{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:5EYT2ECMFDFHNLZHNXQFHP4I5V","short_pith_number":"pith:5EYT2ECM","canonical_record":{"source":{"id":"1801.04264","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","cross_cats_sorted":[],"title_canon_sha256":"91468f321e456c4e82356bf4e5ff39586f668d3a7d24a349ccf2c558e9fcd639","abstract_canon_sha256":"aa435fb0007842e7410d7387818e48ec607d2eaaa47958818390df47690467ba"},"schema_version":"1.0"},"canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","source":{"kind":"arxiv","id":"1801.04264","version":3},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.04264","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"arxiv_version","alias_value":"1801.04264v3","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.04264","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"pith_short_12","alias_value":"5EYT2ECMFDFH","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_16","alias_value":"5EYT2ECMFDFHNLZH","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_8","alias_value":"5EYT2ECM","created_at":"2026-05-18T12:32:08Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:5EYT2ECMFDFHNLZHNXQFHP4I5V","target":"record","payload":{"canonical_record":{"source":{"id":"1801.04264","kind":"arxiv","version":3},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","cross_cats_sorted":[],"title_canon_sha256":"91468f321e456c4e82356bf4e5ff39586f668d3a7d24a349ccf2c558e9fcd639","abstract_canon_sha256":"aa435fb0007842e7410d7387818e48ec607d2eaaa47958818390df47690467ba"},"schema_version":"1.0"},"canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:54:03.122447Z","signature_b64":"qlxSgiEpX+ea/bwMqZyLEo/rQ4w5/HzgappMFjyMn4W0/D3hMW7iAFFydYNZMidkWtI8DHKv1UV9dk7cklPlBQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","last_reissued_at":"2026-05-17T23:54:03.122028Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:54:03.122028Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1801.04264","source_version":3,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:54:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"Xqml4QuVTibE+HO/8Uun968pSKevmRu93LUc6jx75Ve9GmEQ+Gh/uAL9pbFygZScgu/mZBqZ+ViPJfoxDojHBQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T00:46:08.931803Z"},"content_sha256":"93a980205f9fda03ca4d9f9a656c4ff4d0175df41bdd1690f15b8a38773a292b","schema_version":"1.0","event_id":"sha256:93a980205f9fda03ca4d9f9a656c4ff4d0175df41bdd1690f15b8a38773a292b"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:5EYT2ECMFDFHNLZHNXQFHP4I5V","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Real-world Anomaly Detection in Surveillance Videos","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Chen Chen, Mubarak Shah, Waqas Sultani","submitted_at":"2018-01-12T18:46:23Z","abstract_excerpt":"Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instan"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.04264","kind":"arxiv","version":3},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:54:03Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"27pgrSJDVPdonXBgN7jKnpIPsDJ6pBv91Bjy+FEpjTEAUWM+3llXJPaYAmC1Z8NgfyEgcJOvR+XL3Vs1PtigBA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T00:46:08.932506Z"},"content_sha256":"c98368157ea98f325bf2efd3ab1d8d69bc75ec202df1c91d74e9d7e520fa4b80","schema_version":"1.0","event_id":"sha256:c98368157ea98f325bf2efd3ab1d8d69bc75ec202df1c91d74e9d7e520fa4b80"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/bundle.json","state_url":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T00:46:08Z","links":{"resolver":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V","bundle":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/bundle.json","state":"https://pith.science/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/state.json","well_known_bundle":"https://pith.science/.well-known/pith/5EYT2ECMFDFHNLZHNXQFHP4I5V/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:5EYT2ECMFDFHNLZHNXQFHP4I5V","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"aa435fb0007842e7410d7387818e48ec607d2eaaa47958818390df47690467ba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","title_canon_sha256":"91468f321e456c4e82356bf4e5ff39586f668d3a7d24a349ccf2c558e9fcd639"},"schema_version":"1.0","source":{"id":"1801.04264","kind":"arxiv","version":3}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1801.04264","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"arxiv_version","alias_value":"1801.04264v3","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1801.04264","created_at":"2026-05-17T23:54:03Z"},{"alias_kind":"pith_short_12","alias_value":"5EYT2ECMFDFH","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_16","alias_value":"5EYT2ECMFDFHNLZH","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_8","alias_value":"5EYT2ECM","created_at":"2026-05-18T12:32:08Z"}],"graph_snapshots":[{"event_id":"sha256:c98368157ea98f325bf2efd3ab1d8d69bc75ec202df1c91d74e9d7e520fa4b80","target":"graph","created_at":"2026-05-17T23:54:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Surveillance videos are able to capture a variety of realistic anomalies. In this paper, we propose to learn anomalies by exploiting both normal and anomalous videos. To avoid annotating the anomalous segments or clips in training videos, which is very time consuming, we propose to learn anomaly through the deep multiple instance ranking framework by leveraging weakly labeled training videos, i.e. the training labels (anomalous or normal) are at video-level instead of clip-level. In our approach, we consider normal and anomalous videos as bags and video segments as instances in multiple instan","authors_text":"Chen Chen, Mubarak Shah, Waqas Sultani","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","title":"Real-world Anomaly Detection in Surveillance Videos"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1801.04264","kind":"arxiv","version":3},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:93a980205f9fda03ca4d9f9a656c4ff4d0175df41bdd1690f15b8a38773a292b","target":"record","created_at":"2026-05-17T23:54:03Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"aa435fb0007842e7410d7387818e48ec607d2eaaa47958818390df47690467ba","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2018-01-12T18:46:23Z","title_canon_sha256":"91468f321e456c4e82356bf4e5ff39586f668d3a7d24a349ccf2c558e9fcd639"},"schema_version":"1.0","source":{"id":"1801.04264","kind":"arxiv","version":3}},"canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"e9313d104c28ca76af276de053bf88ed61db177826b7002048bc6f09f8b5849c","first_computed_at":"2026-05-17T23:54:03.122028Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:54:03.122028Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"qlxSgiEpX+ea/bwMqZyLEo/rQ4w5/HzgappMFjyMn4W0/D3hMW7iAFFydYNZMidkWtI8DHKv1UV9dk7cklPlBQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:54:03.122447Z","signed_message":"canonical_sha256_bytes"},"source_id":"1801.04264","source_kind":"arxiv","source_version":3}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:93a980205f9fda03ca4d9f9a656c4ff4d0175df41bdd1690f15b8a38773a292b","sha256:c98368157ea98f325bf2efd3ab1d8d69bc75ec202df1c91d74e9d7e520fa4b80"],"state_sha256":"1d0ae2070ff4e61c873459bbbdf217e0239225aa279b24caae55ad135970d261"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"7FyMfXIeoPs4TkKCmdoPq/vK4WxEYwkikOXQ9/oyQdfe5ORzmRnsXVBXu4iafn934sVwiCH90o0Wcwr5eGJODQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T00:46:08.936072Z","bundle_sha256":"2fb5626078807d1f80e1960376a53760ecd89924294fe3df90685472191fd59a"}}