{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T04:51:02Z","timestamp":1749185462080,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031250712"},{"type":"electronic","value":"9783031250729"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25072-9_45","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T08:40:04Z","timestamp":1676623204000},"page":"676-688","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Detection of\u00a0Fights in\u00a0Videos: A Comparison Study of\u00a0Anomaly Detection and\u00a0Action Recognition"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2344-0773","authenticated-orcid":false,"given":"Weijun","family":"Tan","sequence":"first","affiliation":[]},{"given":"Jingfeng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"45_CR1","doi-asserted-by":"crossref","unstructured":"Akt\u0131, S., Tataro\u011flu, G., Ekenel, H.: Vision-based fight detection from surveillance cameras. In: IEEE\/EURASIP 9th International Conference on Image Processing Theory, Tools and Applications (2019)","DOI":"10.1109\/IPTA.2019.8936070"},{"key":"45_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-23678-5_39","volume-title":"Computer Analysis of Images and Patterns","author":"E Bermejo Nievas","year":"2011","unstructured":"Bermejo Nievas, E., Deniz Suarez, O., Bueno Garc\u00eda, G., Sukthankar, R.: Violence detection in video using computer vision techniques. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011. LNCS, vol. 6855, pp. 332\u2013339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zissermana, A.: Quo vadis, action recognition? A new model and the kinetics dataset. In: CVPR (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Degardin, B., Proen\u00e7a, H.: Human activity analysis: iterative weak\/self-supervised learning frameworks for detecting abnormal events. In: 2020 IEEE International Joint Conference on Biometrics (IJCB), pp. 1\u20137. IEEE (2019)","DOI":"10.1109\/IJCB48548.2020.9304905"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR 2009 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Feng, J.C., Hong, F.T., Zheng, W.S.: MIST: multiple instance self-training framework for video anomaly detection. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"45_CR7","doi-asserted-by":"crossref","unstructured":"Ghadiyaram, D., Feiszli, M., Tran, D., Yan, X., Wang, H., Mahajan, D.: Large-scale weakly-supervised pre-training for video action recognition. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.01232"},{"key":"45_CR8","doi-asserted-by":"crossref","unstructured":"Gowda, S.N., Rohrbach, M., Sevilla-Lara, L.: Towards understanding action recognition smart frame selection for action recognition. In: AAAI (2021)","DOI":"10.1609\/aaai.v35i2.16235"},{"key":"45_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"731","DOI":"10.1007\/978-3-030-68238-5_48","volume-title":"Computer Vision \u2013 ECCV 2020 Workshops","author":"ME Kalfaoglu","year":"2020","unstructured":"Kalfaoglu, M.E., Kalkan, S., Alatan, A.A.: Late temporal modeling in 3D CNN architectures with BERT for action recognition. In: Bartoli, A., Fusiello, A. (eds.) ECCV 2020. LNCS, vol. 12539, pp. 731\u2013747. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-68238-5_48"},{"key":"45_CR10","unstructured":"Kay, W., et al.: The kinetics human action video dataset. arXiv preprint 1705.06950 (2017)"},{"key":"45_CR11","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1007\/s11263-022-01594-9","volume":"130","author":"Y Kong","year":"2021","unstructured":"Kong, Y., Fu, Y.: Human action recognition and prediction: a survey. Int. J. Comput. Vis. 130, 1366\u20131401 (2021)","journal-title":"Int. J. Comput. Vis."},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Kuehne, H., Jhuang, H., Garrote, E., Poggio, T., Serre, T.: HMDB: a large video database for human motion recognition. In: International Conference on Computer Vision (ICCV) (2011)","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"45_CR13","doi-asserted-by":"publisher","unstructured":"Landi, F., Snoek, C.G.M., Gucchiara, R.: Anomaly locality in video surveillance. arXiv preprint 1901(10364), p. 10 (2019). https:\/\/doi.org\/10.48550\/ARXIV.1901.10364, https:\/\/arxiv.org\/abs\/1901.10364","DOI":"10.48550\/ARXIV.1901.10364"},{"key":"45_CR14","doi-asserted-by":"crossref","unstructured":"Li, S., Liu, F., Jiao, L.: Self-training multi-sequence learning with transformer for weakly supervised video anomaly detection. In: AAAI (2022)","DOI":"10.1609\/aaai.v36i2.20028"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Liu, K., Ma, H.: Exploring background-bias for anomaly detection in surveillance videos. In: ACM MM (2019)","DOI":"10.1145\/3343031.3350998"},{"key":"45_CR16","doi-asserted-by":"crossref","unstructured":"Liu, X., Pintea, S.L., Nejadasl, F.K., Booij, O.: No frame left behind: Full video action recognition. In: CVPR (2021)","DOI":"10.1109\/CVPR46437.2021.01465"},{"key":"45_CR17","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1109\/TIP.2021.3072863","volume":"30","author":"H Lv","year":"2021","unstructured":"Lv, H., Zhou, C., Cui, Z., Xu, C., Li, Y., Yang, J.: Localizing anomalies from weakly-labeled videos. IEEE Trans. Image Process. (TIP) 30, 4505\u20134515 (2021)","journal-title":"IEEE Trans. Image Process. (TIP)"},{"issue":"2","key":"45_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., Hengel, A.V.D.: Deep learning for anomaly detection: a review. ACM Comput. Surv. 54(2), 1\u201338 (2021)","journal-title":"ACM Comput. Surv."},{"key":"45_CR19","doi-asserted-by":"crossref","unstructured":"Perez, M., Kot, A.C., Rocha, A.: Detection of real-world fights in surveillance videos. In: IEEE ICASSP (2019)","DOI":"10.1109\/ICASSP.2019.8683676"},{"key":"45_CR20","unstructured":"Soomro, K., Zamir, A.R., Shah, M.: UCF101: a dataset of 101 human action classes from videos in the wild. CRCV-TR-12-01 (2012)"},{"key":"45_CR21","doi-asserted-by":"publisher","unstructured":"Sudhakaran, S., Lanz, S.: Learning to detect violent videos using convolutional long short-term memory. In: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136 (2017). https:\/\/doi.org\/10.1109\/AVSS.2017.8078468","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"45_CR22","doi-asserted-by":"crossref","unstructured":"Sultani1, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: CVPR (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"45_CR23","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. arXiv preprint arXiv:2101.10030 (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"45_CR24","doi-asserted-by":"publisher","unstructured":"Tran, D., Wang, H., Torresani, L., Ray, J., LeCun, Y., Paluri, M.: A closer look at spatiotemporal convolutions for action recognition. In: 2018 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 6450\u20136459 (2018). https:\/\/doi.org\/10.1109\/CVPR.2018.00675","DOI":"10.1109\/CVPR.2018.00675"},{"key":"45_CR25","doi-asserted-by":"crossref","unstructured":"Wu, J., et al.: Weakly-supervised spatio-temporal anomaly detection in surveillance video. In: IJCAI (2021)","DOI":"10.24963\/ijcai.2021\/162"},{"key":"45_CR26","doi-asserted-by":"publisher","first-page":"3513","DOI":"10.1109\/TIP.2021.3062192","volume":"30","author":"P Wu","year":"2021","unstructured":"Wu, P., Liu, J.: Learning causal temporal relation and feature discrimination for anomaly detection. IEEE Trans. Image Process. 30, 3513\u20133527 (2021). https:\/\/doi.org\/10.1109\/TIP.2021.3062192","journal-title":"IEEE Trans. Image Process."},{"key":"45_CR27","doi-asserted-by":"publisher","unstructured":"Xu, Q., See, J., Lin, W.: Localization guided fight action detection in surveillance videos. In: 2019 IEEE International Conference on Multimedia and Expo (ICME), pp. 568\u2013573 (2019). https:\/\/doi.org\/10.1109\/ICME.2019.00104","DOI":"10.1109\/ICME.2019.00104"},{"key":"45_CR28","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: train a plug-and-play action classifier for anomaly detection. In: CVPR (2019)","DOI":"10.1109\/CVPR.2019.00133"},{"key":"45_CR29","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/844\/1\/012044","volume":"844","author":"P Zhou","year":"2017","unstructured":"Zhou, P., Ding, Q., Luo, H., Hou, X.: Violent interaction detection in video based on deep learning. J. Phys. Conf. Ser. 844, 012044 (2017)","journal-title":"J. Phys. Conf. Ser."}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2022 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25072-9_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T15:49:44Z","timestamp":1710258584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25072-9_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031250712","9783031250729"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25072-9_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tel Aviv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eccv2022.ecva.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5804","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1645","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.21","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.91","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"From the workshops, 367 reviewed full papers have been selected for publication","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}