{"id":"https://openalex.org/W4387678033","doi":"https://doi.org/10.1109/icac57885.2023.10275293","title":"Industrial Image Anomaly Detection Method Based on Improved MAE","display_name":"Industrial Image Anomaly Detection Method Based on Improved MAE","publication_year":2023,"publication_date":"2023-08-30","ids":{"openalex":"https://openalex.org/W4387678033","doi":"https://doi.org/10.1109/icac57885.2023.10275293"},"language":"en","primary_location":{"id":"doi:10.1109/icac57885.2023.10275293","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icac57885.2023.10275293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 28th International Conference on Automation and Computing (ICAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100669553","display_name":"Hui He","orcid":"https://orcid.org/0000-0003-0678-4689"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hui He","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014140423","display_name":"Yuanping Xu","orcid":"https://orcid.org/0000-0002-4536-6220"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanping Xu","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101538636","display_name":"Chaolong Zhang","orcid":"https://orcid.org/0000-0003-4990-4636"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chaolong Zhang","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100928878","display_name":"Benjun Guo","orcid":null},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Benjun Guo","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100745405","display_name":"Zhijie Xu","orcid":"https://orcid.org/0000-0002-0524-5926"},"institutions":[{"id":"https://openalex.org/I133837150","display_name":"University of Huddersfield","ror":"https://ror.org/05t1h8f27","country_code":"GB","type":"education","lineage":["https://openalex.org/I133837150"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhijie Xu","raw_affiliation_strings":["School of Computing and Engineering, University of Huddersfield,Queensgate,Huddersfield,UK","School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Engineering, University of Huddersfield,Queensgate,Huddersfield,UK","institution_ids":["https://openalex.org/I133837150"]},{"raw_affiliation_string":"School of Computing and Engineering, University of Huddersfield, Queensgate, Huddersfield, UK","institution_ids":["https://openalex.org/I133837150"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100684974","display_name":"Jin Jin","orcid":"https://orcid.org/0000-0003-3745-3233"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Jin","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023399885","display_name":"Chao Kong","orcid":"https://orcid.org/0000-0003-1291-4881"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Kong","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101947031","display_name":"Jian Huang","orcid":"https://orcid.org/0000-0002-8223-5705"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Huang","raw_affiliation_strings":["School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","School of Software Engineering, Chengdu University of Information Technology, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology,Chengdu,China","institution_ids":["https://openalex.org/I24201400"]},{"raw_affiliation_string":"School of Software Engineering, Chengdu University of Information Technology, Chengdu, China","institution_ids":["https://openalex.org/I24201400"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100669553"],"corresponding_institution_ids":["https://openalex.org/I24201400"],"apc_list":null,"apc_paid":null,"fwci":0.3497,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66067596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.9279000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9269999861717224,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.8701010942459106},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7556112408638},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7371640801429749},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.7147717475891113},{"id":"https://openalex.org/keywords/unsupervised-learning","display_name":"Unsupervised learning","score":0.6441540718078613},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5395284295082092},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5264466404914856},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5010726451873779},{"id":"https://openalex.org/keywords/transformer","display_name":"Transformer","score":0.4990391731262207},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.47283607721328735},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.44421839714050293},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38469111919403076},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11463993787765503}],"concepts":[{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.8701010942459106},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7556112408638},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7371640801429749},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.7147717475891113},{"id":"https://openalex.org/C8038995","wikidata":"https://www.wikidata.org/wiki/Q1152135","display_name":"Unsupervised learning","level":2,"score":0.6441540718078613},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5395284295082092},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5264466404914856},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5010726451873779},{"id":"https://openalex.org/C66322947","wikidata":"https://www.wikidata.org/wiki/Q11658","display_name":"Transformer","level":3,"score":0.4990391731262207},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.47283607721328735},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.44421839714050293},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38469111919403076},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11463993787765503},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C165801399","wikidata":"https://www.wikidata.org/wiki/Q25428","display_name":"Voltage","level":2,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icac57885.2023.10275293","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icac57885.2023.10275293","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 28th International Conference on Automation and Computing (ICAC)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/0c8de0b0-6fca-4e83-8fcb-953b5a6e0edc","is_oa":false,"landing_page_url":"https://pure.hud.ac.uk/en/publications/0c8de0b0-6fca-4e83-8fcb-953b5a6e0edc","pdf_url":null,"source":{"id":"https://openalex.org/S4306402508","display_name":"Huddersfield Research Portal (University of Huddersfield)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I133837150","host_organization_name":"University of Huddersfield","host_organization_lineage":["https://openalex.org/I133837150"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"He, H, Xu, Y, Zhang, C, Guo, B, Xu, Z, Jin, J, Kong, C & Huang, J 2023, Industrial Image Anomaly Detection Method Based on Improved MAE. in 2023 28th International Conference on Automation and Computing (ICAC)., 10275293, IEEE, 28th International Conference on Automation and Computing, Birmingham, United Kingdom, 30/08/23. https://doi.org/10.1109/ICAC57885.2023.10275293","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G5580186096","display_name":null,"funder_award_id":"61203172","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2768282280","https://openalex.org/W2991391304","https://openalex.org/W3023868590","https://openalex.org/W3040266635","https://openalex.org/W3092704883","https://openalex.org/W3114010851","https://openalex.org/W3118600296","https://openalex.org/W3121084473","https://openalex.org/W3135550350","https://openalex.org/W3138516171","https://openalex.org/W3147184966","https://openalex.org/W3159648608","https://openalex.org/W3169651898","https://openalex.org/W3173538657","https://openalex.org/W4289792391","https://openalex.org/W4292105403","https://openalex.org/W4293087434","https://openalex.org/W4312349930","https://openalex.org/W4313156423","https://openalex.org/W4321232185","https://openalex.org/W4377819235","https://openalex.org/W4390875033","https://openalex.org/W6756427901","https://openalex.org/W6777869702","https://openalex.org/W6795435739","https://openalex.org/W6841999147","https://openalex.org/W6849540298","https://openalex.org/W6946229193"],"related_works":["https://openalex.org/W3186512740","https://openalex.org/W3194885736","https://openalex.org/W4363671829","https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202"],"abstract_inverted_index":{"This":[0],"study":[1],"explores":[2],"an":[3,22,137],"improved":[4],"Masked":[5,116],"Autoencoder":[6,117],"(MAE)":[7],"model":[8,153],"for":[9],"anomaly":[10,19,79],"detection":[11],"in":[12,26,74,163],"common":[13],"industrial":[14,48,102],"scene":[15],"images.":[16],"Industrial":[17],"image":[18,78,103],"detection,":[20],"as":[21],"important":[23],"research":[24],"topic":[25],"computer":[27],"vision,":[28],"can":[29],"detect":[30],"abnormal":[31,53],"data":[32],"deviations":[33],"from":[34],"normal":[35,41],"expected":[36],"behavior":[37],"and":[38,60,124,128,157],"ensure":[39],"the":[40,50,55,61,75,88,107,115,131,143],"operation":[42],"of":[43,52,57,63,77,90,130],"various":[44],"systems.":[45],"In":[46,93],"actual":[47],"scenarios,":[49],"scarcity":[51],"samples,":[54],"cost":[56],"labeled":[58],"data,":[59],"lack":[62],"prior":[64],"knowledge":[65],"about":[66],"anomalies":[67],"make":[68,96],"unsupervised":[69,83,97,160],"learning":[70,84,98,161],"methods":[71,85],"widely":[72],"used":[73],"field":[76],"detection.":[80],"However,":[81],"most":[82],"currently":[86],"require":[87],"application":[89],"large-scale":[91],"datasets.":[92],"order":[94],"to":[95,100],"applicable":[99],"small-scale":[101],"datasets,":[104],"we":[105],"replaced":[106],"backbone":[108],"network":[109],"with":[110,140],"Swin":[111],"Transformer":[112],"based":[113],"on":[114,155],"method,":[118],"while":[119],"improving":[120],"its":[121],"mask":[122],"strategy":[123],"optimizer.":[125],"The":[126],"effectiveness":[127],"advantage":[129],"proposed":[132],"method":[133,148],"are":[134],"demonstrated":[135],"through":[136],"experimental":[138],"comparison":[139],"existing":[141],"model,":[142],"results":[144],"show":[145],"that":[146],"this":[147],"is":[149],"better":[150],"than":[151],"MAE":[152],"pretrained":[154],"ImageNet,":[156],"outperforms":[158],"other":[159],"models":[162],"multiple":[164],"categories.":[165]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
