{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T00:15:52Z","timestamp":1773015352929,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T00:00:00Z","timestamp":1675036800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12201523"],"award-info":[{"award-number":["12201523"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Vis Comput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00371-023-02783-4","type":"journal-article","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T13:05:23Z","timestamp":1675083923000},"page":"303-318","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Evolving graph-based video crowd anomaly detection"],"prefix":"10.1007","volume":"40","author":[{"given":"Meng","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1608-8695","authenticated-orcid":false,"given":"Yanghe","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Aravinda S.","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]},{"given":"Shucong","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Zhengchun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,30]]},"reference":[{"key":"2783_CR1","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1007\/s00371-014-1032-4","volume":"31","author":"AS Rao","year":"2015","unstructured":"Rao, A.S., Gubbi, J., Marusic, S., Palaniswami, M.: Estimation of crowd density by clustering motion cues. The Visual Computer 31, 1533\u20131552 (2015)","journal-title":"The Visual Computer"},{"key":"2783_CR2","doi-asserted-by":"publisher","first-page":"1254","DOI":"10.1109\/TSMCB.2008.927265","volume":"38","author":"L Li","year":"2008","unstructured":"Li, L., Huang, W., Gu, I.Y.-H., Luo, R., Tian, Q.: An efficient sequential approach to tracking multiple objects through crowds for real-time intelligent cctv systems. IEEE Trans. on Systems, Man, and Cybernetics, Part B 38, 1254\u20131269 (2008)","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics, Part B"},{"key":"2783_CR3","doi-asserted-by":"crossref","unstructured":"Yang, M., Rashidi, L., Rajasegarar, S., Leckie, C.: Graph stream mining based anomalous event analysis. In: Pacific Rim International Conference on Artificial Intelligence, pp. 891\u2013903. Springer (2018)","DOI":"10.1007\/978-3-319-97304-3_68"},{"key":"2783_CR4","doi-asserted-by":"crossref","unstructured":"Yang, M., Rashidi, L., Rajasegarar, S., Leckie, C., Rao, A.S., Palaniswami, M.: Crowd activity change point detection in videos via graph stream mining. In: IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 215\u2013223 (2018)","DOI":"10.1109\/CVPRW.2018.00059"},{"issue":"9","key":"2783_CR5","doi-asserted-by":"publisher","first-page":"2197","DOI":"10.1016\/j.patcog.2011.03.007","volume":"44","author":"M Moshtaghi","year":"2011","unstructured":"Moshtaghi, M., Rajasegarar, S., Leckie, C., Karunasekera, S.: An efficient hyperellipsoidal clustering algorithm for resource-constrained environments. Pattern Recognition 44(9), 2197\u20132209 (2011)","journal-title":"Pattern Recognition"},{"key":"2783_CR6","first-page":"4","volume":"5","author":"J-Y Bouguet","year":"2001","unstructured":"Bouguet, J.-Y.: Pyramidal implementation of the affine Lucas Kanade feature tracker description of the algorithm. Intel Corporation 5, 4 (2001)","journal-title":"Intel Corporation"},{"key":"2783_CR7","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TCSVT.2013.2280061","volume":"24","author":"X Mo","year":"2014","unstructured":"Mo, X., Monga, V., Bala, R., Fan, Z.: Adaptive sparse representations for video anomaly detection. IEEE Trans. on Circuits and Systems for Video Technology 24, 631\u2013645 (2014)","journal-title":"IEEE Trans. on Circuits and Systems for Video Technology"},{"key":"2783_CR8","doi-asserted-by":"crossref","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 935\u2013942 (2009). IEEE","DOI":"10.1109\/CVPRW.2009.5206641"},{"key":"2783_CR9","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 1975\u20131981 (2010). IEEE","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"2783_CR10","doi-asserted-by":"crossref","unstructured":"Kim, J., Grauman, K.: Observe locally, infer globally: a space-time mrf for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2921\u20132928. IEEE (2009)","DOI":"10.1109\/CVPR.2009.5206569"},{"issue":"3","key":"2783_CR11","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s00371-019-01647-0","volume":"36","author":"SD Bansod","year":"2020","unstructured":"Bansod, S.D., Nandedkar, A.V.: Crowd anomaly detection and localization using histogram of magnitude and momentum. The Visual Computer 36(3), 609\u2013620 (2020)","journal-title":"The Visual Computer"},{"issue":"5","key":"2783_CR12","doi-asserted-by":"publisher","first-page":"1553","DOI":"10.1007\/s00371-021-02088-4","volume":"38","author":"MU Farooq","year":"2022","unstructured":"Farooq, M.U., Saad, M.N.M., Khan, S.D.: Motion-shape-based deep learning approach for divergence behavior detection in high-density crowd. The Visual Computer 38(5), 1553\u20131577 (2022)","journal-title":"The Visual Computer"},{"issue":"5","key":"2783_CR13","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1007\/s00371-021-02100-x","volume":"38","author":"M Sabih","year":"2022","unstructured":"Sabih, M., Vishwakarma, D.K.: Crowd anomaly detection with LSTMs using optical features and domain knowledge for improved inferring. The Visual Computer 38(5), 1719\u20131730 (2022)","journal-title":"The Visual Computer"},{"key":"2783_CR14","doi-asserted-by":"crossref","unstructured":"Patel, A.S., Vyas, R., Vyas, O., Ojha, M., Tiwari, V.: Motion-compensated online object tracking for activity detection and crowd behavior analysis. The Visual Computer 1\u201321 (2022)","DOI":"10.1007\/s00371-022-02469-3"},{"key":"2783_CR15","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: Towards real-time object detection with region proposal networks. In: Advances in Neural Information Processing Systems, pp. 91\u201399 (2015)"},{"key":"2783_CR16","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097\u20131105 (2012)"},{"key":"2783_CR17","doi-asserted-by":"crossref","unstructured":"Xu, D., Ricci, E., Yan, Y., Song, J., Sebe, N.: Learning deep representations of appearance and motion for anomalous event detection. In: Proceedings of the British Machine Vision Conference 2015, BMVC, pp. 801\u2013812 (2015)","DOI":"10.5244\/C.29.8"},{"key":"2783_CR18","doi-asserted-by":"crossref","unstructured":"Sabokrou, M., Fayyaz, M., Fathy, M., Moayed, Z., Klette, R.: Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes. Computer Vision and Image Understanding (2018)","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"2783_CR19","doi-asserted-by":"crossref","unstructured":"Morais, R., Le, V., Tran, T., Saha, B., Mansour, M., Venkatesh, S.: Learning regularity in skeleton trajectories for anomaly detection in videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 11996\u201312004 (2019)","DOI":"10.1109\/CVPR.2019.01227"},{"issue":"3","key":"2783_CR20","doi-asserted-by":"publisher","first-page":"1344","DOI":"10.3390\/app11031344","volume":"11","author":"S Dubey","year":"2021","unstructured":"Dubey, S., Boragule, A., Gwak, J., Jeon, M.: Anomalous event recognition in videos based on joint learning of motion and appearance with multiple ranking measures. Applied Sciences 11(3), 1344 (2021)","journal-title":"Applied Sciences"},{"key":"2783_CR21","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh, M., Nabi, M., Mousavi, H., Sangineto, E., Sebe, N.: Plug-and-play CNN for crowd motion analysis: An application in abnormal event detection. In: Winter Conf. on Applications of Computer Vision (WACV), pp. 1689\u20131698. IEEE (2018)","DOI":"10.1109\/WACV.2018.00188"},{"issue":"2","key":"2783_CR22","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/TMM.2019.2929931","volume":"22","author":"K Xu","year":"2019","unstructured":"Xu, K., Sun, T., Jiang, X.: Video anomaly detection and localization based on an adaptive intra-frame classification network. IEEE Transactions on Multimedia 22(2), 394\u2013406 (2019)","journal-title":"IEEE Transactions on Multimedia"},{"key":"2783_CR23","unstructured":"Lucas, B.: An iterative image registration technique with an application to stereo vision. In: DARPA Image Understanding Workshop, pp. 121\u2013130 (1981)"},{"key":"2783_CR24","doi-asserted-by":"crossref","unstructured":"Zhou, B., Wang, X., Tang, X.: Random field topic model for semantic region analysis in crowded scenes from tracklets. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 3441\u20133448. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995459"},{"key":"2783_CR25","unstructured":"Tomasi, C., Kanade, T.: Detection and tracking of point features. CMU Technical Report (1991)"},{"key":"2783_CR26","doi-asserted-by":"crossref","unstructured":"Bay, H., Tuytelaars, T., Van\u00a0Gool, L.: SURF: Speeded up robust features. In: 9th European Conference on Computer Vision, pp. 404\u2013417. Springer (2006)","DOI":"10.1007\/11744023_32"},{"key":"2783_CR27","doi-asserted-by":"crossref","unstructured":"Zeppelzauer, M., Zaharieva, M., Mitrovic, D., Breiteneder, C.: A novel trajectory clustering approach for motion segmentation. In: Intern Conf. on Multimedia Modeling, pp. 433\u2013443. Springer (2010)","DOI":"10.1007\/978-3-642-11301-7_44"},{"key":"2783_CR28","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.patcog.2016.06.016","volume":"61","author":"R Chaker","year":"2017","unstructured":"Chaker, R., Al Aghbari, Z., Junejo, I.N.: Social network model for crowd anomaly detection and localization. Pattern Recognition 61, 266\u2013281 (2017)","journal-title":"Pattern Recognition"},{"key":"2783_CR29","first-page":"225","volume":"38","author":"G Dantzig","year":"2003","unstructured":"Dantzig, G., Fulkerson, D.R.: On the max flow min cut theorem of networks. Linear Inequalities and Related Systems 38, 225\u2013231 (2003)","journal-title":"Linear Inequalities and Related Systems"},{"key":"2783_CR30","unstructured":"Schroeder, J., Guedes, A., Duarte\u00a0Jr, E.P.: Computing the minimum cut and maximum flow of undirected graphs. Relat\u00f3rioT\u00e9cnico RT-DINF 003\/2004 (2004)"},{"key":"2783_CR31","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. on Pattern Analysis and Machine Intelligence 36, 18\u201332 (2014)","journal-title":"IEEE Trans. on Pattern Analysis and Machine Intelligence"},{"key":"2783_CR32","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 FPS in Matlab. In: IEEE International Conference on Computer Vision, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"2783_CR33","doi-asserted-by":"crossref","unstructured":"Reddy, V., Sanderson, C., Lovell, B.C.: Improved anomaly detection in crowded scenes via cell-based analysis of foreground speed, size and texture. In: IEEE Conference on Computer Vision and Pattern Recognition Workshop, pp. 55\u201361. IEEE (2011)","DOI":"10.1109\/CVPRW.2011.5981799"},{"key":"2783_CR34","doi-asserted-by":"crossref","unstructured":"Cong, Y., Yuan, J., Liu, J.: Sparse reconstruction cost for abnormal event detection. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 3449\u20133456. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"2783_CR35","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 6536\u20136545 (2018)","DOI":"10.1109\/CVPR.2018.00684"},{"issue":"3","key":"2783_CR36","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TPAMI.2019.2944377","volume":"43","author":"W Luo","year":"2019","unstructured":"Luo, W., Liu, W., Lian, D., Tang, J., Duan, L., Peng, X., Gao, S.: Video anomaly detection with sparse coding inspired deep neural networks. IEEE transactions on pattern analysis and machine intelligence 43(3), 1070\u20131084 (2019)","journal-title":"IEEE transactions on pattern analysis and machine intelligence"},{"key":"2783_CR37","doi-asserted-by":"crossref","unstructured":"Hasan, M., Choi, J., Neumann, J., Roy-Chowdhury, A.K., Davis, L.S.: Learning temporal regularity in video sequences. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 733\u2013742 (2016)","DOI":"10.1109\/CVPR.2016.86"},{"key":"2783_CR38","doi-asserted-by":"crossref","unstructured":"Smeureanu, S., Ionescu, R.T., Popescu, M., Alexe, B.: Deep appearance features for abnormal behavior detection in video. In: International Conference on Image Analysis and Processing, pp. 779\u2013789. Springer (2017)","DOI":"10.1007\/978-3-319-68548-9_70"},{"key":"2783_CR39","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: Remembering history with convolutional lstm for anomaly detection. In: 2017 IEEE International Conference on Multimedia and Expo (ICME), pp. 439\u2013444. IEEE (2017)","DOI":"10.1109\/ICME.2017.8019325"},{"key":"2783_CR40","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T., Smeureanu, S., Popescu, M., Alexe, B.: Detecting abnormal events in video using narrowed normality clusters. In: 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), pp. 1951\u20131960 (2019)","DOI":"10.1109\/WACV.2019.00212"},{"key":"2783_CR41","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked RNN framework. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 341\u2013349 (2017)","DOI":"10.1109\/ICCV.2017.45"}],"container-title":["The Visual Computer"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-02783-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00371-023-02783-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00371-023-02783-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,21]],"date-time":"2024-01-21T13:02:49Z","timestamp":1705842169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00371-023-02783-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,30]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["2783"],"URL":"https:\/\/doi.org\/10.1007\/s00371-023-02783-4","relation":{},"ISSN":["0178-2789","1432-2315"],"issn-type":[{"value":"0178-2789","type":"print"},{"value":"1432-2315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,30]]},"assertion":[{"value":"11 January 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}