{"id":"https://openalex.org/W7138084847","doi":"https://doi.org/10.48550/arxiv.2603.13964","title":"VID-AD: A Dataset for Image-Level Logical Anomaly Detection under Vision-Induced Distraction","display_name":"VID-AD: A Dataset for Image-Level Logical Anomaly Detection under Vision-Induced Distraction","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138084847","doi":"https://doi.org/10.48550/arxiv.2603.13964"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2603.13964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2603.13964","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129646912","display_name":"Hiroto Nakata","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nakata, Hiroto","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111214514","display_name":"Yawen Zou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zou, Yawen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129751878","display_name":"Shunsuke Sakai","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sakai, Shunsuke","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048865991","display_name":"Shun Maeda","orcid":"https://orcid.org/0009-0007-6872-782X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maeda, Shun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030845704","display_name":"Chunzhi Gu","orcid":"https://orcid.org/0000-0001-7280-337X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gu, Chunzhi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129658360","display_name":"Yijin Wei","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wei, Yijin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127135408","display_name":"Shangce Gao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gao, Shangce","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5129711519","display_name":"Chao Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Chao","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5129646912"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9609000086784363,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.004399999976158142,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8622999787330627},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5716000199317932},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5286999940872192},{"id":"https://openalex.org/keywords/logical-conjunction","display_name":"Logical conjunction","score":0.5141000151634216},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.400299996137619},{"id":"https://openalex.org/keywords/logical-consequence","display_name":"Logical consequence","score":0.39340001344680786}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8622999787330627},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6955000162124634},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6305999755859375},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5716000199317932},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5286999940872192},{"id":"https://openalex.org/C21847791","wikidata":"https://www.wikidata.org/wiki/Q191081","display_name":"Logical conjunction","level":2,"score":0.5141000151634216},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.400299996137619},{"id":"https://openalex.org/C134752490","wikidata":"https://www.wikidata.org/wiki/Q374182","display_name":"Logical consequence","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C2776378700","wikidata":"https://www.wikidata.org/wiki/Q3030775","display_name":"Distraction","level":2,"score":0.3822999894618988},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3707999885082245},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3345000147819519},{"id":"https://openalex.org/C203702819","wikidata":"https://www.wikidata.org/wiki/Q17146953","display_name":"Logical data model","level":3,"score":0.32420000433921814},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2948000133037567},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28949999809265137},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.2687999904155731}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2603.13964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2603.13964","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2603.13964","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Logical":[0],"anomaly":[1,58,108],"detection":[2,59,109],"in":[3,11],"industrial":[4],"inspection":[5],"remains":[6],"challenging":[7],"due":[8],"to":[9],"variations":[10],"visual":[12],"appearance":[13],"(e.g.,":[14],"background":[15],"clutter,":[16],"illumination":[17],"shift,":[18],"and":[19,68,76,93,100,127],"blur),":[20],"which":[21],"often":[22],"distract":[23],"vision-centric":[24],"detectors":[25],"from":[26,88,118,132],"identifying":[27],"rule-level":[28],"violations.":[29,102],"However,":[30],"existing":[31],"benchmarks":[32],"rarely":[33],"provide":[34],"controlled":[35],"settings":[36],"where":[37],"logical":[38,57,85,141],"states":[39],"are":[40],"fixed":[41],"while":[42],"such":[43],"nuisance":[44],"factors":[45],"vary.":[46],"To":[47],"address":[48],"this":[49],"gap,":[50],"we":[51],"introduce":[52],"VID-AD,":[53],"a":[54,106],"dataset":[55,159],"for":[56],"under":[60],"vision-induced":[61],"distraction.":[62],"It":[63],"comprises":[64],"10":[65],"manufacturing":[66],"scenarios":[67],"five":[69],"capture":[70,140],"conditions,":[71],"totaling":[72],"50":[73],"one-class":[74],"tasks":[75],"10,395":[77],"images.":[78,120],"Each":[79],"scenario":[80],"is":[81,160],"defined":[82],"by":[83],"two":[84],"constraints":[86],"selected":[87],"quantity,":[89],"length,":[90],"type,":[91],"placement,":[92],"relation,":[94],"with":[95,124],"anomalies":[96],"including":[97],"both":[98],"single-constraint":[99],"combined":[101],"We":[103],"further":[104],"propose":[105],"language-based":[107],"framework":[110],"that":[111,139],"relies":[112],"solely":[113],"on":[114],"text":[115],"descriptions":[116],"generated":[117],"normal":[119],"Using":[121],"contrastive":[122],"learning":[123],"positive":[125],"texts":[126,130],"contradiction-based":[128],"negative":[129],"synthesized":[131],"these":[133],"descriptions,":[134],"our":[135],"method":[136],"learns":[137],"embeddings":[138],"attributes":[142],"rather":[143],"than":[144],"low-level":[145],"features.":[146],"Extensive":[147],"experiments":[148],"demonstrate":[149],"consistent":[150],"improvements":[151],"over":[152],"baselines":[153],"across":[154],"the":[155],"evaluated":[156],"settings.":[157],"The":[158],"available":[161],"at:":[162],"https://github.com/nkthiroto/VID-AD.":[163]},"counts_by_year":[],"updated_date":"2026-03-18T06:31:55.123368","created_date":"2026-03-18T00:00:00"}
