{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:5EYT2ECMFDFHNLZHNXQFHP4I5V","short_pith_number":"pith:5EYT2ECM","schema_version":"1.0","canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","source":{"kind":"arxiv","id":"1801.04264","version":3},"attestation_state":"computed","paper":{"title":"Real-world Anomaly Detection in Surveillance Videos","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Chen Chen, Mubarak Shah, Waqas Sultani","submitted_at":"2018-01-12T18:46:23Z","abstract_excerpt":"Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instan"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1801.04264","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","cross_cats_sorted":[],"title_canon_sha256":"91468f321e456c4e82356bf4e5ff39586f668d3a7d24a349ccf2c558e9fcd639","abstract_canon_sha256":"aa435fb0007842e7410d7387818e48ec607d2eaaa47958818390df47690467ba"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:54:03.122447Z","signature_b64":"qlxSgiEpX+ea/bwMqZyLEo/rQ4w5/HzgappMFjyMn4W0/D3hMW7iAFFydYNZMidkWtI8DHKv1UV9dk7cklPlBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","last_reissued_at":"2026-05-17T23:54:03.122028Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:54:03.122028Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Real-world Anomaly Detection in Surveillance Videos","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Chen Chen, Mubarak Shah, Waqas Sultani","submitted_at":"2018-01-12T18:46:23Z","abstract_excerpt":"Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instan"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.04264","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1801.04264","created_at":"2026-05-17T23:54:03.122094+00:00"},{"alias_kind":"arxiv_version","alias_value":"1801.04264v3","created_at":"2026-05-17T23:54:03.122094+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.04264","created_at":"2026-05-17T23:54:03.122094+00:00"},{"alias_kind":"pith_short_12","alias_value":"5EYT2ECMFDFH","created_at":"2026-05-18T12:32:08.215937+00:00"},{"alias_kind":"pith_short_16","alias_value":"5EYT2ECMFDFHNLZH","created_at":"2026-05-18T12:32:08.215937+00:00"},{"alias_kind":"pith_short_8","alias_value":"5EYT2ECM","created_at":"2026-05-18T12:32:08.215937+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V","json":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V.json","graph_json":"https://pith.science/api/pith-number/5EYT2ECMFDFHNLZHNXQFHP4I5V/graph.json","events_json":"https://pith.science/api/pith-number/5EYT2ECMFDFHNLZHNXQFHP4I5V/events.json","paper":"https://pith.science/paper/5EYT2ECM"},"agent_actions":{"view_html":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V","download_json":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V.json","view_paper":"https://pith.science/paper/5EYT2ECM","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1801.04264&json=true","fetch_graph":"https://pith.science/api/pith-number/5EYT2ECMFDFHNLZHNXQFHP4I5V/graph.json","fetch_events":"https://pith.science/api/pith-number/5EYT2ECMFDFHNLZHNXQFHP4I5V/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/action/timestamp_anchor","attest_storage":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/action/storage_attestation","attest_author":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/action/author_attestation","sign_citation":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/action/citation_signature","submit_replication":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/action/replication_record"}},"created_at":"2026-05-17T23:54:03.122094+00:00","updated_at":"2026-05-17T23:54:03.122094+00:00"}