{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:41Z","timestamp":1750309481726,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3641584.3641645","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T22:44:43Z","timestamp":1718405083000},"page":"415-420","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["RTFM-VTB: A Weakly Supervised Video Anomaly Detection Method"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-2511-4586","authenticated-orcid":false,"given":"Cheng","family":"Fan","sequence":"first","affiliation":[{"name":"School of Computer, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9516-1947","authenticated-orcid":false,"given":"Yuelei","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Modern Posts,Shaanxi, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8773-3148","authenticated-orcid":false,"given":"Zhao","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Computer, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4079-4881","authenticated-orcid":false,"given":"Junyi","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer, Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5553-2715","authenticated-orcid":false,"given":"Peiqi","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer, Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Foreground-background separation in video surveillance: A survey","volume":"51","author":"Li L.","year":"2018","unstructured":"Li, L., Huang, W., Gu, I.Y.-H., & Tian, Q. (2018). Foreground-background separation in video surveillance: A survey. ACM Computing Surveys, 51(3), 1-37.","journal-title":"ACM Computing Surveys"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/tsmcc.2012.2215319"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/tcsvt.2008.2005599"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.cviu.2016.10.010","article-title":"Detecting anomalous events in videos by learning deep representations of appearance and motion","volume":"156","author":"Xu D.","year":"2015","unstructured":"Xu, D., Yan, Y., Ricci, E., & Sebe, N. (2015). Detecting anomalous events in videos by learning deep representations of appearance and motion. Computer Vision and Image Understanding, 156, 117-127.","journal-title":"Computer Vision and Image Understanding"},{"issue":"6","key":"e_1_3_2_1_5_1","first-page":"1489","article-title":"Weakly supervised action localization with background modeling","volume":"41","author":"Nguyen T.T.","year":"2019","unstructured":"Nguyen, T.T., Le, T.L., Venkatesh, S., & Phung, D.Q. (2019). Weakly supervised action localization with background modeling. IEEE Transactions on Pattern Analysis and Machine Intelligence, 41(6), 1489-1502.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_6_1","volume-title":"Anomaly detection in surveillance videos using transformer based attention model[J]. arXiv e-prints","author":"Deshpande K","year":"2022","unstructured":"Deshpande K , Punn N S , Sonbhadra S K , Anomaly detection in surveillance videos using transformer based attention model[J]. arXiv e-prints, 2022."},{"key":"e_1_3_2_1_7_1","volume-title":"Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning[J]","author":"Tian Y","year":"2021","unstructured":"Tian Y , Pang G , Chen Y , Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning[J]. 2021."},{"key":"e_1_3_2_1_8_1","volume-title":"Overlooked Video Classification in Weakly Supervised Video Anomaly Detection[J]. arXiv preprint arXiv:2210.06688","author":"Tan W","year":"2022","unstructured":"Tan W, Yao Q, Liu J. Overlooked Video Classification in Weakly Supervised Video Anomaly Detection[J]. arXiv preprint arXiv:2210.06688, 2022."},{"key":"e_1_3_2_1_9_1","volume-title":"Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning[J]","author":"Tian Y","year":"2021","unstructured":"Tian Y , Pang G , Chen Y , Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning[J]. 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Anomaly detection in surveillance videos using transformer based attention model[J]. arXiv e-prints","author":"Deshpande K","year":"2022","unstructured":"Deshpande K , Punn N S , Sonbhadra S K , Anomaly detection in surveillance videos using transformer based attention model[J]. arXiv e-prints, 2022."},{"key":"e_1_3_2_1_11_1","volume-title":"Real-world Anomaly Detection in Surveillance Videos[J]","author":"Sultani W","year":"2018","unstructured":"Sultani W , Chen C , Shah M . Real-world Anomaly Detection in Surveillance Videos[J]. 2018."},{"key":"e_1_3_2_1_12_1","volume-title":"Graph Convolutional Label Noise Cleaner: Train a Plug-and-play Action Classifier for Anomaly Detection","author":"Li G","year":"2019","unstructured":"Li G , Zhong J X , Li N , Graph Convolutional Label Noise Cleaner: Train a Plug-and-play Action Classifier for Anomaly Detection:, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"Localizing Anomalies from Weakly-Labeled Videos[J]","author":"Lv H","year":"2020","unstructured":"Lv H , Zhou C , Xu C , Localizing Anomalies from Weakly-Labeled Videos[J]. 2020."},{"key":"e_1_3_2_1_14_1","volume-title":"Weakly-Supervised Spatio-Temporal Anomaly Detection in Surveillance Video:, 10.48550\/arXiv.2108.03825[P]","author":"Wu J","year":"2021","unstructured":"Wu J , Zhang W , Li G , Weakly-Supervised Spatio-Temporal Anomaly Detection in Surveillance Video:, 10.48550\/arXiv.2108.03825[P]. 2021."},{"key":"e_1_3_2_1_15_1","volume-title":"Learning Causal Temporal Relation and Feature Discrimination for Anomaly Detection[J]","author":"Wu P","year":"2021","unstructured":"Wu P , Liu J . Learning Causal Temporal Relation and Feature Discrimination for Anomaly Detection[J]. IEEE Transactions on Image Processing, 2021, PP(99)."},{"key":"e_1_3_2_1_16_1","volume-title":"Zheng W S . MIST: Multiple Instance Self-Training Framework for Video Anomaly Detection[J]","author":"Feng J C","year":"2021","unstructured":"Feng J C , Hong F T , Zheng W S . MIST: Multiple Instance Self-Training Framework for Video Anomaly Detection[J]. 2021."},{"key":"e_1_3_2_1_17_1","volume-title":"Self-Training Multi-Sequence Learning with Transformer for Weakly Supervised Video Anomaly Detection.\u00a0Proceedings of the AAAI Conference on Artificial Intelligence,\u00a036(2), 1395-1403","author":"Li S.","year":"2022","unstructured":"Li, S., Liu, F., & Jiao, L. (2022). Self-Training Multi-Sequence Learning with Transformer for Weakly Supervised Video Anomaly Detection.\u00a0Proceedings of the AAAI Conference on Artificial Intelligence,\u00a036(2), 1395-1403."},{"key":"e_1_3_2_1_18_1","volume-title":"Lee K","author":"Devlin J","year":"2018","unstructured":"Devlin J , Chang M W , Lee K , BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding[J]. 2018."},{"key":"e_1_3_2_1_19_1","volume-title":"Video Swin Transformer[J]","author":"Liu Z","year":"2021","unstructured":"Liu Z , Ning J , Cao Y , Video Swin Transformer[J]. 2021."},{"key":"e_1_3_2_1_20_1","volume-title":"Computer Science","author":"Soomro K","year":"2012","unstructured":"Soomro K , Zamir A R , Shah M . UCF101: A Dataset of 101 Human Actions Classes From Videos in The Wild[J]. Computer Science, 2012."},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE","author":"Kuehne H","year":"2011","unstructured":"Kuehne H , Jhuang H , Garrote E , HMDB: A Large Video Database for Human Motion Recognition[C]\/\/ IEEE International Conference on Computer Vision. IEEE, 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"Future Frame Prediction for Anomaly Detection \u2013 A New Baseline[J]","author":"Liu W","year":"2017","unstructured":"Liu W , Luo W , Lian D , Future Frame Prediction for Anomaly Detection \u2013 A New Baseline[J]. 2017."},{"key":"e_1_3_2_1_23_1","first-page":"731","volume-title":"Proceedings, Part V 16","author":"Kalfaoglu M E","year":"2020","unstructured":"Kalfaoglu M E, Kalkan S, Alatan A A. Late temporal modeling in 3d cnn architectures with bert for action recognition[C]\/\/Computer Vision\u2013ECCV 2020 Workshops: Glasgow, UK, August 23\u201328, 2020, Proceedings, Part V 16. Springer International Publishing, 2020: 731-747."},{"unstructured":"Gong D Liu L Le V Memorizing Normality to Detect Anomaly: Memory-augmented Deep Autoencoder for Unsupervised Anomaly Detection[J].","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","volume-title":"IEEE","author":"Zhang J","year":"2019","unstructured":"Zhang J , Qing L , Miao J . Temporal Convolutional Network with Complementary Inner Bag Loss for Weakly Supervised Anomaly Detection[C]\/\/ 2019 IEEE International Conference on Image Processing (ICIP). IEEE, 2019."}],"event":{"acronym":"AIPR 2023","name":"AIPR 2023: 2023 6th International Conference on Artificial Intelligence and Pattern Recognition","location":"Xiamen China"},"container-title":["2023 6th International Conference on Artificial Intelligence and Pattern Recognition (AIPR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641645","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641584.3641645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:30Z","timestamp":1750295850000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641645"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":25,"alternative-id":["10.1145\/3641584.3641645","10.1145\/3641584"],"URL":"https:\/\/doi.org\/10.1145\/3641584.3641645","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}