2019 IEEE/CVF International Conference on Computer Vision (ICCV) 2019
DOI: 10.1109/iccv.2019.00136
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in Video Sequence With Appearance-Motion Correspondence

Abstract: Anomaly detection in surveillance videos is currently a challenge because of the diversity of possible events. We propose a deep convolutional neural network (CNN) that addresses this problem by learning a correspondence between common object appearances (e.g. pedestrian, background, tree, etc.) and their associated motions. Our model is designed as a combination of a reconstruction network and an image translation model that share the same encoder. The former sub-network determines the most significant struct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
172
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 355 publications
(172 citation statements)
references
References 46 publications
0
172
0
Order By: Relevance
“…Nguyen et al [2] propose a model that is designed as a combination of a network for reconstruction and a model for image translation, which shares the same encoder. The former sub-network identifies the most significant structures that appear in video frames, and the latter attempts to connect movement models to those structures.…”
Section: Related Workmentioning
confidence: 99%
“…Nguyen et al [2] propose a model that is designed as a combination of a network for reconstruction and a model for image translation, which shares the same encoder. The former sub-network identifies the most significant structures that appear in video frames, and the latter attempts to connect movement models to those structures.…”
Section: Related Workmentioning
confidence: 99%
“…Most of recently successful studies [ 1 , 2 , 3 , 4 , 5 , 6 ] have tackled this challenge in specific unsupervised ways. They only use normal samples from training sets to generate the standards for normal actions, then try to enlarge the deviation between abnormal samples in the test set and their standards.…”
Section: Introductionmentioning
confidence: 99%
“…The state of the art proposes two approaches for defining the anomalous feature that are, respectively, based on changing detection [ 1 , 3 , 7 ] and reconstruction/prediction errors [ 4 , 5 , 6 ]. The first solution is a natural approach where each event is compared with its neighbors to find the most different ones.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomaly detection is a hot topic in various domains, such as manufacturing anomaly detection [ 1 , 2 ], cyber attack detection [ 3 , 4 , 5 , 6 ], and crowded scene video anomaly detection [ 7 , 8 ]. Cyber attacks detection typically detects three types of external attacks, i.e., false data injection attack, denial-of-service attack, and confidentiality attack.…”
Section: Introductionmentioning
confidence: 99%