{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:09:40Z","timestamp":1765008580007,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","funder":[{"name":"Jiangxi Provincial Postgraduate Innovation Fund Project for 2025","award":["YC2025-S470"],"award-info":[{"award-number":["YC2025-S470"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,9]]},"DOI":"10.1145\/3743093.3771006","type":"proceedings-article","created":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:06:16Z","timestamp":1765008376000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DS-IB Net: Ultra-Lightweight Weakly-Supervised Video Anomaly Detection through Synergistic Dual Streams and Information Bottleneck"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-1187-3178","authenticated-orcid":false,"given":"Tao","family":"Zhu","sequence":"first","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8556-0036","authenticated-orcid":false,"given":"Qi","family":"Yu","sequence":"additional","affiliation":[{"name":"Jiangxi Science &amp; Technology Normal University, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6049-1132","authenticated-orcid":false,"given":"Heran","family":"Song","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2329-5998","authenticated-orcid":false,"given":"Yuheng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8767-3518","authenticated-orcid":false,"given":"Shiyu","family":"Li","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1695-1604","authenticated-orcid":false,"given":"Yue","family":"Liu","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-8481-3717","authenticated-orcid":false,"given":"Xinyi","family":"Tu","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4786-1656","authenticated-orcid":false,"given":"Kaiwen","family":"Luo","sequence":"additional","affiliation":[{"name":"Jiangxi University of Finance and Economics, Nanchang, China"}]}],"member":"320","published-online":{"date-parts":[[2025,12,6]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01168"},{"key":"e_1_3_3_1_3_2","unstructured":"Junyoung Chung Caglar Gulcehre KyungHyun Cho and Yoshua Bengio. 2014. Empirical evaluation of gated recurrent neural networks on sequence modeling. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1412.3555 (2014)."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"e_1_3_3_1_6_2","first-page":"16049","volume-title":"International conference on machine learning","author":"Kawaguchi Kenji","year":"2023","unstructured":"Kenji Kawaguchi, Zhun Deng, Xu Ji, and Jiaoyang Huang. 2023. How does information bottleneck help deep learning?. In International conference on machine learning. PMLR, 16049\u201316096."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i2.20028"},{"key":"e_1_3_3_1_8_2","first-page":"2531","volume-title":"2022 IEEE International Conference on Image Processing (ICIP)","author":"Li Zhaoyang","year":"2022","unstructured":"Zhaoyang Li, Jinfeng Chen, and Feng Gong. 2022. Clip-tsa: A transformer-based approach for weakly-supervised video anomaly detection. In 2022 IEEE International Conference on Image Processing (ICIP). IEEE, 2531\u20132535."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Hao Liu Lijun He Miao Zhang and Fan Li. 2024. Vadiffusion: Compressed domain information guided conditional diffusion for video anomaly detection. IEEE Transactions on Circuits and Systems for Video Technology 34 9 (2024) 8398\u20138411.","DOI":"10.1109\/TCSVT.2024.3382633"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Tianshan Liu Cong Zhang Kin-Man Lam and Jun Kong. 2022. Decouple and resolve: transformer-based models for online anomaly detection from weakly labeled videos. IEEE Transactions on Information Forensics and Security 18 (2022) 15\u201328.","DOI":"10.1109\/TIFS.2022.3216479"},{"key":"e_1_3_3_1_11_2","first-page":"1737","volume-title":"Proceedings of the 30th ACM International Conference on Multimedia","author":"Liu Wen-Jie","year":"2022","unstructured":"Wen-Jie Liu, Zheng-Bowen Zhang, and Shan Liu. 2022. Exploring temporal preservation and whitening for cross-modal video anomaly detection. In Proceedings of the 30th ACM International Conference on Multimedia. 1737\u20131746."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019325"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00775"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Guansong Pang Chunhua Shen Longbing Cao and Anton Van\u00a0Den Hengel. 2021. Deep learning for anomaly detection: A review. ACM computing surveys (CSUR) 54 2 (2021) 1\u201338.","DOI":"10.1145\/3439950"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_35"},{"key":"e_1_3_3_1_16_2","unstructured":"Yujiang Pu Xiaoyu Wu Lulu Yang and Shengjin Wang. 2024. Learning prompt-enhanced context features for weakly-supervised video anomaly detection. IEEE Transactions on Image Processing (2024)."},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00024"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Bharathkumar Ramachandra Michael\u00a0J Jones and Ranga\u00a0Raju Vatsavai. 2020. A survey of single-scene video anomaly detection. IEEE transactions on pattern analysis and machine intelligence 44 5 (2020) 2293\u20132312.","DOI":"10.1109\/TPAMI.2020.3040591"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2015.7133169"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP49359.2023.10222594"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Aming Wu and Cheng Deng. 2023. TIB: Detecting unknown objects via two-stream information bottleneck. IEEE Transactions on Pattern Analysis and Machine Intelligence 46 1 (2023) 611\u2013625.","DOI":"10.1109\/TPAMI.2023.3323523"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19778-9_42"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i6.28423"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00509"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00067"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Hongchun Yuan Zhenyu Cai Hui Zhou Yue Wang and Xiangzhi Chen. 2021. Transanomaly: Video anomaly detection using video vision transformer. IEEE Access 9 (2021) 123977\u2013123986.","DOI":"10.1109\/ACCESS.2021.3109102"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58542-6_22"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01561"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Yixuan Zhou Yi Qu Xing Xu Fumin Shen Jingkuan Song and Heng\u00a0Tao Shen. 2024. Batchnorm-based weakly supervised video anomaly detection. IEEE Transactions on Circuits and Systems for Video Technology (2024).","DOI":"10.1109\/TCSVT.2024.3450734"},{"key":"e_1_3_3_1_34_2","unstructured":"Tao Zhu Qi Yu Xinru Dong Shiyu Li Yue Liu Jinlong Jiang and Lei Shu. 2025. ProDisc-VAD: An Efficient System for Weakly-Supervised Anomaly Detection in Video Surveillance Applications. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2505.02179 (2025)."}],"event":{"name":"MMAsia '25: ACM Multimedia Asia","location":"Kuala Lumpur Malaysia","acronym":"MMAsia '25","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 7th ACM International Conference on Multimedia in Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3743093.3771006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T08:06:54Z","timestamp":1765008414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3743093.3771006"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,6]]},"references-count":33,"alternative-id":["10.1145\/3743093.3771006","10.1145\/3743093"],"URL":"https:\/\/doi.org\/10.1145\/3743093.3771006","relation":{},"subject":[],"published":{"date-parts":[[2025,12,6]]},"assertion":[{"value":"2025-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}