{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:08:02Z","timestamp":1743102482275,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031463075"},{"type":"electronic","value":"9783031463082"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-46308-2_26","type":"book-chapter","created":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T18:01:24Z","timestamp":1698602484000},"page":"311-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Virtual-Violence: A Brand-New Dataset for\u00a0Video Violence Recognition"],"prefix":"10.1007","author":[{"given":"Pengpeng","family":"Ou","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yimeng","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,30]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Acsintoae, A., et al.: UBnormal: new benchmark for supervised open-set video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 20143\u201320153 (2022)","DOI":"10.1109\/CVPR52688.2022.01951"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Ad\u00e3o Teixeira, M.V., Avila, S.: What should we pay attention to when classifying violent videos? In: Proceedings of the 16th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2021)","DOI":"10.1145\/3465481.3470059"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-23678-5_39","volume-title":"Computer Analysis of Images and Patterns","author":"E Bermejo Nievas","year":"2011","unstructured":"Bermejo Nievas, E., Deniz Suarez, O., Bueno Garc\u00eda, G., Sukthankar, R.: Violence detection in video using computer vision techniques. In: Real, P., Diaz-Pernil, D., Molina-Abril, H., Berciano, A., Kropatsch, W. (eds.) CAIP 2011, Part II. LNCS, vol. 6855, pp. 332\u2013339. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39"},{"issue":"16","key":"26_CR4","doi-asserted-by":"publisher","first-page":"8014","DOI":"10.3390\/app12168014","volume":"12","author":"Y Bi","year":"2022","unstructured":"Bi, Y., Li, D., Luo, Y.: Combining keyframes and image classification for violent behavior recognition. Appl. Sci. 12(16), 8014 (2022)","journal-title":"Appl. Sci."},{"issue":"1\u201312","key":"26_CR5","first-page":"4","volume":"4","author":"S Blunsden","year":"2010","unstructured":"Blunsden, S., Fisher, R.: The behave video dataset: ground truthed video for multi-person behavior classification. Ann. BMVA 4(1\u201312), 4 (2010)","journal-title":"Ann. BMVA"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, M., Cai, K., Li, M.: RWF-2000: an open large scale video database for violence detection. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 4183\u20134190. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412502"},{"key":"26_CR7","doi-asserted-by":"publisher","first-page":"7379","DOI":"10.1007\/s11042-014-1984-4","volume":"74","author":"CH Demarty","year":"2015","unstructured":"Demarty, C.H., Penet, C., Soleymani, M., Gravier, G.: VSD, a public dataset for the detection of violent scenes in movies: design, annotation, analysis and evaluation. Multimed. Tools Appl. 74, 7379\u20137404 (2015)","journal-title":"Multimed. Tools Appl."},{"key":"26_CR8","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1007\/978-981-10-3002-4_43","volume-title":"Pattern Recognition","author":"Z Dong","year":"2016","unstructured":"Dong, Z., Qin, J., Wang, Y.: Multi-stream deep networks for person to person violence detection in videos. In: Tan, T., Li, X., Chen, X., Zhou, J., Yang, J., Cheng, H. (eds.) CCPR 2016, Part I. CCIS, vol. 662, pp. 517\u2013531. Springer, Singapore (2016). https:\/\/doi.org\/10.1007\/978-981-10-3002-4_43"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"85958","DOI":"10.1109\/ACCESS.2020.2992617","volume":"8","author":"C Gu","year":"2020","unstructured":"Gu, C., Wu, X., Wang, S.: Violent video detection based on semantic correspondence. IEEE Access 8, 85958\u201385967 (2020)","journal-title":"IEEE Access"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Hassner, T., Itcher, Y., Kliper-Gross, O.: Violent flows: real-time detection of violent crowd behavior. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"26_CR11","unstructured":"Korbar, B., Tran, D., Torresani, L.: Cooperative learning of audio and video models from self-supervised synchronization. In: Advances in Neural Information Processing Systems, vol. 31 (2018)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Lin, J., Gan, C., Han, S.: TSM: temporal shift module for efficient video understanding. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 7083\u20137093 (2019)","DOI":"10.1109\/ICCV.2019.00718"},{"issue":"21","key":"26_CR13","doi-asserted-by":"publisher","first-page":"2654","DOI":"10.3390\/electronics10212654","volume":"10","author":"J Lou","year":"2021","unstructured":"Lou, J., Zuo, D., Zhang, Z., Liu, H.: Violence recognition based on auditory-visual fusion of autoencoder mapping. Electronics 10(21), 2654 (2021)","journal-title":"Electronics"},{"key":"26_CR14","unstructured":"Nievas, E.B., Suarez, O.D., Garcia, G.B., Sukthankar, R.: Hockey fight detection dataset. In: Computer Analysis of Images and Patterns, pp. 332\u2013339. Springer, Heidelberg (2011)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Peixoto, B., Lavi, B., Bestagini, P., Dias, Z., Rocha, A.: Multimodal violence detection in videos. In: ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2957\u20132961. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054018"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Perez, M., Kot, A.C., Rocha, A.: Detection of real-world fights in surveillance videos. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2662\u20132666. IEEE (2019)","DOI":"10.1109\/ICASSP.2019.8683676"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Rota, P., Conci, N., Sebe, N., Rehg, J.M.: Real-life violent social interaction detection. In: 2015 IEEE International Conference on Image Processing (ICIP), pp. 3456\u20133460. IEEE (2015)","DOI":"10.1109\/ICIP.2015.7351446"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-3-031-18913-5_48","volume-title":"Pattern Recognition and Computer Vision","author":"Y Shang","year":"2022","unstructured":"Shang, Y., Wu, X., Liu, R.: Multimodal violent video recognition based on mutual distillation. In: Yu, S., et al. (eds.) PRCV 2022, Part III. LNCS, vol. 13536, pp. 623\u2013637. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-18913-5_48"},{"key":"26_CR19","unstructured":"Shi, X., Chen, Z., Wang, H., Yeung, D.Y., Wong, W.K., Woo, W.C.: Convolutional LSTM network: A machine learning approach for precipitation nowcasting. In: Advances in Neural Information Processing Systems, vol. 28 (2015)"},{"key":"26_CR20","unstructured":"Simonyan, K., Zisserman, A.: Two-stream convolutional networks for action recognition in videos. In: Advances in Neural Information Processing Systems, vol. 27 (2014)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Sudhakaran, S., Lanz, O.: Learning to detect violent videos using convolutional long short-term memory. In: 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Tian, Y., Shi, J., Li, B., Duan, Z., Xu, C.: Audio-visual event localization in unconstrained videos. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 247\u2013263 (2018)","DOI":"10.1007\/978-3-030-01216-8_16"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3D convolutional networks. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 4489\u20134497 (2015)","DOI":"10.1109\/ICCV.2015.510"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Tran, D., Wang, H., Torresani, L., Ray, J., LeCun, Y., Paluri, M.: A closer look at spatiotemporal convolutions for action recognition. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6450\u20136459 (2018)","DOI":"10.1109\/CVPR.2018.00675"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-46484-8_2","volume-title":"Computer Vision \u2013 ECCV 2016","author":"L Wang","year":"2016","unstructured":"Wang, L., et al.: Temporal segment networks: towards good practices for deep action recognition. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9912, pp. 20\u201336. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_2"},{"key":"26_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58577-8_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"P Wu","year":"2020","unstructured":"Wu, P., et al.: Not only look, but also listen: learning multimodal violence detection under weak supervision. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020, Part XXX. LNCS, vol. 12375, pp. 322\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58577-8_20"}],"container-title":["Lecture Notes in Computer Science","Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-46308-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T18:04:57Z","timestamp":1698602697000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-46308-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031463075","9783031463082"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-46308-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"30 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icig2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icig2023.csig.org.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Conference Management Toolkit","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"409","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"166","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}