{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:56:13Z","timestamp":1767034573273,"version":"3.40.3"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031250712"},{"type":"electronic","value":"9783031250729"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25072-9_43","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T08:40:04Z","timestamp":1676623204000},"page":"642-658","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Look at\u00a0Adjacent Frames: Video Anomaly Detection Without Offline Training"],"prefix":"10.1007","author":[{"given":"Yuqi","family":"Ouyang","sequence":"first","affiliation":[]},{"given":"Guodong","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Abati, D., Porrello, A., Calderara, S., Cucchiara, R.: Latent space autoregression for novelty detection. In: CVPR, pp. 481\u2013490 (2019)","DOI":"10.1109\/CVPR.2019.00057"},{"issue":"2","key":"43_CR2","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1609\/aaai.v35i2.16177","volume":"35","author":"R Cai","year":"2021","unstructured":"Cai, R., Zhang, H., Liu, W., Gao, S., Hao, Z.: Appearance-motion memory consistency network for video anomaly detection. AAAI 35(2), 938\u2013946 (2021)","journal-title":"AAAI"},{"key":"43_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-58555-6_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Chang","year":"2020","unstructured":"Chang, Y., Tu, Z., Xie, W., Yuan, J.: Clustering driven deep autoencoder for video anomaly detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12360, pp. 329\u2013345. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58555-6_20"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y.: Continual learning for anomaly detection in surveillance videos. In: CVPRW, pp. 1025\u20131034 (2020)","DOI":"10.1109\/CVPRW50498.2020.00135"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y.: A modular and unified framework for detecting and localizing video anomalies. In: WACV, pp. 3982\u20133991 (2022)","DOI":"10.1109\/WACV51458.2022.00306"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Doshi, K., Yilmaz, Y.: Rethinking video anomaly detection - a continual learning approach. In: WACV, pp. 3961\u20133970 (2022)","DOI":"10.1109\/WACV51458.2022.00309"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Feng, J.C., Hong, F.T., Zheng, W.S.: MIST: multiple instance self-training framework for video anomaly detection. In: CVPR, pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"43_CR8","unstructured":"Finn, C., Abbeel, P., Levine, S.: Model-agnostic meta-learning for fast adaptation of deep networks. In: ICML, pp. 1126\u20131135 (2017)"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Georgescu, M.I., Barbalau, A., Ionescu, R.T., Khan, F.S., Popescu, M., Shah, M.: Anomaly detection in video via self-supervised and multi-task learning. In: CVPR, pp. 12742\u201312752 (2021)","DOI":"10.1109\/CVPR46437.2021.01255"},{"key":"43_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-46454-1_21","volume-title":"Computer Vision \u2013 ECCV 2016","author":"A Del Giorno","year":"2016","unstructured":"Del Giorno, A., Bagnell, J.A., Hebert, M.: A discriminative framework for anomaly detection in large videos. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9909, pp. 334\u2013349. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46454-1_21"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Gong, D., et al.: Memorizing normality to detect anomaly: memory-augmented deep autoencoder for unsupervised anomaly detection. In: ICCV, pp. 1705\u20131714 (2019)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: CVPR, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Hinami, R., Mei, T., Satoh, S.: Joint detection and recounting of abnormal events by learning deep generic knowledge. In: ICCV, pp. 3639\u20133647 (2017)","DOI":"10.1109\/ICCV.2017.391"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T., Khan, F.S., Georgescu, M., Shao, L.: Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: CVPR, pp. 7834\u20137843 (2019)","DOI":"10.1109\/CVPR.2019.00803"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T., Smeureanu, S., Alexe, B., Popescu, M.: Unmasking the abnormal events in video. In: ICCV, pp. 2914\u20132922 (2017)","DOI":"10.1109\/ICCV.2017.315"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Jin, B., et al.: Exploring spatial-temporal multi-frequency analysis for high-fidelity and temporal-consistency video prediction. In: CVPR, pp. 4553\u20134562 (2020)","DOI":"10.1109\/CVPR42600.2020.00461"},{"key":"43_CR17","unstructured":"Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. In: ICLR (2015)"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Li, Z., Zhao, P., Gao, S.: Margin learning embedded prediction for video anomaly detection with a few anomalies. In: IJCAI, pp. 3023\u20133030 (2019)","DOI":"10.24963\/ijcai.2019\/419"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection - a new baseline. In: CVPR, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"key":"43_CR20","unstructured":"Liu, Y., Li, C., P\u00f3czos, B.: Classifier two sample test for video anomaly detections. In: BMVC, p. 71 (2018)"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nie, Y., Long, C., Zhang, Q., Li, G.: A hybrid video anomaly detection framework via memory-augmented flow reconstruction and flow-guided frame prediction. In: ICCV, pp. 13588\u201313597 (2021)","DOI":"10.1109\/ICCV48922.2021.01333"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 FPS in MATLAB. In: ICCV, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"43_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-030-58558-7_8","volume-title":"Computer Vision \u2013 ECCV 2020","author":"Y Lu","year":"2020","unstructured":"Lu, Y., Yu, F., Reddy, M.K.K., Wang, Y.: Few-shot scene-adaptive anomaly detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12350, pp. 125\u2013141. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58558-7_8"},{"key":"43_CR24","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked RNN framework. In: ICCV, pp. 341\u2013349 (2017)","DOI":"10.1109\/ICCV.2017.45"},{"key":"43_CR25","doi-asserted-by":"crossref","unstructured":"Lv, H., Chen, C., Cui, Z., Xu, C., Li, Y., Yang, J.: Learning normal dynamics in videos with meta prototype network. In: CVPR, pp. 15425\u201315434 (2021)","DOI":"10.1109\/CVPR46437.2021.01517"},{"key":"43_CR26","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: CVPR, pp. 1975\u20131981 (2010)","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"43_CR27","doi-asserted-by":"crossref","unstructured":"Markovitz, A., Sharir, G., Friedman, I., Zelnik-Manor, L., Avidan, S.: Graph embedded pose clustering for anomaly detection. In: CVPR, pp. 10536\u201310544 (2020)","DOI":"10.1109\/CVPR42600.2020.01055"},{"key":"43_CR28","unstructured":"Mohammadi, B., Fathy, M., Sabokrou, M.: Image\/video deep anomaly detection: a survey (2021)"},{"key":"43_CR29","doi-asserted-by":"crossref","unstructured":"Morais, R., Le, V., Tran, T., Saha, B., Mansour, M., Venkatesh, S.: Learning regularity in skeleton trajectories for anomaly detection in videos. In: CVPR, pp. 11988\u201311996 (2019)","DOI":"10.1109\/CVPR.2019.01227"},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Nguyen, T.N., Meunier, J.: Anomaly detection in video sequence with appearance-motion correspondence. In: ICCV, pp. 1273\u20131283 (2019)","DOI":"10.1109\/ICCV.2019.00136"},{"key":"43_CR31","unstructured":"Nichol, A., Achiam, J., Schulman, J.: On first-order meta-learning algorithms (2018)"},{"key":"43_CR32","doi-asserted-by":"crossref","unstructured":"Ouyang, Y., Sanchez, V.: Video anomaly detection by estimating likelihood of representations. In: ICPR, pp. 8984\u20138991 (2021)","DOI":"10.1109\/ICPR48806.2021.9412694"},{"key":"43_CR33","doi-asserted-by":"crossref","unstructured":"Pang, G., Yan, C., Shen, C., Hengel, A.v.d., Bai, X.: Self-trained deep ordinal regression for end-to-end video anomaly detection. In: CVPR, pp. 12170\u201312179 (2020)","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"43_CR34","doi-asserted-by":"crossref","unstructured":"Park, H., Noh, J., Ham, B.: Learning memory-guided normality for anomaly detection. In: CVPR, pp. 14360\u201314369 (2020)","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"43_CR35","doi-asserted-by":"crossref","unstructured":"Purwanto, D., Chen, Y.T., Fang, W.H.: Dance with self-attention: a new look of conditional random fields on anomaly detection in videos. In: ICCV, pp. 173\u2013183 (2021)","DOI":"10.1109\/ICCV48922.2021.00024"},{"key":"43_CR36","doi-asserted-by":"crossref","unstructured":"Ramachandra, B., Jones, M.J., Vatsavai, R.R.: A survey of single-scene video anomaly detection (2020)","DOI":"10.1109\/TPAMI.2020.3040591"},{"key":"43_CR37","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh, M., Nabi, M., Sangineto, E., Marcenaro, L., Regazzoni, C., Sebe, N.: Abnormal event detection in videos using generative adversarial nets. In: ICIP, pp. 1577\u20131581 (2017)","DOI":"10.1109\/ICIP.2017.8296547"},{"key":"43_CR38","doi-asserted-by":"crossref","unstructured":"Shen, G., Ouyang, Y., Sanchez, V.: Video anomaly detection via prediction network with enhanced spatio-temporal memory exchange. In: ICASSP, pp. 3728\u20133732 (2022)","DOI":"10.1109\/ICASSP43922.2022.9747376"},{"key":"43_CR39","unstructured":"Sitzmann, V., Martel, J.N., Bergman, A.W., Lindell, D.B., Wetzstein, G.: Implicit neural representations with periodic activation functions. In: NeurIPS (2020)"},{"key":"43_CR40","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: CVPR, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"43_CR41","doi-asserted-by":"crossref","unstructured":"Sun, C., Jia, Y., Hu, Y., Wu, Y.: Scene-aware context reasoning for unsupervised abnormal event detection in videos. In: ACM MM, pp. 184\u2013192 (2020)","DOI":"10.1145\/3394171.3413887"},{"key":"43_CR42","doi-asserted-by":"crossref","unstructured":"Tancik, M., et al.: Learned initializations for optimizing coordinate-based neural representations. In: CVPR, pp. 2846\u20132855 (2021)","DOI":"10.1109\/CVPR46437.2021.00287"},{"key":"43_CR43","unstructured":"Tancik, M., et al.: Fourier features let networks learn high frequency functions in low dimensional domains. In: NeurIPS (2020)"},{"key":"43_CR44","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J.W., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In: ICCV, pp. 4975\u20134986 (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"issue":"01","key":"43_CR45","doi-asserted-by":"publisher","first-page":"5216","DOI":"10.1609\/aaai.v33i01.33015216","volume":"33","author":"H Vu","year":"2019","unstructured":"Vu, H., Nguyen, T.D., Le, T., Luo, W., Phung, D.: Robust anomaly detection in videos using multilevel representations. AAAI 33(01), 5216\u20135223 (2019)","journal-title":"AAAI"},{"key":"43_CR46","doi-asserted-by":"crossref","unstructured":"Wang, S., Zeng, Y., Liu, Q., Zhu, C., Zhu, E., Yin, J.: Detecting abnormality without knowing normality: a two-stage approach for unsupervised video abnormal event detection. In: ACM MM, pp. 636\u2013644 (2018)","DOI":"10.1145\/3240508.3240615"},{"key":"43_CR47","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zou, Y., Zhang, Z.: Cluster attention contrast for video anomaly detection. In: ACM MM, pp. 2463\u20132471 (2020)","DOI":"10.1145\/3394171.3413529"},{"key":"43_CR48","doi-asserted-by":"crossref","unstructured":"Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection. In: BMVC, pp. 8.1\u20138.12 (2015)","DOI":"10.5244\/C.29.8"},{"key":"43_CR49","doi-asserted-by":"crossref","unstructured":"Ye, M., Peng, X., Gan, W., Wu, W., Qiao, Y.: AnoPCN: video anomaly detection via deep predictive coding network. In: ACM MM, pp. 1805\u20131813 (2019)","DOI":"10.1145\/3343031.3350899"},{"key":"43_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-58542-6_22","volume-title":"Computer Vision \u2013 ECCV 2020","author":"MZ Zaheer","year":"2020","unstructured":"Zaheer, M.Z., Mahmood, A., Astrid, M., Lee, S.-I.: CLAWS: clustering assisted weakly supervised learning with normalcy suppression for anomalous event detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12367, pp. 358\u2013376. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58542-6_22"},{"key":"43_CR51","doi-asserted-by":"crossref","unstructured":"Zaigham Zaheer, M., Lee, J.H., Astrid, M., Lee, S.I.: Old is gold: redefining the adversarially learned one-class classifier training paradigm. In: CVPR, pp. 14171\u201314181 (2020)","DOI":"10.1109\/CVPR42600.2020.01419"},{"key":"43_CR52","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Deng, B., Shen, C., Liu, Y., Lu, H., Hua, X.S.: Spatio-temporal autoencoder for video anomaly detection. In: ACM MM, pp. 1933\u20131941 (2017)","DOI":"10.1145\/3123266.3123451"},{"key":"43_CR53","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: CVPR, pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"43_CR54","unstructured":"Zhu, Y., Newsam, S.D.: Motion-aware feature for improved video anomaly detection. In: BMVC, p. 270 (2019)"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25072-9_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:51:36Z","timestamp":1710258696000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25072-9_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031250712","9783031250729"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25072-9_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops, 367 reviewed full papers have been selected for publication","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}