Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
126 tokens/sec
GPT-4o
47 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Reconstruction-Based Anomaly Localization via Knowledge-Informed Self-Training (2402.14246v1)

Published 22 Feb 2024 in cs.LG and cs.CV

Abstract: Anomaly localization, which involves localizing anomalous regions within images, is a significant industrial task. Reconstruction-based methods are widely adopted for anomaly localization because of their low complexity and high interpretability. Most existing reconstruction-based methods only use normal samples to construct model. If anomalous samples are appropriately utilized in the process of anomaly localization, the localization performance can be improved. However, usually only weakly labeled anomalous samples are available, which limits the improvement. In many cases, we can obtain some knowledge of anomalies summarized by domain experts. Taking advantage of such knowledge can help us better utilize the anomalous samples and thus further improve the localization performance. In this paper, we propose a novel reconstruction-based method named knowledge-informed self-training (KIST) which integrates knowledge into reconstruction model through self-training. Specifically, KIST utilizes weakly labeled anomalous samples in addition to the normal ones and exploits knowledge to yield pixel-level pseudo-labels of the anomalous samples. Based on the pseudo labels, a novel loss which promotes the reconstruction of normal pixels while suppressing the reconstruction of anomalous pixels is used. We conduct experiments on different datasets and demonstrate the advantages of KIST over the existing reconstruction-based methods.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (32)
  1. F. Chen and M. R. Jahanshahi, “NB-CNN: Deep learning-based crack detection using convolutional neural network and naïve Bayes data fusion,” IEEE Trans. Ind. Electron., vol. 65, no. 5, pp. 4392-4400, May 2018.
  2. P. Sassi, P. Tripicchio, and C. A. Avizzano, “A smart monitoring system for automatic welding defect detection,” IEEE Trans. Ind. Electron., vol. 66, no. 12, pp. 9641-9650, Dec. 2019.
  3. Y. Gao, L. Gao, X. Li, and X. Wang, “A multilevel information fusion- based deep learning method for vision-based defect recognition,” IEEE Trans. Instrum. Meas., vol. 69, pp. 3980-3991, Jul. 2020.
  4. Y. Gao, L. Gao, and X. Li, “A generative adversarial network-based deep learning method for low-quality defect image reconstruction and recognition,” IEEE Trans. Ind. Informat., vol. 17, no. 5, pp. 3231-3240, May 2021.
  5. L. Wen, X. Li, and L. Gao,“A new reinforcement learning based learning rate scheduler for convolutional neural network in fault classification,” IEEE Trans. Ind. Electron., vol. 68, no. 12, pp. 12890-12900, Dec. 2021.
  6. L. Wen, L. Gao, and X. Li, “A new deep transfer learning based on sparse auto-encoder for fault diagnosis,” IEEE Trans. Syst., Man, Cybern. Syst., vol. 49, no. 1, pp. 136-144, Jan. 2019.
  7. L. Wen, X. Li, L. Gao, and Y. Zhang,“A new convolutional neural network-based data-driven fault diagnosis method,” IEEE Trans. Ind. Electron., vol. 65, no. 7, pp. 5990-5998, Jul. 2018.
  8. C. Baur, S. Denner, B. Wiestler, S. Albarqouni, and N. Navab, “Autoencoders for unsupervised anomaly segmentation in brain MR images: A comparative study,” Med. Image Anal., vol. 69, Apr. 2021. Art. no. 101952.
  9. S. Youkachen, M. Ruchanurucks, T. Phatrapomnant, and H. Kaneko, “Defect segmentation of hot-rolled steel strip surface by using convolutional auto-encoder and conventional image processing,” in Proc. 10th Int. Conf. Inf. Commun. Technol. Embedded Syst. (IC-ICTES), Mar. 2019, pp. 1–5.
  10. S. Akçay, A. Atapour-Abarghouei, and T. P. Breckon, “Skip-ganomaly: Skip connected and adversarially trained encoder–decoder anomaly detection,” in Proc. Int. Joint Conf. Neural Netw. (IJCNN), 2019, pp. 1–8.
  11. A. S. Collin and C. De Vleeschouwer, “Improved anomaly detection by training an autoencoder with skip connections on images corrupted with stain-shaped noise,” in Proc. IEEE Int. Conf. Pattern Recognit., 2021, pp. 7915-7922.
  12. S. Mei, H. Yang, and Z. Yin, “An unsupervised-learning-based approach for automated defect inspection on textured surfaces,” IEEE Trans. Instrum. Meas., vol. 67, no. 6, pp. 1266-1277, Jun. 2018.
  13. H. Yang, Y. Chen, K. Song, and Z. Yin, “Multiscale feature-clustering-based fully convolutional autoencoder for fast accurate visual inspection of texture surface defects,” IEEE Trans. Autom. Sci. Eng., vol. 16, no. 3, pp. 1450-1467, Jul. 2019.
  14. P. Mishra, C. Piciarelli, and G. L. Foresti, “Image anomaly detection by aggregating deep pyramidal representations,” in Proc. Int. Conf. Pattern Recognit. Cham, Switzerland: Springer, 2021, pp. 705–718.
  15. J. K. Chow, Z. Su, J. Wu, P. S. Tan, X. Mao, and Y. H. Wang, “Anomaly detection of defects on concrete structures with the convolutional autoencoder,” Adv. Eng. Informat., vol. 45, Aug. 2020, Art. no. 101105.
  16. P. Bergmann, S. Löwe, M. Fauser, D. Sattlegger, and C. Steger, “Improving unsupervised defect segmentation by applying structural similarity to autoencoders,” in Proc. 14th Int. Joint Conf. Comput. Vision, Imag. Comput. Graph. Theory Appl., 2019, pp. 372–380.
  17. M. Nakanishi , K. Sato, & Terada, H., “Anomaly Detection By Autoencoder Based On Weighted Frequency Domain Loss.” 2021, arXiv: 2105.10214.
  18. V. Zavrtanik, M. Kristan, and D. Skočaj, “Reconstruction by inpainting for visual anomaly detection,” Pattern Recognit., vol. 112, 2021, Art. no. 107706
  19. D. Gong, L. Liu, V. Le, B. Saha, M. R. Mansour, S. Venkatesh, and A. v. d. Hengel, “Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection,” in IEEE Int. Conf. Comput. Vis., 2019, pp. 1705–1714.
  20. H. Yang, Q. Zhou, K. Song, and Z. Yin, “An anomaly feature-editing-based adversarial network for texture defect visual inspection,” IEEE Trans. Ind. Informat., vol. 17, no. 3, pp. 2220–2230, Mar. 2021.
  21. L. Wang, D. Zhang, J. Guo, and Y. Han, “Image anomaly detection using normal data only by latent space resampling,” Appl. Sci., vol. 10, no. 23, p. 8660, Dec. 2020.
  22. M. Niu, Y. Wang, K. Song, Q. Wang, Y. Zhao, and Y. Yan, “An adaptive pyramid graph and variation residual-based anomaly detection network for rail surface defects,” IEEE Trans. Instrum. Meas., vol. 70, 2021, Art. no. 5020013.
  23. Zadeh L A. “Fuzzy sets,” Inf. Control., vol. 8, no. 3, pp. 338-353, 1965.
  24. K. He, J. Sun and X. Tang, “Guided Image Filtering,” in IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 6, pp. 1397-1409, Jun. 2013.
  25. Y. Huang, C. Qiu, Y. Guo, X. Wang, and K. Yuan, “Surface defect saliency of magnetic tile,” in Proc. IEEE 14th Int. Conf. Autom. Sci. Eng. (CASE), Aug. 2018, pp. 612–617.
  26. J. Božič, D. Tabernik, and D. Skočaj, “Mixed supervision for surface defect detection: From weakly to fully supervised learning,” Comput. Ind., vol. 129, pp. 1–11, 2021.
  27. P. Bergmann, M. Fauser, D. Sattlegger, and C. Steger, “MVTec AD—A comprehensive real-world dataset for unsupervised anomaly detection,” in Proc. IEEE/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), Jun. 2019, pp. 9584–9592
  28. R. R. Boyce and W. A. Clark, “The concept of shape in geography,” Geographical Rev., vol. 54, no. 4, pp. 561–572, 1964.
  29. J. Dombi, “Membership function as an evaluation,” Fuzzy sets Syst., vol. 35, no. 1, pp. 1–21, 1990
  30. V. Kreinovich, O. Kosheleva, and S. N. Shahbazova, “Why triangular and trapezoid membership functions: A simple explanation,” in Proc. World Conf. Soft Comput., Baku, Azerbaijan, May 2018, pp. 1–8.
  31. O. Ronneberger, P. Fischer, and T. Brox, “U-net: Convolutional networks for biomedical image segmentation,” in Proc. Int. Conf. Med. Image Comput. Comput.-Assisted Intervention, 2015, pp. 234-241.
  32. S. Woo, J. Park, J.-Young Lee, and I. S. Kweon, “CBAM: Convolutional block attention module,” in Proc. Eur. Conf. Comput. Vis., 2018, pp. 1-19.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets