{"id":"https://openalex.org/W4312530853","doi":"https://doi.org/10.1109/icpr56361.2022.9956507","title":"Multi-Contextual Predictions with Vision Transformer for Video Anomaly Detection","display_name":"Multi-Contextual Predictions with Vision Transformer for Video Anomaly Detection","publication_year":2022,"publication_date":"2022-08-21","ids":{"openalex":"https://openalex.org/W4312530853","doi":"https://doi.org/10.1109/icpr56361.2022.9956507"},"language":"en","primary_location":{"id":"doi:10.1109/icpr56361.2022.9956507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr56361.2022.9956507","pdf_url":null,"source":{"id":"https://openalex.org/S4363607731","display_name":"2022 26th International Conference on Pattern Recognition (ICPR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 26th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100639187","display_name":"Jooyeon Lee","orcid":"https://orcid.org/0000-0001-5220-0950"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jooyeon Lee","raw_affiliation_strings":["Korea University,Department of Artificial Intelligence","Department of Artificial Intelligence, Korea University"],"affiliations":[{"raw_affiliation_string":"Korea University,Department of Artificial Intelligence","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Department of Artificial Intelligence, Korea University","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109442512","display_name":"Woo-Jeoung Nam","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Woo-Jeoung Nam","raw_affiliation_strings":["Korea University,Department of Computer and Radio Communications Engineering","Department of Computer and Radio Communications Engineering, Korea University"],"affiliations":[{"raw_affiliation_string":"Korea University,Department of Computer and Radio Communications Engineering","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Department of Computer and Radio Communications Engineering, Korea University","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011014617","display_name":"Seong\u2010Whan Lee","orcid":"https://orcid.org/0000-0002-6249-4996"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seong-Whan Lee","raw_affiliation_strings":["Korea University,Department of Artificial Intelligence","Department of Computer and Radio Communications Engineering, Korea University","Department of Artificial Intelligence, Korea University"],"affiliations":[{"raw_affiliation_string":"Korea University,Department of Artificial Intelligence","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Department of Computer and Radio Communications Engineering, Korea University","institution_ids":["https://openalex.org/I197347611"]},{"raw_affiliation_string":"Department of Artificial Intelligence, Korea University","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100639187"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":null,"apc_paid":null,"fwci":2.5199,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.91382234,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1012","last_page":"1018"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.986299991607666,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8224164247512817},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7453505992889404},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.6747467517852783},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5344611406326294},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4972071945667267},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.4917657673358917},{"id":"https://openalex.org/keywords/context-model","display_name":"Context model","score":0.4272111654281616},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.41204768419265747},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3818397521972656},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33375659584999084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8224164247512817},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7453505992889404},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6747467517852783},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5344611406326294},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4972071945667267},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.4917657673358917},{"id":"https://openalex.org/C183322885","wikidata":"https://www.wikidata.org/wiki/Q17007702","display_name":"Context model","level":3,"score":0.4272111654281616},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.41204768419265747},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3818397521972656},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33375659584999084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icpr56361.2022.9956507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpr56361.2022.9956507","pdf_url":null,"source":{"id":"https://openalex.org/S4363607731","display_name":"2022 26th International Conference on Pattern Recognition (ICPR)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 26th International Conference on Pattern Recognition (ICPR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.44999998807907104}],"awards":[],"funders":[{"id":"https://openalex.org/F4320334874","display_name":"Defense Acquisition Program Administration","ror":"https://ror.org/04bjg9m96"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1973181164","https://openalex.org/W2011013898","https://openalex.org/W2031825886","https://openalex.org/W2104558951","https://openalex.org/W2122361470","https://openalex.org/W2128990594","https://openalex.org/W2129169401","https://openalex.org/W2163612318","https://openalex.org/W2341058432","https://openalex.org/W2476270784","https://openalex.org/W2560474170","https://openalex.org/W2766042539","https://openalex.org/W2777342313","https://openalex.org/W2796633859","https://openalex.org/W2921906393","https://openalex.org/W2963240734","https://openalex.org/W2963263347","https://openalex.org/W2963610939","https://openalex.org/W2964094092","https://openalex.org/W2987228832","https://openalex.org/W3035240825","https://openalex.org/W3081430643","https://openalex.org/W3094502228","https://openalex.org/W3096609285","https://openalex.org/W3103592385","https://openalex.org/W3123791969","https://openalex.org/W3160958489","https://openalex.org/W3177187266","https://openalex.org/W3184357402","https://openalex.org/W3192880336","https://openalex.org/W3196890755","https://openalex.org/W3202590754","https://openalex.org/W3207639163","https://openalex.org/W3207976963","https://openalex.org/W4313156423","https://openalex.org/W4320013936","https://openalex.org/W4385245566","https://openalex.org/W6679090672","https://openalex.org/W6720855187","https://openalex.org/W6726497184","https://openalex.org/W6739901393","https://openalex.org/W6778485988","https://openalex.org/W6784333009","https://openalex.org/W6803870738"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Video":[0],"Anomaly":[1],"Detection(VAD)":[2],"has":[3],"been":[4],"traditionally":[5],"tackled":[6],"in":[7,102,116,131,168],"two":[8],"main":[9],"methodologies:":[10],"the":[11,15,19,25,28,38,44,48,66,75,79,89,92,111,125,136,153,169,179,186,191,201,214,217,237],"reconstruction-based":[12,20],"approach":[13,230],"and":[14,35,147,210,212],"prediction-based":[16,49],"one.":[17],"As":[18],"methods":[21],"learn":[22,51,78,164],"to":[23,52,65,122,151,173,185,236],"generalize":[24],"input":[26],"image,":[27],"model":[29,76,138,161,199],"merely":[30],"learns":[31],"an":[32,114],"identity":[33],"function":[34],"strongly":[36],"causes":[37],"problem":[39],"called":[40],"generalizing":[41,67],"issue.":[42,68],"On":[43],"other":[45],"hand,":[46],"since":[47],"ones":[50],"predict":[53,152],"a":[54,83,96,99,117,174,232],"future":[55],"frame":[56],"given":[57],"several":[58],"previous":[59],"frames,":[60,159],"they":[61],"are":[62,183],"less":[63],"sensitive":[64],"However,":[69],"it":[70,105],"is":[71,87],"still":[72],"uncertain":[73],"if":[74],"can":[77,162],"spatio-temporal":[80,93],"context":[81,94,126],"of":[82,91,95,113,156,193,221],"video.":[84],"Our":[85],"intuition":[86],"that":[88,182,227],"understanding":[90],"video":[97,118,132,239],"plays":[98],"vital":[100],"role":[101],"VAD":[103],"as":[104],"provides":[106],"precise":[107],"information":[108,127],"on":[109,200],"how":[110],"appearance":[112],"event":[115],"clip":[119],"changes.":[120],"Hence,":[121],"fully":[123],"exploit":[124],"for":[128],"anomaly":[129,218,240],"detection":[130,241],"circumstances,":[133],"we":[134,196],"designed":[135],"transformer":[137],"with":[139,216],"three":[140],"different":[141],"contextual":[142],"prediction":[143],"streams:":[144],"masked,":[145],"whole":[146],"partial.":[148],"By":[149],"learning":[150],"missing":[154],"frames":[155],"consecutive":[157],"normal":[158],"our":[160,194,198,228],"effectively":[163],"various":[165],"normality":[166],"patterns":[167],"video,":[170],"which":[171],"leads":[172],"high":[175],"reconstruction":[176,222],"error":[177],"at":[178],"abnormal":[180],"cases":[181],"unsuitable":[184],"learned":[187],"context.":[188],"To":[189],"verify":[190],"effectiveness":[192],"approach,":[195],"assess":[197],"public":[202],"benchmark":[203],"datasets:":[204],"USCD":[205],"Pedestrian":[206],"2,":[207],"CUHK":[208],"Avenue":[209],"ShanghaiTech":[211],"evaluate":[213],"performance":[215,234],"score":[219],"metric":[220],"error.":[223],"The":[224],"results":[225],"demonstrate":[226],"proposed":[229],"achieves":[231],"competitive":[233],"compared":[235],"existing":[238],"methods.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":6}],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
