2019 IEEE International Conference on Image Processing (ICIP) 2019
DOI: 10.1109/icip.2019.8803657
|View full text |Cite
|
Sign up to set email alerts
|

Temporal Convolutional Network with Complementary Inner Bag Loss for Weakly Supervised Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 129 publications
(66 citation statements)
references
References 13 publications
0
66
0
Order By: Relevance
“…Table 3 shows the results obtained by using KTH, UCF11, and KISA Datasets. [28] R3D RGB 76.67 Zhang et al [29] C3D RGB 78.66 Kamoona et al [30] C3D RGB 79.49 GCN-Annmaly [31] C3D RGB 81.08 MIST [32] C3D RGB 81.40 MlST [32] I3D RGB 82.30 Wu et al [33] I3D RGB 82.44 Tian et al [34] C3D RGB 83.28 Tian et al [34] I3D RGB 84.03 Recently, Convolutional 3D (C3D), I3D, and Residual 3D (R3D) methods are mainly used for action recognition algorithms. In Table 3, I3D and C3D showed high performance in the public dataset.…”
Section: Resultsmentioning
confidence: 99%
“…Table 3 shows the results obtained by using KTH, UCF11, and KISA Datasets. [28] R3D RGB 76.67 Zhang et al [29] C3D RGB 78.66 Kamoona et al [30] C3D RGB 79.49 GCN-Annmaly [31] C3D RGB 81.08 MIST [32] C3D RGB 81.40 MlST [32] I3D RGB 82.30 Wu et al [33] I3D RGB 82.44 Tian et al [34] C3D RGB 83.28 Tian et al [34] I3D RGB 84.03 Recently, Convolutional 3D (C3D), I3D, and Residual 3D (R3D) methods are mainly used for action recognition algorithms. In Table 3, I3D and C3D showed high performance in the public dataset.…”
Section: Resultsmentioning
confidence: 99%
“…For the authors knowledge, UCF-Crime and The Web datasets are the most well known and referenced by the scientific community for this context [28,29], due to its diversity and size, being this the reason for its selection for training and testing the proposal here included. GBA is also included, as it comprises indoor anomalous scenes from standard in the wild environments [36], of high interest in security applications.…”
Section: Methodsmentioning
confidence: 99%
“…In this work, outer bag loss, associated with the difference in score between abnormal and normal bags, is formulated to push apart the anomalous and normal bags from each other. The above-stated work has been extended to include inner bag loss in [29] as intra-difference between scores within a bag should be as low as possible.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It is suited for the detection or localization of anomalous events especially in the absence of precise label information in the training data. Zhong et al employs a weakly supervised anomaly detection using MIL with inner bag loss (IBL) of both positive and negative bags [17]. Dictionary of sparse codes in conjunction with MIL is also made use of to train anomalous labeled bags containing unlabeled sub-events instances [38].…”
Section: Related Workmentioning
confidence: 99%