{"id":"https://openalex.org/W3097804255","doi":"https://doi.org/10.1145/3394171.3414540","title":"PyAnomaly: A Pytorch-based Toolkit for Video Anomaly Detection","display_name":"PyAnomaly: A Pytorch-based Toolkit for Video Anomaly Detection","publication_year":2020,"publication_date":"2020-10-12","ids":{"openalex":"https://openalex.org/W3097804255","doi":"https://doi.org/10.1145/3394171.3414540","mag":"3097804255"},"language":"en","primary_location":{"id":"doi:10.1145/3394171.3414540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394171.3414540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040096430","display_name":"Yuhao Cheng","orcid":"https://orcid.org/0000-0002-3174-8973"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuhao Cheng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068917997","display_name":"Wu Liu","orcid":"https://orcid.org/0000-0003-1633-7575"},"institutions":[{"id":"https://openalex.org/I4210103986","display_name":"Jingdong (China)","ror":"https://ror.org/01dkjkq64","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210103986"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wu Liu","raw_affiliation_strings":["AI Research of JD.com, Beijing, China"],"affiliations":[{"raw_affiliation_string":"AI Research of JD.com, Beijing, China","institution_ids":["https://openalex.org/I4210103986"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026902492","display_name":"Pengrui Duan","orcid":"https://orcid.org/0000-0003-0412-3406"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengrui Duan","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032552506","display_name":"Jingen Liu","orcid":"https://orcid.org/0000-0003-3133-3644"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jingen Liu","raw_affiliation_strings":["AI Research of JD.com, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"AI Research of JD.com, Mountain View, CA, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017597537","display_name":"Tao Mei","orcid":"https://orcid.org/0000-0003-2497-7732"},"institutions":[{"id":"https://openalex.org/I4210103986","display_name":"Jingdong (China)","ror":"https://ror.org/01dkjkq64","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210103986"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Mei","raw_affiliation_strings":["AI Research of JD.com, Beijing, China"],"affiliations":[{"raw_affiliation_string":"AI Research of JD.com, Beijing, China","institution_ids":["https://openalex.org/I4210103986"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040096430"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64172766,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"4473","last_page":"4476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8277406096458435},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.8144033551216125},{"id":"https://openalex.org/keywords/toolbox","display_name":"Toolbox","score":0.7675232887268066},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6592622995376587},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6415956020355225},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5793685913085938},{"id":"https://openalex.org/keywords/extensibility","display_name":"Extensibility","score":0.5234572291374207},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5141203999519348},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.49003851413726807},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.47522595524787903},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4234559237957001},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3521513342857361},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3208425045013428},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17586320638656616},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.10774698853492737}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277406096458435},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.8144033551216125},{"id":"https://openalex.org/C2777655017","wikidata":"https://www.wikidata.org/wiki/Q1501161","display_name":"Toolbox","level":2,"score":0.7675232887268066},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6592622995376587},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6415956020355225},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5793685913085938},{"id":"https://openalex.org/C32833848","wikidata":"https://www.wikidata.org/wiki/Q4115054","display_name":"Extensibility","level":2,"score":0.5234572291374207},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5141203999519348},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.49003851413726807},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47522595524787903},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4234559237957001},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3521513342857361},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3208425045013428},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17586320638656616},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.10774698853492737},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3394171.3414540","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3394171.3414540","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 28th ACM International Conference on Multimedia","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1967456674","https://openalex.org/W2163612318","https://openalex.org/W2559085405","https://openalex.org/W2766042539","https://openalex.org/W2777342313","https://openalex.org/W2801326158","https://openalex.org/W2950141105","https://openalex.org/W2960737790","https://openalex.org/W2963610939","https://openalex.org/W2963795951","https://openalex.org/W2963878592","https://openalex.org/W2981650061","https://openalex.org/W2981741013","https://openalex.org/W2987228832","https://openalex.org/W3033355958"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W2972971679"],"abstract_inverted_index":{"Video":[0,51],"anomaly":[1,65,151],"detection":[2,53,66,152],"is":[3,45,144,154],"an":[4],"essential":[5],"task":[6],"in":[7,23,149],"computer":[8],"vision":[9],"which":[10],"attracts":[11],"massive":[12],"attention":[13],"from":[14],"academia":[15],"and":[16,28,54,74,78,87,97,105,127,153],"industry.":[17],"The":[18],"existing":[19],"approaches":[20],"are":[21],"implemented":[22],"diverse":[24],"deep":[25],"learning":[26],"frameworks":[27],"settings,":[29],"making":[30],"it":[31,95],"difficult":[32],"to":[33,47],"reproduce":[34],"the":[35,39,48,88,101,112,124,142,145],"results":[36,115],"published":[37,122],"by":[38,103,123],"original":[40,125],"authors.":[41],"Undoubtedly,":[42],"this":[43,58],"phenomenon":[44],"detrimental":[46],"development":[49],"of":[50,116],"Anomaly":[52],"community":[55],"communication.":[56],"In":[57],"paper,":[59],"we":[60,99,109,128],"present":[61],"a":[62,82],"PyTorch-based":[63],"video":[64,150],"toolbox,":[67],"namely":[68],"PyAnomaly":[69,143],"that":[70],"contains":[71],"high":[72],"modular":[73],"extensible":[75],"components,":[76],"comprehensive":[77],"impartial":[79],"evaluation":[80],"platforms,":[81],"friendly":[83],"manageable":[84],"system":[85],"configuration,":[86],"abundant":[89],"engineering":[90],"deployment":[91],"functions.":[92],"To":[93,138],"make":[94],"easy-to-use":[96],"easy-to-extend,":[98],"implement":[100],"architecture":[102],"hooks":[104],"registers":[106],"functionality.":[107],"Remarkably,":[108],"have":[110],"reproduced":[111],"comparable":[113],"experimental":[114],"six":[117],"representative":[118],"methods":[119],"as":[120],"those":[121],"authors,":[126],"will":[129],"release":[130],"these":[131],"pre-trained":[132],"models":[133],"with":[134],"more":[135],"rich":[136],"configurations.":[137],"our":[139],"best":[140],"knowledge,":[141],"first":[146],"open-source":[147],"tool":[148],"available":[155],"at":[156],"https://github.com/YuhaoCheng/PyAnomaly.":[157]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
