{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:25:54Z","timestamp":1769819154684,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1145\/3568562.3568642","type":"proceedings-article","created":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:25:01Z","timestamp":1669681501000},"page":"262-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An integration of Pseudo Anomalies and Memory Augmented Autoencoder for Video Anomaly Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3504-4794","authenticated-orcid":false,"given":"Anh","family":"Le","sequence":"first","affiliation":[{"name":"Le Quy Don Technical Academy, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7099-5187","authenticated-orcid":false,"given":"Quang Uy","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical Academy, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0059-350X","authenticated-orcid":false,"given":"Ngoc","family":"Tran Nguyen","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical Academy, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7886-7128","authenticated-orcid":false,"given":"Hai-Hong","family":"Phan","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical Academy, Viet Nam"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5057-8319","authenticated-orcid":false,"given":"Thi Huong","family":"Chu","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical Academy, Viet Nam"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00028"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58555-6_20"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01059"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107865"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00309"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.3037538"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16220"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"e_1_3_2_1_10_1","volume-title":"Generative adversarial nets. Advances in neural information processing systems 27","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow , Jean Pouget-Abadie , Mehdi Mirza , Bing Xu , David Warde-Farley , Sherjil Ozair , Aaron Courville , and Yoshua Bengio . 2014. Generative adversarial nets. Advances in neural information processing systems 27 ( 2014 ). Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in neural information processing systems 27 (2014)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3004729"},{"key":"e_1_3_2_1_12_1","volume-title":"Anomaly detection and localization in crowded scenes","author":"Li Weixin","year":"2013","unstructured":"Weixin Li , Vijay Mahadevan , and Nuno Vasconcelos . 2013. Anomaly detection and localization in crowded scenes . IEEE transactions on pattern analysis and machine intelligence 36, 1( 2013 ), 18\u201332. Weixin Li, Vijay Mahadevan, and Nuno Vasconcelos. 2013. Anomaly detection and localization in crowded scenes. IEEE transactions on pattern analysis and machine intelligence 36, 1(2013), 18\u201332."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107618"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00684"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01333"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2019.8909850"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.45"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00136"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00197"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350992"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34995-0_30"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00892"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14183\u201314193","author":"Zaheer Muhammad\u00a0Zaigham","year":"2020","unstructured":"Muhammad\u00a0Zaigham Zaheer , Jin-ha Lee, Marcella Astrid , and Seung-Ik Lee . 2020 . Old is gold: Redefining the adversarially learned one-class classifier training paradigm . In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14183\u201314193 . Muhammad\u00a0Zaigham Zaheer, Jin-ha Lee, Marcella Astrid, and Seung-Ik Lee. 2020. Old is gold: Redefining the adversarially learned one-class classifier training paradigm. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14183\u201314193."},{"key":"e_1_3_2_1_28_1","first-page":"2793","article-title":"Reconstructive sequence-graph network for video summarization","volume":"44","author":"Zhao Bin","year":"2021","unstructured":"Bin Zhao , Haopeng Li , Xiaoqiang Lu , and Xuelong Li . 2021 . Reconstructive sequence-graph network for video summarization . IEEE Transactions on Pattern Analysis and Machine Intelligence 44 , 5(2021), 2793 \u2013 2801 . Bin Zhao, Haopeng Li, Xiaoqiang Lu, and Xuelong Li. 2021. Reconstructive sequence-graph network for video summarization. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 5(2021), 2793\u20132801.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6998"},{"key":"e_1_3_2_1_30_1","volume-title":"Attention-driven loss for anomaly detection in video surveillance","author":"Zhou Joey\u00a0Tianyi","year":"2019","unstructured":"Joey\u00a0Tianyi Zhou , Le Zhang , Zhiwen Fang , Jiawei Du , Xi Peng , and Yang Xiao . 2019. Attention-driven loss for anomaly detection in video surveillance . IEEE transactions on circuits and systems for video technology 30, 12( 2019 ), 4639\u20134647. Joey\u00a0Tianyi Zhou, Le Zhang, Zhiwen Fang, Jiawei Du, Xi Peng, and Yang Xiao. 2019. Attention-driven loss for anomaly detection in video surveillance. IEEE transactions on circuits and systems for video technology 30, 12(2019), 4639\u20134647."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00595"}],"event":{"name":"SoICT 2022: The 11th International Symposium on Information and Communication Technology","location":"Hanoi Vietnam","acronym":"SoICT 2022"},"container-title":["The 11th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568642","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3568562.3568642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:40Z","timestamp":1750186840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3568562.3568642"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":31,"alternative-id":["10.1145\/3568562.3568642","10.1145\/3568562"],"URL":"https:\/\/doi.org\/10.1145\/3568562.3568642","relation":{},"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}