{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:04:05Z","timestamp":1774627445997,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672268"],"award-info":[{"award-number":["61672268"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672268"],"award-info":[{"award-number":["61672268"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672268"],"award-info":[{"award-number":["61672268"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1007\/s11760-023-02828-0","type":"journal-article","created":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T17:02:09Z","timestamp":1698339729000},"page":"1111-1118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Weakly supervised video anomaly detection based on spatial\u2013temporal feature fusion enhancement"],"prefix":"10.1007","volume":"18","author":[{"given":"Weijie","family":"Liang","sequence":"first","affiliation":[]},{"given":"Jianming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yongzhao","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,26]]},"reference":[{"key":"2828_CR1","doi-asserted-by":"crossref","unstructured":"Zhong, J.-X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"2828_CR2","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"2828_CR3","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J.W., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4975\u20134986 (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"2828_CR4","doi-asserted-by":"crossref","unstructured":"Li, S., Liu, F., Jiao, L.: Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 36, pp. 1395\u20131403 (2022)","DOI":"10.1609\/aaai.v36i2.20028"},{"key":"2828_CR5","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp. 1\u20136 (2020). IEEE","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"2828_CR6","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"2828_CR7","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nie, Y., Long, C., Zhang, Q., Li, G.: A hybrid video anomaly detection framework via memory-augmented flow reconstruction and flow-guided frame prediction. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 13588\u201313597 (2021)","DOI":"10.1109\/ICCV48922.2021.01333"},{"key":"2828_CR8","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y.: Any-shot sequential anomaly detection in surveillance videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 934\u2013935 (2020)","DOI":"10.1109\/CVPRW50498.2020.00475"},{"key":"2828_CR9","doi-asserted-by":"crossref","unstructured":"Pang, G., Yan, C., Shen, C., Hengel, A.v.d., Bai, X.: Self-trained deep ordinal regression for end-to-end video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12173\u201312182 (2020)","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"2828_CR10","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Deng, B., Shen, C., Liu, Y., Lu, H., Hua, X.-S.: Spatio-temporal autoencoder for video anomaly detection. In: Proceedings of the 25th ACM International Conference on Multimedia, pp. 1933\u20131941 (2017)","DOI":"10.1145\/3123266.3123451"},{"key":"2828_CR11","doi-asserted-by":"crossref","unstructured":"Gong, D., Liu, L., Le, V., Saha, B., Mansour, M.R., Venkatesh, S., Hengel, A.v.d.: Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"2828_CR12","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y.: Continual learning for anomaly detection in surveillance videos. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops, pp. 254\u2013255 (2020)","DOI":"10.1109\/CVPRW50498.2020.00135"},{"issue":"1","key":"2828_CR13","first-page":"1","volume":"2","author":"J An","year":"2015","unstructured":"An, J., Cho, S.: Variational autoencoder based anomaly detection using reconstruction probability. Spec. Lect. IE 2(1), 1\u201318 (2015)","journal-title":"Spec. Lect. IE"},{"key":"2828_CR14","doi-asserted-by":"crossref","unstructured":"Park, H., Noh, J., Ham, B.: Learning memory-guided normality for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14372\u201314381 (2020)","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"2828_CR15","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"2828_CR16","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? a new model and the kinetics dataset. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"2828_CR17","first-page":"48","volume":"58","author":"Z Hang","year":"2021","unstructured":"Hang, Z., Qirong, M., Yongzhao, Z.: Video anomaly detection based on space-time fusion graph network learning. J. Comput. Res. Dev. 58, 48 (2021)","journal-title":"J. Comput. Res. Dev."},{"key":"2828_CR18","unstructured":"Zhu, Y., Newsam, S.: Motion-aware feature for improved video anomaly detection. arXiv preprint arXiv:1907.10211 (2019)"},{"key":"2828_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qing, L., Miao, J.: Temporal convolutional network with complementary inner bag loss for weakly supervised anomaly detection. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 4030\u20134034 (2019)","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"2828_CR20","doi-asserted-by":"crossref","unstructured":"Wu, P., Liu, J., Shi, Y., Sun, Y., Shao, F., Wu, Z., Yang, Z.: Not only look, but also listen: Learning multimodal violence detection under weak supervision. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXX 16, pp. 322\u2013339 (2020)","DOI":"10.1007\/978-3-030-58577-8_20"},{"key":"2828_CR21","unstructured":"Kay, W., Carreira, J., Simonyan, K., Zhang, B., Hillier, C., Vijayanarasimhan, S., Viola, F., Green, T., Back, T., Natsev, P., et al.: The kinetics human action video dataset. arXiv preprint arXiv:1705.06950 (2017)"},{"key":"2828_CR22","first-page":"8026","volume":"32","author":"A Paszke","year":"2019","unstructured":"Paszke, A., Gross, S., Massa, F., Lerer, A., Bradbury, J.P., Chanan, G., Killeen, T., Lin, Z., Gimelshein, N., Antiga, L., et al.: An imperative style, high-performance deep learning library. Adv. Neural. Inf. Process. Syst. 32, 8026 (2019)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2828_CR23","doi-asserted-by":"crossref","unstructured":"Georgescu, M.-I., Barbalau, A., Ionescu, R.T., Khan, F.S., Popescu, M., Shah, M.: Anomaly detection in video via self-supervised and multi-task learning. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 12742\u201312752 (2021)","DOI":"10.1109\/CVPR46437.2021.01255"},{"key":"2828_CR24","doi-asserted-by":"crossref","unstructured":"Zaheer, M.Z., Mahmood, A., Khan, M.H., Segu, M., Yu, F., Lee, S.-I.: Generative cooperative learning for unsupervised video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14744\u201314754 (2022)","DOI":"10.1109\/CVPR52688.2022.01433"},{"key":"2828_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J., Cherian, A.: Gods: generalized one-class discriminative subspaces for anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 8201\u20138211 (2019)","DOI":"10.1109\/ICCV.2019.00829"},{"key":"2828_CR26","doi-asserted-by":"crossref","unstructured":"Zaheer, M.Z., Mahmood, A., Astrid, M., Lee, S.-I.: Claws: clustering assisted weakly supervised learning with normalcy suppression for anomalous event detection. In: Computer Vision\u2013ECCV 2020: 16th European Conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part XXII 16, pp. 358\u2013376 (2020)","DOI":"10.1007\/978-3-030-58542-6_22"},{"key":"2828_CR27","doi-asserted-by":"crossref","unstructured":"Feng, J.-C., Hong, F.-T., Zheng, W.-S.: Mist: multiple instance self-training framework for video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"2828_CR28","doi-asserted-by":"crossref","unstructured":"Wei, D.-L., Liu, C.-G., Liu, Y., Liu, J., Zhu, X.-G., Zeng, X.-H.: Look, listen and pay more attention: fusing multi-modal information for video violence detection. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1980\u20131984 (2022)","DOI":"10.1109\/ICASSP43922.2022.9746422"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02828-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02828-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02828-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,20]],"date-time":"2024-02-20T07:05:15Z","timestamp":1708412715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02828-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,3]]}},"alternative-id":["2828"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02828-0","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,26]]},"assertion":[{"value":"8 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}