no code implementations • 10 Mar 2023 • Fabian Hartung, Billy Joe Franks, Tobias Michels, Dennis Wagner, Philipp Liznerski, Steffen Reithermann, Sophie Fellenz, Fabian Jirasek, Maja Rudolph, Daniel Neider, Heike Leitte, Chen Song, Benjamin Kloepper, Stephan Mandt, Michael Bortz, Jakob Burger, Hans Hasse, Marius Kloft
Our extensive study will facilitate choosing appropriate anomaly detection methods in industrial applications.
no code implementations • 23 Jan 2023 • Billy Joe Franks, Benjamin Dinkelmann, Sophie Fellenz, Marius Kloft
As is common in popular games, there is a large number of community-designed levels.
1 code implementation • 23 May 2022 • Philipp Liznerski, Lukas Ruff, Robert A. Vandermeulen, Billy Joe Franks, Klaus-Robert Müller, Marius Kloft
We find that standard classifiers and semi-supervised one-class methods trained to discern between normal samples and relatively few random natural images are able to outperform the current state of the art on an established AD benchmark with ImageNet.
Ranked #1 on Anomaly Detection on One-class CIFAR-10 (using extra training data)
no code implementations • 8 Dec 2021 • Billy Joe Franks, Markus Anders, Marius Kloft, Pascal Schweitzer
On the theoretical side, among other results, we formally prove that under natural conditions all instantiations of our framework are universal.
2 code implementations • ICLR 2021 • Philipp Liznerski, Lukas Ruff, Robert A. Vandermeulen, Billy Joe Franks, Marius Kloft, Klaus-Robert Müller
Deep one-class classification variants for anomaly detection learn a mapping that concentrates nominal samples in feature space causing anomalies to be mapped away.
Ranked #5 on Anomaly Detection on One-class ImageNet-30 (using extra training data)
1 code implementation • 30 May 2020 • Lukas Ruff, Robert A. Vandermeulen, Billy Joe Franks, Klaus-Robert Müller, Marius Kloft
Though anomaly detection (AD) can be viewed as a classification problem (nominal vs. anomalous) it is usually treated in an unsupervised manner since one typically does not have access to, or it is infeasible to utilize, a dataset that sufficiently characterizes what it means to be "anomalous."