{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T17:55:15Z","timestamp":1776275715246,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031622687","type":"print"},{"value":"9783031622694","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62269-4_2","type":"book-chapter","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T14:02:22Z","timestamp":1718892142000},"page":"16-35","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["SSIVD-Net: A Novel Salient Super Image Classification and\u00a0Detection Technique for\u00a0Weaponized Violence"],"prefix":"10.1007","author":[{"given":"Toluwani","family":"Aremu","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhiyuan","sequence":"additional","affiliation":[]},{"given":"Reem","family":"Alameeri","sequence":"additional","affiliation":[]},{"given":"Mustaqeem","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Abdulmotaleb El","family":"Saddik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,21]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"34366","DOI":"10.1109\/ACCESS.2021.3059170","volume":"9","author":"MT Bhatti","year":"2021","unstructured":"Bhatti, M.T., Khan, M.G., Aslam, M., Fiaz, M.J.: Weapon detection in real-time CCTV videos using deep learning. IEEE Access 9, 34366\u201334382 (2021)","journal-title":"IEEE Access"},{"key":"2_CR2","unstructured":"Bochkovskiy, A., Wang, C.-Y., Liao, H.-Y.: YOLOv4: optimal speed and accuracy of object detection (2020)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo Vadis, action recognition? A new model and the kinetics dataset (2018)","DOI":"10.1109\/CVPR.2017.502"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cheng, M., Cai, K., Li, M.: RWF-2000: an open large scale video database for violence detection. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 4183\u20134190 (2021)","DOI":"10.1109\/ICPR48806.2021.9412502"},{"key":"2_CR5","unstructured":"Fan, Q., Chen, C.-F., Panda, R.: An image classifier can suffice for video understanding, June 2021. https:\/\/arxiv.org\/"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast R-CNN (2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accurate object detection and semantic segmentation (2013). https:\/\/arxiv.org\/. Accessed 17 Sep 2022","DOI":"10.1109\/CVPR.2014.81"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask R-CNN. arXiv preprint arXiv:1703.06870 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Islam, Z., Rukonuzzaman, M., Ahmed, R., Kabir, M.H., Farazi, M.: Efficient two-stream network for violence detection using separable convolutional LSTM. In: 2021 International Joint Conference on Neural Networks (IJCNN), July 2021. IEEE (2021)","DOI":"10.1109\/IJCNN52387.2021.9534280"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Jain, H., Vikram, A., Mohana, Kashyap, A., Jain, A.: Weapon detection using artificial intelligence and deep learning for security applications. In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (2020)","DOI":"10.1109\/ICESC48915.2020.9155832"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60, 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Mumtaz, A., Sargano, A.B., Habib, Z.: Violence detection in surveillance videos with deep network using transfer learning. In: 2018 2nd European Conference on Electrical Engineering and Computer Science (EECS), pp. 558\u2013563 (2018)","DOI":"10.1109\/EECS.2018.00109"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-030-34885-4_13","volume-title":"Artificial Intelligence XXXVI","author":"MS Nadeem","year":"2019","unstructured":"Nadeem, M.S., Franqueira, V.N.L., Kurugollu, F., Zhai, X.: WVD: a new synthetic dataset for video-based violence detection. In: Bramer, M., Petridis, M. (eds.) SGAI 2019. LNCS (LNAI), vol. 11927, pp. 158\u2013164. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34885-4_13"},{"key":"2_CR15","unstructured":"Nievas, E.R., Suarez, O.D., Garcia, G.B., Sukthankar, R.: Hockey fight detection dataset. In: Computer Analysis of Images and Patterns, pp. 332\u2013339. Springer, Heidelberg (2011)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Perez, M., Kot, A.C., Rocha, A.: Detection of real-world fights in surveillance videos. In: 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP 2019, pp. 2662\u20132666 (2019)","DOI":"10.1109\/ICASSP.2019.8683676"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"105590","DOI":"10.1016\/j.knosys.2020.105590","volume":"194","author":"F P\u00e9rez-Hern\u00e1ndez","year":"2020","unstructured":"P\u00e9rez-Hern\u00e1ndez, F., Tabik, S., Lamas, A., Olmos, R., Fujita, H., Herrera, F.: Object detection binary classifiers methodology based on deep learning to identify small objects handled similarly: application in video surveillance. Knowl. Based Syst. 194, 105590 (2020)","journal-title":"Knowl. Based Syst."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection (2015). https:\/\/arxiv.org\/. Accessed 17 Sep 2022","DOI":"10.1109\/CVPR.2016.91"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: YOLO9000: better, faster, stronger (2016). https:\/\/arxiv.org\/","DOI":"10.1109\/CVPR.2017.690"},{"key":"2_CR20","unstructured":"Redmon, J., Farhadi, A.: YOLOv3: an incremental improvement. arXiv preprint arXiv:1804.02767 (2018)"},{"key":"2_CR21","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: Towards real-time object detection with region proposal networks (2015). https:\/\/arxiv.org\/"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Sak, H., Senior, A.W., Beaufays, F.: Long short-term memory based recurrent neural network architectures for large vocabulary speech recognition. CoRR, abs\/1402.1128 (2014)","DOI":"10.21437\/Interspeech.2014-80"},{"key":"2_CR23","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-981-15-0978-0_40","volume-title":"Advances in Data Science and Management","author":"M Sharma","year":"2020","unstructured":"Sharma, M., Baghel, R.: Video surveillance for violence detection using deep learning. In: Borah, S., Emilia Balas, V., Polkowski, Z. (eds.) Advances in Data Science and Management. LNDECT, vol. 37, pp. 411\u2013420. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0978-0_40"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Soliman, M.M., Kamal, M.H., El-Massih\u00a0Nashed, M.A., Mostafa, Y.M., Chawky, B.S., Khattab, D.: Violence recognition from videos using deep learning techniques. In: 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS), pp. 80\u201385 (2019)","DOI":"10.1109\/ICICIS46948.2019.9014714"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Sudhakaran, S., Lanz, O.: Learning to detect violent videos using convolutional long short-term memory (2017)","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3D convolutional networks (2014). https:\/\/arxiv.org\/","DOI":"10.1109\/ICCV.2015.510"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Verma, G.K., Dhillon, A.: A handheld gun detection using faster R-CNN deep learning. In: Proceedings of the 7th International Conference on Computer and Communication Technology, ICCCT-2017 (2017)","DOI":"10.1145\/3154979.3154988"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Wang, C., Yang, J., Xie, L., Yuan, J.: Kervolutional neural networks. In: 2019 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, June 2019","DOI":"10.1109\/CVPR.2019.00012"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Wang, C.-Y., Bochkovskiy, A., Liao, H.-Y.: YOLOv7: trainable bag-of-freebies sets new state-of-the-art for real-time object detectors (2022)","DOI":"10.1109\/CVPR52729.2023.00721"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62269-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T14:11:16Z","timestamp":1718892676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62269-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031622687","9783031622694"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62269-4_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Science and Information Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/Computing","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}