{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:10:01Z","timestamp":1742944201410,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031179945"},{"type":"electronic","value":"9783031179952"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-17995-2_11","type":"book-chapter","created":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T23:03:46Z","timestamp":1665356626000},"page":"145-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["LIREM: A Generic Framework for\u00a0Effective Online Video Novelty Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3144-7166","authenticated-orcid":false,"given":"Chengkun","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1302-818X","authenticated-orcid":false,"given":"Xiangmin","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3119-4763","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,10]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? a new model and the kinetics dataset. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2017, pp. 4724\u20134733 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1016\/j.patcog.2012.11.021","volume":"46","author":"Y Cong","year":"2013","unstructured":"Cong, Y., Yuan, J., Liu, J.: Abnormal event detection in crowded scenes using sparse representation. Pattern Recognit. 46, 1851\u20131864 (2013)","journal-title":"Pattern Recognit."},{"key":"11_CR4","unstructured":"Devlin, J., Chang, M., Lee, K., Toutanova, K.: BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs\/1810.04805 (2018)"},{"key":"11_CR5","unstructured":"Ester, M., Kriegel, H., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), pp. 226\u2013231 (1996)"},{"key":"11_CR6","unstructured":"Ezen-Can, A.: A comparison of LSTM and BERT for small corpus. CoRR abs\/2009.05451 (2020)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Geest, R.D., Tuytelaars, T.: Modeling temporal structure with LSTM for online action detection. In: 2018 IEEE Winter Conference on Applications of Computer Vision, WACV 2018, pp. 1549\u20131557 (2018)","DOI":"10.1109\/WACV.2018.00173"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Hinami, R., Mei, T., Satoh, S.: Joint detection and recounting of abnormal events by learning deep generic knowledge. In: IEEE International Conference on Computer Vision, ICCV 2017, pp. 3639\u20133647 (2017)","DOI":"10.1109\/ICCV.2017.391"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9, 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T., Khan, F.S., Georgescu, M., Shao, L.: Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2019, pp. 7842\u20137851 (2019)","DOI":"10.1109\/CVPR.2019.00803"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Kim, J., Cho, S.: Unsupervised novelty detection in video with adversarial autoencoder based on non-euclidean space. In: 15th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2019, pp. 22\u201327 (2019)","DOI":"10.1109\/SITIS.2019.00016"},{"key":"11_CR13","unstructured":"Kingma, D.P., Ba, J.: Adam: A method for stochastic optimization. In: 3rd International Conference on Learning Representations, ICLR 2015 (2015)"},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"165607","DOI":"10.1109\/ACCESS.2019.2953095","volume":"7","author":"J Lee","year":"2019","unstructured":"Lee, J., Kim, J., Kim, I., Han, K.: Cyber threat detection based on artificial neural networks using event profiles. IEEE Access 7, 165607\u2013165626 (2019)","journal-title":"IEEE Access"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.: Isolation forest. In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 15\u201319 December 2008, Pisa, Italy, pp. 413\u2013422 (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Li, Z., Zhao, P., Gao, S.: Margin learning embedded prediction for video anomaly detection with A few anomalies. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, pp. 3023\u20133030 (2019)","DOI":"10.24963\/ijcai.2019\/419"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection - A new baseline. In: 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhao, K., Cong, G., Bao, Z.: Online anomalous trajectory detection with deep generative sequence modeling. In: 36th IEEE International Conference on Data Engineering, ICDE 2020,. pp. 949\u2013960 (2020)","DOI":"10.1109\/ICDE48307.2020.00087"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 FPS in MATLAB. In: IEEE International Conference on Computer Vision, ICCV 2013, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: The Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2010, pp. 1975\u20131981 (2010)","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), pp. 935\u2013942 (2009)","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Khalooei, M., Fathy, M., Adeli, E.: Adversarially learned one-class classifier for novelty detection. In: 2018 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2018, pp. 3379\u20133388 (2018)","DOI":"10.1109\/CVPR.2018.00356"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-319-59050-9_12","volume-title":"Information Processing in Medical Imaging","author":"T Schlegl","year":"2017","unstructured":"Schlegl, T., Seeb\u00f6ck, P., Waldstein, S.M., Schmidt-Erfurth, U., Langs, G.: Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Niethammer, M., Styner, M., Aylward, S., Zhu, H., Oguz, I., Yap, P.-T., Shen, D. (eds.) IPMI 2017. LNCS, vol. 10265, pp. 146\u2013157. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13, 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"key":"11_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-030-03493-1_48","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2018","author":"W Shin","year":"2018","unstructured":"Shin, W., Cho, S.-B.: CCTV image sequence generation and modeling method for video anomaly detection using generative adversarial network. In: Yin, H., Camacho, D., Novais, P., Tall\u00f3n-Ballesteros, A.J. (eds.) IDEAL 2018. LNCS, vol. 11314, pp. 457\u2013467. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03493-1_48"},{"issue":"4","key":"11_CR26","doi-asserted-by":"publisher","first-page":"1114","DOI":"10.1016\/j.ymssp.2009.09.009","volume":"24","author":"C Surace","year":"2010","unstructured":"Surace, C., Worden, K.: Novelty detection in a changing environment: A negative selection approach. Mech. Syst. Signal Process. 24(4), 1114\u20131128 (2010)","journal-title":"Mech. Syst. Signal Process."},{"key":"11_CR27","unstructured":"Sutskever, I., Vinyals, O., Le, Q.V.: Sequence to sequence learning with neural networks. In: Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, pp. 3104\u20133112 (2014)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Xia, Y., Cao, X., Wen, F., Hua, G., Sun, J.: Learning discriminative reconstructions for unsupervised outlier removal. In: 2015 IEEE International Conference on Computer Vision, ICCV 2015, pp. 1511\u20131519 (2015)","DOI":"10.1109\/ICCV.2015.177"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Yu, G., Wang, S., Cai, Z., Zhu, E., Xu, C., Yin, J., Kloft, M.: Cloze test helps: Effective video anomaly detection via learning to complete video events. In: MM \u201920: The 28th ACM International Conference on Multimedia, pp. 583\u2013591 (2020)","DOI":"10.1145\/3394171.3413973"},{"key":"11_CR30","unstructured":"Zenati, H., Foo, C.S., Lecouat, B., Manek, G., Chandrasekhar, V.R.: Efficient gan-based anomaly detection. In: International Conference on Learning Representation, pp. 1\u201313 (2018)"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qing, L., Miao, J.: Temporal convolutional network with complementary inner bag loss for weakly supervised anomaly detection. In: 2019 IEEE International Conference on Image Processing, ICIP 2019, pp. 4030\u20134034 (2019)","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"11_CR32","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TIFS.2020.3029913","volume":"16","author":"J Zhou","year":"2021","unstructured":"Zhou, J., Pun, C.: Personal privacy protection via irrelevant faces tracking and pixelation in video live streaming. IEEE Trans. Inf. Forensics Secur. 16, 1088\u20131103 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-17995-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,5]],"date-time":"2024-10-05T12:48:32Z","timestamp":1728132512000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-17995-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031179945","9783031179952"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-17995-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"41","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/er2022web.github.io\/ER2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"82","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference took place in a virtual mode.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}