TasksSotADatasetsPapersMethodsSubmitAbout
Papers With Code 2

A community resource for machine learning research: papers, code, benchmarks, and state-of-the-art results.

Explore

Notable BenchmarksAll SotADatasetsPapersMethods

Community

Submit ResultsAbout

Data sourced from the PWC Archive (CC-BY-SA 4.0). Built by the community, for the community.

Papers/Bounding Boxes and Probabilistic Graphical Models: Video A...

Bounding Boxes and Probabilistic Graphical Models: Video Anomaly Detection Simplified

Mia Siemon, Thomas B. Moeslund, Barry Norton, Kamal Nasrollahi

2024-07-08Video Anomaly DetectionAnomaly Detection
PaperPDFCode(official)

Abstract

In this study, we formulate the task of Video Anomaly Detection as a probabilistic analysis of object bounding boxes. We hypothesize that the representation of objects via their bounding boxes only, can be sufficient to successfully identify anomalous events in a scene. The implied value of this approach is increased object anonymization, faster model training and fewer computational resources. This can particularly benefit applications within video surveillance running on edge devices such as cameras. We design our model based on human reasoning which lends itself to explaining model output in human-understandable terms. Meanwhile, the slowest model trains within less than 7 seconds on a 11th Generation Intel Core i9 Processor. While our approach constitutes a drastic reduction of problem feature space in comparison with prior art, we show that this does not result in a reduction in performance: the results we report are highly competitive on the benchmark datasets CUHK Avenue and ShanghaiTech, and significantly exceed on the latest State-of-the-Art results on StreetScene, which has so far proven to be the most challenging VAD dataset.

Results

TaskDatasetMetricValueModel
Anomaly DetectionShanghaiTechRBDC45.4PGM
Anomaly DetectionShanghaiTechTBDC81.87PGM
Anomaly DetectionStreet SceneAUC72.7PGM
Anomaly DetectionStreet SceneRBDC30.65PGM
Anomaly DetectionStreet SceneTBDC66.03PGM
Anomaly DetectionCUHK AvenueRBDC60.18PGM
Anomaly DetectionCUHK AvenueTBDC72.09PGM
Anomaly DetectionStreet SceneAUC72.7PGM
Anomaly DetectionStreet SceneRBDC30.65PGM
Anomaly DetectionStreet SceneTBDC66.03PGM
Anomaly DetectionShanghaiTechRBDC45.4PGM
Anomaly DetectionShanghaiTechTBDC81.87PGM
Anomaly DetectionCUHK AvenueRBDC60.18PGM
Anomaly DetectionCUHK AvenueTBDC72.09PGM
3D Anomaly DetectionStreet SceneAUC72.7PGM
3D Anomaly DetectionStreet SceneRBDC30.65PGM
3D Anomaly DetectionStreet SceneTBDC66.03PGM
3D Anomaly DetectionShanghaiTechRBDC45.4PGM
3D Anomaly DetectionShanghaiTechTBDC81.87PGM
3D Anomaly DetectionCUHK AvenueRBDC60.18PGM
3D Anomaly DetectionCUHK AvenueTBDC72.09PGM
Video Anomaly DetectionStreet SceneAUC72.7PGM
Video Anomaly DetectionStreet SceneRBDC30.65PGM
Video Anomaly DetectionStreet SceneTBDC66.03PGM
Video Anomaly DetectionShanghaiTechRBDC45.4PGM
Video Anomaly DetectionShanghaiTechTBDC81.87PGM
Video Anomaly DetectionCUHK AvenueRBDC60.18PGM
Video Anomaly DetectionCUHK AvenueTBDC72.09PGM

Related Papers

Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems2025-07-213DKeyAD: High-Resolution 3D Point Cloud Anomaly Detection via Keypoint-Guided Point Clustering2025-07-17A Semi-Supervised Learning Method for the Identification of Bad Exposures in Large Imaging Surveys2025-07-17A Privacy-Preserving Framework for Advertising Personalization Incorporating Federated Learning and Differential Privacy2025-07-16Bridge Feature Matching and Cross-Modal Alignment with Mutual-filtering for Zero-shot Anomaly Detection2025-07-15Adversarial Activation Patching: A Framework for Detecting and Mitigating Emergent Deception in Safety-Aligned Transformers2025-07-12Towards High-Resolution 3D Anomaly Detection: A Scalable Dataset and Real-Time Framework for Subtle Industrial Defects2025-07-10seMCD: Sequentially implemented Monte Carlo depth computation with statistical guarantees2025-07-08