An optimization method for out-of-distribution anomaly detection models

02/02/2023
by   Ji Qiu, et al.
0

Frequent false alarms impede the promotion of unsupervised anomaly detection algorithms in industrial applications. Potential characteristics of false alarms depending on the trained detector are revealed by investigating density probability distributions of prediction scores in the out-of-distribution anomaly detection tasks. An SVM-based classifier is exploited as a post-processing module to identify false alarms from the anomaly map at the object level. Besides, a sample synthesis strategy is devised to incorporate fuzzy prior knowledge on the specific application in the anomaly-free training dataset. Experimental results illustrate that the proposed method comprehensively improves the performances of two segmentation models at both image and pixel levels on two industrial applications.

READ FULL TEXT

page 1

page 2

page 4

research
06/29/2020

Patch SVDD: Patch-level SVDD for Anomaly Detection and Segmentation

In this paper, we tackle the problem of image anomaly detection and segm...
research
05/02/2014

A Rank-SVM Approach to Anomaly Detection

We propose a novel non-parametric adaptive anomaly detection algorithm f...
research
06/16/2023

FABLE : Fabric Anomaly Detection Automation Process

Unsupervised anomaly in industry has been a concerning topic and a stepp...
research
02/21/2023

Using Semantic Information for Defining and Detecting OOD Inputs

As machine learning models continue to achieve impressive performance ac...
research
06/21/2018

Anomaly detection; Industrial control systems; convolutional neural networks

This paper presents a study on detecting cyberattacks on industrial cont...
research
03/22/2023

One-Step Detection Paradigm for Hyperspectral Anomaly Detection via Spectral Deviation Relationship Learning

Hyperspectral anomaly detection (HAD) involves identifying the targets t...
research
04/21/2023

An Optimization Framework For Anomaly Detection Scores Refinement With Side Information

This paper considers an anomaly detection problem in which a detection a...

Please sign up or login with your details

Forgot password? Click here to reset