{"id":"https://openalex.org/W7131209129","doi":"https://doi.org/10.1109/tip.2026.3663923","title":"Unified Anomaly Detection via Multi-Scale Contrasted Memory","display_name":"Unified Anomaly Detection via Multi-Scale Contrasted Memory","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7131209129","doi":"https://doi.org/10.1109/tip.2026.3663923","pmid":"https://pubmed.ncbi.nlm.nih.gov/41734105"},"language":"en","primary_location":{"id":"doi:10.1109/tip.2026.3663923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tip.2026.3663923","pdf_url":null,"source":{"id":"https://openalex.org/S4210173141","display_name":"IEEE Transactions on Image Processing","issn_l":"1057-7149","issn":["1057-7149","1941-0042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Image Processing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086724094","display_name":"Loic Jezequel","orcid":"https://orcid.org/0000-0002-4896-0081"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Lo\u00efc J\u00e9z\u00e9quel","raw_affiliation_strings":["Idemia Identity and Security France, Osny, France"],"raw_orcid":"https://orcid.org/0000-0002-4896-0081","affiliations":[{"raw_affiliation_string":"Idemia Identity and Security France, Osny, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065249088","display_name":"Jean Beaudet","orcid":"https://orcid.org/0000-0002-7242-5986"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jean Beaudet","raw_affiliation_strings":["Idemia Identity and Security France, Osny, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Idemia Identity and Security France, Osny, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126697900","display_name":"Aymeric Histace","orcid":null},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I86175216","display_name":"\u00c9cole Nationale Sup\u00e9rieure de l'\u00c9lectronique et de ses Applications","ror":"https://ror.org/03qeacd72","country_code":"FR","type":"education","lineage":["https://openalex.org/I86175216"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Aymeric Histace","raw_affiliation_strings":["ETIS Laboratory - ENSEA, CYU, CNRS, Cergy, France"],"raw_orcid":"https://orcid.org/0000-0002-3029-4412","affiliations":[{"raw_affiliation_string":"ETIS Laboratory - ENSEA, CYU, CNRS, Cergy, France","institution_ids":["https://openalex.org/I86175216","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126740974","display_name":"Ngoc-Son Vu","orcid":null},"institutions":[{"id":"https://openalex.org/I140494188","display_name":"Universit\u00e9 de Technologie de Troyes","ror":"https://ror.org/01qhqcj41","country_code":"FR","type":"education","lineage":["https://openalex.org/I140494188"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ngoc-Son Vu","raw_affiliation_strings":["LIST3N, Universit&#x00E9; de Technologie de Troyes (UTT), Troyes, France"],"raw_orcid":"https://orcid.org/0000-0003-3498-3335","affiliations":[{"raw_affiliation_string":"LIST3N, Universit&#x00E9; de Technologie de Troyes (UTT), Troyes, France","institution_ids":["https://openalex.org/I140494188"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086724094"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.32924373,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"35","issue":null,"first_page":"2802","last_page":"2815"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.5584999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.5584999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0835999995470047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.04740000143647194,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.823199987411499},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5622000098228455},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.5196999907493591},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.5076000094413757},{"id":"https://openalex.org/keywords/face","display_name":"Face (sociological concept)","score":0.4864000082015991},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.4000999927520752}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.823199987411499},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7300999760627747},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6043999791145325},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5622000098228455},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.5196999907493591},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.5076000094413757},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4864000082015991},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.4000999927520752},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.37380000948905945},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.34209999442100525},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.335999995470047},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.30820000171661377},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2883000075817108},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2815999984741211}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tip.2026.3663923","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tip.2026.3663923","pdf_url":null,"source":{"id":"https://openalex.org/S4210173141","display_name":"IEEE Transactions on Image Processing","issn_l":"1057-7149","issn":["1057-7149","1941-0042"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Image Processing","raw_type":"journal-article"},{"id":"pmid:41734105","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41734105","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE transactions on image processing : a publication of the IEEE Signal Processing Society","raw_type":null},{"id":"pmh:oai:HAL:hal-05535830v1","is_oa":false,"landing_page_url":"https://hal.science/hal-05535830","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Image Processing, 2026, online, pp.1-1. &#x27E8;10.1109/TIP.2026.3663923&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Deep":[0],"anomaly":[1,79,117,124],"detection":[2],"aims":[3],"to":[4,33,76,90,103,113],"provide":[5],"robust":[6],"and":[7,14,29,56,94,136,153,161],"efficient":[8,123],"classifiers":[9],"for":[10],"zero-shot":[11],"(unsupervised,":[12],"UNS)":[13],"few-shot":[15],"(imbalanced":[16],"supervised,":[17],"IMS)":[18],"settings.":[19,58,186],"However,":[20],"current":[21],"models":[22],"still":[23],"struggle":[24],"on":[25,144,166],"edge-case":[26],"normal":[27,72,109],"samples":[28],"are":[30],"often":[31],"unable":[32],"keep":[34],"high":[35],"performance":[36,183],"over":[37],"different":[38],"scales":[39],"of":[40,47,108,116,148,180],"anomalies.":[41],"Additionally,":[42],"there":[43],"is":[44],"a":[45,48,65,85,145],"lack":[46],"unified":[49],"framework":[50],"that":[51,127],"efficiently":[52],"addresses":[53],"both":[54,185],"UNS":[55],"IMS":[57],"To":[59],"address":[60],"these":[61],"limitations,":[62],"we":[63,83,120],"present":[64],"novel":[66,86],"two-stage":[67],"method":[68],"which":[69],"leverages":[70],"multi-scale":[71],"prototypes":[73,135],"during":[74],"training":[75],"compute":[77],"an":[78,122],"deviation":[80,130],"score.":[81],"First,":[82],"employ":[84],"memory-augmented":[87],"contrastive":[88],"learning":[89],"jointly":[91],"learn":[92],"representations":[93],"memory":[95],"modules":[96],"across":[97,184],"multiple":[98],"scales.":[99],"This":[100],"allows":[101],"us":[102],"effectively":[104],"capture":[105],"subtle":[106],"features":[107],"data":[110],"while":[111,164],"adapting":[112],"varying":[114],"levels":[115],"complexity.":[118],"Then,":[119],"train":[121],"distance-based":[125],"detector":[126],"computes":[128],"spatial":[129],"maps":[131],"between":[132],"the":[133,142,176],"learned":[134],"incoming":[137],"observations.":[138],"Our":[139],"model":[140,178],"outperforms":[141],"SoTA":[143],"wide":[146],"range":[147],"anomalies,":[149,155],"including":[150],"object,":[151],"style,":[152],"local":[154],"as":[156,158,175],"well":[157],"industrial":[159],"inspection":[160],"face":[162],"anti-spoofing,":[163],"being":[165],"par":[167],"with":[168],"SoTa":[169],"out-of-distribution":[170],"detectors.":[171],"Notably,":[172],"it":[173],"stands":[174],"first":[177],"capable":[179],"maintaining":[181],"exceptional":[182]},"counts_by_year":[],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2026-02-25T00:00:00"}
