{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:04:39Z","timestamp":1761807879027},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,5,13]],"date-time":"2014-05-13T00:00:00Z","timestamp":1399939200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Machine Vision and Applications"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s00138-014-0615-4","type":"journal-article","created":{"date-parts":[[2014,5,12]],"date-time":"2014-05-12T07:18:14Z","timestamp":1399879094000},"page":"1351-1368","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Abnormal behavior detection using dominant sets"],"prefix":"10.1007","volume":"25","author":[{"given":"Manuel","family":"Alvar","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Torsello","sequence":"additional","affiliation":[]},{"given":"Alvaro","family":"Sanchez-Miralles","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Mar\u00eda","family":"Armingol","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,13]]},"reference":[{"issue":"3","key":"615_CR1","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam, A., Rivlin, E., Shimshoni, I., Reinitz, D.: Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 555\u2013560 (2008). doi: 10.1109\/TPAMI.2007.70825","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"615_CR2","doi-asserted-by":"crossref","unstructured":"Albarelli, A., Bul\u00f2, S.R., Torsello, A., Pelillo, M.: Matching as a non-cooperative game. ICCV 37, 1319\u20131326 (2009)","DOI":"10.1109\/ICCV.2009.5459312"},{"key":"615_CR3","doi-asserted-by":"crossref","unstructured":"Albarelli, A., Rodol\u00e0, E., Cavallarin, A., Torsello, A.: Robust figure extraction on textured background: a game-theoretic approach. In: Proceedings of the 2010 20th International Conference on Pattern Recognition. ICPR \u201910, pp. 360\u2013363. IEEE Computer Society, Washington (2010)","DOI":"10.1109\/ICPR.2010.97"},{"key":"615_CR4","doi-asserted-by":"crossref","unstructured":"Albarelli, A., Rodol\u00e0, E., Torsello, A.: Imposing semi-local geometric constraints for accurate correspondences selection in structure from motion: a game-theoretic perspective. Intern. J. Comput. Vision 97(1), 36\u201353 (2012). doi: 10.1007\/s11263-011-0432-4","DOI":"10.1007\/s11263-011-0432-4"},{"key":"615_CR5","doi-asserted-by":"crossref","unstructured":"Ali, S., Shah, M.: A Lagrangian particle dynamics approach for crowd flow segmentation and stability analysis. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR \u201907. pp. 1\u20136 (2007). doi: 10.1109\/CVPR.2007.382977","DOI":"10.1109\/CVPR.2007.382977"},{"key":"615_CR6","doi-asserted-by":"crossref","unstructured":"Antic, B., Ommer, B.: Video parsing for abnormality detection. In: IEEE International Conference on Computer Vision (ICCV), pp. 2415\u20132422 (2011). doi: 10.1109\/ICCV.2011.6126525","DOI":"10.1109\/ICCV.2011.6126525"},{"key":"615_CR7","doi-asserted-by":"crossref","unstructured":"Benezeth, Y., Jodoin, P.M., Saligrama, V., Rosenberger, C.: Abnormal events detection based on spatio-temporal co-occurrences. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009, pp. 2458\u20132465 (2009). doi: 10.1109\/CVPR.2009.5206686","DOI":"10.1109\/CVPR.2009.5206686"},{"key":"615_CR8","doi-asserted-by":"crossref","unstructured":"Brand, M., Oliver, N., Pentland, A.: Coupled hidden Markov models for complex action recognition. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 994\u2013999 (1997). doi: 10.1109\/CVPR.1997.609450","DOI":"10.1109\/CVPR.1997.609450"},{"issue":"3","key":"615_CR9","doi-asserted-by":"crossref","first-page":"416","DOI":"10.3758\/BF03192795","volume":"38","author":"F Br\u00e9mond","year":"2006","unstructured":"Br\u00e9mond, F., Thonnat, M., Z\u00faiga, M.: Video-understanding framework for automatic behavior recognition. Behav. Res. Methods 38(3), 416\u2013426 (2006)","journal-title":"Behav. Res. Methods"},{"key":"615_CR10","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3449\u20133456 (2011). doi: 10.1109\/CVPR.2011.5995434","DOI":"10.1109\/CVPR.2011.5995434"},{"issue":"7","key":"615_CR11","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1016\/j.patcog.2012.11.021","volume":"46","author":"Y Cong","year":"2013","unstructured":"Cong, Y., Yuan, J., Liu, J.: Abnormal event detection in crowded scenes using sparse representation. Patt. Recognit. 46(7), 1851\u20131864 (2013). doi: 10.1016\/j.patcog.2012.11.021","journal-title":"Patt. Recognit."},{"key":"615_CR12","doi-asserted-by":"crossref","unstructured":"Connell, J., Senior, A., Hampapur, A., Tian, Y.L., Brown, L., Pankanti, S.: Detection and tracking in the IBM Peoplevision System. In: IEEE International Conference on Multimedia and Expo, 2004. ICME \u201904, vol. 2, pp. 1403\u20131406. (2004). doi: 10.1109\/ICME.2004.1394495","DOI":"10.1109\/ICME.2004.1394495"},{"key":"615_CR13","doi-asserted-by":"crossref","unstructured":"Dee, H., Hogg, D.: Detecting inexplicable behaviour. In: Proceedings of the British Machine Vision Conference, pp. 50.1\u201350.10. BMVA Press, London (2004)","DOI":"10.5244\/C.18.50"},{"issue":"1","key":"615_CR14","first-page":"49","volume":"33","author":"H Dee","year":"2004","unstructured":"Dee, H., Hogg, D.C.: Is it interesting? Comparing human and machine judgements on the pets dataset. Sixth Intern. Workshop Perform. Eval Tracking Surveill 33(1), 49\u201355 (2004)","journal-title":"Sixth Intern. Workshop Perform. Eval Tracking Surveill"},{"key":"615_CR15","doi-asserted-by":"crossref","unstructured":"Gong, S., Loy, C., Xiang, T.: Security and surveillance. In: Moeslund, T.B., Hilton, A., Kr\u00fcger, V., Sigal, L. (eds.) Visual Analysis of Humans, pp. 455\u2013472. Springer, London (2011)","DOI":"10.1007\/978-0-85729-997-0_23"},{"key":"615_CR16","doi-asserted-by":"crossref","unstructured":"Hamid, R., Johnson, A., Batta, S., Bobick, A., Isbell, C., Coleman, G.: Detection and explanation of anomalous activities: Representing activities as bags of event $$n$$ n -grams. In: Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR\u201905), Vol. 1, CVPR \u201905, pp. 1031\u20131038. IEEE Computer Society, Washington (2005). doi: 10.1109\/CVPR.2005.127","DOI":"10.1109\/CVPR.2005.127"},{"issue":"14","key":"615_CR17","doi-asserted-by":"crossref","first-page":"1221","DOI":"10.1016\/j.artint.2009.05.002","volume":"173","author":"R Hamid","year":"2009","unstructured":"Hamid, R., Maddi, S., Johnson, A., Bobick, A., Essa, I., Isbell, C.: A novel sequence representation for unsupervised analysis of human activities. Artif. Intell. 173(14), 1221\u20131244 (2009). doi: 10.1016\/j.artint.2009.05.002","journal-title":"Artif. Intell."},{"key":"615_CR18","doi-asserted-by":"crossref","unstructured":"Hampapur, A., Brown, L., Connell, J., Pankanti, S., Senior, A., Tian, Y.: Smart surveillance: applications, technologies and implications. In: Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing, and the Fourth Pacific Rim Conference on Multimedia. vol. 2, pp. 1133\u20131138 (2003). doi: 10.1109\/ICICS.2003.1292637","DOI":"10.1109\/ICICS.2003.1292637"},{"issue":"3","key":"615_CR19","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu, W., Tan, T., Wang, L., Maybank, S.: A survey on visual surveillance of object motion and behaviors. Syst. Man Cybern. Part C 34(3), 334\u2013352 (2004)","journal-title":"Syst. Man Cybern. Part C"},{"issue":"9","key":"615_CR20","doi-asserted-by":"crossref","first-page":"1450","DOI":"10.1109\/TPAMI.2006.176","volume":"28","author":"W Hu","year":"2006","unstructured":"Hu, W., Xiao, X., Fu, Z., Xie, D., Tan, T., Maybank, S.: A system for learning statistical motion patterns. IEEE Trans. Patt. Anal. Mach. Intell. 28(9), 1450\u20131464 (2006). doi: 10.1109\/TPAMI.2006.176","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"issue":"3","key":"615_CR21","doi-asserted-by":"crossref","first-page":"1618","DOI":"10.1109\/TSMCB.2004.826829","volume":"34","author":"W Hu","year":"2004","unstructured":"Hu, W., Xie, D., Tan, T., Maybank, S.: Learning activity patterns using fuzzy self-organizing neural network. IEEE Trans. Syst. Man Cybern. Part B 34(3), 1618\u20131626 (2004). doi: 10.1109\/TSMCB.2004.826829","journal-title":"IEEE Trans. Syst. Man Cybern. Part B"},{"key":"615_CR22","doi-asserted-by":"crossref","unstructured":"Hung, H., Kr\u00f6se, B.: Detecting f-formations as dominant sets. In: Proceedings of the 13th international conference on multimodal interfaces, ICMI \u201911, pp. 231\u2013238. ACM, New York (2011). doi: 10.1145\/2070481.2070525","DOI":"10.1145\/2070481.2070525"},{"key":"615_CR23","doi-asserted-by":"crossref","unstructured":"Jan, T.: Neural network based threat assessment for automated visual surveillance. In: IEEE International Joint Conference on Neural Networks. Proceedings. vol. 2, pp. 1309\u20131312 (2004). doi: 10.1109\/IJCNN.2004.1380133","DOI":"10.1109\/IJCNN.2004.1380133"},{"issue":"3","key":"615_CR24","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/j.cviu.2010.10.008","volume":"115","author":"F Jiang","year":"2011","unstructured":"Jiang, F., Yuan, J., Tsaftaris, S.A., Katsaggelos, A.K.: Anomalous video event detection using spatiotemporal context. Comput. Vision Image Underst. 115(3), 323\u2013333 (2011). doi: 10.1016\/j.cviu.2010.10.008","journal-title":"Comput. Vision Image Underst."},{"issue":"8","key":"615_CR25","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/0262-8856(96)01101-8","volume":"14","author":"N Johnson","year":"1996","unstructured":"Johnson, N., Hogg, D.: Learning the distribution of object trajectories for event recognition. Image Vision Comput. 14(8), 609\u2013615 (1996). doi: 10.1016\/0262-8856(96)01101-8","journal-title":"Image Vision Comput."},{"key":"615_CR26","doi-asserted-by":"crossref","unstructured":"Kaltsa, V., Briassouli, A., Kompatsiaris, I., Strintzis, M.: Timely, robust crowd event characterization. In: 19th IEEE International Conference on Image Processing (ICIP), pp. 2697\u20132700 (2012). doi: 10.1109\/ICIP.2012.6467455","DOI":"10.1109\/ICIP.2012.6467455"},{"key":"615_CR27","doi-asserted-by":"crossref","unstructured":"Kim, J., Grauman, K.: Observe locally, infer globally: a space\u2013time mrf for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR, pp. 2921\u20132928 (2009). doi: 10.1109\/CVPR.2009.5206569","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"615_CR28","doi-asserted-by":"crossref","unstructured":"Ko, T.: A survey on behavior analysis in video surveillance for homeland security applications. In: 37th IEEE Applied Imagery Pattern Recognition Workshop, AIPR \u201908, pp. 1\u20138 (2008). doi: 10.1109\/AIPR.2008.4906450","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"615_CR29","doi-asserted-by":"crossref","unstructured":"Li, C.L., Hao, Z.B., Li, J.J.: Abnormal behavior detection using a novel behavior representation. In: 2010 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA), pp. 331\u2013336 (2010). doi: 10.1109\/ICACIA.2010.5709913","DOI":"10.1109\/ICACIA.2010.5709913"},{"key":"615_CR30","doi-asserted-by":"crossref","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Patt. Anal. Mach. Intell. 36(1), 18\u201332 (2014). doi: 10.1109\/TPAMI.2013.111","DOI":"10.1109\/TPAMI.2013.111"},{"key":"615_CR31","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1975\u20131981 (2010). doi: 10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"615_CR32","doi-asserted-by":"crossref","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2009 pp. 935\u2013942 (2009). doi: 10.1109\/CVPR.2009.5206641","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"615_CR33","doi-asserted-by":"crossref","unstructured":"Nayak, N.M., Sethi, R.J., Song, B., Roy-Chowdhury, A.K.: Modeling and recognition of complex human activities. In: Moeslund, T.B., Hilton, A., Kr\u00fcger, V., Sigal, L. (eds.) Visual Analysis of Humans, pp. 289\u2013309. Springer, London (2011)","DOI":"10.1007\/978-0-85729-997-0_15"},{"issue":"8","key":"615_CR34","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/34.868684","volume":"22","author":"NM Oliver","year":"2000","unstructured":"Oliver, N.M., Rosario, B., Pentland, A.P.: A bayesian computer vision system for modeling human interactions. IEEE Trans. Patt. Anal. Mach. Intell. 22(8), 831\u2013843 (2000). ID: 1; additional tuning or training","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"615_CR35","unstructured":"Pavan, M., Pelillo, M.: Efficient out-of-sample extension of dominant-set clusters. In: NIPS (2004)"},{"issue":"1","key":"615_CR36","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1109\/TPAMI.2007.250608","volume":"29","author":"M Pavan","year":"2007","unstructured":"Pavan, M., Pelillo, M.: Dominant sets and pairwise clustering. IEEE Trans. Patt. Anal. Mach. Intell. 29(1), 167\u2013172 (2007). doi: 10.1109\/TPAMI.2007.250608","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"615_CR37","unstructured":"Pelillo, M.: What is a cluster? Perspectives from game theory. In: NIPS Workshop on Clustering: Science of Art (2009)"},{"key":"615_CR38","doi-asserted-by":"crossref","unstructured":"Rota Bul\u00f2, S., Bomze, I.M.: Infection and immunization: a new class of evolutionary game dynamics. Games Econom. Behav. 71(1), 193\u2013211 (2011). doi: 10.1016\/j.geb.2010.06.004","DOI":"10.1016\/j.geb.2010.06.004"},{"key":"615_CR39","unstructured":"Sch\u00f6lkopf, B., Williamson, R.C., Smola, A.J., Shawe-Taylor, J., Platt, J.C.: Support vector method for novelty detection. In: NIPS, pp. 582\u2013588 (1999)"},{"key":"615_CR40","doi-asserted-by":"crossref","unstructured":"Stauffer, C.: Automatic hierarchical classification using time-based co-occurrences. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. (xxiii+637+663) (1999). doi: 10.1109\/CVPR.1999.784654","DOI":"10.1109\/CVPR.1999.784654"},{"issue":"8","key":"615_CR41","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1109\/34.868677","volume":"22","author":"C Stauffer","year":"2000","unstructured":"Stauffer, C., Grimson, W.E.L.: Learning patterns of activity using real-time tracking. IEEE Trans. Patt. Anal. Mach. Intell. 22(8), 747\u2013757 (2000)","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"615_CR42","doi-asserted-by":"crossref","unstructured":"Torsello, A., Bul\u00f2, S.R., Pelillo, M.: Grouping with asymmetric affinities: a game-theoretic perspective. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), pp. 292\u2013299 (2006)","DOI":"10.1109\/CVPR.2006.130"},{"issue":"3","key":"615_CR43","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/S0031-3203(02)00100-0","volume":"36","author":"L Wang","year":"2003","unstructured":"Wang, L., Hu, W., Tan, T.: Recent developments in human motion analysis. Patt. Recogn. 36(3), 585\u2013601 (2003)","journal-title":"Patt. Recogn."},{"key":"615_CR44","doi-asserted-by":"crossref","unstructured":"Wei, Q., Hu, W., Zhang, X., Luo, G.: Dominant sets-based action recognition using image sequence matching. In: IEEE International Conference on Image Processing, ICIP 2007, vol. 6, pp. 133\u2013136 (2007). doi: 10.1109\/ICIP.2007.4379539","DOI":"10.1109\/ICIP.2007.4379539"},{"key":"615_CR45","doi-asserted-by":"crossref","unstructured":"Xiang, T., Gong, S.: Video behaviour profiling and abnormality detection without manual labelling. In: Tenth IEEE International Conference on Computer Vision, ICCV 2005, vol. 2, pp. 1238\u20131245 (2005). doi: 10.1109\/ICCV.2005.248","DOI":"10.1109\/ICCV.2005.248"},{"issue":"5","key":"615_CR46","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1109\/TPAMI.2007.70731","volume":"30","author":"T Xiang","year":"2008","unstructured":"Xiang, T., Gong, S.: Video behavior profiling for anomaly detection. IEEE Trans. Patt. Anal. Mach. Intell. 30(5), 893\u2013908 (2008). doi: 10.1109\/TPAMI.2007.70731","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"issue":"8","key":"615_CR47","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1109\/34.85677","volume":"13","author":"XL Xie","year":"1991","unstructured":"Xie, X.L., Beni, G.: A validity measure for fuzzy clustering. IEEE Trans. Patt. Anal. Mach. Intell. 13(8), 841\u2013847 (1991). doi: 10.1109\/34.85677","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"615_CR48","doi-asserted-by":"crossref","unstructured":"Yang, X., Latecki, L.J.: Affinity learning on a tensor product graph with applications to shape and image retrieval. In: CVPR, pp. 2369\u20132376 (2011)","DOI":"10.1109\/CVPR.2011.5995325"},{"key":"615_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Hancock, E.R.: A graph-based approach to feature selection. In: Jiang, X., Ferrer, M., Torsello, A. (eds.) Graph-Based Representations in Pattern Recognition. Lecture Notes in Computer Science, vol. 6658, pp. 205\u2013214. Springer, Berlin, Heidelberg (2011)","DOI":"10.1007\/978-3-642-20844-7_21"},{"key":"615_CR50","doi-asserted-by":"crossref","unstructured":"Zhao, J., Xu, Y., Yang, X., Yan, Q.: Crowd instability analysis using velocity-field based social force model. In: Visual Communications and Image Processing (VCIP), 2011 IEEE, pp. 1\u20134 (2011). doi: 10.1109\/VCIP.2011.6116003","DOI":"10.1109\/VCIP.2011.6116003"}],"container-title":["Machine Vision and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00138-014-0615-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00138-014-0615-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00138-014-0615-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T11:00:13Z","timestamp":1565434813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00138-014-0615-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,13]]},"references-count":50,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["615"],"URL":"https:\/\/doi.org\/10.1007\/s00138-014-0615-4","relation":{},"ISSN":["0932-8092","1432-1769"],"issn-type":[{"value":"0932-8092","type":"print"},{"value":"1432-1769","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,13]]}}}