{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:13:31Z","timestamp":1743128011453,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030762278"},{"type":"electronic","value":"9783030762285"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76228-5_20","type":"book-chapter","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T12:09:47Z","timestamp":1620734987000},"page":"279-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Static Summarization Using Pearson\u2019s Coefficient and Transfer Learning for Anomaly Detection for Surveillance Videos"],"prefix":"10.1007","author":[{"given":"Steve Willian","family":"Chancolla-Neira","sequence":"first","affiliation":[]},{"given":"C\u00e9sar Ernesto","family":"Salinas-Lozano","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Ugarte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,12]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","first-page":"1967","DOI":"10.3233\/JIFS-169908","volume":"36","author":"SD Bansod","year":"2019","unstructured":"Bansod, S.D., Nandedkar, A.V.: Transfer learning for video anomaly detection. J. Intell. Fuzzy Syst. 36, 1967\u20131975 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"20_CR2","volume-title":"Statistics in a Nutshell","author":"S Boslaugh","year":"2008","unstructured":"Boslaugh, S., Watters, P.A.: Statistics in a Nutshell. O\u2019Reilly, Farnham (2008)"},{"key":"20_CR3","doi-asserted-by":"crossref","first-page":"42884","DOI":"10.1109\/ACCESS.2020.2978054","volume":"8","author":"X Chen","year":"2020","unstructured":"Chen, X., Xu, X., Yang, Y., Wu, H., Tang, J., Zhao, J.: Augmented ship tracking under occlusion conditions from maritime surveillance videos. IEEE Access 8, 42884\u201342897 (2020)","journal-title":"IEEE Access"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Z., Li, W., Fei, C., Liu, B., Yu, N.: Robust anomaly detection via fusion of appearance and motion features. In: VCIP (2018)","DOI":"10.1109\/VCIP.2018.8698703"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, Y., et al.: An anomaly comprehension neural network for surveillance videos on terminal devices. In: DATE (2020)","DOI":"10.23919\/DATE48585.2020.9116533"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"dos Santos Belo, L., Caetano Jr., C.A., Gon\u00e7alves do Patroc\u00ednio Jr., Z.K., Ferzoli Guimar\u00e3es, S.J.: Summarizing video sequence using a graph-based hierarchical approach. Neurocomputing. 173, 1001\u20131016 (2016)","DOI":"10.1016\/j.neucom.2015.08.057"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Fontes de Avila, S.E., Brand\u00e3o Lopes, A.P., da Luz Jr., A., de Albuquerque Ara\u00fajo, A.: VSUMM: a mechanism designed to produce static video summaries and a novel evaluation method. Pattern Recognit. Lett. 32, 56\u201368 (2011)","DOI":"10.1016\/j.patrec.2010.08.004"},{"key":"20_CR8","series-title":"Adaptive Computation and Machine Learning","volume-title":"Deep Learning","author":"IJ Goodfellow","year":"2016","unstructured":"Goodfellow, I.J., Bengio, Y., Courville, A.C.: Deep Learning. Adaptive Computation and Machine Learning, MIT Press, Cambridge (2016)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Nguyen, T., Meunier, J.: Anomaly detection in video sequence with appearance-motion correspondence. In: ICCV (2019)","DOI":"10.1109\/ICCV.2019.00136"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Panda, R., Das, A., Wu, Z., Ernst, J., Roy-Chowdhury, A.K.: Weakly supervised summarization of web videos. In: ICCV (2017)","DOI":"10.1109\/ICCV.2017.395"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Sandler, M., Howard, A.G., Zhu, M., Zhmoginov, A., Chen, L.: MobileNetV2: inverted residuals and linear bottlenecks. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00474"},{"key":"20_CR12","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.neucom.2019.08.059","volume":"371","author":"K Singh","year":"2020","unstructured":"Singh, K., Rajora, S., Vishwakarma, D.K., Tripathi, G., Kumar, S., Walia, G.S.: Crowd anomaly detection using aggregation of ensembles of fine-tuned convnets. Neurocomputing 371, 188\u2013198 (2020)","journal-title":"Neurocomputing"},{"key":"20_CR13","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.neucom.2015.07.131","volume":"187","author":"X Song","year":"2016","unstructured":"Song, X., Sun, L., Lei, J., Tao, D., Yuan, G., Song, M.: Event-based large scale surveillance video summarization. Neurocomputing 187, 66\u201374 (2016)","journal-title":"Neurocomputing"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"20_CR15","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1198302.1198305","volume":"3","author":"BT Truong","year":"2007","unstructured":"Truong, B.T., Venkatesh, S.: Video abstraction: a systematic review and classification. ACM Trans. Multimedia Comput. Commu. Appl. 3, 3 (2007)","journal-title":"ACM Trans. Multimedia Comput. Commu. Appl."},{"key":"20_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-33492-4_25","volume-title":"Discovery Science","author":"W Ugarte","year":"2012","unstructured":"Ugarte, W., Boizumault, P., Loudni, S., Cr\u00e9milleux, B.: Soft threshold constraints for pattern mining. In: Ganascia, J.-G., Lenca, P., Petit, J.-M. (eds.) DS 2012. LNCS (LNAI), vol. 7569, pp. 313\u2013327. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33492-4_25"},{"issue":"2","key":"20_CR17","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10844-013-0281-4","volume":"44","author":"W Ugarte","year":"2015","unstructured":"Ugarte, W., Boizumault, P., Loudni, S., Cr\u00e9milleux, B., Lepailleur, A.: Soft constraints for pattern mining. J. Intell. Inf. Syst. 44(2), 193\u2013221 (2015). https:\/\/doi.org\/10.1007\/s10844-013-0281-4","journal-title":"J. Intell. Inf. Syst."},{"key":"20_CR18","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/LSP.2016.2611485","volume":"24","author":"X Wang","year":"2017","unstructured":"Wang, X., Gao, L., Song, J., Shen, H.T.: Beyond frame-level CNN: saliency-aware 3-D CNN with LSTM for video action recognition. IEEE Signal Process. Lett. 24, 510\u2013514 (2017)","journal-title":"IEEE Signal Process. Lett."},{"key":"20_CR19","doi-asserted-by":"crossref","first-page":"9625","DOI":"10.1007\/s11042-016-3569-x","volume":"76","author":"J Wu","year":"2017","unstructured":"Wu, J., Zhong, S., Jiang, J., Yang, Y.: A novel clustering method for static video summarization. Multimedia Tools Appl. 76, 9625\u20139641 (2017)","journal-title":"Multimedia Tools Appl."},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Xu, Z., Hu, J., Deng, W.: Recurrent convolutional neural network for video classification. In: ICME (2016)","DOI":"10.1109\/ICME.2016.7552971"},{"key":"20_CR21","doi-asserted-by":"crossref","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou, J.T., Du, J., Zhu, H., Peng, X., Liu, Y., Goh, R.S.M.: AnomalyNet: an anomaly detection network for video surveillance. IEEE Trans. Inf. Forensics Secur. 14, 2537\u20132550 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Information Management and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76228-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T12:32:58Z","timestamp":1620736378000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76228-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030762278","9783030762285"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76228-5_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"12 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMBig","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Conference on Information Management and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simbig2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simbig.org\/SIMBig2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"122","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}