recall in industrial anomaly detection","author":"Roth","year":"","journal-title":"arXiv"},{"key":"B117","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1109\/iccvw.2019.00075","article-title":"Structuring autoencoders","author":"Rudolph","year":"2019","journal-title":"arXiv"},{"key":"B118","article-title":"Same same but differnet: semi-supervised defect detection with normalizing flows","author":"Rudolph","year":"2020","journal-title":"CoRR"},{"key":"B119","doi-asserted-by":"publisher","first-page":"100451","DOI":"10.1016\/j.mlwa.2023.100451","article-title":"Semi-supervised visual anomaly detection based on convolutional autoencoder and transfer learning","volume":"11","author":"Saeedi","year":"2023","journal-title":"Mach. Learn. Appl."},{"key":"B120","doi-asserted-by":"publisher","first-page":"103786","DOI":"10.1016\/j.jnca.2023.103786","article-title":"Semi-supervised, neural network based approaches to face mask and anomaly detection in surveillance networks","volume":"222","author":"Saheel","year":"2024","journal-title":"J. Netw. Comput. Appl."},{"key":"B121","article-title":"Puzzle-AE: novelty detection in images through solving puzzles","author":"Salehi","year":"2022"},{"key":"B122","doi-asserted-by":"publisher","first-page":"3721","DOI":"10.3390\/s24123721","article-title":"Toward fully automated inspection of critical assets supported by autonomous mobile robots, vision sensors, and artificial intelligence","volume":"24","author":"Sanchez-Cubillo","year":"2024","journal-title":"Sensors"},{"key":"B548","doi-asserted-by":"publisher","first-page":"363","DOI":"10.2478\/aut-2019-0035","article-title":"A Public Fabric Database for Defect Detection Methods and Results","volume":"19","author":"Silvestre-Blanes","year":"2019","journal-title":"AUTEX Research Journal."},{"key":"B171","first-page":"474","article-title":"Natural synthetic anomalies for self-supervised anomaly detection and localization","volume":"24","author":"Schl\u00fcter","year":"2022"},{"key":"B123","first-page":"03314","article-title":"Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network","volume-title":"CoRR","author":"Sherstinsky","year":"2018"},{"key":"B124","doi-asserted-by":"publisher","first-page":"3434","DOI":"10.1109\/TITS.2016.2552248","article-title":"Automatic road crack detection using random structured forests","volume":"17","author":"Shi","year":"2016","journal-title":"IEEE Trans. Intelligent Transp. Syst."},{"key":"B125","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s12541-023-00924-2","article-title":"Material-adaptive anomaly detection using property-concatenated transfer learning in wire arc additive manufacturing","volume":"25","author":"Shin","year":"2024","journal-title":"Int. J. Precis. Eng. Manuf."},{"key":"B126","doi-asserted-by":"publisher","first-page":"8716","DOI":"10.3390\/app13158716","article-title":"Vision transformers for anomaly detection and localisation in leather surface defect classification based on low-resolution images and a small dataset","volume":"13","author":"Smith","year":"2023","journal-title":"Appl. Sci."},{"key":"B127","article-title":"Learning and evaluating representations for deep one-class classification","author":"Sohn","year":"2021"},{"key":"B128","doi-asserted-by":"publisher","first-page":"640885","DOI":"10.3389\/fagro.2021.640885","article-title":"Drones in insect pest management","volume":"3","author":"Subramanian","year":"2021","journal-title":"Front. Agron."},{"key":"B129","first-page":"355","article-title":"A novel unsupervised visual anomaly detection method based on autoencoder","volume":"15","author":"Sun","year":"2024","journal-title":"Key, Sun Key: Sun, Annotation: Sun"},{"key":"B130","first-page":"193","article-title":"Automated vision-based bolt handling for industrial applications using a manipulator","volume-title":"2024 12th international conference on control, mechatronics and automation (ICCMA)","author":"Surya Prakash","year":""},{"key":"B131","first-page":"3602","article-title":"Automated vision-based bolt sorting by manipulator for industrial applications","volume-title":"2024 IEEE 20th international conference on automation science and engineering (CASE)","author":"Surya Prakash","year":""},{"key":"B132","article-title":"Csi: novelty detection via contrastive learning on distributionally shifted instances","author":"Tack","year":"2020"},{"key":"B133","doi-asserted-by":"publisher","first-page":"111533","DOI":"10.1016\/j.knosys.2024.111533","article-title":"Unsupervised anomaly detection and localization with one model for all category","volume":"289","author":"Tan","year":"2024","journal-title":"Knowledge-Based Syst."},{"key":"B134","doi-asserted-by":"publisher","first-page":"3336","DOI":"10.3390\/s20123336","article-title":"Anomaly detection neural network with dual auto-encoders gan and its industrial inspection applications","volume":"20","author":"Tang","year":"2020","journal-title":"Sensors"},{"key":"B135","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/tsmc.2018.2871750","article-title":"Detection of power line insulator defects using aerial images analyzed with convolutional neural networks","volume":"50","author":"Tao","year":"2018","journal-title":"IEEE Trans. Syst. Man, Cybern. Syst."},{"key":"B136","doi-asserted-by":"publisher","first-page":"7707","DOI":"10.1109\/TII.2022.3142326","article-title":"Unsupervised anomaly detection for surface defects with dual-siamese network","volume":"18","author":"Tao","year":"2022","journal-title":"IEEE Trans. Industrial Inf."},{"key":"B137","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2023.3250225","article-title":"Vitalnet: anomaly on industrial textured surfaces with hybrid transformer","volume":"72","author":"Tao","year":"2023","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"B138","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TAI.2022.3227142","article-title":"Learning multiresolution features for unsupervised anomaly localization on industrial textured surfaces","volume":"5","author":"Tao","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"B139","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1177\/00405175231206820","article-title":"Distillation-based fabric anomaly detection","volume":"94","author":"ThomineS","year":"2024","journal-title":"Text. Res. J."},{"key":"B140","doi-asserted-by":"publisher","first-page":"8292","DOI":"10.1109\/TCSVT.2024.3376399","article-title":"Transformer-based spatio-temporal unsupervised traffic anomaly detection in aerial videos","volume":"34","author":"Tran","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"B141","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/TCPMT.2021.3121265","article-title":"Anomaly detection for solder joints using \u03b2-vae","volume":"11","author":"Ulger","year":"2021","journal-title":"IEEE Trans. Components, Packag. Manuf. Technol."},{"key":"B142","article-title":"Image anomaly detection and prediction scheme based on ssa optimized resnet50-bigru model","author":"Wan","year":"2024"},{"key":"B143","doi-asserted-by":"publisher","first-page":"105187","DOI":"10.1016\/j.knosys.2019.105187","article-title":"advae: a self-adversarial variational autoencoder with Gaussian anomaly prior knowledge for anomaly detection","volume":"190","author":"Wang","year":"","journal-title":"Knowledge-Based Syst."},{"key":"B144","doi-asserted-by":"publisher","first-page":"101037","DOI":"10.1016\/j.aei.2020.101037","article-title":"A smart surface inspection system using faster r-cnn in cloud-edge computing environment","volume":"43","author":"Wang","year":"","journal-title":"Adv. Eng. Inf."},{"key":"B145","doi-asserted-by":"publisher","first-page":"44278","DOI":"10.1109\/ACCESS.2022.3165977","article-title":"Unsupervised anomaly video detection via a double-flow convlstm variational autoencoder","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"B146","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1016\/j.procir.2023.09.088","article-title":"Automated visual inspection of manufactured parts using deep convolutional neural networks and transfer learning","volume":"120","author":"Weiher","year":"2023","journal-title":"Procedia CIRP"},{"key":"B147","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.neucom.2021.12.093","article-title":"Gan-based anomaly detection: a review","volume":"493","author":"Xia","year":"2022","journal-title":"Neurocomputing"},{"key":"B148","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.patrec.2023.06.010","article-title":"Multi-scale attention and dilation network for small defect detection","volume":"172","author":"Xiang","year":"2023","journal-title":"Pattern Recognit. Lett."},{"key":"B149","doi-asserted-by":"publisher","first-page":"103583","DOI":"10.1016\/j.compind.2021.103583","article-title":"A feature fusion enhanced multiscale cnn with attention mechanism for spot-welding surface appearance recognition","volume":"135","author":"Xiao","year":"2022","journal-title":"Comput. Industry"},{"key":"B150","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1109\/TCYB.2024.3357213","article-title":"Im-iad: industrial image anomaly detection benchmark in manufacturing","volume":"54","author":"Xie","year":"2024","journal-title":"IEEE Trans. Cybern."},{"key":"B151","doi-asserted-by":"publisher","first-page":"103983","DOI":"10.1016\/j.jvcir.2023.103983","article-title":"Unsupervised industrial anomaly detection with diffusion models","volume":"97","author":"Xu","year":"","journal-title":"J. Vis. Commun. Image Represent."},{"key":"B152","doi-asserted-by":"publisher","first-page":"109347","DOI":"10.1016\/j.patcog.2023.109347","article-title":"A comprehensive survey of image augmentation techniques for deep learning","volume":"137","author":"Xu","year":"","journal-title":"Pattern Recognit."},{"key":"B153","article-title":"Improving unsupervised anomaly localization by applying multi-scale memories to autoencoders","author":"Yang","year":"2020","journal-title":"CoRR"},{"key":"B154","doi-asserted-by":"publisher","first-page":"105835","DOI":"10.1016\/j.engappai.2023.105835","article-title":"Memseg: a semi-supervised method for image surface defect detection using differences and commonalities","volume":"119","author":"Yang","year":"","journal-title":"Eng. Appl. Artif. Intell."},{"key":"B155","doi-asserted-by":"publisher","first-page":"108936","DOI":"10.1016\/j.cie.2022.108936","article-title":"A deep learning process anomaly detection approach with representative latent features for low discriminative and insufficient abnormal data","volume":"176","author":"Yang","year":"","journal-title":"Comput. and Industrial Eng."},{"key":"B156","first-page":"2958","article-title":"Anomaly detection with domain adaptation","volume-title":"Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition (CVPR) workshops","author":"Yang","year":""},{"key":"B157","doi-asserted-by":"publisher","first-page":"6126","DOI":"10.1109\/TASE.2023.3322156","article-title":"Dual-attention transformer and discriminative flow for industrial visual anomaly detection","volume":"21","author":"Yao","year":"2023","journal-title":"IEEE Trans. Automation Sci. Eng."},{"key":"B158","doi-asserted-by":"publisher","first-page":"41436","DOI":"10.1109\/ACCESS.2024.3378999","article-title":"Lcg-yolo: a real-time surface defect detection method for metal components","volume":"12","author":"Yu","year":"2024","journal-title":"IEEE Access"},{"key":"B159","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIM.2024.3351241","article-title":"Yolo-hmc: an improved method for pcb surface defect detection","volume":"73","author":"Yuan","year":"2024","journal-title":"IEEE Trans. Instrum. Meas."},{"key":"B160","doi-asserted-by":"publisher","first-page":"103852","DOI":"10.1016\/j.compind.2023.103852","article-title":"Evaluation of deep unsupervised anomaly detection methods with a data-centric approach for on-line inspection","volume":"146","author":"Zeiser","year":"2023","journal-title":"Comput. Industry"},{"key":"B161","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s10278-021-00558-8","article-title":"Unsupervised deep anomaly detection for medical images using an improved adversarial autoencoder","volume":"35","author":"Zhang","year":"2022","journal-title":"J. Digit. Imaging"},{"key":"B162","doi-asserted-by":"publisher","first-page":"109373","DOI":"10.1016\/j.patcog.2023.109373","article-title":"A graph model-based multiscale feature fitting method for unsupervised anomaly detection","volume":"138","author":"Zhang","year":"","journal-title":"Pattern Recognit."},{"key":"B163","article-title":"Diffusionad: norm-guided one-step denoising diffusion for anomaly detection","author":"Zhang","year":"","journal-title":"arXiv"},{"key":"B164","first-page":"6759","article-title":"Unsupervised surface anomaly detection with diffusion probabilistic model","volume-title":"2023 IEEE\/CVF international conference on computer vision (ICCV)","author":"Zhang","year":""},{"key":"B165","article-title":"Exploring plain vit reconstruction for multi-class unsupervised anomaly detection","author":"Zhang","year":"2024","journal-title":"arXiv"},{"key":"B166","doi-asserted-by":"publisher","first-page":"102308","DOI":"10.1016\/j.aei.2023.102308","article-title":"Contrastive and transfer learning-based visual small component inspection in assembly","volume":"59","author":"Zhao","year":"2024","journal-title":"Adv. Eng. Inf."},{"key":"B167","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/icme52920.2022.9859925","article-title":"Focus your distribution: coarse-to-fine non-contrastive learning for anomaly detection and localization","author":"Zheng","year":"2022","journal-title":"arXiv"},{"key":"B168","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.neucom.2021.04.089","article-title":"Vae-based deep svdd for anomaly detection","volume":"453","author":"Zhou","year":"2021","journal-title":"Neurocomputing"},{"key":"B169","doi-asserted-by":"publisher","first-page":"103067","DOI":"10.1016\/j.media.2023.103067","article-title":"Learning image representations for anomaly detection: application to discovery of histological alterations in drug development","volume":"92","author":"Zingman","year":"2024","journal-title":"Med. Image Anal."},{"key":"B170","doi-asserted-by":"publisher","first-page":"109045","DOI":"10.1016\/j.cie.2023.109045","article-title":"Anomaly detection for industrial quality assurance: a comparative evaluation of unsupervised deep learning models","volume":"177","author":"Zipfel","year":"2023","journal-title":"Comput. and Industrial Eng."}],"container-title":["Frontiers in Robotics and AI"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frobt.2025.1554196\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T09:15:18Z","timestamp":1750670118000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frobt.2025.1554196\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":170,"alternative-id":["10.3389\/frobt.2025.1554196"],"URL":"https:\/\/doi.org\/10.3389\/frobt.2025.1554196","relation":{},"ISSN":["2296-9144"],"issn-type":[{"value":"2296-9144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,23]]},"article-number":"1554196"}}