2021
DOI: 10.1007/s10586-021-03439-5
|View full text |Cite
|
Sign up to set email alerts
|

An explainable and efficient deep learning framework for video anomaly detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(8 citation statements)
references
References 54 publications
0
6
0
Order By: Relevance
“…Ranganathan et al [9] have used the Diffie-Hellman key exchange technique and the advanced encryption standards (AES) technique to implement the concept of differential privacy, which are both quite powerful in terms of speed. e tests were conducted with Laplace and Gaussian methods, which are the techniques currently most commonly used.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ranganathan et al [9] have used the Diffie-Hellman key exchange technique and the advanced encryption standards (AES) technique to implement the concept of differential privacy, which are both quite powerful in terms of speed. e tests were conducted with Laplace and Gaussian methods, which are the techniques currently most commonly used.…”
Section: Related Workmentioning
confidence: 99%
“…Breaches are unavoidable, threats have become more complex, and database security has become more difficult. Furthermore, many threats are undetectable by traditional policy-based or rule-based security systems [9]. Firewalls, access control levels, and rule-based management are useless in circumstances of stolen privileged user accounts or internal attacks.…”
Section: Introductionmentioning
confidence: 99%
“…A new cloud data platform login and identity verification system was proposed, which is equipped with a fingerprint authentication and identification module, which has the advantages of high information security and strong antiattack ability [17]. After testing, this technology improves the security and validity of the connection and access to the cloud data platform without affecting the user experience [18]. e security performance requirements of the cloud data platform application in the communication process authentication were analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…(AUC) MDT [7] 2010 82.9% N/A Conv-AE [8] 2015 85.0% 80.0% ConvLSTM-AE [11] 2017 88.1% 77.0% Unmasking [12] 2017 82.2% 80.6% Stacked RNN [18] 2017 92.2% 81.7% MCNet [14] 2017 95.0% 83.8% Liu et al [15] 2018 95.4% 85.1% RC-GAN [17] 2019 93.5% 82.1% MemAE [13] 2019 94.1% 83.3% Hu et al [30] 2020 90.4% / DAE-SHAP [33] 2021 92.4% / F2PN [19] 2021 96.2% 85.7% Sun et al [31] 2022 / 85.7% DAGMM [32] 2022 95.7% / Wang et al [34] 2022 95.6% 73.1% NA-UnetG [20] 2022 96.3% 83.4% Ours 2022 96.9% 86.1%…”
Section: Cuhk Avenuementioning
confidence: 99%