{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2017:UYMSK3LI7DOTOO2NUOF6HVKBYM","short_pith_number":"pith:UYMSK3LI","canonical_record":{"source":{"id":"1708.05211","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-08-17T11:44:34Z","cross_cats_sorted":[],"title_canon_sha256":"d57046ccde4daf2c4be59023c79fe6fa08a43abf8583c41ac2fd4782f77be413","abstract_canon_sha256":"f92c10c1a7862608bda4ac7b009b6a468bbee25da4e086a7488d566290000579"},"schema_version":"1.0"},"canonical_sha256":"a619256d68f8dd373b4da38be3d541c3339d8956c73689a644d5c96055b4957f","source":{"kind":"arxiv","id":"1708.05211","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.05211","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"arxiv_version","alias_value":"1708.05211v1","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.05211","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"pith_short_12","alias_value":"UYMSK3LI7DOT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"UYMSK3LI7DOTOO2N","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"UYMSK3LI","created_at":"2026-05-18T12:31:49Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2017:UYMSK3LI7DOTOO2NUOF6HVKBYM","target":"record","payload":{"canonical_record":{"source":{"id":"1708.05211","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-08-17T11:44:34Z","cross_cats_sorted":[],"title_canon_sha256":"d57046ccde4daf2c4be59023c79fe6fa08a43abf8583c41ac2fd4782f77be413","abstract_canon_sha256":"f92c10c1a7862608bda4ac7b009b6a468bbee25da4e086a7488d566290000579"},"schema_version":"1.0"},"canonical_sha256":"a619256d68f8dd373b4da38be3d541c3339d8956c73689a644d5c96055b4957f","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:37:53.556692Z","signature_b64":"Yjq6pmbUY8eh++4E8stlKC2ymstlFVU/8U9BPY59btyJQ0HcnBGfR8V3oPgxtaFozPk+aNL57hOR8S9Gg84eBg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"a619256d68f8dd373b4da38be3d541c3339d8956c73689a644d5c96055b4957f","last_reissued_at":"2026-05-18T00:37:53.556184Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:37:53.556184Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1708.05211","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:37:53Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"cmUH5OHAbuBjCznvhhYG/rqobO/LAA4zzSQXOYgCz40a8ZlOOV+fP3CNhOkiyOqyuvKKTpbL8Hc7KgVoy15UCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T22:21:17.222134Z"},"content_sha256":"b8b29aa187e9b8a1dcfcee8ea18c6c7e2655017466cca4e1bf5a5468993edbf7","schema_version":"1.0","event_id":"sha256:b8b29aa187e9b8a1dcfcee8ea18c6c7e2655017466cca4e1bf5a5468993edbf7"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2017:UYMSK3LI7DOTOO2NUOF6HVKBYM","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Energy-based Models for Video Anomaly Detection","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Anthony Trevors, Dinh Phung, Hung Vu, Svetha Venkatesh, Tu Dinh Nguyen","submitted_at":"2017-08-17T11:44:34Z","abstract_excerpt":"Automated detection of abnormalities in data has been studied in research area in recent years because of its diverse applications in practice including video surveillance, industrial damage detection and network intrusion detection. However, building an effective anomaly detection system is a non-trivial task since it requires to tackle challenging issues of the shortage of annotated data, inability of defining anomaly objects explicitly and the expensive cost of feature engineering procedure. Unlike existing appoaches which only partially solve these problems, we develop a unique framework t"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.05211","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:37:53Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3IMiWX/IIMUbsx+GJU3zJZqHG48zHa9wDAyi1Ox9xLtmCpEG44D0qpLzM2zOKvK6JnrH5o0uozVuQcyeuleqAA==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-19T22:21:17.222493Z"},"content_sha256":"c9b9b73ecf7712768fa8b77db6ca0be35f0fde844cdd1a57e0322cf5ebb37fe3","schema_version":"1.0","event_id":"sha256:c9b9b73ecf7712768fa8b77db6ca0be35f0fde844cdd1a57e0322cf5ebb37fe3"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/bundle.json","state_url":"https://pith.science/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-19T22:21:17Z","links":{"resolver":"https://pith.science/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM","bundle":"https://pith.science/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/bundle.json","state":"https://pith.science/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/state.json","well_known_bundle":"https://pith.science/.well-known/pith/UYMSK3LI7DOTOO2NUOF6HVKBYM/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2017:UYMSK3LI7DOTOO2NUOF6HVKBYM","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"f92c10c1a7862608bda4ac7b009b6a468bbee25da4e086a7488d566290000579","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-08-17T11:44:34Z","title_canon_sha256":"d57046ccde4daf2c4be59023c79fe6fa08a43abf8583c41ac2fd4782f77be413"},"schema_version":"1.0","source":{"id":"1708.05211","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1708.05211","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"arxiv_version","alias_value":"1708.05211v1","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1708.05211","created_at":"2026-05-18T00:37:53Z"},{"alias_kind":"pith_short_12","alias_value":"UYMSK3LI7DOT","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_16","alias_value":"UYMSK3LI7DOTOO2N","created_at":"2026-05-18T12:31:49Z"},{"alias_kind":"pith_short_8","alias_value":"UYMSK3LI","created_at":"2026-05-18T12:31:49Z"}],"graph_snapshots":[{"event_id":"sha256:c9b9b73ecf7712768fa8b77db6ca0be35f0fde844cdd1a57e0322cf5ebb37fe3","target":"graph","created_at":"2026-05-18T00:37:53Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Automated detection of abnormalities in data has been studied in research area in recent years because of its diverse applications in practice including video surveillance, industrial damage detection and network intrusion detection. However, building an effective anomaly detection system is a non-trivial task since it requires to tackle challenging issues of the shortage of annotated data, inability of defining anomaly objects explicitly and the expensive cost of feature engineering procedure. Unlike existing appoaches which only partially solve these problems, we develop a unique framework t","authors_text":"Anthony Trevors, Dinh Phung, Hung Vu, Svetha Venkatesh, Tu Dinh Nguyen","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-08-17T11:44:34Z","title":"Energy-based Models for Video Anomaly Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1708.05211","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:b8b29aa187e9b8a1dcfcee8ea18c6c7e2655017466cca4e1bf5a5468993edbf7","target":"record","created_at":"2026-05-18T00:37:53Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"f92c10c1a7862608bda4ac7b009b6a468bbee25da4e086a7488d566290000579","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2017-08-17T11:44:34Z","title_canon_sha256":"d57046ccde4daf2c4be59023c79fe6fa08a43abf8583c41ac2fd4782f77be413"},"schema_version":"1.0","source":{"id":"1708.05211","kind":"arxiv","version":1}},"canonical_sha256":"a619256d68f8dd373b4da38be3d541c3339d8956c73689a644d5c96055b4957f","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"a619256d68f8dd373b4da38be3d541c3339d8956c73689a644d5c96055b4957f","first_computed_at":"2026-05-18T00:37:53.556184Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:37:53.556184Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Yjq6pmbUY8eh++4E8stlKC2ymstlFVU/8U9BPY59btyJQ0HcnBGfR8V3oPgxtaFozPk+aNL57hOR8S9Gg84eBg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:37:53.556692Z","signed_message":"canonical_sha256_bytes"},"source_id":"1708.05211","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:b8b29aa187e9b8a1dcfcee8ea18c6c7e2655017466cca4e1bf5a5468993edbf7","sha256:c9b9b73ecf7712768fa8b77db6ca0be35f0fde844cdd1a57e0322cf5ebb37fe3"],"state_sha256":"07ed5439671ff51abc469d0a86bca9098534f3a65d91bae0ef435fdb6c2d0eb4"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"I6+T9OLn3yQQTJz3p0fcO6V1IyfwjVdXWJmmgQv+5Z4x1D+sTCUwAzNy9zpbZtz2CByQsed7iKG2Lb8uVwPmDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-19T22:21:17.224341Z","bundle_sha256":"5266eaeca63a34714f3e750ce9161ee23ad1ab6c716731878f3596f9a04a4326"}}