Abstract: Despite the prevailing transition from single-task to multi-task approaches in video anomaly detection, we observe that many adopt sub-optimal frameworks for individual proxy tasks.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results