{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T16:24:26Z","timestamp":1778171066160,"version":"3.51.4"},"reference-count":223,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T00:00:00Z","timestamp":1712620800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"China Mobile Research Fund of the Chinese Ministry of Education","award":["No. KEH2310029"],"award-info":[{"award-number":["No. KEH2310029"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 62250410368"],"award-info":[{"award-number":["No. 62250410368"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Specific Research Fund of the Innovation Platform for Academicians of Hainan Province","award":["No. YSPTZX202314"],"award-info":[{"award-number":["No. YSPTZX202314"]}]},{"name":"Shanghai Key Research Laboratory of NSAI"},{"name":"Joint Laboratory on Networked AI Edge Computing Fudan University-Changan"},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"crossref","award":["No. 202306100221"],"award-info":[{"award-number":["No. 202306100221"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,7,31]]},"abstract":"<jats:p>Video Anomaly Detection (VAD) serves as a pivotal technology in the intelligent surveillance systems, enabling the temporal or spatial identification of anomalous events within videos. While existing reviews predominantly concentrate on conventional unsupervised methods, they often overlook the emergence of weakly-supervised and fully-unsupervised approaches. To address this gap, this survey extends the conventional scope of VAD beyond unsupervised methods, encompassing a broader spectrum termed Generalized Video Anomaly Event Detection (GVAED). By skillfully incorporating recent advancements rooted in diverse assumptions and learning frameworks, this survey introduces an intuitive taxonomy that seamlessly navigates through unsupervised, weakly-supervised, supervised and fully-unsupervised VAD methodologies, elucidating the distinctions and interconnections within these research trajectories. In addition, this survey facilitates prospective researchers by assembling a compilation of research resources, including public datasets, available codebases, programming tools, and pertinent literature. Furthermore, this survey quantitatively assesses model performance, delves into research challenges and directions, and outlines potential avenues for future exploration.<\/jats:p>","DOI":"10.1145\/3645101","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T11:59:15Z","timestamp":1707307155000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":116,"title":["Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1312-0146","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"first","affiliation":[{"name":"Fudan University, Shanghai, China and University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1829-5671","authenticated-orcid":false,"given":"Dingkang","family":"Yang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4953-2660","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2819-0200","authenticated-orcid":false,"given":"Jing","family":"Liu","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China and University of British Columbia, Vancouver, Canada and Duke Kunshan University, Suzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4365-4165","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3851-9938","authenticated-orcid":false,"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8356-1329","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"Duke Kunshan University, Kunshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8143-9052","authenticated-orcid":false,"given":"Liang","family":"Song","sequence":"additional","affiliation":[{"name":"Fudan University, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,9]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01951"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70825"},{"key":"e_1_3_2_4_2","article-title":"Spatio-temporal video parsing for abnormality detection","author":"Anti\u0107 Borislav","year":"2015","unstructured":"Borislav Anti\u0107 and Bj\u00f6rn Ommer. 2015. Spatio-temporal video parsing for abnormality detection. arXiv preprint arXiv:1502.06235 (2015).","journal-title":"arXiv preprint arXiv:1502.06235"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00676"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548199"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206686"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3444690"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i2.16177"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.10.044"},{"key":"e_1_3_2_11_2","first-page":"9912","article-title":"Unsupervised learning of visual features by contrasting cluster assignments","volume":"33","author":"Caron Mathilde","year":"2020","unstructured":"Mathilde Caron, Ishan Misra, Julien Mairal, Priya Goyal, Piotr Bojanowski, and Armand Joulin. 2020. Unsupervised learning of visual features by contrasting cluster assignments. Advances in Neural Information Processing Systems 33 (2020), 9912\u20139924.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.502"},{"key":"e_1_3_2_13_2","first-page":"1","article-title":"Anomaly detection in surveillance videos: A thematic taxonomy of deep models, review and performance analysis","author":"Chandrakala S.","year":"2022","unstructured":"S. Chandrakala, K. Deepak, and G. Revathy. 2022. Anomaly detection in surveillance videos: A thematic taxonomy of deep models, review and performance analysis. Artificial Intelligence Review (2022), 1\u201350.","journal-title":"Artificial Intelligence Review"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108213"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58555-6_20"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i1.19898"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.103915"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107969"},{"key":"e_1_3_2_19_2","first-page":"1597","volume-title":"International Conference on Machine Learning","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International Conference on Machine Learning. PMLR, 1597\u20131607."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00587"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01472"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3261138"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10095170"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298909"},{"key":"e_1_3_2_25_2","first-page":"189","volume-title":"International Symposium on Neural Networks","author":"Chong Yong Shean","year":"2017","unstructured":"Yong Shean Chong and Yong Haur Tay. 2017. Abnormal event detection in videos using spatiotemporal autoencoder. In International Symposium on Neural Networks. Springer, 189\u2013196."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16111904"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958185"},{"key":"e_1_3_2_28_2","article-title":"Diffusion models in vision: A survey","author":"Croitoru Florinel-Alin","year":"2022","unstructured":"Florinel-Alin Croitoru, Vlad Hondru, Radu Tudor Ionescu, and Mubarak Shah. 2022. Diffusion models in vision: A survey. arXiv preprint arXiv:2209.04747 (2022).","journal-title":"arXiv preprint arXiv:2209.04747"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995558"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/11744047_33"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-020-01740-1"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00266"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2976475"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/VSPETS.2005.1570899"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993373"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW50498.2020.00475"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107865"},{"key":"e_1_3_2_39_2","first-page":"1","volume-title":"Conference on Robot Learning","author":"Dosovitskiy Alexey","year":"2017","unstructured":"Alexey Dosovitskiy, German Ros, Felipe Codevilla, Antonio Lopez, and Vladlen Koltun. 2017. CARLA: An open urban driving simulator. In Conference on Robot Learning. PMLR, 1\u201316."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475693"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.063"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11548-019-02003-2"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01255"},{"issue":"9","key":"e_1_3_2_45_2","first-page":"4505","article-title":"A background-agnostic framework with adversarial training for abnormal event detection in video","volume":"44","author":"Georgescu Mariana Iuliana","year":"2021","unstructured":"Mariana Iuliana Georgescu, Radu Tudor Ionescu, Fahad Shahbaz Khan, Marius Popescu, and Mubarak Shah. 2021. A background-agnostic framework with adversarial training for abnormal event detection in video. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 9 (2021), 4505\u20134523.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.169"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00179"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"e_1_3_2_49_2","unstructured":"Jean-Bastien Grill Florian Strub Florent Altch\u00e9 Corentin Tallec Pierre Richemond Elena Buchatskaya Carl Doersch Bernardo Avila Pires Zhaohan Guo Mohammad Gheshlaghi Azar Bilal Piot Koray Kavukcuoglu Remi Munos and Michal Valko. 2020. Bootstrap your own latent-a new approach to self-supervised learning. Advances in Neural Information Processing Systems 33 (2020) 21271\u201321284."},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.gaitpost.2020.07.100"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01553"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00975"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.391"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859873"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2868617"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3227044"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548369"},{"key":"e_1_3_2_60_2","article-title":"Self-supervised attentive generative adversarial networks for video anomaly detection","author":"Huang Chao","year":"2022","unstructured":"Chao Huang, Jie Wen, Yong Xu, Qiuping Jiang, Jian Yang, Yaowei Wang, and David Zhang. 2022. Self-supervised attentive generative adversarial networks for video anomaly detection. IEEE Transactions on Neural Networks and Learning Systems (2022).","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3122801"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3127716"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00803"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00212"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010029"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283370"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119079"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging4020036"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.10.001"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-022-03613-1"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956507"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2948286"},{"key":"e_1_3_2_73_2","first-page":"1","volume-title":"2017 5th International Workshop on Biometrics and Forensics (IWBF)","author":"Leyva Roberto","year":"2017","unstructured":"Roberto Leyva, Victor Sanchez, and Chang-Tsun Li. 2017. The LV dataset: A realistic surveillance video dataset for abnormal event detection. In 2017 5th International Workshop on Biometrics and Forensics (IWBF). IEEE, 1\u20136."},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2695105"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2022.3186041"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2022.03.004"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22186893"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-021-02377-4"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2984093"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.01.026"},{"key":"e_1_3_2_81_2","doi-asserted-by":"crossref","unstructured":"Waseem Ullah Tanveer Hussain Zulfiqar Ahmad Khan Umair Haroon and Sung Wook Baik. 2022. Intelligent dual stream CNN and echo state network for anomaly detection. Knowledge-Based Systems 253 (2022) 109456.","DOI":"10.1016\/j.knosys.2022.109456"},{"key":"e_1_3_2_82_2","article-title":"Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection","volume":"24","author":"Li Shuo","year":"2022","unstructured":"Shuo Li, Fang Liu, and Licheng Jiao. 2022. Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection. Proceedings of the AAAI, Virtual 24 (2022).","journal-title":"Proceedings of the AAAI, Virtual"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.01.097"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV48630.2021.00368"},{"issue":"1","key":"e_1_3_2_85_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","article-title":"Anomaly detection and localization in crowded scenes","volume":"36","author":"Li Weixin","year":"2013","unstructured":"Weixin Li, Vijay Mahadevan, and Nuno Vasconcelos. 2013. Anomaly detection and localization in crowded scenes. IEEE Transactions on Pattern Analysis and Machine Intelligence 36, 1 (2013), 18\u201332.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954540"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2018.2865525"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2019.00148"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20053"},{"key":"e_1_3_2_90_2","first-page":"1","article-title":"DSDCLA: Driving style detection via hybrid CNN-LSTM with multi-level attention fusion","author":"Liu Jing","year":"2023","unstructured":"Jing Liu, Yang Liu, Di Li, Hanqi Wang, Xiaohong Huang, and Liang Song. 2023. DSDCLA: Driving style detection via hybrid CNN-LSTM with multi-level attention fusion. Applied Intelligence (2023), 1\u201318.","journal-title":"Applied Intelligence"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109568"},{"key":"e_1_3_2_92_2","doi-asserted-by":"crossref","unstructured":"Wen Liu Weixin Luo Zhengxin Li Peilin Zhao and Shenghua Gao. 2019. Margin learning embedded prediction for video anomaly detection with A few anomalies. In IJCAI. 3023\u20133030.","DOI":"10.24963\/ijcai.2019\/419"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00684"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3263792"},{"key":"e_1_3_2_95_2","first-page":"71","volume-title":"BMVC","author":"Liu Yusha","year":"2018","unstructured":"Yusha Liu, Chun-Liang Li, and Barnab\u00e1s P\u00f3czos. 2018. Classifier two sample test for video anomaly detections. In BMVC. 71."},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10097052"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISHC54333.2021.00034"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2022.3161049"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892231"},{"key":"e_1_3_2_100_2","first-page":"1","article-title":"AMP-Net: Appearance-motion prototype network assisted automatic video anomaly detection system","author":"Liu Yang","year":"2023","unstructured":"Yang Liu, Jing Liu, Kun Yang, Bobo Ju, Siao Liu, Yuzheng Wang, Dingkang Yang, Peng Sun, and Liang Song. 2023. AMP-Net: Appearance-motion prototype network assisted automatic video anomaly detection system. IEEE Transactions on Industrial Informatics (2023), 1\u201313.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"5","key":"e_1_3_2_101_2","first-page":"2508","article-title":"Collaborative normality learning framework for weakly supervised video anomaly detection","volume":"69","author":"Liu Yang","year":"2022","unstructured":"Yang Liu, Jing Liu, Mengyang Zhao, Shuang Li, and Liang Song. 2022. Collaborative normality learning framework for weakly supervised video anomaly detection. IEEE Transactions on Circuits and Systems II: Express Briefs 69, 5 (2022), 2508\u20132512.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME52920.2022.9859727"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746822"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3612393"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110986"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01333"},{"issue":"2","key":"e_1_3_2_107_2","first-page":"2581","article-title":"A survey on real world anomaly detection in live video surveillance techniques","volume":"2","author":"Lomte Vina","year":"2019","unstructured":"Vina Lomte, Satish Singh, Siddharth Patil, Siddheshwar Patil, and Durgesh Pahurkar. 2019. A survey on real world anomaly detection in live video surveillance techniques. International Journal of Research in Engineering, Science and Management 2, 2 (2019), 2581\u20135792.","journal-title":"International Journal of Research in Engineering, Science and Management"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"e_1_3_2_109_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-018-1129-8"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58558-7_8"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.45"},{"key":"e_1_3_2_112_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.12.148"},{"key":"e_1_3_2_113_2","article-title":"Future frame prediction network for video anomaly detection","author":"Luo Weixin","year":"2021","unstructured":"Weixin Luo, Wen Liu, Dongze Lian, and Shenghua Gao. 2021. Future frame prediction network for video anomaly detection. IEEE Transactions on Pattern Analysis and Machine Intelligence (2021).","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2944377"},{"key":"e_1_3_2_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00775"},{"key":"e_1_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3072863"},{"key":"e_1_3_2_117_2","article-title":"Anomaly detection in crowded scenes using dense trajectories","author":"Ma Ke","year":"2015","unstructured":"Ke Ma, Michael Doescher, and Christopher Bodden. 2015. Anomaly detection in crowded scenes using dense trajectories. University of Wisconsin-Madison (2015).","journal-title":"University of Wisconsin-Madison"},{"key":"e_1_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3118815"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4018-9_31"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01055"},{"key":"e_1_3_2_122_2","article-title":"Anomaly detection in video using predictive convolutional long short-term memory networks","author":"Medel Jefferson Ryan","year":"2016","unstructured":"Jefferson Ryan Medel and Andreas Savakis. 2016. Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv preprint arXiv:1612.00390 (2016).","journal-title":"arXiv preprint arXiv:1612.00390"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/120187"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.02.064"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"e_1_3_2_126_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078"},{"key":"e_1_3_2_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372278.3390701"},{"key":"e_1_3_2_128_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00136"},{"key":"e_1_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1145\/3439950"},{"key":"e_1_3_2_130_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"e_1_3_2_131_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413686"},{"key":"e_1_3_2_132_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"e_1_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV56688.2023.00269"},{"key":"e_1_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549555.3549568"},{"key":"e_1_3_2_135_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCECE54139.2022.9712793"},{"key":"e_1_3_2_136_2","doi-asserted-by":"crossref","unstructured":"Abel Gawel Hermann Blum Johannes Pankert Koen Kr\u00e4mer Luca Bartolomei Selen Ercan Farbod Farshidian Margarita Chli Fabio Gramazio Roland Siegwart and others. 2019. A fully-integrated sensing and control system for high-accuracy mobile robotic building construction. In 2019 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS). IEEE 2300\u20132307.","DOI":"10.1109\/IROS40897.2019.8967733"},{"key":"e_1_3_2_137_2","first-page":"1","article-title":"Analysis of anomaly detection in surveillance video: Recent trends and future vision","author":"Raja Rohit","year":"2022","unstructured":"Rohit Raja, Prakash Chandra Sharma, Md. Rashid Mahmood, and Dinesh Kumar Saini. 2022. Analysis of anomaly detection in surveillance video: Recent trends and future vision. Multimedia Tools and Applications (2022), 1\u201317.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093457"},{"key":"e_1_3_2_139_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV45572.2020.9093417"},{"issue":"5","key":"e_1_3_2_140_2","first-page":"2293","article-title":"A survey of single-scene video anomaly detection","volume":"44","author":"Ramachandra Bharathkumar","year":"2020","unstructured":"Bharathkumar Ramachandra, Michael J. Jones, and Ranga Raju Vatsavai. 2020. A survey of single-scene video anomaly detection. IEEE Transactions on Pattern Analysis and Machine Intelligence 44, 5 (2020), 2293\u20132312.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00188"},{"key":"e_1_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"e_1_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2019.00206"},{"key":"e_1_3_2_144_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"key":"e_1_3_2_145_2","first-page":"1","article-title":"A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance","author":"Rezaee Khosro","year":"2021","unstructured":"Khosro Rezaee, Sara Mohammad Rezakhani, Mohammad R. Khosravi, and Mohammad Kazem Moghimi. 2021. A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance. Personal and Ubiquitous Computing (2021), 1\u201317.","journal-title":"Personal and Ubiquitous Computing"},{"key":"e_1_3_2_146_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.06.007"},{"key":"e_1_3_2_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"e_1_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2017.2670780"},{"key":"e_1_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355081"},{"key":"e_1_3_2_150_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.937393"},{"key":"e_1_3_2_151_2","doi-asserted-by":"publisher","DOI":"10.1145\/3417989"},{"key":"e_1_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00462"},{"key":"e_1_3_2_153_2","doi-asserted-by":"crossref","first-page":"621","DOI":"10.1007\/978-3-319-67361-5_40","volume-title":"Field and Service Robotics","author":"Shah Shital","year":"2018","unstructured":"Shital Shah, Debadeepta Dey, Chris Lovett, and Ashish Kapoor. 2018. AirSim: High-fidelity visual and physical simulation for autonomous vehicles. In Field and Service Robotics. Springer, 621\u2013635."},{"key":"e_1_3_2_154_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18913-5_48"},{"key":"e_1_3_2_155_2","unstructured":"Md Haidar Sharif Lei Jiao and Christian W. Omlin. 2022. Deep crowd anomaly detection: State-of-the-art challenges and future research directions. arXiv preprint arXiv:2210.13927 (2022)."},{"key":"e_1_3_2_156_2","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2018.8599969"},{"key":"e_1_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3172270"},{"key":"e_1_3_2_158_2","article-title":"Training very deep networks","volume":"28","author":"Srivastava Rupesh K.","year":"2015","unstructured":"Rupesh K. Srivastava, Klaus Greff, and J\u00fcrgen Schmidhuber. 2015. Training very deep networks. Advances in Neural Information Processing Systems 28 (2015).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_159_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"e_1_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.09.016"},{"key":"e_1_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02188"},{"key":"e_1_3_2_162_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2019.11.024"},{"key":"e_1_3_2_164_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2018.8486576"},{"key":"e_1_3_2_165_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"e_1_3_2_166_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.510"},{"key":"e_1_3_2_167_2","doi-asserted-by":"publisher","DOI":"10.5244\/C.31.139"},{"key":"e_1_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.315"},{"key":"e_1_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68560-1_16"},{"key":"e_1_3_2_170_2","article-title":"Attention is all you need","volume":"30","author":"Vaswani Ashish","year":"2017","unstructured":"Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N. Gomez, \u0141ukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. Advances in Neural Information Processing Systems 30 (2017).","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015216"},{"key":"e_1_3_2_172_2","article-title":"Energy-based models for video anomaly detection","author":"Vu Hung","year":"2017","unstructured":"Hung Vu, Dinh Phung, Tu Dinh Nguyen, Anthony Trevors, and Svetha Venkatesh. 2017. Energy-based models for video anomaly detection. arXiv preprint arXiv:1708.05211 (2017).","journal-title":"arXiv preprint arXiv:1708.05211"},{"key":"e_1_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"e_1_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-012-0594-8"},{"key":"e_1_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3178128"},{"key":"e_1_3_2_176_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109335"},{"key":"e_1_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46484-8_2"},{"key":"e_1_3_2_178_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2878538"},{"key":"e_1_3_2_179_2","article-title":"Robust unsupervised video anomaly detection by multipath frame prediction","author":"Wang Xuanzhao","year":"2021","unstructured":"Xuanzhao Wang, Zhengping Che, Bo Jiang, Ning Xiao, Ke Yang, Jian Tang, Jieping Ye, Jingyu Wang, and Qi Qi. 2021. Robust unsupervised video anomaly detection by multipath frame prediction. IEEE Transactions on Neural Networks and Learning Systems (2021).","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_180_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10094913"},{"key":"e_1_3_2_181_2","article-title":"Sampling to distill: Knowledge transfer from open-world data","author":"Wang Yuzheng","year":"2023","unstructured":"Yuzheng Wang, Zhaoyu Chen, Jie Zhang, Dingkang Yang, Zuhao Ge, Yang Liu, Siao Liu, Yunquan Sun, Wenqiang Zhang, and Lizhe Qi. 2023. Sampling to distill: Knowledge transfer from open-world data. arXiv preprint arXiv:2307.16601 (2023).","journal-title":"arXiv preprint arXiv:2307.16601"},{"key":"e_1_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3216500"},{"key":"e_1_3_2_183_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746422"},{"key":"e_1_3_2_184_2","doi-asserted-by":"publisher","DOI":"10.1145\/3400066"},{"key":"e_1_3_2_185_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_42"},{"issue":"7","key":"e_1_3_2_186_2","first-page":"2609","article-title":"A deep one-class neural network for anomalous event detection in complex scenes","volume":"31","author":"Wu Peng","year":"2019","unstructured":"Peng Wu, Jing Liu, and Fang Shen. 2019. A deep one-class neural network for anomalous event detection in complex scenes. IEEE Transactions on Neural Networks and Learning Systems 31, 7 (2019), 2609\u20132622.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_187_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58577-8_20"},{"key":"e_1_3_2_188_2","article-title":"Weakly supervised audio-visual violence detection","author":"Wu Peng","year":"2022","unstructured":"Peng Wu, Xiaotao Liu, and Jing Liu. 2022. Weakly supervised audio-visual violence detection. IEEE Transactions on Multimedia (2022).","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_2_189_2","article-title":"DSS-Net: Dynamic self-supervised network for video anomaly detection","author":"Wu Peihao","year":"2023","unstructured":"Peihao Wu, Wenqian Wang, Faliang Chang, Chunsheng Liu, and Bin Wang. 2023. DSS-Net: Dynamic self-supervised network for video anomaly detection. IEEE Transactions on Multimedia (2023).","journal-title":"IEEE Transactions on Multimedia"},{"key":"e_1_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2023.3264621"},{"key":"e_1_3_2_191_2","article-title":"Learning deep representations of appearance and motion for anomalous event detection","author":"Xu Dan","year":"2015","unstructured":"Dan Xu, Elisa Ricci, Yan Yan, Jingkuan Song, and Nicu Sebe. 2015. Learning deep representations of appearance and motion for anomalous event detection. arXiv preprint arXiv:1510.01553 (2015).","journal-title":"arXiv preprint arXiv:1510.01553"},{"key":"e_1_3_2_192_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.10.010"},{"key":"e_1_3_2_193_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00675"},{"key":"e_1_3_2_194_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19836-6_9"},{"key":"e_1_3_2_195_2","doi-asserted-by":"crossref","unstructured":"Dingkang Yang Shuai Huang Zhi Xu Zhenpeng Li Shunli Wang Mingcheng Li Yuzheng Wang Yang Liu Kun Yang Zhaoyu Chen Yan Wang Jing Liu Peixuan Zhang Peng Zhai and Lihua Zhang. 2023. Aide: A vision-driven multi-view multi-modal multi-tasking dataset for assistive driving perception. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. 20459\u201320470.","DOI":"10.1109\/ICCV51070.2023.01871"},{"key":"e_1_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.110370"},{"key":"e_1_3_2_197_2","article-title":"Spatio-temporal domain awareness for multi-agent collaborative perception","author":"Yang Kun","year":"2023","unstructured":"Kun Yang, Dingkang Yang, Jingyu Zhang, Mingcheng Li, Yang Liu, Jing Liu, Hanqi Wang, Peng Sun, and Liang Song. 2023. Spatio-temporal domain awareness for multi-agent collaborative perception. arXiv preprint arXiv:2307.13929 (2023).","journal-title":"arXiv preprint arXiv:2307.13929"},{"key":"e_1_3_2_198_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01402"},{"key":"e_1_3_2_199_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350899"},{"key":"e_1_3_2_200_2","doi-asserted-by":"crossref","unstructured":"Qingze Yin Guodong Ding Shaogang Gong and Zhenmin Tang. 2021. Multi-view label prediction for unsupervised learning person re-identification. IEEE Signal Processing Letters 28 (2021) 1390\u20131394.","DOI":"10.1109\/LSP.2021.3090258"},{"key":"e_1_3_2_201_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3300094"},{"key":"e_1_3_2_202_2","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413973"},{"key":"e_1_3_2_203_2","article-title":"Abnormal event detection and localization via adversarial event prediction","author":"Yu Jongmin","year":"2021","unstructured":"Jongmin Yu, Younkwan Lee, Kin Choong Yow, Moongu Jeon, and Witold Pedrycz. 2021. Abnormal event detection and localization via adversarial event prediction. IEEE Transactions on Neural Networks and Learning Systems (2021).","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_204_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3547868"},{"key":"e_1_3_2_205_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109102"},{"key":"e_1_3_2_206_2","first-page":"14183","volume-title":"Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition","author":"Zaheer Muhammad Zaigham","year":"2020","unstructured":"Muhammad Zaigham Zaheer, Jin-ha Lee, Marcella Astrid, and Seung-Ik Lee. 2020. Old is gold: Redefining the adversarially learned one-class classifier training paradigm. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 14183\u201314193."},{"key":"e_1_3_2_207_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_22"},{"key":"e_1_3_2_208_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01433"},{"key":"e_1_3_2_209_2","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2020.3025688"},{"key":"e_1_3_2_210_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2931441"},{"key":"e_1_3_2_211_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00672"},{"key":"e_1_3_2_212_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01561"},{"key":"e_1_3_2_213_2","article-title":"Weakly supervised video anomaly detection via transformer-enabled temporal relation learning","author":"Zhang Dasheng","year":"2022","unstructured":"Dasheng Zhang, Chao Huang, Chengliang Liu, and Yong Xu. 2022. Weakly supervised video anomaly detection via transformer-enabled temporal relation learning. IEEE Signal Processing Letters (2022).","journal-title":"IEEE Signal Processing Letters"},{"key":"e_1_3_2_214_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"e_1_3_2_215_2","first-page":"1","article-title":"Surveillance video anomaly detection via non-local U-Net frame prediction","author":"Zhang Qianqian","year":"2022","unstructured":"Qianqian Zhang, Guorui Feng, and Hanzhou Wu. 2022. Surveillance video anomaly detection via non-local U-Net frame prediction. Multimedia Tools and Applications (2022), 1\u201316.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_216_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.09.005"},{"key":"e_1_3_2_217_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.981"},{"key":"e_1_3_2_218_2","article-title":"Robust semi-supervised federated learning for images automatic recognition in internet of drones","author":"Zhang Zhe","year":"2022","unstructured":"Zhe Zhang, Shiyao Ma, Zhaohui Yang, Zehui Xiong, Jiawen Kang, Yi Wu, Kejia Zhang, and Dusit Niyato. 2022. Robust semi-supervised federated learning for images automatic recognition in internet of drones. IEEE Internet of Things Journal (2022).","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR56361.2022.9956287"},{"key":"e_1_3_2_220_2","doi-asserted-by":"publisher","DOI":"10.1145\/3123266.3123451"},{"key":"e_1_3_2_221_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"e_1_3_2_222_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900907"},{"key":"e_1_3_2_223_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.06.007"},{"key":"e_1_3_2_224_2","first-page":"1","volume-title":"The British Machine Vision Conference","author":"Zhu Yi","year":"2019","unstructured":"Yi Zhu and Shawn Newsam. 2019. Motion-aware feature for improved video anomaly detection. In The British Machine Vision Conference. 1\u201312."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3645101","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3645101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:27Z","timestamp":1750291407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3645101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,9]]},"references-count":223,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7,31]]}},"alternative-id":["10.1145\/3645101"],"URL":"https:\/\/doi.org\/10.1145\/3645101","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,9]]},"assertion":[{"value":"2023-02-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-31","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}