{"id":"https://openalex.org/W4411270327","doi":"https://doi.org/10.1109/tii.2025.3574406","title":"Dual-Detector Reoptimization for Federated Weakly Supervised Video Anomaly Detection via Adaptive Dynamic Recursive Mapping","display_name":"Dual-Detector Reoptimization for Federated Weakly Supervised Video Anomaly Detection via Adaptive Dynamic Recursive Mapping","publication_year":2025,"publication_date":"2025-06-13","ids":{"openalex":"https://openalex.org/W4411270327","doi":"https://doi.org/10.1109/tii.2025.3574406"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2025.3574406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3574406","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043830283","display_name":"Yong Su","orcid":"https://orcid.org/0000-0002-6851-4142"},"institutions":[{"id":"https://openalex.org/I15062923","display_name":"Tianjin Normal University","ror":"https://ror.org/05x2td559","country_code":"CN","type":"education","lineage":["https://openalex.org/I15062923"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Su","raw_affiliation_strings":["Tianjin Normal University, Tianjin, China"],"raw_orcid":"https://orcid.org/0000-0002-6851-4142","affiliations":[{"raw_affiliation_string":"Tianjin Normal University, Tianjin, China","institution_ids":["https://openalex.org/I15062923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104319708","display_name":"Jiahang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I15062923","display_name":"Tianjin Normal University","ror":"https://ror.org/05x2td559","country_code":"CN","type":"education","lineage":["https://openalex.org/I15062923"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiahang Li","raw_affiliation_strings":["Tianjin Normal University, Tianjin, China"],"raw_orcid":"https://orcid.org/0009-0002-3403-5589","affiliations":[{"raw_affiliation_string":"Tianjin Normal University, Tianjin, China","institution_ids":["https://openalex.org/I15062923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031972872","display_name":"Simin An","orcid":"https://orcid.org/0000-0001-7316-336X"},"institutions":[{"id":"https://openalex.org/I15062923","display_name":"Tianjin Normal University","ror":"https://ror.org/05x2td559","country_code":"CN","type":"education","lineage":["https://openalex.org/I15062923"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Simin An","raw_affiliation_strings":["Tianjin Normal University, Tianjin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tianjin Normal University, Tianjin, China","institution_ids":["https://openalex.org/I15062923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073654521","display_name":"Hengpeng Xu","orcid":"https://orcid.org/0000-0001-5432-1908"},"institutions":[{"id":"https://openalex.org/I15062923","display_name":"Tianjin Normal University","ror":"https://ror.org/05x2td559","country_code":"CN","type":"education","lineage":["https://openalex.org/I15062923"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hengpeng Xu","raw_affiliation_strings":["Tianjin Normal University, Tianjin, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Tianjin Normal University, Tianjin, China","institution_ids":["https://openalex.org/I15062923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052138365","display_name":"Weilong Peng","orcid":"https://orcid.org/0000-0001-5820-889X"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weilong Peng","raw_affiliation_strings":["School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-5820-889X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043830283"],"corresponding_institution_ids":["https://openalex.org/I15062923"],"apc_list":null,"apc_paid":null,"fwci":34.0978,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.9965028,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"21","issue":"9","first_page":"7046","last_page":"7056"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9776999950408936,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.7076324224472046},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6399663686752319},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6308066248893738},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.6300486922264099},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40404486656188965},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.36913251876831055},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.34210819005966187},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10755443572998047}],"concepts":[{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.7076324224472046},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6399663686752319},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6308066248893738},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.6300486922264099},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40404486656188965},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.36913251876831055},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.34210819005966187},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10755443572998047},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2025.3574406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2025.3574406","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2777342313","https://openalex.org/W2963795951","https://openalex.org/W3015495912","https://openalex.org/W3035021504","https://openalex.org/W3040266635","https://openalex.org/W3136793533","https://openalex.org/W3168414501","https://openalex.org/W3168600998","https://openalex.org/W3209696639","https://openalex.org/W3212514695","https://openalex.org/W3212899624","https://openalex.org/W4205847268","https://openalex.org/W4225880911","https://openalex.org/W4283811196","https://openalex.org/W4292828967","https://openalex.org/W4297087995","https://openalex.org/W4309095845","https://openalex.org/W4313181443","https://openalex.org/W4379034050","https://openalex.org/W4386057769","https://openalex.org/W4386066487","https://openalex.org/W4386076087","https://openalex.org/W4390605026","https://openalex.org/W4390938864","https://openalex.org/W4393153999","https://openalex.org/W4394842465","https://openalex.org/W4402265131","https://openalex.org/W4402753276","https://openalex.org/W4402754070","https://openalex.org/W4402775275","https://openalex.org/W4403780794","https://openalex.org/W4403791827","https://openalex.org/W4403866590"],"related_works":["https://openalex.org/W2366906938","https://openalex.org/W2349391998","https://openalex.org/W4205655149","https://openalex.org/W2000775715","https://openalex.org/W2074467390","https://openalex.org/W2795393339","https://openalex.org/W2626393719","https://openalex.org/W4390618967","https://openalex.org/W2174745845","https://openalex.org/W2063058012"],"abstract_inverted_index":{"Federated":[0],"weakly":[1],"supervised":[2],"video":[3,201],"anomaly":[4,19,87,92,107],"detection":[5],"represents":[6],"a":[7,59,85,90],"significant":[8],"advancement":[9],"in":[10,38,50,162,169,181,190,199],"privacy-preserving":[11],"collaborative":[12],"learning,":[13],"enabling":[14],"distributed":[15,200],"clients":[16],"to":[17,101,184],"train":[18],"detectors":[20],"using":[21,149],"only":[22],"video-level":[23],"annotations.":[24],"However,":[25],"the":[26,115,143,150,156],"inherent":[27],"challenges":[28],"of":[29,159,177],"optimizing":[30],"noisy":[31],"representation":[32,77],"with":[33],"coarse-grained":[34],"labels":[35],"often":[36],"result":[37],"substantial":[39],"local":[40,71,118],"model":[41,72],"errors,":[42],"which":[43,68,94,121],"are":[44],"exacerbated":[45],"during":[46],"federated":[47,166,170],"aggregation,":[48],"particularly":[49],"heterogeneous":[51],"scenarios.":[52,138],"To":[53],"address":[54],"these":[55],"limitations,":[56],"we":[57,113],"propose":[58],"novel":[60],"dual-detector":[61],"framework":[62,80],"incorporating":[63],"adaptive":[64,98,117],"dynamic":[65],"recursive":[66],"mapping,":[67],"significantly":[69],"enhances":[70],"accuracy":[73],"and":[74,89,105,124,152,165,179,193],"robustness":[75],"against":[76],"noise.":[78],"Our":[79],"integrates":[81],"two":[82],"complementary":[83],"components:":[84],"channel-averaged":[86],"detector":[88],"channel-statistical":[91],"detector,":[93],"interact":[95],"through":[96],"cross-detector":[97],"decision":[99],"parameters":[100],"enable":[102],"iterative":[103],"optimization":[104],"stable":[106],"scoring":[108],"across":[109,136],"all":[110],"instances.":[111],"Furthermore,":[112],"introduce":[114],"scene-similarity":[116],"aggregation":[119],"algorithm,":[120],"dynamically":[122],"aggregates":[123],"learns":[125],"private":[126],"models":[127],"based":[128],"on":[129,142],"scene":[130],"similarity,":[131],"thereby":[132],"enhancing":[133],"generalization":[134],"capabilities":[135],"diverse":[137],"Extensive":[139],"experiments":[140],"conducted":[141],"NVIDIA":[144],"Jetson":[145],"AGX":[146],"Xavier":[147],"platform":[148],"ShanghaiTech":[151],"UBnormal":[153],"datasets":[154],"demonstrate":[155],"superior":[157],"performance":[158],"our":[160,172],"approach":[161],"both":[163],"centralized":[164],"settings.":[167],"Notably,":[168],"environments,":[171],"method":[173],"achieves":[174],"remarkable":[175],"improvements":[176],"6.2%":[178],"12.3%":[180],"AUC":[182],"compared":[183],"state-of-the-art":[185],"methods,":[186],"underscoring":[187],"its":[188,194],"effectiveness":[189],"resource-constrained":[191],"scenarios":[192],"potential":[195],"for":[196],"real-world":[197],"applications":[198],"surveillance":[202],"systems.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":11},{"year":2025,"cited_by_count":5}],"updated_date":"2026-05-02T08:42:23.175194","created_date":"2025-10-10T00:00:00"}
