<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Enhancing the Evaluation of Fault Detection Models in Smart Agriculture Using LLM Agents for Rule-Based Anomaly Generation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Paolo</forename><surname>Lindia</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università della Calabria</orgName>
								<address>
									<settlement>Rende (CS)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Riccardo</forename><surname>Cantini</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università della Calabria</orgName>
								<address>
									<settlement>Rende (CS)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Bettucci</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Università degli studi di Padova</orgName>
								<address>
									<settlement>Legnaro (PD)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Luigi</forename><surname>Sartori</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Università degli studi di Padova</orgName>
								<address>
									<settlement>Legnaro (PD)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Paolo</forename><surname>Trunfio</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Università della Calabria</orgName>
								<address>
									<settlement>Rende (CS)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Relatech SpA</orgName>
								<address>
									<settlement>Rende (CS)</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Enhancing the Evaluation of Fault Detection Models in Smart Agriculture Using LLM Agents for Rule-Based Anomaly Generation</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">BB456638DF044CB826E393070C560FF7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T16:38+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Smart Agriculture</term>
					<term>Large Language Models</term>
					<term>Agentic Workflows</term>
					<term>Predictive maintenance</term>
					<term>Green AI</term>
					<term>Environmental Sustainability</term>
					<term>Internet of Things</term>
					<term>Anomaly Detection</term>
					<term>Anomaly Generation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the context of Agriculture 4.0, advanced technologies such as the Internet of Things (IoT), artificial intelligence (AI), and big data analytics play a critical role in enhancing the efficiency and sustainability of farming operations. These innovations enable real-time monitoring and decision-making, improving the efficiency, sustainability, and productivity of agricultural systems. Central to Agriculture 4.0 is the deployment of sensors embedded in agricultural machinery, such as tractors, which continuously collect data on key operational metrics, including engine performance, fuel consumption, soil conditions, and equipment health. The effective analysis of such data is essential for predictive maintenance, as early detection of potential anomalies can prevent costly breakdowns and reduce downtime. However, finding real-world datasets containing examples of anomalies in agricultural machinery is highly challenging, making it difficult to develop and assess the effectiveness of anomaly detection models. Additionally, classical methods for anomaly generation, such as stochastic and adversarial approaches, may be difficult to apply given the intricate patterns and time dependency of these data. To address this gap, our work leverages Large Language Models (LLMs) and agentic workflows to generate realistic anomaly scenarios from agricultural data. Using a rule-based approach that combines prompt engineering techniques with a multiagent system, we create synthetic anomalies that can later be used to evaluate anomaly detection models. These models would then enable the timely identification of potential machinery failures, reducing maintenance costs, minimizing downtime, and significantly lowering the environmental impact by preventing inefficiencies such as increased fuel consumption from faulty equipment, reducing the need for replacement parts, and conserving energy and resources used in repairs.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>IoT sensor networks are increasingly leveraged in Industry 4.0 and Smart Agriculture to enhance productivity and sustainability through advanced sensing, data fusion, and machine learning. In this context, anomaly detection techniques can be effectively applied for real-time monitoring of machinery and systems, preventing failures and optimizing operational efficiency <ref type="bibr" target="#b0">[1]</ref>.</p><p>In Smart Agriculture, anomaly detection techniques primarily rely on multivariate streams of sensor data, consisting of measurements taken from multiple sensors at regular intervals. Due to the unique challenges inherent in IoT sensor data, such as temporal and spatial correlations, high dimensionality, and inherent noise, recent techniques increasingly rely on deep learning methods. Specifically, autoencoders and recurrent or convolutional neural networks have been employed for their ability to handle complex Envelope paolo.lindia@dimes.unical.it (P. Lindia); rcantini@dimes.unical.it (R. Cantini); francesco.bettucci@phd.unipd.it (F. Bettucci); luigi.sartori@unipd.it (L. Sartori); trunfio@dimes.unical.it (P. Trunfio) Orcid 0000-0002-7550-1331 (P. Lindia); 0000-0003-3053-6132 (R. Cantini); 0009-0001-3758-1158 (F. Bettucci); 0000-0001-6437-3402 (L. Sartori); 0000-0002-5076-6544 (P. Trunfio) and noisy datasets <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4]</ref>. Despite the demonstrated effectiveness of such methods, identifying representative anomalous data for testing purposes remains a significant challenge, particularly in IoT settings where data is spatiotemporal and real-world anomalies are often rare or difficult to observe. Anomaly generation becomes therefore crucial in overcoming this challenge by enabling the creation of synthetic anomalies that closely resemble real-world data distributions. Classical methods for anomaly generation, such as rule-based or stochastic approaches, often fail to capture the complex dependencies between spatial and temporal features, resulting in unrealistic anomalies. In addition, while more sophisticated techniques like adversarial methods and latent models can generate realistic data, they are computationally expensive and require extensive tuning, which may hinder their application in this domain.</p><p>To address these limitations, we propose a novel rule-based anomaly generation approach that leverages the context-aware capabilities of Large Language Models (LLMs). Our methodology extends beyond a single LLM by employing LLM agents in a collaborative workflow, where each agent contributes specialized knowledge to produce the final synthetic anomalies. By incorporating LLM agents into the rule generation process, we enable a more informed, context-driven creation of anomalies that better reflect the spatiotemporal complexities of IoT sensor data. This hybrid approach combines the interpretability and simplicity of rule-based methods with the nuanced understanding and adaptability of LLM agents, resulting in a more efficient and realistic anomaly generation process suitable for testing detection algorithms in dynamic, real-world environments.</p><p>The main contributions of the paper can be summarized as follows:</p><p>• We advance the application of LLM agents in Smart Agriculture, showing how such systems can cooperate within an agentic workflow to generate realistic synthetic anomalies. • The proposed method integrates a rule-based approach with the capabilities of LLMs, addressing the limitations of traditional methods in handling high-dimensional spatiotemporal IoT data. • Our approach enhances the testing of anomaly detection systems, leading to more reliable realtime monitoring and improved operational efficiency.</p><p>The remainder of the paper is organized as follows. In Section 2, we discuss related work in the field of anomaly generation, highlighting the main applications of LLMs to Smart Agriculture. Section 3 provides an in-depth description of the proposed approach showing its application to a real-world case study. Finally, Section 4 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>Large Language Models (LLMs) have recently gained significant traction due to their remarkable natural language understanding and generation capabilities <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>. These systems are increasingly being integrated into Smart Agriculture, providing powerful tools for data-driven decision-making and precision farming. Conversational assistants powered by LLM agents provide farmers and agricultural professionals with insights drawn from vast datasets to support resource management, enhance crop health, and optimize environmental conditions, thereby improving productivity and sustainability <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>.</p><p>In this work, we explore how LLM-based agents can be synergistically leveraged in the field of smart agriculture to generate synthetic real-world anomalies. This task is critical for improving and evaluating the performance of anomaly detection systems. Several methodologies have been developed to generate synthetic anomalies that closely resemble real-world scenarios, enabling a robust assessment of detection algorithms. Major approaches in the literature leverage conditional generation approaches and Generative Adversarial Networks (GANs), in which two neural networks-a generator and a discriminator-compete with each other during the training process. Specifically, the discriminator tries to create realistic synthetic data, i.e., anomalous instances, while the discriminator tries to differentiate between normal and anomalous data. This process leads to the generation of highly realistic anomalies that closely resemble actual outliers, making GANs particularly useful in testing the robustness of anomaly detection systems. As an example, Uzolas et al. leverage conditional GANs for the generation of realistic single-chromosome images following user-defined banding patterns <ref type="bibr" target="#b9">[10]</ref>, while Salem et al. <ref type="bibr" target="#b10">[11]</ref> uses a Cycle-GAN to generate synthetic anomalous data from normal data for improving anomaly detection in imbalanced datasets. Zhang et al. <ref type="bibr" target="#b11">[12]</ref> introduce DefectGAN, which generates anomaly samples by superimposing learned defect foregrounds onto a normal background, while Niu et al. propose SDGAN <ref type="bibr" target="#b12">[13]</ref>, which modifies defect-free images to introduce surface defects using a generator trained with cycle consistency loss on both normal and anomalous images. Duan et al. <ref type="bibr" target="#b13">[14]</ref> introduce a few-shot defect image generation technique, producing structural anomalies from a limited set of defect samples. It enhances a pre-trained StyleGAN2 backbone by adding defect-aware residual blocks to manipulate features within learned defect masks.</p><p>Besides GANs, Diffusion Models (DMs) have been also leveraged for generating synthetic anomalies by perturbing normal patterns. DMs are a family of probabilistic generative models that progressively add noise to data and then learn to reverse this process to generate new samples. In the field of anomaly generation, Dai et al. present GRAD <ref type="bibr" target="#b14">[15]</ref>, an unsupervised anomaly detection framework using a diffusion model called PatchDiff to generate contrastive patterns by disrupting global structures while preserving local ones. GRAD also includes a self-supervised reweighting mechanism and a lightweight detector to efficiently identify anomalies. Hu et al. <ref type="bibr" target="#b15">[16]</ref> propose a diffusion-based few-shot anomaly generation model, leveraging the strong prior knowledge of a latent diffusion model trained on large datasets to improve the realism of generated anomalies. Zhang et al. introduce RealNet <ref type="bibr" target="#b16">[17]</ref>, another diffusion-based approach that relies on Strength-controllable Diffusion Anomaly Synthesis (SDAS) to generate synthetic anomalies of varying strengths, mimicking real-world anomalies. RealNet also incorporates feature selection and residual detection methods to improve anomaly detection while managing computational cost, showing significant improvements on several benchmark datasets.</p><p>While these anomaly synthesis methods are effective, they depend on real defect images and cannot generate unseen types of anomalies. Furthermore, these methods are usually computationally intensive and often require extensive tuning to produce meaningful results.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Proposed Approach: Leveraging LLM Agents for Anomaly Generation in Agricultural Machinery</head><p>In this section, we provide a detailed description of the proposed approach aimed at generating realworld anomalies in multivariate sensor data from agricultural machinery, specifically tractors. We leverage an agentic workflow in which different LLM agents interact with each other to produce high-quality anomalous test data. The proposed methodology is articulated in two main phases:</p><p>1. Best LLM selection via zero-shot operational range generation -First, the best LLM must be selected from all those available, including GPT-4o and LLama3.1. For this purpose, CAN bus sensor data from tractors are analyzed to extract the operational ranges of the different variables considered. By comparing these real ranges with those generated by various Large Language Models (LLMs) through zero-shot prompting, we identify the LLM that exhibits the highest level of expertise in the domain of agriculture and tractor operations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Anomaly generation through an agentic workflow -The methodology employs an agentic workflow</head><p>to generate anomalies, which involves collaboration between two LLM-based agents: (𝑖) the first agent generates anomaly rules based on insights from the selected LLM; (𝑖𝑖) the second agent transforms the generated rules into executable Python code. This code applies the anomalies to the original non-anomalous data, effectively simulating real-world deviations and faults.</p><p>Finally, as the test anomalies are generated, they are used to assess the performance of deep learningbased anomaly detection models. Specifically, an LSTM-based autoencoder is trained on a dataset representing a work session of the tractor and then tested against the synthetic anomalies generated as described above. This approach mimics real-world processes of anomaly detection in agricultural machinery, allowing for an assessment of the effectiveness of the generated anomalies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Best LLM selection via zero-shot operational range generation</head><p>Figure <ref type="figure" target="#fig_1">1</ref> depicts the flowchart used in the first phase of the methodology, dedicated to selecting the LLM that exhibits the highest expertise in the agricultural domain, specifically regarding tractors and their sensor data. The selection process involves several LLMs, specifically GPT-4o, Llama 3.1 70B, Gemini Pro, and Mistral Large 2. Their effectiveness is measured by their ability to generate operational ranges for key tractor variables, which are then compared to the actual ranges extracted from tractor sensor data.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Operational range generation via Zero-shot Prompting Real operational range extraction</head><p>Sensor data</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Range evaluation LLM selection</head><p>Jaccard Score In the following yellow box, we report the prompt used for querying the different LLMs to generate operational ranges of variables. Each model is provided with a prompt containing the variable name, its unit of measurement, and a description. Generation is performed through zero-shot prompting, which means that the prompt used to interact with the model does not include any example or demonstration.</p><p>As a seasoned expert in New Holland T7 165 S tractors, we seek your expertise in diagnosing various operational variables retrieved from the CAN bus of the tractor. You are provided with a list of variables, each with its name, unit of measurement, and description. These variables are listed according to the following format: -&lt;var_name&gt; (&lt;unit&gt;): &lt;description&gt;. Your task is to generate the operational range of each variable, which jointly takes into account the different activities performed by the tractor, i.e. idling, moving, plowing, and turning.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Format your output as follows:</head><p>-&lt;var_name&gt;: &lt;operational_range&gt; (&lt;unit&gt;) -…</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Input variables:</head><p>-CAN1.LFE1.EngineFuelRate (l/h): Amount of fuel consumed by the engine per unit of time. -CAN1.EFLP1.EngineOilPressure1 (kPa): Gage pressure of oil in the engine lubrication system as provided by the oil pump. -… Table <ref type="table" target="#tab_0">1</ref> presents the operational ranges generated by each LLM for the various key variables associated with tractor sensor data. Each row of the table details the ranges produced by the evaluated models for a given variable, while the final column provides the actual ranges extracted from the sensor data. This comparative analysis highlights the discrepancies and alignments between the internal knowledge of LLMs and real-world data, which are crucial for determining the most effective LLM for the subsequent phases of the methodology.</p><p>To quantitatively assess the accuracy of LLM-generated ranges, we compared them with ground truth values derived from tractor sensor data by introducing a continuous version of the Jaccard index that quantifies the similarity between two ranges. Given two intervals [𝑙 1 , 𝑢 1 ] and [𝑙 2 , 𝑢 2 ], where 𝑙 1 and 𝑢 1 represent the lower and upper bounds of the first interval, and 𝑙 2 and 𝑢 2 represent the bounds of the Zero-shot generation of the operational range for the selected features using different LLMs. Real ranges, extracted from sensor data, are shown for reference.</p><p>second interval, the Jaccard similarity (𝐽 ) for intervals is defined as follows. Let:</p><p>• 𝑈 = max(𝑢 1 , 𝑢 2 ) − min(𝑙 1 , 𝑙 2 ) be the union of the two intervals (i.e., total covered range length).</p><p>• 𝐼 = max(0, min(𝑢 1 , 𝑢 2 ) − max(𝑙 1 , 𝑙 2 )) be the intersection of the intervals, which is calculated based on the overlap between the intervals. 𝐼 = 0 if the intervals do not overlap. Otherwise, 𝐼 represents the length of the overlapping interval.</p><p>Then, the Jaccard similarity for intervals can be expressed as 𝐽 ([𝑙 1 , 𝑢 1 ], [𝑙 2 , 𝑢 2 ]) = 𝐼 𝑈 , with 𝐽 ∈ [0, 1] where 0 means no overlap, and 1 means the intervals are identical. For each variable, the average Jaccard similarity score was calculated across all comparisons between the real and generated ranges. The LLM with the highest average Jaccard score was selected as the most appropriate model for generating anomaly rules in the subsequent steps of the proposed methodology. Figure <ref type="figure" target="#fig_2">2</ref> illustrates the win rates of the evaluated LLMs alongside the average Jaccard interval scores achieved by each model. The plot shows that GPT-4o consistently outperforms all other models and demonstrates good accuracy in generating intervals that closely resemble the actual operational ranges extracted from tractor sensor data, confirming its suitability as the chosen model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Anomaly generation through an agentic workflow</head><p>Once the most appropriate LLM is selected, the anomaly generation process is performed through an agentic workflow, as illustrated in Figure <ref type="figure" target="#fig_3">3</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>LLM selection Agent 1 -Expert Farmer Agent 2 -Expert Developer</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Prompt chaining</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Generation of realworld anomaly instances</head><p>Generation of a set of rules for each anomaly instance This workflow involves two LLM-based agents:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Zero-shot prompting</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Python script generation</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Application of rules to test data</head><p>• Expert farmer: Its role is to generate realistic cases of anomalies in the form of rules that can be applied to test data, resulting in anomalous test instances. • Expert developer: Its role is to convert the set of rules generated by the expert farmer into a runnable Python script, which can be executed, via tool use, on the test dataset to produce a structured set of anomalous test instances for benchmarking anomaly detection methods.</p><p>In the following sections, the prompts used to query the LLM-based agents are shown, along with the generated output.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1.">Expert farmer Agent -Anomaly generation via prompt chaining</head><p>In this step, the prompt chaining technique is employed to generate meaningful anomaly instances, as indicated by the green-colored boxes. Using prompt chaining, a sequence of prompts generates complex outputs by linking multiple tasks together. Initially, the agent (i.e., the expert farmer) generates a set of significant anomaly cases across various activities, such as plowing, moving, turning, and idle</p><p>These anomalies are then used to create rules that modify the operational ranges of the variables, thereby generating anomalies. For each anomaly, a corresponding rule is created that specifies its duration and how the operational ranges are altered to simulate the anomaly within the data. These rules are then passed to the second agent (i.e., the expert developer) for further processing.</p><p>As a seasoned expert in New Holland T7 165 S tractors, we seek your expertise in diagnosing various operational variables retrieved from the CAN bus of the tractor. You are provided with a list of variables, each with its name, operational range, unit of measurement and description. These variables are listed according to the following format: -&lt;var_name&gt; (&lt;operational_range&gt; &lt;unit&gt;): &lt;description&gt;. Your task is to generate instances of significant anomalies based on the activity performed by the tractor, i.e., "plowing, " "moving, " "turning, " "starting, " and "idling". Each anomaly instance must include:</p><p>-a description of the anomaly instance -the list of variables involved in the anomaly instance -the activity performed by the tractor when the anomaly shows up.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Format your output as follows:</head><p>-&lt;instance_name&gt;: &lt;description&gt; -variables involved:</p><p>-&lt;var_name&gt; -… -&lt;activity_performed&gt; -…</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Input variables:</head><p>-CAN1.LFE1.EngineFuelRate (0 -29.35 l/h): Amount of fuel consumed by the engine per unit of time. -CAN1.EFLP1.EngineOilPressure1 (96 -536 kPa): Gage pressure of oil in the engine lubrication system as provided by the oil pump. -… Based on: (𝑖) the generated anomaly instances, (𝑖𝑖) the descriptions, (𝑖𝑖𝑖) the activities performed, and (𝑖𝑣) the operational range of the involved variables, generate a set of rules for each anomaly instance describing how each variable involved varies numerically. Also, specify the overall duration of the anomaly for each instance. Consider that the session in which the anomalies will be applied lasts approximately 2 hours, with observations recorded at a frequency of 1 Hz.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Format your output as follows:</head><p>-&lt;instance_name&gt; (&lt;activity_performed&gt;):</p><p>-&lt;duration&gt; -rules:</p><p>-</p><formula xml:id="formula_0">&lt;var_name&gt;: &lt;rule_description&gt; -… -…</formula><p>Table <ref type="table">2</ref> presents the output generated by the first agent. Specifically, the following information is reported:</p><p>• The anomaly name, which concisely describes the issue. • The performed activity during which the anomaly occurs.</p><p>• An issue description that provides useful details on how the anomaly affects the normal operation of the tractor. • The duration of the anomaly.</p><p>• The variables affected.</p><p>• The associated rules specifying how each variable deviates from its expected range over time. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Anomaly instances generated by GPT-4o. Each instance includes a description and a set of associated features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2.">Expert developer Agent -Python script generation and application of rules to test data</head><p>The second agent, acting as a Python programming expert, is prompted to transform the anomaly rules, generated by the expert farmer LLM agent, into an executable Python script.</p><p>As an expert Python developer, we seek your assistance in code scripting. You are provided with a set of rules for different anomaly instances that describe how each variable involved varies numerically, along with the overall duration of the anomaly. Anomaly instances are listed according to the following format:</p><p>-&lt;instance_name&gt; (&lt;activity_performed&gt;):</p><p>-&lt;duration&gt; -rules:</p><p>-&lt;var_name&gt;: &lt;rule_description&gt; -…</p><p>Based on this information, generate a Python function that applies a given anomaly instance to a time series of sensor data. The code must adhere to the following requirements:</p><p>-all anomaly instances are handled; -random values are used instead of fixed anomalous values; -the input dataframe is read from a csv given as input; the start time and the anomaly to be applied are given as input; -output the required function without any example usage.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Input anomaly instances:</head><p>-Fuel Consumption Spike (Plowing):</p><p>-10 minutes -rules:</p><p>-CAN1.LFE1.EngineInstantaneousFuelEconomy: Drops below 20 km/l from a normal range of 50-70 km/l. -CAN1.LFE1.EngineFuelRate: Increases to above 20 l/h from a normal range of 5-10 l/h. -CAN1.EEC2.EnginePercentLoadAtCurrentSpeed: Increases to above 80% from a normal range of 30-50%.</p><p>-…</p><p>In this case, as shown in the blue-colored box, zero-shot prompting is employed, wherein the agent generates a Python script based on the provided anomaly rules without any prior examples or specific training data. The script is designed to take the clean, non-anomalous test dataset as input and apply the anomalies according to the rules generated by the first agent. The generated script is executed to create four distinct datasets by applying the anomalies to the test dataset for each possible activity.</p><p>Through this agentic workflow, the entire process of anomaly rule generation and application can be automated, providing a robust method for simulating consistent anomalous behaviors. This, in turn, supports the evaluation of anomaly detection models, by providing realistic and domain-specific anomalies that accurately reflects potential issues that could arise in real-world operations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Auto-encoder evaluation on synthetic test anomalies</head><p>Here we show how the previously generated anomalous test datasets can be effectively leveraged to assess the effectiveness of a deep learning-based anomaly detection model. In particular, for each possible activity, including plowing, moving, turning, or idle, an LSTM autoencoder is trained on a normal working session, encompassing non-anomalous data from CAN bus sensors (see Figure <ref type="figure" target="#fig_4">4</ref>). The LSTM autoencoder works by reconstructing the input time series. A large reconstruction error suggests that the input data may deviate from normal patterns, indicating an anomaly. The detection performance of each autoencoder is measured using the Area Under the Receiver Operating Characteristic Curve (AUC) score. It ranges from 0 to 1, where a score of 1 indicates perfect separation between anomalies and normal data, while 0.5 suggests that the model is equivalent to random guessing.</p><p>Figure <ref type="figure" target="#fig_6">5</ref> presents the ROC curves for the four anomalous instances considered during the anomaly generation process. Each curve illustrates the model's ability to distinguish between anomalous and non-anomalous data across a diverse set of potential scenarios. Specifically, two cases (figure <ref type="figure" target="#fig_6">5b and  5d</ref>) achieve perfect classification (AUC = 1.00), while the other two cases (figure <ref type="figure" target="#fig_6">5a and 5c</ref>) show strong (AUC = 0.90) and moderate (AUC = 0.76) performance, respectively. These results suggest that the model is highly effective in detecting anomalies, with some variability depending on the specific type of anomaly and the amount of training data from sensors. Furthermore, the ability to generate activity-specific test data facilitates a more granular analysis of model performance, providing insights into how different types of anomalies might be detected in real-world deployments.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>In this work, we advance the application of LLM agents in Smart Agriculture by proposing a rulebased approach for the automatic generation of synthetic anomalies in agricultural machinery. By generating realistic, domain-specific anomalies, the system creates a rich dataset that accurately reflects potential issues that could arise in real-world operations. This enables effective evaluation of anomaly detection models and allows researchers and developers to test their algorithms against a variety of plausible scenarios. The generated datasets support thorough benchmarking, helping to identify the strengths and weaknesses of different anomaly detection methods. Moreover, the ability to generate diverse datasets tailored to specific activities-such as plowing, moving, turning, and idling-facilitates more granular analysis of model performance. This can lead to insights into how different types of anomalies might affect operational efficiency, safety, and tractor maintenance. Ultimately, the proposed methodology fosters an iterative feedback loop, where the performance of anomaly detection models can be continuously improved based on simulated data. This enhances their robustness and reliability in realworld applications, ensuring efficient utilization of agricultural resources and paving the way for more sustainable agricultural practices. Future work will focus on integrating domain-specific knowledge through agentic RAG (Retrieval-Augmented Generation), further improving context awareness of the system and enabling LLMs to better comprehend complex scenarios.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>1st</head><label></label><figDesc>Workshop on Green-Aware Artificial Intelligence, 23rd International Conference of the Italian Association for Artificial Intelligence (AIxIA 2024), November 25-28, 2024, Bolzano, Italy * Corresponding author. Authors contribution: P.L., R.C., P.T.: Conceptualization, Investigation, Methodology, Software, Validation; F.B., L.S.: Data curation, Validation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Best LLM selection via zero-shot operational range generation.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: LLM win rates graph with average Jaccard interval score achieved by the tested LLMs. Each edge ℳ 𝑖 → ℳ 𝑗 represents the percentage of features where ℳ 𝑖 achieved a higher Jaccard score compared to ℳ 𝑗 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Agentic workflow for anomalies generation</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: LSTM auto-encoder testing on anomalous generated data for a given activity.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: LSTM auto-encoder evaluation for each anomaly instance.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc></figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>ID Anom. Name Activity Issue description</head><label></label><figDesc></figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>Dur.</cell><cell>Involved features</cell><cell>Rule descriptions</cell></row><row><cell>1</cell><cell>Fuel Consumption Spike</cell><cell>Plowing</cell><cell>The tractor shows unusually high fuel consumption during operation, despite consistent speed and load. Instantaneous fuel economy drops sharply, and the fuel rate is well above normal.</cell><cell>10 min</cell><cell>CAN1.LFE1.EngineInstantaneousFuelEconomy CAN1.LFE1.EngineFuelRate CAN1.EEC2.EnginePercentLoadAtCurrentSpeed</cell><cell>Drops below 20 km/l from a normal range of 50-70 km/l. Increases to above 20 l/h from a normal range of 5-10 l/h. Increases to above 80% from a normal range of 30-50%.</cell></row><row><cell>2</cell><cell>Overheating Engine</cell><cell>Moving</cell><cell>The tractor's engine temperature suddenly rises above normal limits, increasing fan speed to compensate. Since intake air temperature and pressure remain normal, this indicates a potential issue with the cooling system.</cell><cell>20 min</cell><cell>CAN1.IC1.EngnIntkMnfld1Tmprtr CAN1.FD1.FanSpeed CAN1.EFLP1.EngineOilPressure1</cell><cell>Rises to above 67 ∘ C from a normal range of 20-40 ∘ C. Increases to above 2000 rpm from a normal range of 1200-1600 rpm. Drops below 100 kPa from a normal range of 200-400 kPa.</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>CAN1.EEC1.EngineSpeed</cell><cell>Fluctuates between 1800-2200 rpm from a normal steady range of 1500-1700 rpm.</cell></row><row><cell>3</cell><cell>Torque Instability</cell><cell>Turning</cell><cell>The tractor's engine torque output fluctuates, causing jerky movements and inefficient performance. A misalignment between requested and actual torque values suggests an issue with the engine control system.</cell><cell>15 min</cell><cell>CAN2.TSC1.EngnRqstdTrqTrqLmt_0 CAN1.EEC1.EngineDemandPercentTorque CAN1.EEC1.ActualEnginePercentTorque</cell><cell>Varies erratically between -50% and 100% from a normal steady range of 20-40%. Fluctuates between 0% and 99% from a normal steady range of 30-60%. Deviates between 0% and 98% from a normal steady range of 30-60%.</cell></row><row><cell>4</cell><cell>Battery Voltage Drop</cell><cell>Idle</cell><cell>The tractor's battery voltage drops below the normal range, potentially causing electrical issues like erratic behavior of control units.</cell><cell>30 min</cell><cell>CAN1.VEP1.BatteryPotentialPowerInput1 CAN1.VEP1.KeySwitchBatteryPotential</cell><cell>Drops below 11.37 V from a normal range of 12.5-14 V. Drops below 11.37 V from a normal range of 12.5-14 V.</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been funded by the project "AGRITECH: National Research Centre for Agricultural Technologies" -CUP CN00000022, of the National Recovery and Resilience Plan (PNRR) financed by the European Union "Next Generation EU", and by the "FAIR -Future Artificial Intelligence Research" project -CUP H23C22000860006.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Anomaly detection for iot time-series data: A survey</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Cook</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Mısırlı</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Fan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet of Things Journal</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="6481" to="6494" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Squeezed convolutional variational autoencoder for unsupervised anomaly detection in edge device industrial internet of things</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Chung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cho</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kim</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2018 international conference on information and computer technologies (icict)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="67" to="71" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Multidimensional time series anomaly detection: A gru-based gaussian mixture variational autoencoder approach</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Guo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Liao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Ji</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Asian Conference on Machine Learning</title>
				<meeting><address><addrLine>PMLR</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="97" to="112" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Outlier detection for multidimensional time series using deep neural networks</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kieu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Jensen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2018 19th IEEE international conference on mobile data management (MDM), IEEE</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="125" to="134" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Language models are few-shot learners</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Brown</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2005.14165</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Large language models are zero-shot reasoners</title>
		<author>
			<persName><forename type="first">T</forename><surname>Kojima</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename><surname>Gu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Reid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Matsuo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Iwasawa</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in neural information processing systems</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="22199" to="22213" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">X</forename><surname>Zhao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Min</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Dong</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2303.18223</idno>
		<title level="m">A survey of large language models</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
	<note type="report_type">arXiv preprint</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Decision support in a smart greenhouse using large language model with retrieval augmented generation</title>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">N</forename><surname>Glukhikh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">Y</forename><surname>Chernysheva</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">A</forename><surname>Shentsov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Third International Conference on Digital Technologies, Optics, and Materials Science</title>
				<meeting><address><addrLine>DTIEE</addrLine></address></meeting>
		<imprint>
			<publisher>SPIE</publisher>
			<date type="published" when="2024">2024. 2024</date>
			<biblScope unit="volume">13217</biblScope>
			<biblScope unit="page" from="166" to="173" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Reconnoitering precision agriculture and resource management: A comprehensive review from an extension standpoint on artificial intelligence and machine learning</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Raman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sarkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Yadav</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mukherjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Meena</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Indian Research Journal of Extension Education</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<biblScope unit="page" from="108" to="123" />
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Deep anomaly generation: An image translation approach of synthesizing abnormal banded chromosome images</title>
		<author>
			<persName><forename type="first">L</forename><surname>Uzolas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rico</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Coupé</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Sanmiguel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cserey</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="59090" to="59098" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Anomaly generation using generative adversarial networks in host-based intrusion detection</title>
		<author>
			<persName><forename type="first">M</forename><surname>Salem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Taheri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Yuan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON), IEEE</title>
				<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="683" to="687" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Defect-gan: High-fidelity defect synthesis for automated defect inspection</title>
		<author>
			<persName><forename type="first">G</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Cui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T.-Y</forename><surname>Hung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Lu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision</title>
				<meeting>the IEEE/CVF Winter Conference on Applications of Computer Vision</meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="2524" to="2534" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Defect image sample generation with gan for improving defect recognition</title>
		<author>
			<persName><forename type="first">S</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Automation Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="1611" to="1622" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Few-shot defect image generation via defect-aware feature manipulation</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Duan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="571" to="578" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Generating and reweighting dense contrastive patterns for unsupervised anomaly detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Dai</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xue</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="1454" to="1462" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Anomalydiffusion: Few-shot anomaly image generation with diffusion model</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Yi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Du</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the AAAI Conference on Artificial Intelligence</title>
				<meeting>the AAAI Conference on Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="8526" to="8534" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Realnet: A feature selection network with realistic synthetic anomaly for anomaly detection</title>
		<author>
			<persName><forename type="first">X</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition</title>
				<meeting>the IEEE/CVF Conference on Computer Vision and Pattern Recognition</meeting>
		<imprint>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="16699" to="16708" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
