{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:08:18Z","timestamp":1773270498229,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":46,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562022","type":"print"},{"value":"9789819562039","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6203-9_12","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:26:06Z","timestamp":1767320766000},"page":"215-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Early Detection of\u00a0Risky Crowd Dynamics Scheme Based on\u00a0Motion Entropy and\u00a0Scene Semantics"],"prefix":"10.1007","author":[{"given":"Sourabh","family":"Choudhary","sequence":"first","affiliation":[]},{"given":"Chunqiang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Syed Murtoza Mushrul","family":"Pasha","sequence":"additional","affiliation":[]},{"given":"MD Tanvir","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Rashedin","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Arnob Barua","family":"Himo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"12_CR1","unstructured":"Kaggle dataset: real-time anomaly detection in surveillance videos (2025). https:\/\/www.kaggle.com\/datasets\/valentynsichkar\/anomaly-detection-in-surveillance-videos Accessed June 2025"},{"issue":"16","key":"12_CR2","doi-asserted-by":"publisher","first-page":"6080","DOI":"10.3390\/s22166080","volume":"22","author":"A Aldayri","year":"2022","unstructured":"Aldayri, A., Albattah, W.: Taxonomy of anomaly detection techniques in crowd scenes. Sensors 22(16), 6080 (2022)","journal-title":"Sensors"},{"issue":"9","key":"12_CR3","doi-asserted-by":"publisher","first-page":"3928","DOI":"10.3390\/app14093928","volume":"14","author":"S Altowairqi","year":"2024","unstructured":"Altowairqi, S., Luo, S., Greer, P., Chen, S.: Efficient crowd anomaly detection using sparse feature tracking and neural network. Appl. Sci. 14(9), 3928 (2024)","journal-title":"Appl. Sci."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Cao, T., Wu, X., Guo, J., Yu, S., Xu, Y.: Abnormal crowd motion analysis. In: 2009 IEEE International Conference on Robotics and Biomimetics (ROBIO), pp. 1709\u20131714. IEEE (2009)","DOI":"10.1109\/ROBIO.2009.5420408"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Chen, L.C., Zhu, Y., Papandreou, G., Schroff, F., Adam, H.: Encoder-decoder with atrous separable convolution for semantic image segmentation. In: Proceedings of the European conference on computer vision (ECCV), pp. 801\u2013818 (2018)","DOI":"10.1007\/978-3-030-01234-2_49"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Cho, M., et al.: Look around for anomalies: weakly-supervised anomaly detection via context-motion relational learning. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 12137\u201312146 (2023)","DOI":"10.1109\/CVPR52729.2023.01168"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: CVPR 2011, pp. 3449\u20133456. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Cordts, M., et al.: The cityscapes dataset for semantic urban scene understanding. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 3213\u20133223 (2016)","DOI":"10.1109\/CVPR.2016.350"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Das, D., Mishra, D.: Unsupervised anomalous trajectory detection for crowded scenes, pp. 27\u201331 (2018)","DOI":"10.1109\/ICIINFS.2018.8721320"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Defard, T., Setkov, A., Loesch, A., Audigier, R.: PaDiM: a patch distribution modeling framework for anomaly detection and localization, pp. 475\u2013489 (2021)","DOI":"10.1007\/978-3-030-68799-1_35"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Farneb\u00e4ck, G.: Two-frame motion estimation based on polynomial expansion. In: Scandinavian conference on Image analysis, pp. 363\u2013370. Springer (2003)","DOI":"10.1007\/3-540-45103-X_50"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Feng, J., Wang, D., Zhang, L.: Crowd anomaly detection via spatial constraints and meaningful perturbation, vol.\u00a011, p.\u00a0205. MDPI (2022)","DOI":"10.3390\/ijgi11030205"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s13347-016-0219-1","volume":"30","author":"M Gali\u010d","year":"2017","unstructured":"Gali\u010d, M., Timan, T., Koops, B.J.: Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philos. Technol. 30(1), 9\u201337 (2017)","journal-title":"Philos. Technol."},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Georgescu, M.I., et al.: Anomaly detection in video via self-supervised and multi-task learning, pp. 12742\u201312752 (2021)","DOI":"10.1109\/CVPR46437.2021.01255"},{"issue":"7","key":"12_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.3390\/e19070323","volume":"19","author":"Y Guo","year":"2017","unstructured":"Guo, Y., et al.: Trajectory shape analysis and anomaly detection utilizing Shannon entropy and clustering. Entropy 19(7), 323 (2017)","journal-title":"Entropy"},{"issue":"8","key":"12_CR16","doi-asserted-by":"publisher","first-page":"845","DOI":"10.3390\/e22080845","volume":"22","author":"A Howedi","year":"2020","unstructured":"Howedi, A., Lotfi, A., Pourabdollah, A.: An entropy-based approach for anomaly detection in activities of daily living in the presence of a visitor. Entropy 22(8), 845 (2020)","journal-title":"Entropy"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Hu, C., Zhu, L., Lai, S.: Spatio-temporal-based context fusion for video anomaly detection, pp. 187\u2013192 (2023)","DOI":"10.1109\/PRMVIA58252.2023.00037"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Huang, X., Zhao, C., Wu, Z.: A video anomaly detection framework based on appearance-motion semantics representation consistency, pp.\u00a01\u20135 (2023)","DOI":"10.1109\/ICASSP49357.2023.10097199"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Islam, M.T., Yin, Y., Deng, D., Islam, M.M., Pasha, S.M.M.: Leveraging dermograbcut segmentation for improved CNN-based skin lesion classification. In: International Conference on Intelligent Computing, pp. 335\u2013346. Springer (2025)","DOI":"10.1007\/978-981-95-0030-7_29"},{"issue":"6","key":"12_CR20","doi-asserted-by":"publisher","first-page":"3318","DOI":"10.3390\/s23063318","volume":"23","author":"DT Lan","year":"2023","unstructured":"Lan, D.T., Yoon, S.: Trajectory clustering-based anomaly detection in indoor human movement. Sensors 23(6), 3318 (2023)","journal-title":"Sensors"},{"issue":"3","key":"12_CR21","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TCSVT.2014.2358029","volume":"25","author":"T Li","year":"2014","unstructured":"Li, T.: Crowded scene analysis: a survey. IEEE Trans. Circuits Syst. Video Technol. 25(3), 367\u2013386 (2014)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"12_CR22","first-page":"18","volume":"36","author":"W Li","year":"2013","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2013)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107622","volume":"110","author":"X Lian","year":"2021","unstructured":"Lian, X., Pang, Y., Han, J., Pan, J.: Cascaded hierarchical Atrous spatial pyramid pooling module for semantic segmentation. Pattern Recogn. 110, 107622 (2021)","journal-title":"Pattern Recogn."},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Luo, L., et al.: Crowd-level abnormal behavior detection via multi-scale motion consistency learning. In: Proceedings of the AAAI conference on artificial intelligence, vol.\u00a037, pp. 8984\u20138992 (2023)","DOI":"10.1609\/aaai.v37i7.26079"},{"issue":"1","key":"12_CR25","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1080\/01431160412331269698","volume":"26","author":"M Pal","year":"2005","unstructured":"Pal, M.: Random forest classifier for remote sensing classification. Int. J. Remote Sens. 26(1), 217\u2013222 (2005)","journal-title":"Int. J. Remote Sens."},{"key":"12_CR26","first-page":"8887","volume":"975","author":"SMM Pasha","year":"2024","unstructured":"Pasha, S.M.M., Sohag, S.R., Ali, M.M.: Enhancing audio classification with a CNN-attention model: robust performance and resilience against backdoor attacks. Int. J. Comput. Appl. 975, 8887 (2024)","journal-title":"Int. J. Comput. Appl."},{"key":"12_CR27","unstructured":"Reiss, T., Hoshen, Y.: Attribute-based representations for accurate and interpretable video anomaly detection. arXiv preprint arXiv:2212.00789 (2022)"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Ronneberger, O., Fischer, P., Brox, T.: U-Net: convolutional networks for biomedical image segmentation. In: International Conference on Medical image computing and computer-assisted intervention, pp. 234\u2013241. Springer (2015)","DOI":"10.1007\/978-3-319-24574-4_28"},{"key":"12_CR29","doi-asserted-by":"crossref","unstructured":"Roshtkhari, M.J., Levine, M.D.: Online dominant and anomalous behavior detection in videos, pp. 2611\u20132618 (2013)","DOI":"10.1109\/CVPR.2013.337"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"1524286","DOI":"10.3389\/fmed.2025.1524286","volume":"12","author":"JA Shaikh","year":"2025","unstructured":"Shaikh, J.A., et al.: A deep reinforcement learning-based robust intrusion detection system for securing IoMT healthcare networks. Front. Med. 12, 1524286 (2025). https:\/\/doi.org\/10.3389\/fmed.2025.1524286","journal-title":"Front. Med."},{"issue":"7","key":"12_CR31","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1016\/j.patcog.2011.11.023","volume":"45","author":"MH Sharif","year":"2012","unstructured":"Sharif, M.H., Djeraba, C.: An entropy approach for abnormal activities detection in video streams. Pattern Recogn. 45(7), 2543\u20132561 (2012)","journal-title":"Pattern Recogn."},{"issue":"5","key":"12_CR32","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10462-024-11092-8","volume":"58","author":"MH Sharif","year":"2025","unstructured":"Sharif, M.H., Jiao, L., Omlin, C.W.: Deep crowd anomaly detection: state-of-the-art, challenges, and future research directions. Artif. Intell. Rev. 58(5), 139 (2025)","journal-title":"Artif. Intell. Rev."},{"key":"12_CR33","doi-asserted-by":"crossref","unstructured":"Str\u00e4ter, L.P., Salehi, M., Gavves, E., Snoek, C.G., Asano, Y.M.: Generalad: anomaly detection across domains by attending to distorted features, pp. 448\u2013465 (2024)","DOI":"10.1007\/978-3-031-72913-3_25"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Sultani, W., Chen, C., Shah, M.: Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 6479\u20136488 (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Sun, S., Gong, X.: Hierarchical semantic contrast for scene-aware video anomaly detection, pp. 22846\u201322856 (2023)","DOI":"10.1109\/CVPR52729.2023.02188"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Swears, E., Hoogs, A., Perera, A.A.: Learning motion patterns in surveillance video using hmm clustering. In: 2008 IEEE workshop on motion and video computing, pp.\u00a01\u20138. IEEE (2008)","DOI":"10.1109\/WMVC.2008.4544063"},{"issue":"4","key":"12_CR37","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1109\/34.206956","volume":"15","author":"M Unser","year":"2002","unstructured":"Unser, M., Aldroubi, A., Eden, M.: The l\/sub 2\/-polynomial spline pyramid. IEEE Trans. Pattern Anal. Mach. Intell. 15(4), 364\u2013379 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"12_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Z., et al.: Global abnormal event detection in video via motion information entropy, pp.\u00a01\u20134 (2018)","DOI":"10.23919\/URSI-AT-RASC.2018.8471516"},{"key":"12_CR39","doi-asserted-by":"crossref","unstructured":"Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection (2015)","DOI":"10.5244\/C.29.8"},{"issue":"7","key":"12_CR40","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1016\/j.patrec.2011.01.021","volume":"32","author":"X Xu","year":"2011","unstructured":"Xu, X., Xu, S., Jin, L., Song, E.: Characteristic analysis of Otsu threshold and its applications. Pattern Recogn. Lett. 32(7), 956\u2013961 (2011)","journal-title":"Pattern Recogn. Lett."},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Yang, T., et al.: Entity backdoor attacks against fine-tuned models. In: International Conference on Intelligent Computing, pp. 338\u2013349. Springer (2025)","DOI":"10.1007\/978-981-95-0009-3_29"},{"key":"12_CR42","doi-asserted-by":"crossref","unstructured":"Yang, Z., Radke, R.J.: Context-aware video anomaly detection in long-term datasets. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, pp. 4002\u20134011 (2024)","DOI":"10.1109\/CVPRW63382.2024.00404"},{"issue":"1","key":"12_CR43","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13040-024-00372-2","volume":"17","author":"Y Yin","year":"2024","unstructured":"Yin, Y., Yuan, Z., Tanvir, I.M., Bao, X.: Electronic medical records imputation by temporal generative adversarial network. BioData Mining 17(1), 19 (2024)","journal-title":"BioData Mining"},{"issue":"14","key":"12_CR44","doi-asserted-by":"publisher","first-page":"8799","DOI":"10.1007\/s11042-015-3101-8","volume":"75","author":"X Zhang","year":"2016","unstructured":"Zhang, X., Yang, S., Tang, Y.Y., Zhang, W.: A thermodynamics-inspired feature for anomaly detection on crowd motions in surveillance videos. Multimedia Tools Appl. 75(14), 8799\u20138826 (2016)","journal-title":"Multimedia Tools Appl."},{"key":"12_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, X., Ma, D., Yu, H., Huang, Y., Howell, P., Stevens, B.: Scene perception guided crowd anomaly detection, vol.\u00a0414, pp. 291\u2013302. Elsevier (2020)","DOI":"10.1016\/j.neucom.2020.07.019"},{"key":"12_CR46","doi-asserted-by":"crossref","unstructured":"Zhou, B., et al.: Scene parsing through ade20k dataset. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 633\u2013641 (2017)","DOI":"10.1109\/CVPR.2017.544"}],"updated-by":[{"DOI":"10.1007\/978-981-95-6203-9_26","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:00:00Z","timestamp":1773273600000}}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6203-9_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T07:37:44Z","timestamp":1773214664000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6203-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562022","9789819562039"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6203-9_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"12 March 2026","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"A correction has been published.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}