{"id":"https://openalex.org/W4387245339","doi":"https://doi.org/10.1109/tcsvt.2023.3321235","title":"Towards Video Anomaly Detection in the Real World: A Binarization Embedded Weakly-Supervised Network","display_name":"Towards Video Anomaly Detection in the Real World: A Binarization Embedded Weakly-Supervised Network","publication_year":2023,"publication_date":"2023-10-02","ids":{"openalex":"https://openalex.org/W4387245339","doi":"https://doi.org/10.1109/tcsvt.2023.3321235"},"language":"en","primary_location":{"id":"doi:10.1109/tcsvt.2023.3321235","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2023.3321235","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101788311","display_name":"Zhen Yang","orcid":"https://orcid.org/0009-0004-2325-633X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Yang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030187602","display_name":"Yuanfang Guo","orcid":"https://orcid.org/0000-0003-4592-8083"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanfang Guo","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006128508","display_name":"Junfu Wang","orcid":"https://orcid.org/0000-0003-4780-501X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junfu Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056972984","display_name":"Di Huang","orcid":"https://orcid.org/0000-0002-2412-9330"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Di Huang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"School of Computer Science and Engineering, State Key Laboratory of Software Development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109674238","display_name":"Xiuguo Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiuguo Bao","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team Coordination Center of China, Beijing, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100398953","display_name":"Yunhong Wang","orcid":"https://orcid.org/0000-0001-8001-2703"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunhong Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101788311"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":5.219,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.96499748,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"34","issue":"5","first_page":"4135","last_page":"4140"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12391","display_name":"Artificial Immune Systems Applications","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8797237277030945},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8373913764953613},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.627729058265686},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6180922389030457},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.607975959777832},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.5220827460289001},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4929807186126709},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4473244845867157},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.4286736249923706},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.33589375019073486},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.332920104265213},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07363000512123108},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.07010477781295776},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.06800469756126404}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8797237277030945},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8373913764953613},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.627729058265686},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6180922389030457},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.607975959777832},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.5220827460289001},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4929807186126709},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4473244845867157},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.4286736249923706},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.33589375019073486},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.332920104265213},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07363000512123108},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.07010477781295776},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.06800469756126404},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcsvt.2023.3321235","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcsvt.2023.3321235","pdf_url":null,"source":{"id":"https://openalex.org/S115173108","display_name":"IEEE Transactions on Circuits and Systems for Video Technology","issn_l":"1051-8215","issn":["1051-8215","1558-2205"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Circuits and Systems for Video Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G306517120","display_name":null,"funder_award_id":"SKLSDE-2023ZX-16","funder_id":"https://openalex.org/F4320326978","funder_display_name":"State Key Laboratory of Software Development Environment"},{"id":"https://openalex.org/G3325775721","display_name":null,"funder_award_id":"22VMG037","funder_id":"https://openalex.org/F4320335869","funder_display_name":"National Social Science Fund of China"},{"id":"https://openalex.org/G5196642116","display_name":null,"funder_award_id":"62272020","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6860175829","display_name":null,"funder_award_id":"2021ZD0110503","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7665144123","display_name":null,"funder_award_id":"U20B2069","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326978","display_name":"State Key Laboratory of Software Development Environment","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320335869","display_name":"National Social Science Fund of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2110934250","https://openalex.org/W2125276050","https://openalex.org/W2921491036","https://openalex.org/W2963524571","https://openalex.org/W2963610939","https://openalex.org/W2963795951","https://openalex.org/W2998277278","https://openalex.org/W3089682612","https://openalex.org/W3136793533","https://openalex.org/W3176309086","https://openalex.org/W3176940011","https://openalex.org/W4226109438","https://openalex.org/W4283811196","https://openalex.org/W4285411154","https://openalex.org/W4293518932","https://openalex.org/W4293519347","https://openalex.org/W4312661433"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2667207928","https://openalex.org/W2912112202","https://openalex.org/W4377864969","https://openalex.org/W3120251014"],"abstract_inverted_index":{"In":[0],"this":[1],"letter,":[2],"we":[3,64,110],"pioneer":[4],"to":[5,25,53,76,97,100],"propose":[6,65,111],"a":[7,18,66],"binarization":[8],"embedded":[9],"weakly-supervised":[10,28],"video":[11,29],"anomaly":[12,21,30,61],"detection":[13,22,31,38,56,62,103],"(BE-WSVAD)":[14],"method":[15],"by":[16,43],"constructing":[17],"binarized":[19],"GCN-based":[20],"module.":[23],"Compared":[24],"the":[26,37,44,55,59,72,77,81,85,93,102,112,120,124,130,138],"existing":[27,45],"(WS-VAD)":[32],"methods,":[33],"BE-WSVAD":[34,134],"focuses":[35],"on":[36],"efficiency,":[39],"which":[40,92,116],"is":[41],"ignored":[42],"literature":[46],"yet":[47],"vital":[48],"in":[49,71,84,91,135],"real":[50],"applications.":[51],"Specifically,":[52],"improve":[54,101],"performance":[57,104],"of":[58,123,132,137],"binary":[60,67],"module,":[63],"network":[68],"augmentation":[69],"strategy":[70],"training":[73,86],"process.":[74],"Due":[75],"weakly":[78],"supervision":[79],"mechanism,":[80],"videos":[82],"employed":[83],"process":[87],"are":[88],"usually":[89],"lengthy,":[90],"lengthy-input":[94],"dependencies":[95],"tend":[96],"be":[98],"exploited":[99],"with":[105],"extra":[106],"memory":[107,139],"consumption.":[108],"Then,":[109],"short-input":[113],"inference":[114],"modes,":[115],"can":[117],"largely":[118],"reduce":[119],"desired":[121],"length":[122],"input":[125],"video.":[126],"Experimental":[127],"results":[128],"demonstrate":[129],"superiority":[131],"our":[133],"terms":[136],"and":[140],"computational":[141],"consumptions":[142],"while":[143],"giving":[144],"comparable":[145],"accuracies.":[146]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":20},{"year":2024,"cited_by_count":6}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
