{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T01:10:02Z","timestamp":1748999402243,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319422930"},{"type":"electronic","value":"9783319422947"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42294-7_21","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T15:00:47Z","timestamp":1468249247000},"page":"245-256","source":"Crossref","is-referenced-by-count":2,"title":["Detection of Abnormal Event in Complex Situations Using Strong Classifier Based on BP Adaboost"],"prefix":"10.1007","author":[{"given":"Yuqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meina","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Aichun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ce","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hichem","family":"Snoussi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Duque, D., Santos, H., Cortez, P.: Prediction of abnormal behaviors for intelligent video surveillance systems. In: Proceedings of IEEE Symposium on Computational Intelligence and Data Mining (CIDM), pp. 362\u2013367 (2007)","DOI":"10.1109\/CIDM.2007.368897"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Jiang, Q., Li, G., Yu. J., Li, X.: A model based method of pedestrian abnormal behavior detection in traffic scene. In: Proceedings of IEEE First International Smart Cities Conference (ISC2), pp. 1\u20136 (2015)","DOI":"10.1109\/ISC2.2015.7366164"},{"key":"21_CR3","unstructured":"David, S., Derald, W., Stanley, S., Diane, S.: Understanding Abnormal Behavior. Cengage Learning (2012)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liang, G., Lee, K., Xu, Y.: Abnormal behavior detection by multi-SVM-based Bayesian network. In: Proceedings of IEEE International Conference on Information Acquisition (ICIA), pp. 298\u2013303 (2007)","DOI":"10.1109\/ICIA.2007.4295746"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Palaniappan, A., Bhargavi, R., Vaidehi, V.: Abnormal human activity recognition using SVM based approach. In: Proceedings of IEEE International Conference on Recent Trends in Information Technology (ICRTIT), pp. 97\u2013102 (2012)","DOI":"10.1109\/ICRTIT.2012.6206829"},{"issue":"1","key":"21_CR6","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.eswa.2011.06.013","volume":"39","author":"S Sindhu","year":"2012","unstructured":"Sindhu, S., Geetha, S., Kannan, A.: Decision tree based light weight intrusion detection using a wrapper approach. Expert Syst. Appl. 39(1), 129\u2013141 (2012)","journal-title":"Expert Syst. Appl."},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Amor, N., Benferhat, S., Elouedi, Z.: Naive Bayes vs decision trees in intrusion detection systems. In: Proceedings of ACM Symposium on Applied Computing, pp. 420\u2013424 (2004)","DOI":"10.1145\/967900.967989"},{"issue":"3","key":"21_CR8","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSMCB.2005.860136","volume":"36","author":"S Han","year":"2005","unstructured":"Han, S., Cho, S.: Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Trans. Syst. Man Cybern. B Cybern. 36(3), 559\u2013570 (2005)","journal-title":"IEEE Trans. Syst. Man Cybern. B Cybern."},{"issue":"1\u20132","key":"21_CR9","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1159\/000443372","volume":"75","author":"Y Li","year":"2016","unstructured":"Li, Y., Liu, L., Wang, E., Zhang, H., Dou, S., Tong, L., Cheng, J., Chen, C., Shi, D.: Abnormal neural network of primary insomnia: evidence from spatial working memory task fMRI. Eur. Neurol. 75(1\u20132), 48\u201357 (2016)","journal-title":"Eur. Neurol."},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Wu, D., Wang, L., Wang, J., Liu, L.: Solitary oldies abnormal action recognition based on MEI. In: Proceedings of IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), pp. 1\u20134 (2015)","DOI":"10.1109\/ICSPCC.2015.7338826"},{"key":"21_CR11","unstructured":"Vishwakarma, D., Kapoor, R., Maheshwari, R., Kapoor, V., Raman, S.: Recognition of abnormal human activity using the changes in orientation of silhouette in key frames. In: Proceedings of 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 336\u2013341 (2015)"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Liang, X., Xu, H., Liu, Y.: Recognition of living abnormal cells based on an optical microscope. In: Proceedings of IEEE International Conference on Manipulation, Manufacturing and Measurement on the Nanoscale (3M-NANO), pp. 18\u201321 (2012)","DOI":"10.1109\/3M-NANO.2012.6473003"},{"issue":"6","key":"21_CR13","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1176\/appi.ajp.162.6.1067","volume":"162","author":"K Rubia","year":"2005","unstructured":"Rubia, K., Smith, A., Brammer, M.J., Toone, B., Taylor, E.: Abnormal brain activation during inhibition and error detection in medication-naive adolescents with ADHD. Am. J. Psychiatry 162(6), 1067\u20131075 (2005)","journal-title":"Am. J. Psychiatry"},{"issue":"2","key":"21_CR14","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1162\/089892901564289","volume":"13","author":"R Adolphs","year":"2001","unstructured":"Adolphs, R., Sears, L., Piven, J.: Abnormal processing of social information from faces in autism. J. Cogn. Neurosci. 13(2), 232\u2013240 (2001)","journal-title":"J. Cogn. Neurosci."},{"key":"21_CR15","unstructured":"Khan, Z., Sohn, W.: Feature extraction and dimensions reduction using R transform and principal component analysis for abnormal human activity recognition. In: Proceedings of IEEE International Conference on Advanced Information Management and Service (IMS), pp. 253\u2013258 (2010)"},{"key":"21_CR16","unstructured":"Detection of Events\u2014Detection of Unusual Crowd Activity. http:\/\/mha.cs.umn.edu\/Movies\/Crowd-Activity-All.avi"},{"key":"21_CR17","first-page":"026","volume":"3","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Chen, Y.-D.: The applied research of motive object tracking based on BP-Adaboost algorithm. J. Hebei Univ. Eng. (Natural Science Edition) 3, 026 (2012)","journal-title":"J. Hebei Univ. Eng. (Natural Science Edition)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Horn, B.K., Schunck, B.G.: Determining optical flow. In: Technical Symposium East, pp. 319\u2013331. International Society for Optics and Photonics (1981)","DOI":"10.1016\/0004-3702(81)90024-2"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Lertniphonphan, K., Aramvith, S., Chalidabhongse, T.: Human action recognition using direction histograms of optical flow. In: Proceedings of IEEE International Symposium on Communications and Information Technologies (ISCIT), pp. 574\u2013579 (2011)","DOI":"10.1109\/ISCIT.2011.6089701"},{"issue":"6","key":"21_CR20","doi-asserted-by":"crossref","first-page":"988","DOI":"10.1109\/TIFS.2014.2315971","volume":"9","author":"T Wang","year":"2014","unstructured":"Wang, T., Snoussi, H.: Detection of abnormal visual events via global optical flow orientation histogram. IEEE Trans. Inf. Forensics Secur. 9(6), 988\u2013998 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Liu, X., Wang, J., Yin, M., Edwards, B., Xu, P.: Supervised learning of sparse context reconstruction coefficients for data representation and classification. Neural Comput. Appl. 1\u20139 (2015)","DOI":"10.1007\/s00521-015-2042-5"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhou, Y., Duan, K., Wang, J., Bensmail, H.: Supervised cross-modal factor analysis for multiple modal data classification. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, pp. 1882\u20131888 (2015)","DOI":"10.1109\/SMC.2015.329"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Wang, J., Wang, H., Zhou, Y., McDonald, N.: Multiple kernel multivariate performance learning using cutting plane algorithm. arXiv preprint arXiv:1508.06264 (2015)","DOI":"10.1109\/SMC.2015.327"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 935\u2013942 (2009)","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3449\u20133456 (2011)","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Shi, Y., Gao, Y., Wang, R.: Real-time abnormal event detection in complicated scenes. In: Proceedings of IEEE International Conference on Pattern Recognition (ICPR), pp. 3653\u20133656 (2010)","DOI":"10.1109\/ICPR.2010.891"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42294-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:34:58Z","timestamp":1748997298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42294-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319422930","9783319422947"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42294-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}