{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:11:20Z","timestamp":1743081080544,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030374280"},{"type":"electronic","value":"9783030374297"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37429-7_21","type":"book-chapter","created":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T01:02:48Z","timestamp":1579482168000},"page":"211-222","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Global Anomaly Detection Based on a Deep Prediction Neural Network"],"prefix":"10.1007","author":[{"given":"Ang","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhenjiang","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Yigang","family":"Cen","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Mladenovic","sequence":"additional","affiliation":[]},{"given":"Liequan","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xinwei","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,12]]},"reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-41512-8_2","volume-title":"Intelligent Multimedia Surveillance","author":"M Thida","year":"2013","unstructured":"Thida, M., Yong, Y.L., Climent-P\u00e9rez, P., Eng, H.-l., Remagnino, P.: A literature review on video analytics of crowded scenes. In: Atrey, P.K., Kankanhalli, M.S., Cavallaro, A. (eds.) Intelligent Multimedia Surveillance, pp. 17\u201336. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41512-8_2"},{"issue":"1","key":"21_CR2","first-page":"1","volume":"4","author":"NNA Sjarif","year":"2012","unstructured":"Sjarif, N.N.A., Shamsuddin, S.M., Hashim, S.Z.: Detection of abnormal behaviors in crowd scene: a review. Int. J. Adv. Soft Comput. Appl. 4(1), 1\u201333 (2012)","journal-title":"Int. J. Adv. Soft Comput. Appl."},{"issue":"5","key":"21_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2010.937392","volume":"27","author":"D Kosmopoulos","year":"2010","unstructured":"Kosmopoulos, D., Chatzis, S.P.: Robust visual behavior recognition. IEEE Signal Process. Mag. 27(5), 34\u201345 (2010)","journal-title":"IEEE Signal Process. Mag."},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: IEEE Conference on Computer Vision and Pattern Recognition, Miami, pp. 935\u2013942. IEEE (2009)","DOI":"10.1109\/CVPRW.2009.5206641"},{"issue":"12","key":"21_CR5","doi-asserted-by":"publisher","first-page":"14767","DOI":"10.1007\/s11042-017-5061-7","volume":"77","author":"S Amraee","year":"2018","unstructured":"Amraee, S., Vafaei, A., Jamshidi, K., Adibi, P.: Anomaly detection and localization in crowded scenes using connected component analysis. Multimed. Tools Appl. 77(12), 14767\u201314782 (2018)","journal-title":"Multimed. Tools Appl."},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Tziakos, I., Cavallaro, A., Xu, L.Q.: Local abnormality detection in video using subspace learning. In: 7th IEEE International Conference on Advanced Video and Signal Based Surveillance, Boston, pp. 519\u2013525. IEEE (2010)","DOI":"10.1109\/AVSS.2010.70"},{"issue":"10","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1612","DOI":"10.1109\/TCSVT.2015.2395752","volume":"25","author":"DG Lee","year":"2015","unstructured":"Lee, D.G., Suk, H.I., Park, S.K., Lee, S.W.: Motion influence map for unusual human activity detection and localization in crowded scenes. IEEE Trans. Circuits Syst. Video Technol. 25(10), 1612\u20131623 (2015)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Patil, N., Biswas, P.K.: Global abnormal events detection in surveillance video\u2014a hierarchical approach. In: Sixth International Symposium on Embedded Computing and System Design, Patna, pp. 217\u2013222. IEEE (2016)","DOI":"10.1109\/ISED.2016.7977085"},{"issue":"6","key":"21_CR9","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TIFS.2014.2315971","volume":"9","author":"T Wang","year":"2014","unstructured":"Wang, T., Snoussi, H.: Detection of abnormal visual events via global optical flow orientation histogram. IEEE Trans. Inf. Forensics Secur. 9(6), 988\u2013998 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.patcog.2015.09.005","volume":"51","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Lu, H., Zhang, L., Ruan, X.: Combining motion and appearance cues for anomaly detection. Pattern Recognit. 51, 443\u2013452 (2016)","journal-title":"Pattern Recognit."},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: IEEE Conference on Computer Vision and Pattern Recognition, Colorado, pp. 3449\u20133456. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995434"},{"issue":"24","key":"21_CR12","doi-asserted-by":"publisher","first-page":"26249","DOI":"10.1007\/s11042-016-4115-6","volume":"76","author":"A Li","year":"2017","unstructured":"Li, A., Miao, Z., Cen, Y., Cen, Y.: Anomaly detection using sparse reconstruction in crowded scenes. Multimed. Tools Appl. 76(24), 26249\u201326271 (2017)","journal-title":"Multimed. Tools Appl."},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Tran, H.T., Hogg, D.: Anomaly detection using a convolutional winner-take-all autoencoder. In: Proceedings of the British Machine Vision Conference. British Machine Vision Association, London (2017)","DOI":"10.5244\/C.31.139"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Chalapathy, R., Chawla, S.: Deep learning for anomaly detection: a survey. Eprint Arxiv (2019)","DOI":"10.1145\/3394486.3406704"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh, M., Nabi, M., Mousavi, H., Sangineto, E., Sebe, N.: Plug-and-play cnn for crowd motion analysis: an application in abnormal event detection. In: IEEE Winter Conference on Applications of Computer Vision, Lake Tahoe, pp. 1689\u20131698. IEEE (2018)","DOI":"10.1109\/WACV.2018.00188"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Las Vegas, pp. 733\u2013742. IEEE (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: Remembering history with convolutional LSTM for anomaly detection. In: IEEE International Conference on Multimedia and Expo, Hong Kong, pp. 439\u2013444. IEEE (2017)","DOI":"10.1109\/ICME.2017.8019325"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1007\/978-3-030-20876-9_31","volume-title":"Computer Vision \u2013 ACCV 2018","author":"M Sabokrou","year":"2019","unstructured":"Sabokrou, M., et al.: AVID: adversarial visual irregularity detection. In: Jawahar, C.V., Li, H., Mori, G., Schindler, K. (eds.) ACCV 2018. LNCS, vol. 11366, pp. 488\u2013505. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-20876-9_31"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cviu.2018.02.006","volume":"172","author":"M Sabokrou","year":"2018","unstructured":"Sabokrou, M., Fayyaz, M., Fathy, M., Moayed, Z., Klette, R.: Deep-Anomaly: fully convolutional neural network for fast anomaly detection in crowded scenes. Comput. Vis. Image Underst. 172, 88\u201397 (2018)","journal-title":"Comput. Vis. Image Underst."},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Salt Lake City, pp. 6536\u20136545. IEEE (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.neucom.2016.08.156","volume":"277","author":"S Wang","year":"2018","unstructured":"Wang, S., Zhu, E., Yin, J., Porikli, F.: Video anomaly detection and localization by local motion based joint video representation and OCELM. Neurocomputing 277, 161\u2013175 (2018)","journal-title":"Neurocomputing"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Sharif Razavian, A., Azizpour, H., Sullivan, J., Carlsson, S.: CNN features off-the-shelf: an astounding baseline for recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, Columbus, pp. 806\u2013813. IEEE (2014)","DOI":"10.1109\/CVPRW.2014.131"},{"issue":"3","key":"21_CR23","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s11263-015-0816-y","volume":"115","author":"O Russakovsky","year":"2015","unstructured":"Russakovsky, O., et al.: ImageNet large scale visual recognition challenge. Int. J. Comput. Vis. 115(3), 211\u2013252 (2015)","journal-title":"Int. J. Comput. Vis."},{"key":"21_CR24","unstructured":"Xingjian, S.H.I., Chen, Z., Wang, H., Yeung, D.Y., Wong, W.K., Woo, W.C.: Convolutional LSTM network: a machine learning approach for precipitation nowcasting. In: Advances in Neural Information Processing Systems, Montr\u00e9al, pp. 802\u2013810 (2015)"},{"issue":"10","key":"21_CR25","doi-asserted-by":"publisher","first-page":"2222","DOI":"10.1109\/TNNLS.2016.2582924","volume":"28","author":"K Greff","year":"2016","unstructured":"Greff, K., Srivastava, R.K., Koutn\u00edk, J., Steunebrink, B.R., Schmidhuber, J.: LSTM: A search space odyssey. IEEE Trans. Neural Netw. Learn. Syst. 28(10), 2222\u20132232 (2016)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"21_CR26","unstructured":"UMN: Unusual crowd activity dataset of University of Minnesota, department of computer science and engineering (2006). http:\/\/mha.cs.umn.edu\/movies\/crowd-activity-all.avi"}],"container-title":["Lecture Notes in Computer Science","Human Centered Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37429-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T10:55:46Z","timestamp":1710240946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-37429-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374280","9783030374297"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37429-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Centered Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u010ca\u010dak","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Serbia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpca2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/hcc.scholat.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}