{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T05:59:57Z","timestamp":1759384797847,"version":"3.41.2"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,12,8]],"date-time":"2021-12-08T00:00:00Z","timestamp":1638921600000},"content-version":"vor","delay-in-days":341,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>With the rapid growth of video surveillance data, there is an increasing demand for big data automatic anomaly detection of large\u2010scale video data. The detection methods using reconstruction errors based on deep autoencoders have been widely discussed. However, sometimes the autoencoder could reconstruct the anomaly well and lead to missing detections. In order to solve this problem, this paper uses a memory module to enhance the autoencoder, which is called the memory\u2010augmented autoencoder (Memory AE) method. Given the input, Memory AE first obtains the code from the encoder and then uses it as a query to retrieve the most relevant memory items for reconstruction. In the training phase, the memory content is updated and encouraged to represent prototype elements of normal data. In the test phase, the learned memory elements are fixed, and reconstruction is obtained from several selected memory records of normal data. So, the reconstruction will tend to be close to normal samples. Therefore, the reconstruction of abnormal errors will be strengthened for abnormal detection. The experimental results on two public video anomaly detection datasets, i.e., Avenue dataset and ShanghaiTech dataset, prove the effectiveness of the proposed method.<\/jats:p>","DOI":"10.1155\/2021\/9861533","type":"journal-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T00:20:07Z","timestamp":1639009207000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Abnormal Detection in Big Data Video with an Improved Autoencoder"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6566-798X","authenticated-orcid":false,"given":"Yihan","family":"Bian","sequence":"first","affiliation":[]},{"given":"Xinchen","family":"Tang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,12,8]]},"reference":[{"key":"e_1_2_7_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2993373"},{"key":"e_1_2_7_2_2","doi-asserted-by":"crossref","unstructured":"DoshiK.andYilmazY. Any-shot sequential anomaly detection in surveillance videos Proceedings of the CVPRW June 2020 Seattle WA USA 934\u2013935 https:\/\/doi.org\/10.1109\/cvprw50498.2020.00475.","DOI":"10.1109\/CVPRW50498.2020.00475"},{"key":"e_1_2_7_3_2","doi-asserted-by":"crossref","unstructured":"DoshiK.andYilmazY. Continual learning for anomaly detection in surveillance videos Proceedings of the CVPRW June 2020 Seattle WA USA 254\u2013255 https:\/\/doi.org\/10.1109\/cvprw50498.2020.00135.","DOI":"10.1109\/CVPRW50498.2020.00135"},{"key":"e_1_2_7_4_2","doi-asserted-by":"crossref","unstructured":"JayantaK. Dutta and bonny banerjee. Online detection of abnormal events using incremental coding length Proceedings of the AAAI January 2015 Austin Texas USA 3755\u20133761.","DOI":"10.1609\/aaai.v29i1.9799"},{"key":"e_1_2_7_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.09.063"},{"key":"e_1_2_7_6_2","doi-asserted-by":"crossref","unstructured":"GongD. LiuL. LeV. SahaB. MansourM. R. VenkateshS. andVan Den HengelA. Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection Proceedings of the ICCV October 2019 Seoul Korea 1705\u20131714.","DOI":"10.1109\/ICCV.2019.00179"},{"key":"e_1_2_7_7_2","doi-asserted-by":"crossref","unstructured":"RavanbakhshM. NabiM. SanginetoE. MarcenaroL. RegazzoniC. andSebeN. Abnormal event detection in videos using generative adversarial nets Proceedings of the IEEE International Conference on Image Processing September 2017 Beijing China 1577\u20131581 https:\/\/doi.org\/10.1109\/icip.2017.8296547 2-s2.0-85045346178.","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"e_1_2_7_8_2","doi-asserted-by":"crossref","unstructured":"HasanM. ChoiJ. NeumannJ. Roy-ChowdhuryA. K. andDavisL. S. Learning temporal regularity in video sequences Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2016 Las Vegas NV USA 733\u2013742 https:\/\/doi.org\/10.1109\/cvpr.2016.86 2-s2.0-84986265779.","DOI":"10.1109\/CVPR.2016.86"},{"key":"e_1_2_7_9_2","doi-asserted-by":"crossref","unstructured":"LiuW. LuoW. LianD. andGaoS. Future frame prediction for anomaly detection\u2013a new baseline Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2018 Salt Lake City UT USA 6536\u20136545.","DOI":"10.1109\/CVPR.2018.00684"},{"key":"e_1_2_7_10_2","doi-asserted-by":"crossref","unstructured":"ParkH. NohJ. andHamB. Learning memory-guided normality for anomaly detection Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2020 Seattle WA USA 14 372\u2013414 381 https:\/\/doi.org\/10.1109\/cvpr42600.2020.01438.","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"e_1_2_7_11_2","doi-asserted-by":"crossref","unstructured":"ZaheerM. Z. LeeJ.-h. AstridM. andLeeS.-I. Old is gold: redefining the adversarially learned one-class classifier training paradigm Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2020 Seattle WA USA 14 183\u2013214 193 https:\/\/doi.org\/10.1109\/cvpr42600.2020.01419.","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"e_1_2_7_12_2","doi-asserted-by":"crossref","unstructured":"ZhuX. LiuJ. WangJ. FangY. andLuH. Anomaly detection in crowded scene via appearance and dynamics joint modeling Proceedings of the IEEE International Conference on Image Processing September 2013 Melbourne VIC Australia 2705\u20132708.","DOI":"10.1109\/ICIP.2012.6467457"},{"key":"e_1_2_7_13_2","doi-asserted-by":"crossref","unstructured":"ColqueR. V. H. M. J\u00faniorC. A. C. andSchwartzW. R. Histograms of optical flow orientation and magnitude to detect anomalous events in videos Proceedings of the Sibgrapi Conference on Graphics Patterns and Images August 2015 Salvador Bahia Brazil 126\u2013133 https:\/\/doi.org\/10.1109\/sibgrapi.2015.21 2-s2.0-84959373671.","DOI":"10.1109\/SIBGRAPI.2015.21"},{"key":"e_1_2_7_14_2","unstructured":"ZongBo QiS. MartinR. M. ChengW. LumezanuC. ChoD. andChenH. Deep autoencoding Gaussian mixture model for unsupervised anomaly detection Proceedings of the International Conference on Learning Representations April 2018 Vancouver Canada."},{"key":"e_1_2_7_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"e_1_2_7_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2012.03.040"},{"key":"e_1_2_7_17_2","doi-asserted-by":"crossref","unstructured":"MahadevanV. LiW. BhalodiaV. andVasconcelosN. Anomaly detection in crowded scenes Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) June 2010 San Francisco CA USA IEEE 1975\u20131981 https:\/\/doi.org\/10.1109\/cvpr.2010.5539872 2-s2.0-77956002209.","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"e_1_2_7_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.111"},{"key":"e_1_2_7_19_2","doi-asserted-by":"crossref","unstructured":"ZhaoY. DengB. ShenC. LiuY. LuH. andHuaX.-S. Spatio-Temporal AutoEncoder for video anomaly detection Proceedings of the ACM International Conference on Multimedia (ACM MM) October 2017 Mountain View California USA ACM 1933\u20131941 https:\/\/doi.org\/10.1145\/3123266.3123451 2-s2.0-85035215923.","DOI":"10.1145\/3123266.3123451"},{"key":"e_1_2_7_20_2","doi-asserted-by":"crossref","unstructured":"LuoW. WenL. andGaoS. A revisit of sparse coding based anomaly detection in stacked RNN framework Proceedings of the IEEE International Conference on Computer Vision (ICCV) October 2017 Venice Italy https:\/\/doi.org\/10.1109\/iccv.2017.45 2-s2.0-85041892183.","DOI":"10.1109\/ICCV.2017.45"},{"key":"e_1_2_7_21_2","doi-asserted-by":"crossref","unstructured":"LuoW. WenL. andGaoS. Remembering history with convolutional LSTM for anomaly detection Proceedings of the IEEE International Conference on Multimedia and Expo (ICME) July 2017 Hong Kong IEEE 439\u2013444 https:\/\/doi.org\/10.1109\/icme.2017.8019325 2-s2.0-85030226661.","DOI":"10.1109\/ICME.2017.8019325"},{"key":"e_1_2_7_22_2","doi-asserted-by":"crossref","unstructured":"ChangY. TuZ. XieW. andYuanJ. Clustering driven deep autoencoder for video anomaly detection Proceedings of the European Conference on Computer Vision (ECCV) August 2020 Glasgow United Kingdom Springer 329\u2013345 https:\/\/doi.org\/10.1007\/978-3-030-58555-6_20.","DOI":"10.1007\/978-3-030-58555-6_20"},{"key":"e_1_2_7_23_2","unstructured":"WenL. LuoW. LianD. andGaoS. Future frame prediction for anomaly detection \u2013 a new baseline Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR) June 2018 Salt Lake City UT USA IEEE 6536\u20136545."},{"key":"e_1_2_7_24_2","first-page":"E7665","article-title":"A mean field view of the landscape of two-layer neural networks","volume":"115","author":"Song M.","year":"2018","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"e_1_2_7_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2018.02.012"},{"key":"e_1_2_7_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2014.2315971"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/9861533.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2021\/9861533.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/9861533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:34:13Z","timestamp":1726277653000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/9861533"}},"subtitle":[],"editor":[{"given":"Bai Yuan","family":"Ding","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/9861533"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9861533","archive":["Portico"],"relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-10-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9861533"}}