{"id":"https://openalex.org/W7153204479","doi":"https://doi.org/10.48550/arxiv.2604.07900","title":"AnomalyAgent: Agentic Industrial Anomaly Synthesis via Tool-Augmented Reinforcement Learning","display_name":"AnomalyAgent: Agentic Industrial Anomaly Synthesis via Tool-Augmented Reinforcement Learning","publication_year":2026,"publication_date":"2026-04-09","ids":{"openalex":"https://openalex.org/W7153204479","doi":"https://doi.org/10.48550/arxiv.2604.07900"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.07900","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.07900","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.07900","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017790992","display_name":"Jie Su","orcid":"https://orcid.org/0000-0002-5098-8040"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Su, Jiaming","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133322402","display_name":"Tengchao Yang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yang, Tengchao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133355627","display_name":"Ruikang Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Ruikang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133336826","display_name":"Zhengan Yan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yan, Zhengan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133358741","display_name":"Haoyu Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sun, Haoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133317851","display_name":"Linfeng Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhang, Linfeng","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017790992"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9534000158309937,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9534000158309937,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.007699999958276749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.004100000020116568,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.718999981880188},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6834999918937683},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.6514000296592712},{"id":"https://openalex.org/keywords/iterative-and-incremental-development","display_name":"Iterative and incremental development","score":0.6290000081062317},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4828000068664551},{"id":"https://openalex.org/keywords/reflection","display_name":"Reflection (computer programming)","score":0.4699000120162964},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4462999999523163},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.4417000114917755}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.718999981880188},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6834999918937683},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.6514000296592712},{"id":"https://openalex.org/C143587482","wikidata":"https://www.wikidata.org/wiki/Q1543216","display_name":"Iterative and incremental development","level":2,"score":0.6290000081062317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6225000023841858},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5436000227928162},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49160000681877136},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4828000068664551},{"id":"https://openalex.org/C65682993","wikidata":"https://www.wikidata.org/wiki/Q1056451","display_name":"Reflection (computer programming)","level":2,"score":0.4699000120162964},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4462999999523163},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.4417000114917755},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.3255999982357025},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30660000443458557},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.29510000348091125},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.28290000557899475},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.2768999934196472},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.26600000262260437},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.26489999890327454},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.26460000872612},{"id":"https://openalex.org/C117619785","wikidata":"https://www.wikidata.org/wiki/Q6094414","display_name":"Iterative learning control","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.2547999918460846}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.07900","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.07900","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.07900","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.07900","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.40593186020851135,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"anomaly":[1,14,19,39,49,104,150,172],"generation":[2,25],"is":[3,69,120],"a":[4,108,123,187],"crucial":[5],"method":[6],"for":[7,171],"alleviating":[8],"the":[9,132,145,160,163,183],"data":[10,198],"scarcity":[11],"problem":[12],"in":[13],"detection":[15],"tasks.":[16],"Most":[17],"existing":[18],"synthesis":[20,50,151],"methods":[21],"rely":[22],"on":[23],"single-step":[24],"mechanisms,":[26],"lacking":[27],"complex":[28],"reasoning":[29],"and":[30,56,64,86,96,106,134,179,197],"iterative":[31,57],"optimization":[32],"capabilities,":[33,59],"making":[34],"it":[35],"difficult":[36],"to":[37,61,130,143,148,156,159],"generate":[38,62],"samples":[40],"with":[41,52,71],"high":[42],"semantic":[43],"realism.":[44],"We":[45],"propose":[46],"AnomalyAgent,":[47],"an":[48],"agent":[51],"self-reflection,":[53,97],"knowledge":[54],"retrieval,":[55],"refinement":[58],"aiming":[60],"realistic":[63],"diverse":[65],"anomalies.":[66],"Specifically,":[67],"AnomalyAgent":[68,166],"equipped":[70],"five":[72],"tools:":[73],"Prompt":[74],"Generation":[75,78,88],"(PG),":[76],"Image":[77],"(IG),":[79],"Quality":[80],"Evaluation":[81],"(QE),":[82],"Knowledge":[83],"Retrieval":[84],"(KR),":[85],"Mask":[87],"(MG),":[89],"enabling":[90],"closed-loop":[91],"optimization.":[92],"To":[93],"improve":[94,149],"decision-making":[95],"we":[98],"construct":[99],"structured":[100],"trajectories":[101],"from":[102],"real":[103],"images":[105],"design":[107],"two-stage":[109],"training":[110],"framework:":[111],"supervised":[112],"fine-tuning":[113],"followed":[114],"by":[115,122],"reinforcement":[116],"learning.":[117],"This":[118],"process":[119],"driven":[121],"three-part":[124],"reward":[125],"mechanism:":[126],"(1)":[127],"task":[128],"rewards":[129,142,155],"supervise":[131],"quality":[133],"location":[135],"rationality":[136],"of":[137,169],"generated":[138],"anomalies;":[139],"(2)":[140],"reflection":[141],"train":[144],"model's":[146],"ability":[147],"prompt;":[152],"(3)":[153],"behavioral":[154],"ensure":[157],"adherence":[158],"trajectory.":[161],"On":[162],"MVTec-AD":[164],"dataset,":[165],"achieves":[167],"IS/IC-L":[168],"2.10/0.33":[170],"generation,":[173],"57.0%":[174],"classification":[175],"accuracy":[176],"using":[177,186],"ResNet34,":[178],"99.3%/74.2%":[180],"AP":[181],"at":[182],"image/pixel":[184],"level":[185],"simple":[188],"UNet,":[189],"surpassing":[190],"all":[191],"zero-shot":[192],"SOTA":[193],"methods.":[194],"The":[195],"code":[196],"will":[199],"be":[200],"made":[201],"publicly":[202],"available.":[203]},"counts_by_year":[],"updated_date":"2026-04-11T06:19:08.300824","created_date":"2026-04-11T00:00:00"}
