{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:21:31Z","timestamp":1747153291331,"version":"3.40.5"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031274398"},{"type":"electronic","value":"9783031274404"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-27440-4_36","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T20:39:41Z","timestamp":1685479181000},"page":"370-379","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Improving MIL Video Anomaly Detection Concatenating Deep Features of\u00a0Video Clips"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2535-3024","authenticated-orcid":false,"given":"Silas S. L.","family":"Pereira","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4983-1724","authenticated-orcid":false,"given":"Jos\u00e9 Everardo Bessa","family":"Maia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","unstructured":"Fawcett, T.: An introduction to roc analysis. Pattern Recognition Letters 27(8), 861 \u2013 874 (2006). https:\/\/doi.org\/10.1016\/j.patrec.2005.10.010, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S016786550500303X, rOC Analysis in Pattern Recognition","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Feng, J.C., Hong, F.T., Zheng, W.S.: Mist: multiple instance self-training framework for video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 14009\u201314018 (2021)","DOI":"10.1109\/CVPR46437.2021.01379"},{"key":"36_CR3","unstructured":"Kosman, E.: Pytorch implementation of real-world anomaly detection in surveillance videos. https:\/\/github.com\/ekosman\/AnomalyDetectionCVPR2018-Pytorch. Accessed 06 Oct 2022"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, J., Zhu, X., Wei, D., Huang, X., Song, L.: Learning task-specific representation for video anomaly detection with spatial-temporal attention. In: ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2190\u20132194. IEEE (2022)","DOI":"10.1109\/ICASSP43922.2022.9746822"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked RNN framework. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 341\u2013349 (2017)","DOI":"10.1109\/ICCV.2017.45"},{"key":"36_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078","volume":"106","author":"R Nayak","year":"2021","unstructured":"Nayak, R., Pati, U.C., Das, S.K.: A comprehensive review on deep learning-based methods for video anomaly detection. Image Vis. Comput. 106, 104078 (2021)","journal-title":"Image Vis. Comput."},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Patrikar, D.R., Parate, M.R.: Anomaly detection using edge computing in video surveillance system. Int. J. Multimedia Inf. Retrieval, pp. 1\u201326 (2022)","DOI":"10.1007\/s13735-022-00227-8"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Ren, J., Xia, F., Liu, Y., Lee, I.: Deep video anomaly detection: opportunities and challenges. In: 2021 International Conference on Data Mining Workshops (ICDMW), pp. 959\u2013966. IEEE (2021)","DOI":"10.1109\/ICDMW53433.2021.00125"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J.W., Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 4975\u20134986 (2021)","DOI":"10.1109\/ICCV48922.2021.00493"},{"issue":"11","key":"36_CR11","doi-asserted-by":"publisher","first-page":"16979","DOI":"10.1007\/s11042-020-09406-3","volume":"80","author":"W Ullah","year":"2021","unstructured":"Ullah, W., Ullah, A., Haq, I.U., Muhammad, K., Sajjad, M., Baik, S.W.: CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks. Multimedia Tools Appl. 80(11), 16979\u201316995 (2021)","journal-title":"Multimedia Tools Appl."},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Wan, B., Fang, Y., Xia, X., Mei, J.: Weakly supervised video anomaly detection via center-guided discriminative learning. In: 2020 IEEE International Conference on Multimedia and Expo (ICME), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/ICME46284.2020.9102722"},{"key":"36_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58577-8_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"P Wu","year":"2020","unstructured":"Wu, P., et al.: Not only look, but also listen: learning multimodal violence detection under weak supervision. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12375, pp. 322\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58577-8_20"},{"key":"36_CR14","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1109\/LSP.2021.3117737","volume":"28","author":"S Yu","year":"2021","unstructured":"Yu, S., Wang, C., Mao, Q., Li, Y., Wu, J.: Cross-epoch learning for weakly supervised anomaly detection in surveillance videos. IEEE Signal Process. Lett. 28, 2137\u20132141 (2021)","journal-title":"IEEE Signal Process. Lett."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, J., Qing, L., Miao, J.: Temporal convolutional network with complementary inner bag loss for weakly supervised anomaly detection. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 4030\u20134034. IEEE (2019)","DOI":"10.1109\/ICIP.2019.8803657"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li, T.H., Li, G.: Graph convolutional label noise cleaner: Train a plug-and-play action classifier for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 1237\u20131246 (2019)","DOI":"10.1109\/CVPR.2019.00133"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Systems Design and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-27440-4_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T20:46:38Z","timestamp":1685479598000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-27440-4_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031274398","9783031274404"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-27440-4_36","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems Design and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isda2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/isda22\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}