{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:29Z","timestamp":1750220489130,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Program of China under Grant","award":["2017YFC1703302"],"award-info":[{"award-number":["2017YFC1703302"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,22]]},"DOI":"10.1145\/3501409.3501698","type":"proceedings-article","created":{"date-parts":[[2022,1,2]],"date-time":"2022-01-02T06:18:12Z","timestamp":1641104292000},"page":"1640-1645","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["3D U-Net for Video Anomaly Detection"],"prefix":"10.1145","author":[{"given":"JingXian","family":"Yang","sequence":"first","affiliation":[{"name":"Beijing University of Technology, Beijing China"}]},{"given":"YiHeng","family":"Cai","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing China"}]},{"given":"Dan","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing China"}]},{"given":"Jin","family":"Xie","sequence":"additional","affiliation":[{"name":"Beijing University of Technology, Beijing China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"e_1_3_2_1_2_1","first-page":"481","volume-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition","author":"Abati A.","year":"2019","unstructured":"D. Abati, A. Porrello, S. Calderara, R. Cucchiara, Latent space autoregression for novelty detection, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 481--490."},{"key":"e_1_3_2_1_3_1","first-page":"203","volume-title":"in IEEE Transactions on Multimedia","author":"Li F.","unstructured":"N. Li, F. Chang and C. Liu(2021)Spatial-Temporal Cascade Autoencoder for Video Anomaly Detection in Crowded Scenes. in IEEE Transactions on Multimedia, vol. 23, pp. 203--215."},{"key":"e_1_3_2_1_4_1","first-page":"6536","volume-title":"IEEE Conf. Comput. Vision Pattern Recognit.","author":"Liu W.","year":"2018","unstructured":"W. Liu, W. Luo, D. Lian and S. Gao, \"Future Frame Prediction for Anomaly Detection - A New Baseline,\" in Proc. IEEE Conf. Comput. Vision Pattern Recognit., 2018, pp. 6536--6545."},{"key":"e_1_3_2_1_5_1","first-page":"1577","volume-title":"Conf. Image Process.","author":"Ravanbakhsh M.","year":"2017","unstructured":"M. Ravanbakhsh, M. Nabi, E. Sangineto, L. Marcenaro, C. Regazzoni and N. Sebe, \"Abnormal event detection in videos using generative adversarial nets,\" in Proc IEEE Int. Conf. Image Process., 2017, pp. 1577--158."},{"key":"e_1_3_2_1_6_1","volume-title":"Histograms of Oriented Gradients for Human Detection[C]\/\/Computer Vision and Pattern Recognition","author":"Dalal N","year":"2005","unstructured":"Dalal N, Triggs B. Histograms of Oriented Gradients for Human Detection[C]\/\/Computer Vision and Pattern Recognition, 2005. IEEE Computer Society, 2005:886--893."},{"key":"e_1_3_2_1_7_1","first-page":"1446","article-title":"Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models[C]\/\/2009 IEEE Conference on Computer Vision and Pattern Recognition","volume":"2009","author":"Kratz L","unstructured":"Kratz L, Nishino K. Anomaly Detection in Extremely Crowded Scenes Using Spatio-Temporal Motion Pattern Models[C]\/\/2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2009: 1446--1453.","journal-title":"IEEE"},{"key":"e_1_3_2_1_8_1","first-page":"222","article-title":"Abnormal Event Detection Using Recurrent Neural Network[C]\/\/2015 International Conference on Computer Science and Applications (CSA)","volume":"2015","author":"Zhou X G","unstructured":"Zhou X G, Zhang L Q. Abnormal Event Detection Using Recurrent Neural Network[C]\/\/2015 International Conference on Computer Science and Applications (CSA). IEEE, 2015: 222--226.","journal-title":"IEEE"},{"key":"e_1_3_2_1_9_1","first-page":"1273","volume-title":"Proceedings of the IEEE International Conference on Computer Vision","author":"Nguyen J.","year":"2019","unstructured":"T.-N. Nguyen, J. Meunier, Anomaly detection in video sequence with appearance-motion correspondence, in: Proceedings of the IEEE International Conference on Computer Vision, 2019, pp. 1273--1283."},{"key":"e_1_3_2_1_10_1","volume-title":"Anomaly detection in video using predictive convolutional long short-term memory networks","author":"Medel A.","year":"2016","unstructured":"J.R. Medel and A. Savakis, Anomaly detection in video using predictive convolutional long short-term memory networks, 2016, [online] Available: http:\/\/arxiv.org\/abs\/1612.00390."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2950530"},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Gao, Video anomaly detection with sparse coding inspired deep neural networks","author":"Luo W.","year":"2019","unstructured":"W. Luo, W. Liu, D. Lian, J. Tang, L. Duan, X. Peng, S. Gao, Video anomaly detection with sparse coding inspired deep neural networks, IEEE Transactions on Pattern Analysis and Machine Intelligence (99)(2019) 1--1.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence (99)("},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"IEEE International Conference on Advanced Video and Signal Based Surveillance","author":"Lu K. M.","year":"2019","unstructured":"Y. Lu, K. M. Kumar, S. s. Nabavi and Y. Wang, \"Future Frame Prediction Using Convolutional VRNN for Anomaly Detection,\" in Proc. IEEE International Conference on Advanced Video and Signal Based Surveillance, 2019, pp. 1--8."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2019.2962229"},{"key":"e_1_3_2_1_15_1","first-page":"1705","volume-title":"IEEE Int. Conf. Comput. Vision","author":"Gong","year":"2019","unstructured":"D. Gong et al., \"Memorizing Normality to Detect Anomaly: Memory-Augmented Deep Autoencoder for Unsupervised Anomaly Detection,\" in Proc. IEEE Int. Conf. Comput. Vision, 2019, pp. 1705--1714."},{"key":"e_1_3_2_1_16_1","first-page":"439","volume-title":"IEEE International Conference on Multimedia and Expo","author":"Luo W.","year":"2017","unstructured":"W. Luo, W. Liu and S. Gao, \"Remembering history with convolutional LSTM for anomaly detection,\" in Proc. IEEE International Conference on Multimedia and Expo, 2017, pp. 439--444."},{"key":"e_1_3_2_1_17_1","first-page":"264","article-title":"Video anomaly detection with multi-scale feature and temporal information fusion","volume":"432","author":"Yiheng Cai","year":"2021","unstructured":"Yiheng Cai, Jiaqi Liu, Yajun Guo, Shaobin Hu, Shinan Lang, \"Video anomaly detection with multi-scale feature and temporal information fusion,\" Neuro computing, vol. 432, pp. 264--273, 2021.","journal-title":"Neuro computing"},{"key":"e_1_3_2_1_18_1","unstructured":"Sklearn documentation http:\/\/scikit-learn.org\/stable\/"}],"event":{"name":"EITCE 2021: 2021 5th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2021","location":"Xiamen China"},"container-title":["Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501409.3501698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501409.3501698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:17Z","timestamp":1750193357000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501409.3501698"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":18,"alternative-id":["10.1145\/3501409.3501698","10.1145\/3501409"],"URL":"https:\/\/doi.org\/10.1145\/3501409.3501698","relation":{},"subject":[],"published":{"date-parts":[[2021,10,22]]},"assertion":[{"value":"2021-12-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}