{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:24:00Z","timestamp":1743121440020,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031666933"},{"type":"electronic","value":"9783031666940"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-66694-0_20","type":"book-chapter","created":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T06:09:21Z","timestamp":1724306961000},"page":"328-339","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["End-to-End Video Surveillance Framework for\u00a0Anomaly Detection and\u00a0Person Re-identification"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1205-0738","authenticated-orcid":false,"given":"Rohan","family":"Nandan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4284-4684","authenticated-orcid":false,"given":"Rohan","family":"Lingeri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0682-9293","authenticated-orcid":false,"given":"Rohan","family":"Mehta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7490-0090","authenticated-orcid":false,"given":"Preet","family":"Kanwal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0133-9152","authenticated-orcid":false,"given":"Rishita","family":"Atluri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,21]]},"reference":[{"key":"20_CR1","unstructured":"Chen, C., Xu, X., Luo, Y., Jiang, Z., Luo, J., Wang, Y.: Real-world anomaly detection in surveillance videos. In: Proceedings of the 2015 International Conference on Pattern Recognition (ICPR), pp. 1776\u20131781. IEEE (2015)"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: MGFN: magnitude-contrastive glance-and-focus network for weakly-supervised video anomaly detection. arXiv preprint arXiv:2211.15098 (2022)","DOI":"10.1609\/aaai.v37i1.25112"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Wojke, N., Bewley, A., Paulus, D.: Simple online and realtime tracking with a deep association metric. arXiv preprint arXiv:1703.07402 (2017)","DOI":"10.1109\/ICIP.2017.8296962"},{"key":"20_CR4","unstructured":"Jocher, G., Chaurasia, A., Qiu, J.: Ultralytics YOLOv8, version 8.0.0 (2023). https:\/\/github.com\/ultralytics\/ultralytics"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385 (2015)","DOI":"10.1109\/CVPR.2016.90"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Parthasarathy, P., Vivekanandan, S.: Detection of suspicious human activity based on CNN-DBNN algorithm for video surveillance applications. In: 2019 Innovations in Power and Advanced Computing Technologies (i-PACT), Vellore, India, pp. 1\u20137 (2019). https:\/\/doi.org\/10.1109\/i-PACT44901.2019.8960085.","DOI":"10.1109\/i-PACT44901.2019.8960085."},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.engappai.2017.10.001","volume":"67","author":"KE Ko","year":"2018","unstructured":"Ko, K.E., Sim, K.B.: Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Eng. Appl. Artif. Intell. 67, 226\u2013234 (2018). https:\/\/doi.org\/10.1016\/j.engappai.2017.10.001","journal-title":"Eng. Appl. Artif. Intell."},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Kamthe, U.M., Patil, C.G.: Suspicious activity recognition in video surveillance system. In: 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), pp. 1\u20136 (2018). https:\/\/doi.org\/10.1109\/ICCUBEA.2018.8697408","DOI":"10.1109\/ICCUBEA.2018.8697408"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1016\/j.ijleo.2017.07.064","volume":"152","author":"T Wang","year":"2018","unstructured":"Wang, T., et al.: Abnormal event detection based on analysis of movement information of video sequence. Optik 152, 50\u201360 (2018). https:\/\/doi.org\/10.1016\/j.ijleo.2017.07.064","journal-title":"Optik"},{"key":"20_CR10","unstructured":"Divya, P.B., et al.: Inspection of suspicious human activity in the crowdsourced areas captured in surveillance cameras. In: International Research Journal of Engineering and Technology (IRJET) (2017)"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Amrutha, C.V., Jyotsna, C., Amudha, J.: Deep learning approach for suspicious activity detection from surveillance video. In: 2020 2nd International Conference on innovative Mechanisms for Industry Applications (ICIMIA), pp. 335\u2013339 (2020). https:\/\/doi.org\/10.1109\/ICIMIA48430.2020.9074920","DOI":"10.1109\/ICIMIA48430.2020.9074920"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Sunil, A., Sheth, M.H., Shreyas, E.: Usual and unusual human activity recognition in video using deep learning and artificial intelligence for security applications. In: 2021 Fourth International Conference on Electrical, Computer, and Communication Technologies (ICECCT). IEEE (2021)","DOI":"10.1109\/ICECCT52121.2021.9616791"},{"issue":"3","key":"20_CR13","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TPAMI.2019.2944377","volume":"43","author":"W Luo","year":"2021","unstructured":"Luo, W., et al.: Video Anomaly Detection with Sparse Coding Inspired Deep Neural Networks. IEEE Trans. Pattern Anal. Mach. Intell. 43(3), 1070\u20131084 (2021). https:\/\/doi.org\/10.1109\/TPAMI.2019.2944377","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"7","key":"20_CR14","doi-asserted-by":"publisher","first-page":"4487","DOI":"10.1109\/TITS.2020.3017505","volume":"22","author":"S Wan","year":"2021","unstructured":"Wan, S., Xu, X., Wang, T., Gu, Z.: An intelligent video analysis method for abnormal event detection in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 22(7), 4487\u20134495 (2021). https:\/\/doi.org\/10.1109\/TITS.2020.3017505","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-030-58577-8_20","volume-title":"Computer Vision \u2013 ECCV 2020","author":"P Wu","year":"2020","unstructured":"Wu, P., et al.: Not only look, but also listen: learning multimodal violence detection under weak supervision. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12375, pp. 322\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58577-8_20"},{"issue":"19","key":"20_CR16","doi-asserted-by":"publisher","first-page":"9197","DOI":"10.3390\/app11199197","volume":"11","author":"M Tahir","year":"2021","unstructured":"Tahir, M., Anwar, S.: Transformers in Pedestrian Image Retrieval and Person Re-Identification in a Multi-Camera Surveillance System. Appl. Sci. 11(19), 9197 (2021). https:\/\/doi.org\/10.3390\/app11199197","journal-title":"Appl. Sci."},{"issue":"6","key":"20_CR17","doi-asserted-by":"publisher","first-page":"1412","DOI":"10.1109\/TMM.2018.2877886","volume":"21","author":"L Wu","year":"2019","unstructured":"Wu, L., Wang, Y., Gao, J., Li, X.: Where-and-when to look: deep Siamese attention networks for video-based person re-identification. IEEE Trans. Multimedia 21(6), 1412\u20131424 (2019). https:\/\/doi.org\/10.1109\/TMM.2018.2877886","journal-title":"IEEE Trans. Multimedia"},{"key":"20_CR18","first-page":"100422","volume":"24","author":"S Sivachandiran","year":"2022","unstructured":"Sivachandiran, S., Jagan Mohan, K., Mohammed Nazer, G.: Deep Learning driven automated person detection and tracking model on surveillance videos. Meas.: Sens. 24, 100422 (2022). ISSN 2665-9174","journal-title":"Meas.: Sens."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Tan, M., Pang, R., Le, Q.V.: EfficientDet: scalable and efficient object detection. arXiv preprint arXiv:1911.09070 (2020)","DOI":"10.1109\/CVPR42600.2020.01079"},{"issue":"1","key":"20_CR20","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1115\/1.3662552","volume":"82","author":"RE Kalman","year":"1960","unstructured":"Kalman, R.E.: A new approach to linear filtering and prediction problems. J. Basic Eng. 82(1), 35\u201345 (1960). https:\/\/doi.org\/10.1115\/1.3662552","journal-title":"J. Basic Eng."},{"key":"20_CR21","unstructured":"Sharma, C., Kapil, S.R., Chapman, D.: Person re-identification with a locally aware transformer. arXiv preprint arXiv:2106.03720 (2021)"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Bewley, A., Ge, Z., Ott, L., Ramos, F., Upcroft, B.: Simple online and realtime tracking. In: 2016 IEEE International Conference on Image Processing (ICIP). IEEE (2016). https:\/\/doi.org\/10.1109\/icip.2016.7533003.","DOI":"10.1109\/icip.2016.7533003."},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo Vadis, action recognition? A new model and the kinetics dataset. arXiv preprint arXiv:1705.07750 (2018)","DOI":"10.1109\/CVPR.2017.502"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., Wojna, Z.: Rethinking the inception architecture for computer vision. *CoRR* abs\/1512.00567 (2015). http:\/\/arxiv.org\/abs\/1512.00567","DOI":"10.1109\/CVPR.2016.308"},{"key":"20_CR25","unstructured":"Zhou, K., Xiang, T.: Torchreid: a library for deep learning person re-identification in pytorch. arXiv preprint arXiv:1910.10093 (2019)"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, Y., Cavallaro, A., Xiang, T.: Omni-scale feature learning for person re-identification. In ICCV (2019)","DOI":"10.1109\/ICCV.2019.00380"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Zhou, K., Yang, Y., Cavallaro, A., Xiang, T.: Learning generalisable omni-scale representations for person re-identification. IEEE Trans. Pattern Anal. Mach. Intell. (TPAMI) (2021)","DOI":"10.1109\/TPAMI.2021.3069237"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Oh, S., et al.: A large-scale benchmark dataset for event recognition in surveillance video. In: CVPR 2011, pp. 3153\u20133160. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995586"}],"container-title":["Communications in Computer and Information Science","Deep Learning Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66694-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T06:13:28Z","timestamp":1724307208000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66694-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031666933","9783031666940"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66694-0_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"21 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DeLTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Deep Learning Theory and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dijon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"delta2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/delta.scitevents.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}