{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:43Z","timestamp":1740098983347,"version":"3.37.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319687100"},{"type":"electronic","value":"9783319687117"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68711-7_20","type":"book-chapter","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T08:23:40Z","timestamp":1507105420000},"page":"377-396","source":"Crossref","is-referenced-by-count":2,"title":["VIOLA: Video Labeling Application for Security Domains"],"prefix":"10.1007","author":[{"given":"Elizabeth","family":"Bondi","sequence":"first","affiliation":[]},{"given":"Fei","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Debarun","family":"Kar","sequence":"additional","affiliation":[]},{"given":"Venil","family":"Noronha","sequence":"additional","affiliation":[]},{"given":"Donnabell","family":"Dmello","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]},{"given":"Arvind","family":"Iyer","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Hannaford","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in network intrusion detection. In: Proceedings of 42nd IEEE Conference on Decision and Control, vol. 3, pp. 2595\u20132600. IEEE (2003)","DOI":"10.1109\/CDC.2003.1273013"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Badrinarayanan, V., Galasso, F., Cipolla, R.: Label propagation in video sequences. In: CVPR, pp. 3265\u20133272. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5540054"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Bae, S.H., Yoon, K.J.: Robust online multi-object tracking based on tracklet confidence and online discriminative appearance learning. In: CVPR (2014)","DOI":"10.1109\/CVPR.2014.159"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Basilico, N., Nittis, G.D., Gatti, N.: A security game combining patrolling and alarm-triggered responses under spatial and detection uncertainties. In: AAAI, pp. 397\u2013403 (2016)","DOI":"10.1609\/aaai.v30i1.10022"},{"issue":"2","key":"20_CR5","doi-asserted-by":"crossref","first-page":"1822","DOI":"10.1016\/j.eswa.2011.08.068","volume":"39","author":"CA Catania","year":"2012","unstructured":"Catania, C.A., Bromberg, F., Garino, C.G.: An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection. Expert Syst. Appl. 39(2), 1822\u20131829 (2012)","journal-title":"Expert Syst. Appl."},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: Imagenet: a large-scale hierarchical image database. In: CVPR, pp. 248\u2013255. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"issue":"2","key":"20_CR7","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11263-009-0275-4","volume":"88","author":"M Everingham","year":"2010","unstructured":"Everingham, M., Van Gool, L., Williams, C.K.I., Winn, J., Zisserman, A.: The pascal visual object classes (VOC) challenge. Int. J. Comput. Vision 88(2), 303\u2013338 (2010)","journal-title":"Int. J. Comput. Vision"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Fang, F., Nguyen, T.H., Pickles, R., Lam, W.Y., Clements, G.R., An, B., Singh, A., Tambe, M., Lemieux, A.: Deploying PAWS: field optimization of the protection assistant for wildlife security. In: AAAI, pp. 3966\u20133973 (2016)","DOI":"10.1609\/aaai.v30i2.19070"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Haskell, W., Kar, D., Fang, F., Tambe, M., Cheung, S., Denicola, E.: Robust protection of fisheries with COmPASS. In: IAAI, pp. 2978\u20132983 (2014)","DOI":"10.1609\/aaai.v28i2.19018"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"22574","DOI":"10.1038\/srep22574","volume":"6","author":"JC Hodgson","year":"2016","unstructured":"Hodgson, J.C., et al.: Precision wildlife monitoring using unmanned aerial vehicles. Sci. Rep. 6, 22574 (2016). doi: 10.1038\/srep22574","journal-title":"Sci. Rep."},{"key":"20_CR11","unstructured":"Johnson, M.P., Fang, F., Tambe, M.: Patrol strategies to maximize pristine forest area. In: AAAI (2012)"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Kar, D., Fang, F., Fave, F.D., Sintov, N., Tambe, M.: \u201cA Game of Thrones\u201d: when human behavior models compete in repeated Stackelberg security games. In: AAMAS (2015)","DOI":"10.1016\/j.artint.2016.08.002"},{"key":"20_CR13","unstructured":"Kar, D., Ford, B., Gholami, S., Fang, F., Plumptre, A., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Nsubaga, M., Mabonga, J.: Cloudy with a chance of poaching: adversary behavior modeling and forecasting with real-world poaching data. In: AAMAS, pp. 159\u2013167 (2017)"},{"key":"20_CR14","unstructured":"Kristan, M., Matas, J., Leonardis, A., Felsberg, M., Cehovin, L., Fern\u00e1ndez, G., Vojir, T., Hager, G., Nebehay, G., Pflugfelder, R.: The visual object tracking vot2015 challenge results. In: ICCV Workshops, pp. 1\u201323 (2015)"},{"key":"20_CR15","unstructured":"Lucas, B.D., Kanade, T., et al.: An iterative image registration technique with an application to stereo vision (1981)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Ma, C., Yang, X., Zhang, C., Yang, M.H.: Long-term correlation tracking. In: CVPR, pp. 5388\u20135396 (2015)","DOI":"10.1109\/CVPR.2015.7299177"},{"key":"20_CR17","unstructured":"Milan, A., Leal-Taix\u00e9, L., Reid, I., Roth, S., Schindler, K.: Mot16: a benchmark for multi-object tracking. arXiv preprint arXiv:1603.00831 (2016)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen, P., Kim, J., Miller, R.C.: Generating annotations for how-to videos using crowdsourcing. In: CHI 2013 Extended Abstracts on Human Factors in Computing Systems, pp. 835\u2013840 (2013)","DOI":"10.1145\/2468356.2468506"},{"key":"20_CR19","unstructured":"Nguyen, T.H., Sinha, A., Gholami, S., Plumptre, A., Joppa, L., Tambe, M., Driciru, M., Wanyama, F., Rwetsiba, A., Critchlow, R., et al.: Capture: a new predictive anti-poaching tool for wildlife protection. In: AAMAS, pp. 767\u2013775 (2016)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Yang, R., Azaria, A., Kraus, S., Tambe, M.: Analyzing the effectiveness of adversary modeling in security games. In: AAAI, pp. 718\u2013724 (2013)","DOI":"10.1609\/aaai.v27i1.8599"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Nguyen-Dinh, L.V., Waldburger, C., Roggen, D., Tr\u00f6ster, G.: Tagging human activities in video by crowdsourcing. In: ICMR, pp. 263\u2013270 (2013)","DOI":"10.1145\/2461466.2461508"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Pai, C.H., Lin, Y.P., Medioni, G.G., Hamza, R.R.: Moving object detection on a runway prior to landing using an onboard infrared camera. In: CVPR, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/CVPR.2007.383447"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Park, S., Mohammadi, G., Artstein, R., Morency, L.P.: Crowdsourcing micro-level multimedia annotations: the challenges of evaluation and interface. In: CrowdMM, pp. 29\u201334 (2012)","DOI":"10.1145\/2390803.2390816"},{"key":"20_CR24","unstructured":"Pita, J., Jain, M., Western, C., Portway, C., Tambe, M., Ordonez, F., Kraus, S., Paruchuri, P.: Deployed ARMOR protection: the application of a game theroetic model for security at the Los Angeles International Airport. In: AAMAS (2008)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: CVPR, pp. 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"20_CR26","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: NIPS, pp. 91\u201399 (2015)"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Sheng, V.S., Provost, F., Ipeirotis, P.G.: Get another label? Improving data quality and data mining using multiple, noisy labelers. In: KDD, pp. 614\u2013622 (2008)","DOI":"10.1145\/1401890.1401965"},{"key":"20_CR28","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511973031","volume-title":"Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned","author":"M Tambe","year":"2011","unstructured":"Tambe, M.: Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, Cambridge (2011)"},{"key":"20_CR29","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/s11263-012-0564-1","volume":"101","author":"C Vondrick","year":"2013","unstructured":"Vondrick, C., Patterson, D., Ramanan, D.: Efficiently scaling up crowdsourced video annotation. Int. J. Comput. Vis. 101, 184\u2013204 (2013)","journal-title":"Int. J. Comput. Vis."},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Yan, R., Yang, J., Hauptmann, A.: Automatically labeling video data using multi-class active learning. In: ICCV (2003)","DOI":"10.1109\/ICCV.2003.1238391"},{"issue":"4","key":"20_CR31","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1177352.1177355","volume":"38","author":"A Yilmaz","year":"2006","unstructured":"Yilmaz, A., Javed, O., Shah, M.: Object tracking: a survey. ACM Comput. Surv. (CSUR) 38(4), 13 (2006)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, Y., Nevatia, R.: Global data association for multi-object tracking using network flows. In: CVPR, pp. 1\u20138. IEEE (2008)","DOI":"10.1109\/CVPR.2008.4587584"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68711-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T22:39:45Z","timestamp":1659566385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68711-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319687100","9783319687117"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68711-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}