joeyzhouty / AnomalyNetView external linksLinks
AnomalyNet: An Anomaly Detection Network for Video Surveillance, IEEE Trans Information Forensics and Security 2019.
☆18Dec 26, 2019Updated 6 years ago
Alternatives and similar repositories for AnomalyNet
Users that are interested in AnomalyNet are comparing it to the libraries listed below
Sorting:
- Repository for NVIDIA AICITY Challenge☆15Jul 29, 2021Updated 4 years ago
- Anomaly Detection in Video Sequence with Appearance-Motion Correspondence☆57Aug 3, 2020Updated 5 years ago
- ☆52Mar 24, 2023Updated 2 years ago
- ☆81Jul 28, 2020Updated 5 years ago
- Papers for Video Anomaly Detection, released codes collection, Performance Comparision.☆658Sep 20, 2022Updated 3 years ago
- ☆549Jun 30, 2023Updated 2 years ago
- Real-World Anomaly Detection in Surveillance Videos☆190Oct 16, 2018Updated 7 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- ReFLIP-VAD: Towards Weakly Supervised Video Anomaly Detection via Vision-Language Model☆14Nov 25, 2024Updated last year
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Implementing from scratch a search engine for the French Wikipedia☆10Feb 22, 2019Updated 6 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Official code for 'Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning' [ICCV 2021]☆335Oct 29, 2025Updated 3 months ago
- Source codes of our paper in CVPR 2019: Graph Convolutional Label Noise Cleaner: Train a Plug-and-play Action Classifier for Anomaly Det…☆241Jul 26, 2022Updated 3 years ago
- Traffic Video Event Retrieval via Text Query using Vehicle Appearance and Motion Attributes☆10Jun 21, 2021Updated 4 years ago
- [IEEE TII 2025] Official Implementation for "Dual-Detector Reoptimization for Federated Weakly Supervised Video Anomaly Detection via Ada…☆26Nov 11, 2025Updated 3 months ago
- ☆13Aug 18, 2023Updated 2 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- ☆13Apr 16, 2025Updated 9 months ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- ☆12Feb 16, 2024Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆12Jan 22, 2026Updated 3 weeks ago
- 实验室找工作交流☆10Oct 16, 2015Updated 10 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated last month
- Code and database for Jacquot et al. CVPR 2020. Can we decode subtle human activities?☆12Dec 22, 2020Updated 5 years ago
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 2 years ago
- Datasets related to sports video analysis.☆14Jul 22, 2025Updated 6 months ago
- Predicting agriculture crop yields using climate modeling and deep learning.☆13Jun 2, 2017Updated 8 years ago
- This development is designed to measure the content of harmful gases and dust particles using an unmanned aerial vehicle DJI.☆12Jun 28, 2018Updated 7 years ago
- ☆11Dec 21, 2017Updated 8 years ago
- Generates spectrogram from images☆13Apr 26, 2021Updated 4 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago