{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T22:43:39Z","timestamp":1767912219242,"version":"3.49.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,10]],"date-time":"2021-01-10T00:00:00Z","timestamp":1610236800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,10]]},"DOI":"10.1109\/icpr48806.2021.9412694","type":"proceedings-article","created":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T02:15:54Z","timestamp":1620267354000},"page":"8984-8991","source":"Crossref","is-referenced-by-count":13,"title":["Video Anomaly Detection by Estimating Likelihood of Representations"],"prefix":"10.1109","author":[{"given":"Yuqi","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Victor","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390294"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00931"},{"key":"ref33","article-title":"YOLOv3: An Incremental Improvement","author":"redmon","year":"2018","journal-title":"CoRR"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"ref37","first-page":"568","article-title":"Two-Stream Convolutional Networks for Action Recognition in Videos","author":"simonyan","year":"0","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref36","article-title":"Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery","author":"schlegl","year":"0","journal-title":"International Conference on Information Processing in Medical Imaging (IPMI)"},{"key":"ref35","first-page":"2483","article-title":"How Does Batch Normalization Help Optimization?","author":"santurkar","year":"0","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00356"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.391"},{"key":"ref40","first-page":"3371","article-title":"Stacked Denoising Autoencoders: Learning Useful Representations in a Deep Network with a Local Denoising Criterion","volume":"11","author":"vincent","year":"2010","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the Dimensionality of Data with Neural Networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00803"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.315"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"ref15","article-title":"Adam: A Method for Stochastic Optimization","author":"kingma","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2695105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00684"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/419"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00136"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.331"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"ref3","first-page":"1027","article-title":"K-Means++: The Advantages of Careful Seeding","author":"arthur","year":"0","journal-title":"Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"ref5","first-page":"189","article-title":"Abnormal Event Detection in Videos Using Spatiotemporal Autoencoder","author":"chong","year":"0","journal-title":"Advances in Neural Networks (ISNN)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11744047_33"},{"key":"ref2","first-page":"622","article-title":"GANomaly: Semi-supervised Anomaly Detection via Adversarial Training","author":"akcay","year":"0","journal-title":"Asian Conference on Computer Vision (ACCV)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00057"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref45","article-title":"Deep Autoencoding Gaussian Mixture Model for Unsupervised Anomaly Detection","author":"zong","year":"0","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2944377"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019325"},{"key":"ref42","first-page":"8.1","article-title":"Learning Deep Representations of Appearance and Motion for Anomalous Event Detection","author":"dan","year":"0","journal-title":"Proceedings of the British Machine Vision Conference (BMVC)"},{"key":"ref24","first-page":"2579","article-title":"Viualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015216"},{"key":"ref23","first-page":"3221","article-title":"Accelerating t-SNE using Tree-Based Algorithms","volume":"15","author":"van der maaten","year":"2014","journal-title":"Journal of Machine Learning Research (JMLR)"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01055"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123451"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"}],"event":{"name":"2020 25th International Conference on Pattern Recognition (ICPR)","location":"Milan, Italy","start":{"date-parts":[[2021,1,10]]},"end":{"date-parts":[[2021,1,15]]}},"container-title":["2020 25th International Conference on Pattern Recognition (ICPR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9411940\/9411911\/09412694.pdf?arnumber=9412694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:40:47Z","timestamp":1652197247000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9412694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,10]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/icpr48806.2021.9412694","relation":{},"subject":[],"published":{"date-parts":[[2021,1,10]]}}}