{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:44:05Z","timestamp":1769049845265,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819985364","type":"print"},{"value":"9789819985371","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T00:00:00Z","timestamp":1703548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,26]],"date-time":"2023-12-26T00:00:00Z","timestamp":1703548800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8537-1_20","type":"book-chapter","created":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:02:17Z","timestamp":1703530937000},"page":"245-256","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Temporal-Semantic Context Fusion for\u00a0Robust Weakly Supervised Video Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Yuan","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Yuanyuan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Wu","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,26]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/LSP.2022.3226411","volume":"29","author":"C Cao","year":"2022","unstructured":"Cao, C., Zhang, X., Zhang, S., Wang, P., Zhang, Y.: Adaptive graph convolutional networks for weakly supervised anomaly detection in videos. IEEE Signal Process. Lett. 29, 2497\u20132501 (2022)","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? A new model and the kinetics dataset. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liu, Z., Zhang, B., Fok, W., Qi, X., Wu, Y.C.: MGFN: magnitude-contrastive glance-and-focus network for weakly-supervised video anomaly detection (2022)","DOI":"10.1609\/aaai.v37i1.25112"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Feng, J.C., Hong, F.T., Zheng, W.S.: MIST: multiple instance self-training framework for video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Gong, Y., Wang, C., Dai, X., Yu, S., Xiang, L., Wu, J.: Multi-scale continuity-aware refinement network for weakly supervised video anomaly detection. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/ICME52920.2022.9860012"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Huang, C., Liu, Y., Zhang, Z., Liu, C., Wen, J., Xu, Y., Wang, Y.: Hierarchical graph embedded pose regularity learning via spatio-temporal transformer for abnormal behavior detection. In: Proceedings of the 30th ACM International Conference on Multimedia, pp. 307\u2013315 (2022)","DOI":"10.1145\/3503161.3548369"},{"key":"20_CR7","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016)"},{"key":"20_CR8","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.neucom.2022.01.026","volume":"481","author":"N Li","year":"2022","unstructured":"Li, N., Zhong, J.X., Shu, X., Guo, H.: Weakly-supervised anomaly detection in video surveillance via graph convolutional label noise cleaning. Neurocomputing 481, 154\u2013167 (2022)","journal-title":"Neurocomputing"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Li, S., Liu, F., Jiao, L.: Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 1395\u20131403 (2022)","DOI":"10.1609\/aaai.v36i2.20028"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection-a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Long, F., Yao, T., Qiu, Z., Tian, X., Luo, J., Mei, T.: Gaussian temporal awareness networks for action localization. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 344\u2013353 (2019)","DOI":"10.1109\/CVPR.2019.00043"},{"issue":"4","key":"20_CR12","doi-asserted-by":"publisher","first-page":"102983","DOI":"10.1016\/j.ipm.2022.102983","volume":"59","author":"H Mu","year":"2022","unstructured":"Mu, H., Sun, R., Wang, M., Chen, Z.: Spatio-temporal graph-based CNNs for anomaly detection in weakly-labeled videos. Inf. Process. Manage. 59(4), 102983 (2022)","journal-title":"Inf. Process. Manage."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J.W., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4975\u20134986 (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"2178","DOI":"10.1109\/LSP.2022.3216500","volume":"29","author":"D Wei","year":"2022","unstructured":"Wei, D., Liu, Y., Zhu, X., Liu, J., Zeng, X.: MSAF: multimodal supervise-attention enhanced fusion for video anomaly detection. IEEE Signal Process. Lett. 29, 2178\u20132182 (2022). https:\/\/doi.org\/10.1109\/LSP.2022.3216500","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Xu, M., Zhao, C., Rojas, D.S., Thabet, A., Ghanem, B.: G-TAD: sub-graph localization for temporal action detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10156\u201310165 (2020)","DOI":"10.1109\/CVPR42600.2020.01017"},{"key":"20_CR18","doi-asserted-by":"publisher","unstructured":"Yu, S., Wang, C., Xiang, L., Wu, J.: TCA-VAD: temporal context alignment network for weakly supervised video anomly detection. In: 2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/ICME52920.2022.9859607","DOI":"10.1109\/ICME52920.2022.9859607"},{"issue":"5","key":"20_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2751541","volume":"38","author":"W Yue","year":"2019","unstructured":"Yue, W., Yongbin, S., Ziwei, L., Sarma, S.E., Bronstein, M.M., Solomon, J.M.: Dynamic graph CNN for learning on point clouds. ACM Trans. Graph. (TOG) 38(5), 1\u201312 (2019)","journal-title":"ACM Trans. Graph. (TOG)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8537-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,25]],"date-time":"2023-12-25T19:09:52Z","timestamp":1703531392000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8537-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,26]]},"ISBN":["9789819985364","9789819985371"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8537-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,26]]},"assertion":[{"value":"26 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision  (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/prcv2023.xmu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1420","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"532","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,78","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,69","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}