{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T05:01:34Z","timestamp":1744347694122,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031189128"},{"type":"electronic","value":"9783031189135"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18913-5_52","type":"book-chapter","created":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:03:53Z","timestamp":1666825433000},"page":"678-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Background Suppressed and\u00a0Motion Enhanced Network for\u00a0Weakly Supervised Video Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wanxiao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hangyou","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yuqiu","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Shenglan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,27]]},"reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Cai, R., Zhang, H., Liu, W., Gao, S., Hao, Z.: Appearance-motion memory consistency network for video anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 35, pp. 938\u2013946 (2021)","DOI":"10.1609\/aaai.v35i2.16177"},{"key":"52_CR2","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? a new model and the kinetics dataset. In: proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"52_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-319-59081-3_23","volume-title":"Advances in Neural Networks - ISNN 2017","author":"YS Chong","year":"2017","unstructured":"Chong, Y.S., Tay, Y.H.: Abnormal event detection in videos using spatiotemporal autoencoder. In: Cong, F., Leung, A., Wei, Q. (eds.) ISNN 2017. LNCS, vol. 10262, pp. 189\u2013196. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59081-3_23"},{"key":"52_CR4","doi-asserted-by":"crossref","unstructured":"Feng, J.C., Hong, F.T., Zheng, W.S.: Mist: Multiple instance self-training framework for video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"52_CR7","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Kiran, B.R., Thomas, D.M., Parakkal, R.: An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. J. Imaging 4(2), 36 (2018)","DOI":"10.3390\/jimaging4020036"},{"issue":"1","key":"52_CR9","first-page":"18","volume":"36","author":"W Li","year":"2013","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"52_CR10","doi-asserted-by":"crossref","unstructured":"Liu, B., Chen, Y., Liu, S., Kim, H.S.: Deep learning in latent space for video prediction and compression. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 701\u2013710 (2021)","DOI":"10.1109\/CVPR46437.2021.00076"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Liu, K., Ma, H.: Exploring background-bias for anomaly detection in surveillance videos. In: Proceedings of the 27th ACM International Conference on Multimedia, pp. 1490\u20131499 (2019)","DOI":"10.1145\/3343031.3350998"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection-a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"52_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nie, Y., Long, C., Zhang, Q., Li, G.: A hybrid video anomaly detection framework via memory-augmented flow reconstruction and flow-guided frame prediction. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13588\u201313597 (2021)","DOI":"10.1109\/ICCV48922.2021.01333"},{"key":"52_CR14","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N., Meunier, J.: Anomaly detection in video sequence with appearance-motion correspondence. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1273\u20131283 (2019)","DOI":"10.1109\/ICCV.2019.00136"},{"key":"52_CR15","doi-asserted-by":"crossref","unstructured":"Park, H., Noh, J., Ham, B.: Learning memory-guided normality for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14372\u201314381 (2020)","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"52_CR16","first-page":"2293","volume":"44","author":"B Ramachandra","year":"2020","unstructured":"Ramachandra, B., Jones, M., Vatsavai, R.R.: A survey of single-scene video anomaly detection. IEEE Trans. Pattern Anal. Mach. Intell. 44, 2293\u20132312 (2020)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"52_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-030-01270-0_10","volume-title":"Computer Vision \u2013 ECCV 2018","author":"Z Shou","year":"2018","unstructured":"Shou, Z., Gao, H., Zhang, L., Miyazawa, K., Chang, S.-F.: Autoloc: Weakly-supervised temporal action localization in untrimmed videos. In: Ferrari, V., Hebert, M., Sminchisescu, C., Weiss, Y. (eds.) ECCV 2018. LNCS, vol. 11220, pp. 162\u2013179. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01270-0_10"},{"key":"52_CR18","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"52_CR19","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"52_CR20","doi-asserted-by":"crossref","unstructured":"Wang, X., Girshick, R., Gupta, A., He, K.: Non-local neural networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7794\u20137803 (2018)","DOI":"10.1109\/CVPR.2018.00813"},{"key":"52_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58577-8_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"P Wu","year":"2020","unstructured":"Wu, P., et al.: Not only look, but also listen: learning multimodal violence detection under weak supervision. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12375, pp. 322\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58577-8_20"},{"key":"52_CR22","doi-asserted-by":"crossref","unstructured":"Yu, G., et al.: Cloze test helps: Effective video anomaly detection via learning to complete video events. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 583\u2013591 (2020)","DOI":"10.1145\/3394171.3413973"},{"key":"52_CR23","doi-asserted-by":"publisher","first-page":"3572","DOI":"10.1109\/TNNLS.2021.3053563","volume":"33","author":"J Yu","year":"2021","unstructured":"Yu, J., Lee, Y., Yow, K.C., Jeon, M., Pedrycz, W.: Abnormal event detection and localization via adversarial event prediction. IEEE Trans. Neural Netw. Learn. Syst. 33, 3572\u20133586 (2021)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"52_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-58542-6_22","volume-title":"Computer Vision \u2013 ECCV 2020","author":"MZ Zaheer","year":"2020","unstructured":"Zaheer, M.Z., Mahmood, A., Astrid, M., Lee, S.-I.: CLAWS: Clustering assisted weakly supervised learning with normalcy suppression for anomalous event detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12367, pp. 358\u2013376. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58542-6_22"},{"key":"52_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qing, L., Miao, J.: Temporal convolutional network with complementary inner bag loss for weakly supervised anomaly detection. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 4030\u20134034. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"52_CR26","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: Train a plug-and-play action classifier for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"52_CR27","unstructured":"Zhu, Y., Newsam, S.: Motion-aware feature for improved video anomaly detection. arXiv preprint arXiv:1907.10211 (2019)"},{"issue":"4","key":"52_CR28","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1093\/clinchem\/39.4.561","volume":"39","author":"MH Zweig","year":"1993","unstructured":"Zweig, M.H., Campbell, G.: Receiver-operating characteristic (roc) plots: a fundamental evaluation tool in clinical medicine. Clin. Chem. 39(4), 561\u2013577 (1993)","journal-title":"Clin. Chem."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18913-5_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T23:30:31Z","timestamp":1666827031000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18913-5_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031189128","9783031189135"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18913-5_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"27 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/en.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"microsoft","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"564","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"233","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.03","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.35","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}