AnomalyNet: An Anomaly Detection Network for Video Surveillance, IEEE Trans Information Forensics and Security 2019.
☆18Dec 26, 2019Updated 6 years ago
Alternatives and similar repositories for AnomalyNet
Users that are interested in AnomalyNet are comparing it to the libraries listed below
Sorting:
- Training code for the ACAM action detection model.☆28Feb 2, 2023Updated 3 years ago
- This repository is for Weakly Supervised Video Anomaly Detection via Center-Guided Discriminative Learning(ICME 2020). The original paper…☆60Oct 22, 2025Updated 4 months ago
- Anomaly Detection in Video Sequence with Appearance-Motion Correspondence☆57Aug 3, 2020Updated 5 years ago
- ☆52Mar 24, 2023Updated 2 years ago
- Cloze Test Helps: Effective Video Anomaly Detection via Learning to Complete Video Events. Oral paper in ACM Multimedia 2020.☆97Mar 24, 2023Updated 2 years ago
- ☆81Jul 28, 2020Updated 5 years ago
- ☆25Dec 21, 2019Updated 6 years ago
- Papers for Video Anomaly Detection, released codes collection, Performance Comparision.☆659Sep 20, 2022Updated 3 years ago
- ☆550Jun 30, 2023Updated 2 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Linux configurations for themes, utilities, and layouts.☆11Oct 4, 2024Updated last year
- Graph Embedded Pose Clustering for Anomaly Detection☆80Jan 7, 2020Updated 6 years ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago
- Cloud SQL Proxy works with encrypted credential file.☆10Jan 27, 2021Updated 5 years ago
- Official code for 'Weakly-supervised Video Anomaly Detection with Robust Temporal Feature Magnitude Learning' [ICCV 2021]☆336Oct 29, 2025Updated 4 months ago
- Source codes of our paper in CVPR 2019: Graph Convolutional Label Noise Cleaner: Train a Plug-and-play Action Classifier for Anomaly Det…☆241Jul 26, 2022Updated 3 years ago
- [IEEE TII 2025] Official Implementation for "Dual-Detector Reoptimization for Federated Weakly Supervised Video Anomaly Detection via Ada…☆26Nov 11, 2025Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- ☆12Oct 27, 2021Updated 4 years ago
- Singer.io Tap for extracting data from the Google Analytics Reporting API☆12Updated this week
- ☆13Apr 16, 2025Updated 10 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- Terraform to run Scoutsuite security scan of projects within a Google Cloud Org. Report will be published to a GCS bucket.☆17Jan 5, 2026Updated 2 months ago
- DeepMBTI is an AI-powered MBTI full-stack predictor application. The app includes an interactive front-end that links to an NLP Log Reg M…☆11Nov 5, 2023Updated 2 years ago
- 实验室找工作交流☆10Oct 16, 2015Updated 10 years ago
- ☆14Aug 18, 2023Updated 2 years ago
- ☆10Oct 25, 2024Updated last year
- Source codes of our paper in TCSVT 2025: PLOVAD: Prompting Vision-Language Models for Open Vocabulary Video Anomaly Detection☆27Feb 15, 2025Updated last year
- Official repository of "TDSD: Text-Driven Scene-Decoupled Weakly Supervised Video Anomaly Detection"☆11May 25, 2025Updated 9 months ago
- Create your own custom MoViNet model using your custom data. You can train and inference from "a single of code".☆10Jun 1, 2023Updated 2 years ago
- A paper set about Machine Learning and Deep Learning.机器学习,深度学习等理论与应用☆11Jul 15, 2017Updated 8 years ago
- Frequency hopping spread spectrum analyzer and repeat attack program for use with a Nuand BladeRF☆10Apr 10, 2015Updated 10 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Code and database for Jacquot et al. CVPR 2020. Can we decode subtle human activities?☆12Dec 22, 2020Updated 5 years ago