PaperHub
4.0
/10
withdrawn4 位审稿人
最低3最高5标准差1.0
3
3
5
5
4.8
置信度
ICLR 2024

Set Features for Anomaly Detection

OpenReviewPDF
提交: 2023-09-18更新: 2024-03-26
TL;DR

A method for detecting anomalies consisting of unusual combinations of normal elments

摘要

关键词
Anomaly DetectionLogical Anomaly DetectionSet Anomaly DetectionTime-Series

评审与讨论

审稿意见
3

The authors present an approach based on set features to detect logical anomalies. This anomaly type consists of samples with unusual combinations of normal elements. The authors extract elements at multiple scales, apply random projections, and compute histograms in the projected spaces. The method is demonstrated in image and time series anomaly detection.

优点

  • The paper is well written and easy to follow.
  • Anomaly detection is an interesting and timely topic.

缺点

  • The method is applicable to a narrow case, specifically when the anomalies are represented by an unusual distribution of normal elements. This setting does not apply to detecting anomalies in general. The proposed method should be integrated within a method able to detect other kinds of anomalies.
  • There are several methods reporting much better results on MVTec-LOCO (see [1]). The authors claim to achieve state-of-the-art results, but according to [1], this is clearly not the case. Since the method does not surpasses competing methods, its benefits are not well justified from a practical point of view.
  • The method is demonstrated for only one bachbone: ResNet. It is not clear how the method generalizes to other backbones.
  • It is not clear if the method applies to large scale datasets, since it relies on kNN.
  • The inference time of the presented method is not discussed.
  • With three lines, the conclusion is too short. The authors did not seem to manage the space too well. The conclusion should be more consistent.
  • There are a few typos here and there that should be corrected:
    • "Fig.2. The average of a set of" => "Fig. 2, the average of a set of".

[1] https://paperswithcode.com/sota/anomaly-detection-on-mvtec-loco-ad

问题

The authors can refer to the identified weaknesses.

评论

“The proposed method should be integrated within a method able to detect other kinds of anomalies.”

We agree and discuss it in the paper.

“Since the method does not surpasses competing methods, its benefits are not well justified from a practical point of view.”

We do outperform on logical anomalies, as well as on series-level time series dataset. Please examine the relevant numbers in Tab.1,2.

“It is not clear if the method applies to large scale datasets, since it relies on kNN”

The method uses a single vector for each image in each kNN index, so it is trivially scalable to hundreds of thousands of images (and can be scaled even further with locally sensitive hashing, if needed).

“The inference time of the presented method is not discussed.”

Our algorithm can run in real-time (>20 images per second)

审稿意见
3

This paper introduces a novel approach to address the challenging problem of anomaly detection, specifically focusing on logical anomalies. The key idea revolves around modeling individual samples using their elemental components and corresponding distributions, ultimately calculating anomaly scores through density estimation on these set descriptors. The study conducts experiments encompassing both visual anomaly detection and time-series anomaly detection.

优点

(1) This work tackles the intricate issue of logical anomalies in anomaly detection, a problem not commonly addressed.

(2) The paper is clear and easy to follow.

(3) The inclusion of experiments covering both image anomaly detection and time-series datasets adds to the paper's breadth and applicability.

缺点

(1) The method relies on a strong assumption that individual elements within a sample are normal, but their combination leads to anomalies (i.e., logical anomalies). However, there is no foolproof way to validate this assumption when a query sample is introduced, casting doubt on the practicality of the algorithm.

(2) The evaluation lacks comprehensiveness as it does not include state-of-the-art (SOTA) anomaly detection algorithms like CutPaste, RD4AD, SimpleNet, PaDim, CS-Flow, etc., in its experiment results (e.g. Figure 1). Over the past year, many anomaly detection algorithms have demonstrated promising results on the MVTec-LOCO benchmark. A comparison against these SOTA algorithms would better establish the effectiveness of the proposed method.

(3) Contemporary anomaly detection algorithms typically generate anomaly score maps, pinpointing the location or segment of abnormality within the query data. It remains unclear whether this method is capable of producing such anomaly localization results.

(4) In implementation details, the authors mention that combining multiple crops of a query sample enhances the proposed method's performance. However, there is no mention of the computational overhead introduced by this approach or whether there is a tradeoff between computational cost and algorithm accuracy. Moreover, it would be valuable to know if applying the strategy of using multiple crops to other methods, such as patchcore, yields similar or better results than the proposed method.

(5) The authors claims in the first page that the usually anomaly detection procedure follows the paradigm of detection-by-segmentation. This claim is too strong and not true. The majority of anomaly detection algorithms are based on data reconstruction and embedding similarity quantification.

问题

Please refer to the weakness section for my questions. In addition, I am wondering if there is a code published for this algorithm?

伦理问题详情

N/A

评论

“The method relies on a strong assumption that individual elements within a sample are normal, but their combination leads to anomalies (i.e., logical anomalies). However, there is no foolproof way to validate this assumption when a query sample is introduce”

Normal samples can be validated on the training set. The inability to expect anomalous properties is shared among all anomaly detection methods, as anomalies are in principle unexpected. Our ability to state the inductive bias that we use is an advantage, as all such methods must rely on an inductive bias. For a longer discussion, please refer to [1].

“A comparison against these SOTA algorithms would better establish the effectiveness of the proposed method.”

We compare against SOTA algorithms, both ones aimed at logical anomalies and general ones. The mentioned methods non-logical anomaly detection methods, and are out-performed by the non-logical anomaly method we do compare to.

“It remains unclear whether this method is capable of producing such anomaly localization results”.

Anomaly localization is out of scope of this work, as discussed in Sec.7.

“there is no mention of the computational overhead introduced by this approach or whether there is a tradeoff between computational cost and algorithm accuracy.”

Our algorithm can run in real-time on multiple GPUs if needed. Even on a single GPU, we may achieve similar performance by starting with a coarse-grained inspection, and more subtle ones to samples suspected as anomalies.

“In addition, I am wondering if there is a code published for this algorithm?”

Yes, please see the supplementary material.

[1] Reiss, T., Cohen, N., & Hoshen, Y. (2023). No Free Lunch: The Hazards of Over-Expressive Representations in Anomaly Detection. arXiv preprint arXiv:2306.07284.

审稿意见
5

The paper proposes set-based representations for effective anomaly detection on datasets of logical defects (such as MVTec-Loco [1] ). The set representation is constructed as the histogram of projected feature values. In the end, the anomaly score is computed by the Mahalanobis score in the set-representation space.

[1] https://www.mvtec.com/company/research/datasets/mvtec-loco

优点

  1. The usage of set features as presented in the paper (i.e., random projections of feature histograms and Mahalanobis distance scoring) is novel for the anomaly detection task to my best understanding.
  2. The method has not only been image but time-series datasets

缺点

  1. The method is not clearly presented. The notations are unclear; What is f_i[j] in Sec. 3.3? How is f in Eq. (1) exactly obtained?
  2. One of the papers main claim that it is the sota on MVTec-Loco, is not valid; the proposed method is outperformed by EfficientAD [2], which is 2 years already outdated. Particularly, the proposed method significantly underperforms in the structural anomaly detection.
  3. The method has not been tested on conventional benchmarks MVTec-AD [3] and VisA [4].
  4. There is no computation cost analysis of the method in the paper. Is this efficient compared to EfficientAD and PatchCore?
  5. Although the usage of histograms can be regarded as new in the anomaly detection task, the method itself is quite a classical one.

[2] Batzner, Kilian, Lars Heckler, and Rebecca König. "Efficientad: Accurate visual anomaly detection at millisecond-level latencies." arXiv preprint arXiv:2303.14535 (2023). [3] Bergmann, Paul, et al. "MVTec AD--A comprehensive real-world dataset for unsupervised anomaly detection." Proceedings of the IEEE/CVF conference on computer vision and pattern recognition. 2019. [4] Zou, Yang, et al. "Spot-the-difference self-supervised pre-training for anomaly detection and segmentation." European Conference on Computer Vision. Cham: Springer Nature Switzerland, 2022.

问题

  1. It would be highly helpful if the authors provide a precise Algorithm of the proposed method.
  2. What is the main difference between the proposed method and PNI [5]?

[5] Bae, Jaehyeok, Jae-Han Lee, and Seyun Kim. "Pni: industrial anomaly detection using position and neighborhood information." Proceedings of the IEEE/CVF International Conference on Computer Vision. 2023.

评论

“the proposed method is outperformed by EfficientAD”

We achieve an average ROC-AUC of 91.2 on MVTec-LOCO logical classes, while EfficientAD achieves ROC-AUC of 86.8 on the logical classes. We also discuss this in the paper.

“The method has not been tested on conventional benchmarks MVTec-AD [3] and VisA [4]”

As discussed in the paper, we focus on logical anomaly detection and suggest using existing methods for standard datasets.

审稿意见
5

The paper presents an algorithm to detect anomalies based on unusual combinations of set features. Multiple 'set' features for each instance might be computed using hand-crafted feature encoders, deepnets, etc. These set features are projected on to multiple histograms to compute histogram sketches that are then concatenated together to form the feature vector for anomaly detection. The objective here is that the featurization should help in detecting unusual combinations of higher-level elements rather than low-level patterns.

优点

  • The intuition behind the histogram descriptors is good

缺点

  1. The paper should present the algorithm better. Currently, some vital information is only in the Introduction (last para on page 1). That should be moved to Section 3 for clarity.

  2. Section 3.1 second paragraph "The typical way ...": While the discussion here refers to only the pooling aspect of deep networks, it overlooks their property of detecting higher-level abstractions. There are multiple feature maps in the layers of deep nets and each feature map detects one type of abstraction. Across multiple feature maps, it can be argued that they learn multiple 'sets' of features and the final task (classification/sequence prediction/anomaly detection) will be a function of the sets of features. Moreover, deepnets can learn the feature map finetuned to the task. In that respect, the proposed algorithm (SINBAD) is limited by the fixed set of histogram projections which cannot be finetuned. For example, such an ability to learn would automatically avoid projections along original axes if they are not discriminative. The point here is that, in theory, there is nothing fundamental about the proposed 'set' based design that a general purpose deepnet cannot do (e.g., for images, ResNet).

  3. The procedure for generating the histogram descriptors should be illustrated either with a simple figure or in algorithm format.

问题

  1. The number of set 'elements' (N_E in Section 3.2) used for each dataset should be presented. How large should this be for good accuracy?

  2. N_P, N_D have not been properly defined before introducing them in Section 3.3. How are the number of histogram projections determined?

  3. Do all set feature dimensions (not their histogram descriptors) need to be the same? i.e, (say) features extracted from different layers of ResNet? The projection matrix P (eqn 1) seems to suggest so.

评论

“limited by the fixed set of histogram projections which cannot be finetuned”

We follow a prominent line of works focusing on better anomaly detection with pretrained features. Fine-tuning the histogram feature may indeed result in additional gain and is an exciting direction for future works.

“there is nothing fundamental about the proposed 'set' based design that a general purpose deepnet cannot do (e.g., for images, ResNet)”

We do not claim that a pre-trained network cannot learn set descriptors in principle, but instead demonstrate how using our method we can create a set descriptor given existing features. As anomaly detection is unsupervised, it is not clear to us that training a large neural network on the normal data will in practice be able to learn effective set features. As our method achieves SOTA results, it can at least serve as a good reference point to the direction the reviewer suggested. Please note that our approach generalizes well also to time-series features, and is not aimed only at one specific task.

“Do all set feature dimensions (not their histogram descriptors) need to be the same”

They do not all need to be the same. The notation was chosen for simplicity of exposition.

评论

We thank the reviewers for the time invested in this review. While we choose to resubmit the paper to another venue, we still wish to address the key concerns of the reviewers in the individual comments below.