{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:49:17Z","timestamp":1742978957093,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819755998"},{"type":"electronic","value":"9789819756001"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5600-1_7","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T15:03:47Z","timestamp":1722265427000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation and Application of Violence Detection System Based on Multi-head Attention and LSTM"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3702-296X","authenticated-orcid":false,"given":"Fengping","family":"Cao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2950-7835","authenticated-orcid":false,"given":"Yi","family":"Miao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3560-747X","authenticated-orcid":false,"given":"Wangyi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1016\/j.eswa.2017.09.029","volume":"91","author":"AB Mabrouk","year":"2018","unstructured":"Mabrouk, A.B., Zagrouba, E.: Abnormal behavior recognition for intelligent video surveillance systems: A review. Expert Syst. Appl. 91, 480\u2013491 (2018)","journal-title":"Expert Syst. Appl."},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"107560","DOI":"10.1109\/ACCESS.2019.2932114","volume":"7","author":"M Ramzan","year":"2019","unstructured":"Ramzan, M., et al.: A review on state-of-the-art violence detection techniques. IEEE Access 7, 107560\u2013107575 (2019)","journal-title":"IEEE Access"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Sudhakaran, S., Lanz, O.: Learning to detect violent videos using convolutional long short-term memory. In: 2017 14th IEEE international conference on advanced video and signal based surveillance (AVSS), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Tran, D., Bourdev, L., Fergus, R., Torresani, L., Paluri, M.: Learning spatiotemporal features with 3d convolutional networks. In: Proceedings of the IEEE international conference on computer vision, pp. 4489\u20134497 (2015)","DOI":"10.1109\/ICCV.2015.510"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Traor\u00b4e, A., Akhloufi, M.A.: Violence detection in videos using deep recurrent and convolutional neural networks. In: 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 154\u2013159. IEEE (2020)","DOI":"10.1109\/SMC42975.2020.9282971"},{"issue":"11","key":"7_CR6","doi-asserted-by":"publisher","first-page":"2472","DOI":"10.3390\/s19112472","volume":"19","author":"FUM Ullah","year":"2019","unstructured":"Ullah, F.U.M., Ullah, A., Muhammad, K., Haq, I.U., Baik, S.W.: Violence detection using spatiotemporal features with 3d convolutional neural network. Sensors 19(11), 2472 (2019)","journal-title":"Sensors"},{"issue":"8","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997)","journal-title":"Neural Comput."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Abdali, A.M.R., Al-Tuma, R.F.: Robust real-time violence detection in video using cnn and lstm. In: 2019 2nd Scientific Conference of Computer Sciences (SCCS), pp. 104\u2013108. IEEE (2019)","DOI":"10.1109\/SCCS.2019.8852616"},{"key":"7_CR9","unstructured":"Pang, W., Xie, W., He, Q., Li, Y., Yang, J.: Audiovisual dependency attention for violence detection in videos. IEEE Transactions on Multimedia, pp. 1\u201312 (2022)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Khaleghi, A., Moin, M.S.: Improved anomaly detection in surveillance videos based on a deep learning method. In: 2018 8th Conference of AI and Robotics and 10th RoboCup Iranopen International Symposium (IRANOPEN), pp. 73\u201381. IEEE (2018)","DOI":"10.1109\/RIOS.2018.8406634"},{"issue":"8","key":"7_CR11","doi-asserted-by":"publisher","first-page":"2811","DOI":"10.3390\/s21082811","volume":"21","author":"W Ullah","year":"2021","unstructured":"Ullah, W., Ullah, A., Hussain, T., Khan, Z.A., Baik, S.W.: An efficient anomaly recognition framework using an attention residual lstm in surveillance videos. Sensors 21(8), 2811 (2021)","journal-title":"Sensors"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Zhao, Y., et al.: Spatio-temporal autoencoder for video anomaly detection. In: Proceedings of the 25th ACM international conference on Multimedia, pp. 1933\u20131941 (2017)","DOI":"10.1145\/3123266.3123451"},{"key":"7_CR13","unstructured":"Ma, Y., Tan Li, D.X., Chong, Y.C.: Behavior recognition for intelligent surveillance, pp. 282\u2013290 (2019)"},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2021.104120","volume":"108","author":"K Zhou","year":"2021","unstructured":"Zhou, K., Hui, B., Wang, J., Wang, C., Wu, T.: A study on attention-based lstm for abnormal behavior recognition with variable pooling. Image Vis. Comput. 108, 104120 (2021)","journal-title":"Image Vis. Comput."},{"issue":"10","key":"7_CR15","doi-asserted-by":"publisher","first-page":"4787","DOI":"10.1109\/TIP.2018.2845742","volume":"27","author":"I Serrano","year":"2018","unstructured":"Serrano, I., Deniz, O., Espinosa-Aranda, J.L., Bueno, G.: Fight recognition in video using hough forests and 2d convolutional neural network. IEEE Trans. Image Process. 27(10), 4787\u20134797 (2018)","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Li, J., Jiang, X., Sun, T., Xu, K.: Efficient violence detection using 3d convolutional neural networks. In: 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20138 (2019)","DOI":"10.1109\/AVSS.2019.8909883"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s42979-020-00207-x","volume":"1","author":"R Halder","year":"2020","unstructured":"Halder, R., Chatterjee, R.: CNN-BiLSTM model for violence detection in smart surveillance. SN Computer Science 1(4), 201 (2020)","journal-title":"SN Computer Science"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Mumtaz, A., Sargano, A.B., Habib, Z.: Violence detection in surveillance videos with deep network using transfer learning. In: 2018 2nd European Conference on Electrical Engineering and Computer Science (EECS), pp. 558\u2013563 (2018)","DOI":"10.1109\/EECS.2018.00109"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Bermejo Nievas, E., Deniz Suarez, O., Bueno Garc\u00b4\u0131a, G., Sukthankar, R.: Violence detection in video using computer vision techniques. In: Computer Analysis of Images and Patterns: 14th International Conference, CAIP 2011, Seville, Spain, August 29\u201331, 2011, Proceedings, Part II 14, pp. 332\u2013339. Springer (2011)","DOI":"10.1007\/978-3-642-23678-5_39"},{"key":"7_CR20","unstructured":"Nievas, E.B., Suarez, O.D., Garcia, G.B., Sukthankar, R.: Movies fight detection dataset. In: Computer Analysis of Images and Patterns, pp. 332\u2013339. Springer (2011)"},{"key":"7_CR21","unstructured":"Vaswani, A., et al.: Attention is all you need. Adv. Neural Info. Proc. Sys. 30 (2017)"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.engappai.2017.10.001","volume":"67","author":"KE Ko","year":"2018","unstructured":"Ko, K.E., Sim, K.B.: Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Eng. Appl. Artif. Intell. 67, 226\u2013234 (2018)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"10","key":"7_CR23","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1109\/TKDE.2009.191","volume":"22","author":"SJ Pan","year":"2010","unstructured":"Pan, S.J., Yang, Q.: A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345\u20131359 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR24","unstructured":"Mnih, V., Heess, N., Graves, A., et al.: Recurrent models of visual attention. Adv. Neural Info. Proce. Sys. 27 (2014)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Hassner, T., Itcher, Y., Kliper-Gross, O.: Violent flows: Real-time detection of violent crowd behavior. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1\u20136. IEEE, Providence, RI, USA (2012)","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Cheng, M., Cai, K., Li, M.: Rwf-2000: an open large scale video database for violence detection. In: 2020 25th International Conference on Pattern Recognition (ICPR), pp. 4183\u20134190. IEEE (2021)","DOI":"10.1109\/ICPR48806.2021.9412502"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Carreira, J., Zisserman, A.: Quo vadis, action recognition? a new model and the kinetics dataset. In: proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6299\u20136308 (2017)","DOI":"10.1109\/CVPR.2017.502"},{"key":"7_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118791","volume":"212","author":"H Mohammadi","year":"2023","unstructured":"Mohammadi, H., Nazerfard, E.: Video violence recognition and localization using a semi-supervised hard attention model. Expert Syst. Appl. 212, 118791 (2023)","journal-title":"Expert Syst. Appl."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5600-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T06:03:50Z","timestamp":1727417030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5600-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755998","9789819756001"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5600-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}