{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:02:25Z","timestamp":1751860945903,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319999777"},{"type":"electronic","value":"9783319999784"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99978-4_29","type":"book-chapter","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T02:07:12Z","timestamp":1535594832000},"page":"371-382","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ATM Protection Using Embedded Deep Learning Solutions"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Rossi","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Rizzo","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Montefoschi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"key":"29_CR1","unstructured":"European Association for Secure Transactions. ATM explosive attacks surge in Europe (2016). https:\/\/www.association-secure-transactions.eu\/atm-explosive-attacks-surge-in-europe\/"},{"key":"29_CR2","unstructured":"European Association for Secure Transactions. EAST publishes European fraud update 3-2017 (2017). https:\/\/www.association-secure-transactions.eu\/east-publishes-european-fraud-update-3-2017\/"},{"key":"29_CR3","doi-asserted-by":"publisher","unstructured":"Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016, LNCS, vol. 9999, pp. 1\u201313. Springer, Heidelberg (2016). https:\/\/doi.org\/10.10007\/1234567890","DOI":"10.10007\/1234567890"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Deng, J., et al.: A large-scale hierarchical image database. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 248\u2013255 (2009)","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"29_CR5","unstructured":"Krizhevsky, A., et al.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (NIPS), pp. 1097\u20131105 (2012)"},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1016\/j.imavis.2017.01.010","volume":"60","author":"S Herath","year":"2017","unstructured":"Herath, S., et al.: Going deeper into action recognition: a survey. Image Vis. Comput. 60, 4\u201321 (2017)","journal-title":"Image Vis. Comput."},{"issue":"1","key":"29_CR7","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/TPAMI.2012.59","volume":"35","author":"S Ji","year":"2013","unstructured":"Ji, S., et al.: 3D convolutional neural networks for human action recognition. IEEE Trans. Pattern Anal. Mach. Intell. 35(1), 221\u2013231 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Ng, J.Y.-H., et al.: Beyond short snippets: deep networks for video classification. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4694\u20134702 (2015)","DOI":"10.1109\/CVPR.2015.7299101"},{"key":"29_CR9","unstructured":"Hochreiter, S., Schmidhuber, J.: Unsupervised learning of video representations using LSTMs, pp. 473\u2013479 (1997)"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Donahue, J.L.A., et al.: Long-term recurrent convolutional networks for visual recognition and description. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2625\u20132634 (2015)","DOI":"10.1109\/CVPR.2015.7298878"},{"key":"29_CR11","unstructured":"Srivastava, N., et al.: Long-term recurrent convolutional networks for visual recognition and description. In: International Conference on Machine Learning (ICML), pp. 843\u2013852 (2015)"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"De Luca, A., et al.: Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the Sixth Symposium on Usable Privacy and Security (2010)","DOI":"10.1145\/1837110.1837131"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Puente, F., et al.: Improving online banking security with hardware devices. In: Annual International Carnahan Conference on Security Technology (CCST), pp. 174\u2013177 (2005)","DOI":"10.1109\/CCST.2005.1594874"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Lasisi, H., Ajisafe, A.A.: Development of stripe biometric based fingerprint authentications systems in Automated Teller Machines. In: International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), pp. 172\u2013175 (2012)","DOI":"10.1109\/ICTEA.2012.6462860"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"AshokaRajan, R., et al.: A novel approach for secure ATM transactions using fingerprint watermarking. In: International Conference on Advanced Computing (ICoAC), pp. 547\u2013552 (2013)","DOI":"10.1109\/ICoAC.2013.6922010"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Sako, H., et al.: Self-defense-technologies for automated teller machines. In: International Machine Vision and Image Processing Conference (IMVIP), pp. 177\u2013184 (2007)","DOI":"10.1109\/IMVIP.2007.20"},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Raj, M.M.E., Julian, A.: Design and implementation of anti-theft ATM machine using embedded systems. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20135 (2015)","DOI":"10.1109\/ICCPCT.2015.7159316"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Shriram, S., et al.: Smart ATM surveillance system. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20136 (2016)","DOI":"10.1109\/ICCPCT.2016.7530322"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Ding, N., et al.: Energy-based surveillance systems for ATM machines. In: World Congress on Intelligent Control and Automation (WCICA), pp. 2880\u20132887 (2010)","DOI":"10.1109\/WCICA.2010.5554907"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Tang, Y., et al.: ATM intelligent surveillance based on omni-directional vision. In: World Congress on Computer Science and Information Engineering (WRI), pp. 660\u2013664 (2009)","DOI":"10.1109\/CSIE.2009.7"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Chen, I.-P., et al.: Image processing based burglarproof system using silhouette image. In: International Conference on Multimedia Technology (ICMT), pp. 6394\u20136397 (2011)","DOI":"10.1109\/ICMT.2011.6002187"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, X.: A novel efficient method for abnormal face detection in ATM. In: International Conference on Audio, Language and Image Processing (ICALIP), pp. 695\u2013700 (2014)","DOI":"10.1109\/ICALIP.2014.7009884"},{"key":"29_CR23","unstructured":"Zeiler, M.D.: ADADELTA: an adaptive learning rate method. arXiv preprint arXiv:1212.5701 (2012)"},{"key":"29_CR24","unstructured":"Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition (2014). arXiv:1409.1556"},{"key":"29_CR25","unstructured":"Chollet, F., et al.: Keras (2015). https:\/\/keras.io"},{"key":"29_CR26","unstructured":"Abadi, M., et al.: TensorFlow: large-scale machine learning on heterogeneous systems (2015). https:\/\/www.tensorflow.org\/"},{"key":"29_CR27","unstructured":"Bradski, G.: The OpenCV library. Dr. Dobb\u2019s J. Softw. Tools (2000)"},{"key":"29_CR28","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MAF Pimentel","year":"2014","unstructured":"Pimentel, M.A.F., et al.: A review of novelty detection. Signal Process. 99, 215\u2013249 (2014)","journal-title":"Signal Process."},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Rossi, A., et al.: Auto-associative recurrent neural networks and long term dependencies in novelty detection for audio surveillance applications. In: IOP Conference Series: Materials Science and Engineering (2017)","DOI":"10.1088\/1757-899X\/261\/1\/012009"}],"container-title":["Lecture Notes in Computer Science","Artificial Neural Networks in Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99978-4_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T17:40:01Z","timestamp":1751823601000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99978-4_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319999777","9783319999784"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99978-4_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"30 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ANNPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IAPR Workshop on Artificial Neural Networks in Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Siena","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"annpr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/annpr2018.diism.unisi.it\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}