{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:31:37Z","timestamp":1763202697939,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031189128"},{"type":"electronic","value":"9783031189135"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18913-5_46","type":"book-chapter","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:03:53Z","timestamp":1666825433000},"page":"594-608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Weakly Supervised Video Anomaly Detection with\u00a0Temporal and\u00a0Abnormal Information"],"prefix":"10.1007","author":[{"given":"Ruoyan","family":"Pi","sequence":"first","affiliation":[]},{"given":"Xiangteng","family":"He","sequence":"additional","affiliation":[]},{"given":"Yuxin","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"46_CR2","unstructured":"Unusual crowd activity dataset of University of Minnesota. http:\/\/mha.cs.umn.edu\/Movies\/Crowd-Activity-All.avi"},{"issue":"1","key":"46_CR3","first-page":"18","volume":"36","author":"W Li","year":"2013","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes (PAMI). IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 FPS in MATLAB. In: IEEE International Conference on Computer Vision (ICCV), pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"46_CR5","doi-asserted-by":"crossref","unstructured":"Liu, W., Lian, D., Luo, W., Gao, S.: Future frame prediction for anomaly detection - a new baseline. In: IEEE International Conference on Computer Vision (ICCV) (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"issue":"22","key":"46_CR6","doi-asserted-by":"publisher","first-page":"29573","DOI":"10.1007\/s11042-017-5255-z","volume":"77","author":"C He","year":"2017","unstructured":"He, C., Shao, J., Sun, J.: An anomaly-introduced learning method for abnormal event detection. Multimedia Tools Appl. 77(22), 29573\u201329588 (2017). https:\/\/doi.org\/10.1007\/s11042-017-5255-z","journal-title":"Multimedia Tools Appl."},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Zhong, J., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"46_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58577-8_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"P Wu","year":"2020","unstructured":"Wu, P., et al.: Not only look, but also listen: learning multimodal violence detection under weak supervision. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12375, pp. 322\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58577-8_20"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J.W., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In: IEEE International Conference on Computer Vision (ICCV) (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020)","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Feng, J.-C., Hong, F.-T., Zheng, W.-S.: MIST: multiple instance self-training framework for video anomaly detection. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"46_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-46454-1_21","volume-title":"Computer Vision \u2013 ECCV 2016","author":"A Del Giorno","year":"2016","unstructured":"Del Giorno, A., Bagnell, J.A., Hebert, M.: A discriminative framework for anomaly detection in large videos. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9909, pp. 334\u2013349. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46454-1_21"},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Ionescu, R., Smeureanu, S., Alexe, B., Popescu, M.: Unmasking the abnormal events in video. In: IEEE International Conference on Computer Vision (ICCV) (2017)","DOI":"10.1109\/ICCV.2017.315"},{"key":"46_CR14","doi-asserted-by":"crossref","unstructured":"Wang, S., Zeng, Y., Liu, Q., Zhu, C., Zhu, E., Yin, J.: Detecting abnormality without knowing normality: a two-stage approach for unsupervised video abnormal event detection. In: ACM International Conference on Multimedia (ACM MM) (2018)","DOI":"10.1145\/3240508.3240615"},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Liu, W., Lian, D., Luo, W., Gao, S.: Future frame prediction for anomaly detection - a new baseline. In: 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"46_CR16","doi-asserted-by":"crossref","unstructured":"Ye, M., Peng, X., Gan, W., Wu, W., Qiao, Y.: AnoPCN: video anomaly detection via deep predictive coding network. In: ACM International Conference on Multimedia (ACM MM), pp. 1805\u20131813 (2019)","DOI":"10.1145\/3343031.3350899"},{"key":"46_CR17","doi-asserted-by":"crossref","unstructured":"Zhong, J., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: 2018 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"46_CR18","doi-asserted-by":"crossref","unstructured":"Bromley, J., Guyon, I., Lecun, Y., Sckinger, E., Shah, R.: Signature verification using a \u201cSiamese\u201d time delay neural network. In: Neural Information Processing Systems (NeurIPS) (1994)","DOI":"10.1142\/9789812797926_0003"},{"key":"46_CR19","doi-asserted-by":"crossref","unstructured":"Hong, F., Huang, X., Li, W., Zheng, W.: Mini-Net: multiple instance ranking network for video highlight detection. arXiv preprint arXiv:2007.09833 (2020)","DOI":"10.1007\/978-3-030-58601-0_21"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, P., Liu, T., Prasad, G., Han, B.: Weakly supervised action localization by sparse temporal pooling network. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00706"},{"key":"46_CR21","doi-asserted-by":"crossref","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2015)","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"46_CR22","unstructured":"Sohn, K.: Improved deep metric learning with multiclass n-pair loss objective. In: Neural Information Processing Systems (NeurIPS) (2016)"},{"key":"46_CR23","doi-asserted-by":"crossref","unstructured":"Song, H., Xiang, Y., Jegelka, S., Savarese, S.: Deep metric learning via lifted structured feature embedding. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2016)","DOI":"10.1109\/CVPR.2016.434"},{"key":"46_CR24","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Li, Z., Zhao, P., Gao, S., et al.: Margin learning embedded prediction for video anomaly detection with a few anomalies. In: International Joint Conference on Artificial Intelligence (IJCAI) (2019)","DOI":"10.24963\/ijcai.2019\/419"},{"key":"46_CR25","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? A new model and the kinetics dataset. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"46_CR26","doi-asserted-by":"crossref","unstructured":"Hu, J., Shen, L., Sun, G.: Squeeze-and-excitation networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00745"},{"key":"46_CR27","doi-asserted-by":"crossref","unstructured":"Wang, X., Girshick, R., Gupta, A., He, K.: Non-local neural networks. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2018)","DOI":"10.1109\/CVPR.2018.00813"},{"key":"46_CR28","doi-asserted-by":"crossref","unstructured":"Cao, Y., Xu, J., Lin, S., et al.: GCNet: non-local networks meet squeeze-excitation networks and beyond. In: 2019 IEEE\/CVF International Conference on Computer Vision Workshop (ICCVW). IEEE (2020)","DOI":"10.1109\/ICCVW.2019.00246"},{"key":"46_CR29","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"46_CR30","doi-asserted-by":"crossref","unstructured":"Wang, J., Cherian, A.: GODS: generalized one-class discriminative subspaces for anomaly detection. In: IEEE International Conference on Computer Vision (CVPR), pp. 8201\u20138211 (2019)","DOI":"10.1109\/ICCV.2019.00829"},{"key":"46_CR31","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020)","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"46_CR32","doi-asserted-by":"crossref","unstructured":"Georgescu, M.-I., Barbalau, A., Ionescu, R.T., Khan, F.S., Popescu, M., Shah, M.: Anomaly detection in video via self-supervised and multi-task learning. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 12742\u201312752 (2021)","DOI":"10.1109\/CVPR46437.2021.01255"},{"key":"46_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zou, Y., Zhang, Z.: Cluster attention contrast for video anomaly detection. In: ACM International Conference on Multimedia (ACM MM), pp. 2463\u20132471 (2020)","DOI":"10.1145\/3394171.3413529"},{"key":"46_CR34","doi-asserted-by":"crossref","unstructured":"Cai, R., Zhang, H., Liu, W., Gao, S., Hao, Z.: Appearance-motion memory consistency network for video anomaly detection. In: Association for the Advancement of Artificial Intelligence (AAAI), pp. 938\u2013946 (2021)","DOI":"10.1609\/aaai.v35i2.16177"},{"key":"46_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-58542-6_22","volume-title":"Computer Vision \u2013 ECCV 2020","author":"MZ Zaheer","year":"2020","unstructured":"Zaheer, M.Z., Mahmood, A., Astrid, M., Lee, S.-I.: CLAWS: clustering assisted weakly supervised learning with normalcy suppression for anomalous event detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12367, pp. 358\u2013376. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58542-6_22"},{"key":"46_CR36","doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3d convolutional networks. In: IEEE international conference on Computer Vision (ICCV), pp. 4489\u20134497 (2015)","DOI":"10.1109\/ICCV.2015.510"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18913-5_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:28:02Z","timestamp":1666826882000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18913-5_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031189128","9783031189135"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18913-5_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/en.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"564","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"233","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.03","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}