{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:59:56Z","timestamp":1774367996700,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030005627","type":"print"},{"value":"9783030005634","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00563-4_59","type":"book-chapter","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T11:35:29Z","timestamp":1538739329000},"page":"605-614","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Big Data Analytics and Mining for Crime Data Analysis, Visualization and Prediction"],"prefix":"10.1007","author":[{"given":"Mingchen","family":"Feng","sequence":"first","affiliation":[]},{"given":"Jiangbin","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yukang","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jinchang","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qiaoyuan","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,6]]},"reference":[{"key":"59_CR1","doi-asserted-by":"crossref","unstructured":"Thongsatapornwatana, U.: A survey of data mining techniques for analyzing crime patterns. In: 2nd Asian Conference on Defence Technology, Chiang Mai, pp. 123\u2013128 (2016)","DOI":"10.1109\/ACDT.2016.7437655"},{"issue":"4","key":"59_CR2","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1109\/TKDE.2015.2507570","volume":"28","author":"C Yu","year":"2016","unstructured":"Yu, C., Ding, W., et al.: Hierarchical spatio-temporal pattern discovery and predictive modeling. IEEE Trans. Knowl. Data Eng. 28(4), 979\u2013993 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"59_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MPOT.2016.2566099","volume":"37","author":"S Musa","year":"2018","unstructured":"Musa, S.: Smart cities-a road map for development. IEEE Potentials 37(2), 19\u201323 (2018)","journal-title":"IEEE Potentials"},{"issue":"1","key":"59_CR4","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/TCSS.2017.2782008","volume":"5","author":"S Wang","year":"2018","unstructured":"Wang, S., Wang, X., et al.: Parallel crime scene analysis based on ACP approach. IEEE Trans. Comput. Soc. Syst. 5(1), 244\u2013255 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"59_CR5","doi-asserted-by":"crossref","unstructured":"Yadav, S., Timbadia, M., et al: Crime pattern detection, analysis and prediction. In: IEEE International Conference on Electronics, Communication and Aerospace Technology, pp. 225\u2013230 (2017)","DOI":"10.1109\/ICECA.2017.8203676"},{"key":"59_CR6","doi-asserted-by":"crossref","unstructured":"Baloian, N., et al.: Crime prediction using patterns and context. In: 21st IEEE International Conference on Computer Supported Cooperative Work in Design, Wellington, pp. 2\u20139 (2017)","DOI":"10.1109\/CSCWD.2017.8066662"},{"key":"59_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, X., Tang, J.: Exploring transfer learning for crime prediction. In: Proceedings of IEEE International Conference on Data Mining Workshops, New Orleans, LA, pp. 1158\u20131159 (2017)","DOI":"10.1109\/ICDMW.2017.165"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Wu, S. et al.: Spatial-temporal campus crime pattern mining from historical alert messages. In: International Conference on Computing, Networking and Communications, pp. 778\u2013782 (2017)","DOI":"10.1109\/ICCNC.2017.7876229"},{"key":"59_CR9","doi-asserted-by":"crossref","unstructured":"Vineeth, K., Pandey, A., et al.: A novel approach for intelligent crime pattern discovery and prediction. In: International Conference on Advanced Communication Control and Computing Technologies, Ramanathapuram, pp. 531\u2013538 (2016)","DOI":"10.1109\/ICACCCT.2016.7831697"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, C., Gomez, D., et al.: Forecasting time series from clustering by a memetic differential fuzzy approach: an application to crime prediction. In: IEEE Symposium Series on Computational Intelligence, Honolulu, HI, pp. 1\u20138 (2017)","DOI":"10.1109\/SSCI.2017.8285373"},{"key":"59_CR11","doi-asserted-by":"crossref","unstructured":"Joshi, A., Sabitha, A.S., et al.: Crime analysis using K-means clustering. In: 2017 3rd International Conference on Computational Intelligence and Networks, Odisha, pp. 33\u201339 (2017)","DOI":"10.1109\/CINE.2017.23"},{"key":"59_CR12","doi-asserted-by":"crossref","unstructured":"Noor, N., Ghazali, A., et al.: Supporting decision making in situational crime prevention using fuzzy association rule. In: International Conference on Computer, Control, Informatics and Its Applications (IC3INA), Jakarta, pp. 225\u2013229 (2013)","DOI":"10.1109\/IC3INA.2013.6819178"},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Wang, M., Zhang, F., et al.: Hybrid neural network mixed with random forests and perlin noise. In: 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 1937\u20131941 (2016)","DOI":"10.1109\/CompComm.2016.7925039"},{"key":"59_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.neucom.2018.01.076","volume":"287","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Ren, J., et al.: A deep-learning based feature hybrid framework for spatiotemporal saliency detection inside videos. Neurocomputing 287, 68\u201383 (2018)","journal-title":"Neurocomputing"},{"issue":"5","key":"59_CR15","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1109\/TMM.2009.2021782","volume":"11","author":"J Ren","year":"2009","unstructured":"Ren, J., Jiang, J.: Hierarchical modeling and adaptive clustering for real-time summarization of rush videos. IEEE Trans. Multimed. 11(5), 906\u2013917 (2009)","journal-title":"IEEE Trans. Multimed."},{"issue":"6","key":"59_CR16","doi-asserted-by":"publisher","first-page":"3325","DOI":"10.1109\/TGRS.2014.2374218","volume":"53","author":"J Han","year":"2015","unstructured":"Han, J., Zhang, D., et al.: Object detection in optical remote sensing images based on weakly supervised learning and high-level feature learning. IEEE Trans. Geosci. Remote Sens. 53(6), 3325\u20133337 (2015)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"2","key":"59_CR17","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11042-010-0518-y","volume":"54","author":"J Chen","year":"2011","unstructured":"Chen, J., Ren, J.: Modelling of content-aware indicators for effective determination of shot boundaries in compressed MPEG videos. Multimed. Tools Appl. 54(2), 219\u2013239 (2011)","journal-title":"Multimed. Tools Appl."},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Ren, J., Vlachos, T.: Immersive and perceptual human-computer interaction using computer vision techniques. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE, pp. 66\u201372 (2010)","DOI":"10.1109\/CVPRW.2010.5543161"},{"key":"59_CR19","doi-asserted-by":"crossref","unstructured":"Yan, Y., Ren, J., et al.: Cognitive fusion of thermal and visible imagery for effective detection and tracking of pedestrians in videos. Cognit. Comput. 1\u201311 (2017)","DOI":"10.1007\/s12559-017-9529-6"},{"key":"59_CR20","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.patcog.2018.02.004","volume":"79","author":"Y Yan","year":"2018","unstructured":"Yan, Y., Ren, J., et al.: Unsupervised image saliency detection with Gestalt-laws guided optimization and visual attention based refinement. Pattern Recognit. 79, 65\u201378 (2018)","journal-title":"Pattern Recognit."}],"container-title":["Lecture Notes in Computer Science","Advances in Brain Inspired Cognitive Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00563-4_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:12:09Z","timestamp":1774365129000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00563-4_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030005627","9783030005634"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00563-4_59","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"BICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Brain Inspired Cognitive Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bics2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}