{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T09:40:06Z","timestamp":1751190006819,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319716060"},{"type":"electronic","value":"9783319716077"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71607-7_60","type":"book-chapter","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T01:30:23Z","timestamp":1514511023000},"page":"687-697","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Key-Region Representation Learning for Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Wenfei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,30]]},"reference":[{"issue":"3","key":"60_CR1","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1016\/j.cviu.2011.09.009","volume":"116","author":"M Bertini","year":"2012","unstructured":"Bertini, M., Del Bimbo, A., Seidenari, L.: Multi-scale and real-time non-parametric approach for anomaly detection and localization. Comput. Vis. Image Underst. 116(3), 320\u2013329 (2012)","journal-title":"Comput. Vis. Image Underst."},{"key":"60_CR2","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-7908-2604-3_16","volume-title":"Proceedings of COMPSTAT 2010","author":"L Bottou","year":"2010","unstructured":"Bottou, L.: Large-scale machine learning with stochastic gradient descent. In: Lechevallier, Y., Saporta, G. (eds.) Proceedings of COMPSTAT 2010, pp. 177\u2013186. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-7908-2604-3_16"},{"key":"60_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, K.W., Chen, Y.T., Fang, W.H.: Video anomaly detection and localization using hierarchical feature representation and Gaussian process regression. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2909\u20132917 (2015)","DOI":"10.1109\/CVPR.2015.7298909"},{"key":"60_CR4","doi-asserted-by":"crossref","unstructured":"Chong, Y.S., Tay, Y.H.: Abnormal event detection in videos using spatiotemporal autoencoder. arXiv preprint arXiv:1701.01546 (2017)","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"60_CR5","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3449\u20133456. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"60_CR6","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"60_CR7","doi-asserted-by":"crossref","unstructured":"Hu, X., Hu, S., Zhang, X., Zhang, H., Luo, L.: Anomaly detection based on local nearest neighbor distance descriptor in crowded scenes. Sci. World J. 2014 (2014)","DOI":"10.1155\/2014\/632575"},{"key":"60_CR8","doi-asserted-by":"crossref","unstructured":"Leyva, R., Sanchez, V., Li, C.T.: Video anomaly detection with compact feature sets for online performance. IEEE Trans. Image Process. (2017)","DOI":"10.1109\/TIP.2017.2695105"},{"key":"60_CR9","unstructured":"Li, K.L., Huang, H.K., Tian, S.F., Xu, W.: Improving one-class SVM for anomaly detection. In: International Conference on Machine Learning and Cybernetics, vol. 5, pp. 3077\u20133081. IEEE (2003)"},{"issue":"1","key":"60_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2014)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"60_CR11","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 fps in MATLAB. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"60_CR12","unstructured":"Medel, J.R., Savakis, A.: Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv preprint arXiv:1612.00390 (2016)"},{"issue":"11","key":"60_CR13","doi-asserted-by":"publisher","first-page":"2624","DOI":"10.1109\/TPAMI.2013.83","volume":"35","author":"T Mensink","year":"2013","unstructured":"Mensink, T., Verbeek, J., Perronnin, F., Csurka, G.: Distance-based image classification: generalizing to new classes at near-zero cost. IEEE Trans. Pattern Anal. Mach. Intell. 35(11), 2624\u20132637 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"6","key":"60_CR14","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1109\/TSMCC.2011.2178594","volume":"42","author":"OP Popoola","year":"2012","unstructured":"Popoola, O.P., Wang, K.: Video-based abnormal human behavior recognitiona review. IEEE Trans. Syst. Man. Cybern. Part C (Appl. Rev.) 42(6), 865\u2013878 (2012)","journal-title":"IEEE Trans. Syst. Man. Cybern. Part C (Appl. Rev.)"},{"key":"60_CR15","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Fathy, M., Hoseini, M., Klette, R.: Real-time anomaly detection and localization in crowded scenes. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 56\u201362 (2015)","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"60_CR16","unstructured":"Sabokrou, M., Fayyaz, M., Fathy, M., et al.: Fully convolutional neural network for fast anomaly detection in crowded scenes. arXiv preprint arXiv:1609.00866 (2016)"},{"key":"60_CR17","unstructured":"Simonyan, K., Vedaldi, A., Zisserman, A.: Deep inside convolutional networks: visualising image classification models and saliency maps. arXiv preprint arXiv:1312.6034 (2013)"},{"key":"60_CR18","doi-asserted-by":"crossref","unstructured":"Vincent, P., Larochelle, H., Bengio, Y., Manzagol, P.A.: Extracting and composing robust features with denoising autoencoders. In: Proceedings of the 25th International Conference on Machine Learning, pp. 1096\u20131103. ACM (2008)","DOI":"10.1145\/1390156.1390294"},{"issue":"3","key":"60_CR19","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/00401706.1962.10490022","volume":"4","author":"B Welford","year":"1962","unstructured":"Welford, B.: Note on a method for calculating corrected sums of squares and products. Technometrics 4(3), 419\u2013420 (1962)","journal-title":"Technometrics"},{"key":"60_CR20","unstructured":"Wu, C., Guo, Y., Ma, Y.: Adaptive anomalies detection with deep network, pp. 181\u2013186 (2015)"},{"key":"60_CR21","doi-asserted-by":"crossref","unstructured":"Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection. arXiv preprint arXiv:1510.01553 (2015)","DOI":"10.5244\/C.29.8"},{"key":"60_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, D., Lu, G.: Evaluation of similarity measurement for image retrieval. In: Proceedings of the 2003 International Conference on Neural Networks and Signal Processing, vol. 2, pp. 928\u2013931. IEEE (2003)","DOI":"10.1109\/ICNNSP.2003.1280752"}],"container-title":["Lecture Notes in Computer Science","Image and Graphics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71607-7_60","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T08:59:02Z","timestamp":1751187542000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71607-7_60"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319716060","9783319716077"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71607-7_60","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"30 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Image and Graphics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icig2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/10times.com\/icig-sa","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}