{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:57:52Z","timestamp":1765357072290,"version":"3.37.3"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:00:00Z","timestamp":1641772800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"research and innovation team foundation of zhejiang business technology institute","award":["KYTD202103"],"award-info":[{"award-number":["KYTD202103"]}]},{"name":"the Scientific research project of Zhejiang Provincial Department of Education","award":["Y202147736"],"award-info":[{"award-number":["Y202147736"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04190-9","type":"journal-article","created":{"date-parts":[[2022,1,10]],"date-time":"2022-01-10T00:03:16Z","timestamp":1641772996000},"page":"8409-8429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Attention-based framework for weakly supervised video anomaly detection"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2470-3072","authenticated-orcid":false,"given":"Hualin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Liyan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,10]]},"reference":[{"issue":"3","key":"4190_CR1","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D (2008) Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans Pattern Anal Mach Intell 30(3):555\u2013560","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4190_CR2","doi-asserted-by":"crossref","unstructured":"Carreira J, Zisserman A (2017) Quo vadis, action recognition? A new model and the kinetics dataset. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 4724\u20134733","DOI":"10.1109\/CVPR.2017.502"},{"key":"4190_CR3","doi-asserted-by":"crossref","unstructured":"Chaudhry R, Ravichandran A, Hager G, Vidal R (2009) Histograms of oriented optical flow and Binet\u2013Cauchy kernels on nonlinear dynamical systems for the recognition of human actions. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 1932\u20131939","DOI":"10.1109\/CVPR.2009.5206821"},{"key":"4190_CR4","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1016\/j.ins.2020.10.001","volume":"546","author":"CM Chen","year":"2021","unstructured":"Chen CM, Chen L, Gan W, Qiu L, Ding W (2021) Discovering high utility-occupancy patterns from uncertain data. Inf Sci 546:1208\u20131229","journal-title":"Inf Sci"},{"issue":"4","key":"4190_CR5","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/s11704-015-4362-0","volume":"9","author":"X Chen","year":"2015","unstructured":"Chen X, Li A, Zeng X, Guo W, Huang G (2015) Runtime model based approach to IoT application development. Front Comput Sci 9(4):540\u2013553","journal-title":"Front Comput Sci"},{"issue":"8","key":"4190_CR6","first-page":"1","volume":"62","author":"X Chen","year":"2019","unstructured":"Chen X, Chen S, Ma Y, Liu B, Zhang Y, Huang G (2019) An adaptive offloading framework for android applications in mobile edge computing. Sci China Inf Sci 62(8):1\u201317","journal-title":"Sci China Inf Sci"},{"issue":"11","key":"4190_CR7","first-page":"1","volume":"62","author":"X Chen","year":"2019","unstructured":"Chen X, Lin J, Ma Y, Lin B, Wang H, Huang G (2019) Self-adaptive resource allocation for cloud-based software services based on progressive qos prediction model. Sci China Inf Sci 62(11):1\u20133","journal-title":"Sci China Inf Sci"},{"key":"4190_CR8","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1016\/j.future.2019.12.005","volume":"105","author":"X Chen","year":"2020","unstructured":"Chen X, Wang H, Ma Y, Zheng X, Guo L (2020) Self-adaptive resource allocation for cloud-based software services based on iterative qos prediction model. Futur Gener Comput Syst 105:287\u2013296","journal-title":"Futur Gener Comput Syst"},{"key":"4190_CR9","doi-asserted-by":"crossref","unstructured":"Chen X, Zhu F, Chen Z, Min G, Zheng X, Rong C (2020) Resource allocation for cloud-based software services using prediction-enabled feedback control with reinforcement learning. IEEE Trans Cloud Comput","DOI":"10.1109\/TCC.2020.2992537"},{"key":"4190_CR10","doi-asserted-by":"crossref","unstructured":"Chen X, Li M, Zhong H, Ma Y, Hsu CH (2021) DNNOff: offloading DNN-based intelligent IoT applications in mobile edge computing. IEEE Trans Ind Inf","DOI":"10.1109\/TII.2021.3075464"},{"key":"4190_CR11","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/LSP.2020.3015422","volume":"27","author":"Y Chen","year":"2020","unstructured":"Chen Y, Li W, Wang Y (2020) Robust Gaussian approximate fixed-interval smoother with outlier detection. IEEE Signal Process Lett 27:1505\u20131509","journal-title":"IEEE Signal Process Lett"},{"key":"4190_CR12","doi-asserted-by":"publisher","first-page":"106065","DOI":"10.1016\/j.asoc.2020.106065","volume":"89","author":"YQ Chen","year":"2020","unstructured":"Chen YQ, Zhou B, Zhang M, Chen CM (2020) Using IoT technology for computer-integrated manufacturing systems in the semiconductor industry. Appl Soft Comput 89:106065","journal-title":"Appl Soft Comput"},{"key":"4190_CR13","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1007\/s11227-020-03303-0","volume":"77","author":"Y Chen","year":"2021","unstructured":"Chen Y, Guo J, Yang H, Wang Z, Liu H (2021) Research on navigation of bidirectional a* algorithm based on ant colony algorithm. J Supercomput 77:1958\u20131975","journal-title":"J Supercomput"},{"issue":"3","key":"4190_CR14","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TCSVT.2016.2637778","volume":"27","author":"RVHM Colque","year":"2017","unstructured":"Colque RVHM, Caetano C, de Andrade MTL, Schwartz WR (2017) Histograms of optical flow orientation and magnitude and entropy to detect anomalous events in videos. IEEE Trans Circuits Syst Video Technol 27(3):673\u2013682","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4190_CR15","doi-asserted-by":"crossref","unstructured":"Cong Y, Yuan J, Liu J (2011) Sparse reconstruction cost for abnormal event detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 3449\u20133456","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"4190_CR16","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR), pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"4190_CR17","doi-asserted-by":"crossref","unstructured":"Feng JC, Hong FT, Zheng WS (2021) Mist: multiple instance self-training framework for video anomaly detection. In: Proceedings IEEE Conference on Computer Vision and Pattern Recognition, pp 14009\u201314018","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"4190_CR18","doi-asserted-by":"crossref","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour MR, Venkatesh S, Hengel A (2019) Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp 1705\u20131714","DOI":"10.1109\/ICCV.2019.00179"},{"key":"4190_CR19","doi-asserted-by":"publisher","first-page":"185580","DOI":"10.1109\/ACCESS.2019.2960603","volume":"7","author":"JL Guo","year":"2019","unstructured":"Guo JL, Chen YQ, Yang HD, Chen CM, Chen YC, Zhang H, Zhang Z (2019) Study on secrecy capacity of wireless sensor networks in internet of things based on the amplify-and-forward compressed sensing scheme. IEEE Access 7:185580\u2013185589","journal-title":"IEEE Access"},{"key":"4190_CR20","doi-asserted-by":"crossref","unstructured":"Hasan M, Choi J, Neumann J, Roy-Chowdhury AK, Davis LS (2016) Learning temporal regularity in video sequences. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 733\u2013742","DOI":"10.1109\/CVPR.2016.86"},{"issue":"22","key":"4190_CR21","doi-asserted-by":"publisher","first-page":"29573","DOI":"10.1007\/s11042-017-5255-z","volume":"77","author":"C He","year":"2018","unstructured":"He C, Shao J, Sun J (2018) An anomaly-introduced learning method for abnormal event detection. Multimed Tools Appl 77(22):29573\u201329588","journal-title":"Multimed Tools Appl"},{"issue":"9","key":"4190_CR22","doi-asserted-by":"publisher","first-page":"1450","DOI":"10.1109\/TPAMI.2006.176","volume":"28","author":"W Hu","year":"2006","unstructured":"Hu W, Xiao X, Fu Z, Xie D, Tan T, Maybank S (2006) A system for learning statistical motion patterns. IEEE Trans Pattern Anal Mach Intell 28(9):1450\u20131464","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4190_CR23","doi-asserted-by":"publisher","first-page":"46643","DOI":"10.1109\/ACCESS.2018.2866081","volume":"6","author":"C Huang","year":"2018","unstructured":"Huang C, Peng Z, Chen F, Jiang Q, Jiang G, Hu Q (2018) Efficient CU and PU decision based on neural network and gray level co-occurrence matrix for intra prediction of screen content coding. IEEE Access 6:46643\u201346655","journal-title":"IEEE Access"},{"key":"4190_CR24","doi-asserted-by":"crossref","unstructured":"Huang C, Peng Z, Chen F, Jiang Q, Cui X, Jiang G (2019) Encoding complexity control for live video applications: an interpretable machine learning approach. In: 2019 IEEE International Conference on Multimedia and Expo (ICME), IEEE, pp 1456\u20131461","DOI":"10.1109\/ICME.2019.00252"},{"key":"4190_CR25","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TIP.2020.3036766","volume":"30","author":"C Huang","year":"2021","unstructured":"Huang C, Peng Z, Xu Y, Chen F, Jiang Q, Zhang Y, Jiang G, Ho YS (2021) Online learning-based multi-stage complexity control for live video coding. IEEE Trans Image Process 30:641\u2013656","journal-title":"IEEE Trans Image Process"},{"key":"4190_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3122801","author":"C Huang","year":"2021","unstructured":"Huang C, Wu Z, Wen J, Xu Y, Jiang Q, Wang Y (2021) Abnormal event detection using deep contrastive learning for intelligent video surveillance system. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2021.3122801","journal-title":"IEEE Trans Ind Inf"},{"issue":"3","key":"4190_CR27","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TSC.2014.2347293","volume":"8","author":"G Huang","year":"2014","unstructured":"Huang G, Ma Y, Liu X, Luo Y, Lu X, Blake MB (2014) Model-based automated navigation and composition of complex service mashups. IEEE Trans Serv Comput 8(3):494\u2013506","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"4190_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/TSC.2016.2587260","volume":"12","author":"G Huang","year":"2016","unstructured":"Huang G, Liu X, Ma Y, Lu X, Zhang Y, Xiong Y (2016) Programming situational mobile web applications with cloud-mobile convergence: an internetware-oriented approach. IEEE Trans Serv Comput 12(1):6\u201319","journal-title":"IEEE Trans Serv Comput"},{"issue":"10","key":"4190_CR29","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.1109\/TMC.2017.2651823","volume":"16","author":"G Huang","year":"2017","unstructured":"Huang G, Xu M, Lin FX, Liu Y, Ma Y, Pushp S, Liu X (2017) Shuffledog: characterizing and adapting user-perceived latency of android apps. IEEE Trans Mob Comput 16(10):2913\u20132926","journal-title":"IEEE Trans Mob Comput"},{"key":"4190_CR30","doi-asserted-by":"crossref","unstructured":"Huang G, Luo C, Wu K, Ma Y, Zhang Y, Liu X (2019) Software-defined infrastructure for decentralized data lifecycle governance: principled design and open challenges. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), IEEE, pp 1674\u20131683","DOI":"10.1109\/ICDCS.2019.00166"},{"key":"4190_CR31","doi-asserted-by":"crossref","unstructured":"Ionescu RT, Khan FS, Georgescu M, Shao L (2019) Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 7834\u20137843","DOI":"10.1109\/CVPR.2019.00803"},{"issue":"4","key":"4190_CR32","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1109\/TIP.2008.2012070","volume":"18","author":"F Jiang","year":"2009","unstructured":"Jiang F, Wu Y, Katsaggelos AK (2009) A dynamic hierarchical clustering method for trajectory-based unusual video event detection. IEEE Trans Image Process 18(4):907\u2013913","journal-title":"IEEE Trans Image Process"},{"key":"4190_CR33","unstructured":"Kingma DP, Welling M (2014) Auto-encoding variational bayes. In: International Conference on Learning Representations (ICLR)"},{"key":"4190_CR34","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1109\/TIP.2019.2948286","volume":"29","author":"S Lee","year":"2020","unstructured":"Lee S, Kim HG, Ro YM (2020) Bman: bidirectional multi-scale aggregation networks for abnormal event detection. IEEE Trans Image Process 29:2395\u20132408","journal-title":"IEEE Trans Image Process"},{"key":"4190_CR35","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TMM.2020.2984093","volume":"23","author":"N Li","year":"2020","unstructured":"Li N, Chang F, Liu C (2020) Spatial-temporal cascade autoencoder for video anomaly detection in crowded scenes. IEEE Trans Multimed 23:203\u2013215","journal-title":"IEEE Trans Multimed"},{"issue":"8","key":"4190_CR36","doi-asserted-by":"publisher","first-page":"5456","DOI":"10.1109\/TII.2019.2961237","volume":"16","author":"B Lin","year":"2019","unstructured":"Lin B, Huang Y, Zhang J, Hu J, Chen X, Li J (2019) Cost-driven off-loading for DNN-based applications over cloud, edge, and end devices. IEEE Trans Ind Inf 16(8):5456\u20135466","journal-title":"IEEE Trans Ind Inf"},{"key":"4190_CR37","doi-asserted-by":"crossref","unstructured":"Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection\u2014a new baseline. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 6536\u20136545","DOI":"10.1109\/CVPR.2018.00684"},{"issue":"1","key":"4190_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-015-5499-z","volume":"57","author":"X Liu","year":"2014","unstructured":"Liu X, Huang G, Zhao Q, Mei H, Blake MB (2014) iMashup: a mashup-based framework for service composition. Sci China Inf Sci 57(1):1\u201320","journal-title":"Sci China Inf Sci"},{"key":"4190_CR39","doi-asserted-by":"crossref","unstructured":"Lu C, Shi J, Jia J (2013) Abnormal event detection at 150 fps in matlab. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp 2720\u20132727","DOI":"10.1109\/ICCV.2013.338"},{"key":"4190_CR40","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) Remembering history with convolutional lstm for anomaly detection. In: 2017 IEEE International Conference on Multimedia and Expo (ICME), pp 439\u2013444","DOI":"10.1109\/ICME.2017.8019325"},{"key":"4190_CR41","unstructured":"Luo W, Liu W, Lian D, Tang J, Duan L, Peng X, Gao S (2019) Video anomaly detection with sparse coding inspired deep neural networks. In: IEEE Transactions on Pattern Analysis and Machine Intelligence, p 1"},{"key":"4190_CR42","doi-asserted-by":"crossref","unstructured":"Lv H, Chen C, Cui Z, Xu C, Li Y, Yang J (2021) Learning normal dynamics in videos with meta prototype network. In: Proceedings IEEE Conference on Computer Vision and Pattern Recognition, pp 15425\u201315434","DOI":"10.1109\/CVPR46437.2021.01517"},{"key":"4190_CR43","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1109\/TIP.2021.3072863","volume":"30","author":"H Lv","year":"2021","unstructured":"Lv H, Zhou C, Cui Z, Xu C, Li Y, Yang J (2021) Localizing anomalies from weakly-labeled videos. IEEE Trans Image Process 30:4505\u20134515","journal-title":"IEEE Trans Image Process"},{"key":"4190_CR44","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 1975\u20131981","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"4190_CR45","unstructured":"Mathieu M, Couprie C, LeCun Y (2016) Deep multi-scale video prediction beyond mean square error. In: 4th International Conference on Learning Representations (ICLR)"},{"key":"4190_CR46","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/LSP.2020.2978462","volume":"27","author":"KR Mestav","year":"2020","unstructured":"Mestav KR, Tong L (2020) Universal data anomaly detection via inverse generative adversary network. IEEE Signal Process Lett 27:511\u2013515","journal-title":"IEEE Signal Process Lett"},{"issue":"4","key":"4190_CR47","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TCSVT.2013.2280061","volume":"24","author":"X Mo","year":"2014","unstructured":"Mo X, Monga V, Bala R, Fan Z (2014) Adaptive sparse representations for video anomaly detection. IEEE Trans Circuits Syst Video Technol 24(4):631\u2013645","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4190_CR48","doi-asserted-by":"crossref","unstructured":"Morais R, Le V, Tran T, Saha B, Mansour M, Venkatesh S (2019) Learning regularity in skeleton trajectories for anomaly detection in videos. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 11988\u201311996","DOI":"10.1109\/CVPR.2019.01227"},{"issue":"1","key":"4190_CR49","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TII.2019.2938527","volume":"16","author":"R Nawaratne","year":"2020","unstructured":"Nawaratne R, Alahakoon D, De Silva D, Yu X (2020) Spatiotemporal anomaly detection using deep learning for real-time video surveillance. IEEE Trans Ind Inf 16(1):393\u2013402","journal-title":"IEEE Trans Ind Inf"},{"key":"4190_CR50","doi-asserted-by":"crossref","unstructured":"Nguyen P, Ramanan D, Fowlkes C (2019) Weakly-supervised action localization with background modeling. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp 5501\u20135510","DOI":"10.1109\/ICCV.2019.00560"},{"key":"4190_CR51","doi-asserted-by":"crossref","unstructured":"Nguyen TN, Meunier J (2019) Anomaly detection in video sequence with appearance-motion correspondence. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp 1273\u20131283","DOI":"10.1109\/ICCV.2019.00136"},{"key":"4190_CR52","doi-asserted-by":"crossref","unstructured":"Park H, Noh J, Ham B (2020) Learning memory-guided normality for anomaly detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 14360\u201314369","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"4190_CR53","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.image.2019.06.014","volume":"78","author":"Z Peng","year":"2019","unstructured":"Peng Z, Huang C, Chen F, Jiang G, Cui X, Yu M (2019) Multiple classifier-based fast coding unit partition for intra coding in future video coding. Signal Process Image Commun 78:171\u2013179","journal-title":"Signal Process Image Commun"},{"key":"4190_CR54","doi-asserted-by":"publisher","first-page":"116256","DOI":"10.1016\/j.image.2021.116256","volume":"95","author":"Z Peng","year":"2021","unstructured":"Peng Z, Chen F, Jiang D, Huang C, Jiang G, Yu M, Li J (2021) Inter-layer correlation-based adaptive bit allocation for enhancement layer in scalable high efficiency video coding. Signal Process Image Commun 95:116256","journal-title":"Signal Process Image Commun"},{"key":"4190_CR55","doi-asserted-by":"crossref","unstructured":"Saligrama V, Chen Z (2012) Video anomaly detection based on local statistical aggregates. In: 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp 2112\u20132119","DOI":"10.1109\/CVPR.2012.6247917"},{"key":"4190_CR56","first-page":"1","volume":"53","author":"KK Santhosh","year":"2019","unstructured":"Santhosh KK, Dogra DP, Roy PP, Chaudhuri BB (2019) Trajectory-based scene understanding using Dirichlet process mixture model. IEEE Trans Cybern 53:1\u201326","journal-title":"IEEE Trans Cybern"},{"key":"4190_CR57","unstructured":"Sohn K, Lee H, Yan X (2015) Learning structured output representation using deep conditional generative models. In: Advances in Neural Information Processing Systems (NeurIPS), pp 3483\u20133491"},{"key":"4190_CR58","doi-asserted-by":"crossref","unstructured":"Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 6479\u20136488","DOI":"10.1109\/CVPR.2018.00678"},{"key":"4190_CR59","doi-asserted-by":"crossref","unstructured":"Wang J, Cherian A (2019) Gods: generalized one-class discriminative subspaces for anomaly detection. In: 2019 IEEE\/CVF International Conference on Computer Vision (ICCV), pp 8200\u20138210","DOI":"10.1109\/ICCV.2019.00829"},{"key":"4190_CR60","doi-asserted-by":"crossref","unstructured":"Wang X, Che Z, Yang K, Jiang B, Tang J, Ye J, Wang J, Qi Q (2020) Robust unsupervised video anomaly detection by multi-path frame prediction. arXiv preprint arXiv:201102763","DOI":"10.1109\/TNNLS.2021.3083152"},{"key":"4190_CR61","doi-asserted-by":"crossref","unstructured":"Wang X, Che Z, Yang K, Jiang B, Tang J, Ye J, Wang J, Qi Q (2020) Robust unsupervised video anomaly detection by multi-path frame prediction. arXiv preprint arXiv:201102763v1","DOI":"10.1109\/TNNLS.2021.3083152"},{"key":"4190_CR62","doi-asserted-by":"publisher","first-page":"3513","DOI":"10.1109\/TIP.2021.3062192","volume":"30","author":"P Wu","year":"2021","unstructured":"Wu P, Liu J (2021) Learning causal temporal relation and feature discrimination for anomaly detection. IEEE Trans Image Process 30:3513\u20133527","journal-title":"IEEE Trans Image Process"},{"key":"4190_CR63","doi-asserted-by":"crossref","unstructured":"Wu P, Liu J, Shi Y, Sun Y, Shao F, Wu Z, Yang Z (2020) Not only look, but also listen: learning multimodal violence detection under weak supervision. In: European Conference on Computer Vision (ECCV)","DOI":"10.1007\/978-3-030-58577-8_20"},{"key":"4190_CR64","doi-asserted-by":"crossref","unstructured":"Ye M, Zhang X, Yuen PC, Chang S (2019) Unsupervised embedding learning via invariant and spreading instance feature. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 6203\u20136212","DOI":"10.1109\/CVPR.2019.00637"},{"key":"4190_CR65","doi-asserted-by":"crossref","unstructured":"Yu Q, Aizawa K (2019) Unsupervised out-of-distribution detection by maximum classifier discrepancy. In: IEEE\/CVF International Conference on Computer Vision (ICCV), pp 9517\u20139525","DOI":"10.1109\/ICCV.2019.00961"},{"key":"4190_CR66","doi-asserted-by":"crossref","unstructured":"Zaheer MZ, Mahmood A, Astrid M, Lee SI (2020) Claws: clustering assisted weakly supervised learning with normalcy suppression for anomalous event detection. In: European Conference on Computer Vision (ECCV)","DOI":"10.1007\/978-3-030-58542-6_22"},{"key":"4190_CR67","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1109\/LSP.2020.3025688","volume":"27","author":"MZ Zaheer","year":"2020","unstructured":"Zaheer MZ, Mahmood A, Shin H, Lee SI (2020) A self-reasoning framework for anomaly detection using video-level labels. IEEE Signal Process Lett 27:1705\u20131709","journal-title":"IEEE Signal Process Lett"},{"key":"4190_CR68","doi-asserted-by":"crossref","unstructured":"Zaigham Zaheer M, Lee JH, Astrid M, Lee SI (2020) Old is gold: redefining the adversarially learned one-class classifier training paradigm. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 14171\u201314181","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"4190_CR69","doi-asserted-by":"crossref","unstructured":"Zhang J, Qing L, Miao J (2019) Temporal convolutional network with complementary inner bag loss for weakly supervised anomaly detection. In: IEEE International Conference on Image Processing (ICIP), pp 4030\u20134034","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"4190_CR70","doi-asserted-by":"crossref","unstructured":"Zhao Y, Deng B, Shen C, Liu Y, Lu H, Hua X (2017) Spatio-temporal autoencoder for video anomaly detection. In: the 25th ACM International Conference on Multimedia (ACM MM), pp 1933\u20131941","DOI":"10.1145\/3123266.3123451"},{"key":"4190_CR71","doi-asserted-by":"crossref","unstructured":"Zhong J, Li N, Kong W, Liu S, Li TH, Li G (2019) Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 1237\u20131246","DOI":"10.1109\/CVPR.2019.00133"},{"key":"4190_CR72","doi-asserted-by":"crossref","unstructured":"Zhou B, Khosla A, Lapedriza A, Oliva A, Torralba A (2016) Learning deep features for discriminative localization. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp 2921\u20132929","DOI":"10.1109\/CVPR.2016.319"},{"key":"4190_CR73","unstructured":"Zhu Y, Newsam S (2019) Motion-aware feature for improved video anomaly detection. In: British Machine Vision Conference (BMVC)"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04190-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04190-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T13:49:45Z","timestamp":1648820985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04190-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,10]]},"references-count":73,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4190"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04190-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,1,10]]},"assertion":[{"value":"5 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}