{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:24:04Z","timestamp":1772119444455,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"9-10","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s00500-025-10664-2","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T04:12:55Z","timestamp":1749442375000},"page":"4449-4459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Robust prediction method for pedestrian trajectories in occluded video scenarios"],"prefix":"10.1007","volume":"29","author":[{"given":"Aria","family":"Seo","sequence":"first","affiliation":[]},{"given":"Hyeonjin","family":"Jeon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2580-4393","authenticated-orcid":false,"given":"Yunsik","family":"Son","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"issue":"19","key":"10664_CR1","doi-asserted-by":"publisher","first-page":"10951","DOI":"10.3390\/app131910951","volume":"13","author":"S Alabdulwahab","year":"2023","unstructured":"Alabdulwahab S, Kim YT, Seo A, Son Y (2023) Generating synthetic dataset for ML-based IDS using CTGAN and feature selection to protect smart IoT environments. Appl Sci 13(19):10951. https:\/\/doi.org\/10.3390\/app131910951","journal-title":"Appl Sci"},{"key":"10664_CR2","doi-asserted-by":"publisher","unstructured":"Alahi A, Goel K, Ramanathan V, Robicquet A, Fei-Fei L, Savarese S (2016) Social lstm: human trajectory prediction in crowded spaces. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 961\u2013971. https:\/\/doi.org\/10.1109\/cvpr.2016.110","DOI":"10.1109\/cvpr.2016.110"},{"key":"10664_CR3","doi-asserted-by":"publisher","unstructured":"Chen G, Chen Z, Fan S, Zhang K (2023) Unsupervised sampling promoting for stochastic human trajectory prediction. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition, 17874\u201317884. https:\/\/doi.org\/10.1109\/cvpr52729.2023.01714","DOI":"10.1109\/cvpr52729.2023.01714"},{"key":"10664_CR4","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 770\u2013778). https:\/\/doi.org\/10.1109\/cvpr.2016.90","DOI":"10.1109\/cvpr.2016.90"},{"key":"10664_CR5","doi-asserted-by":"publisher","unstructured":"He L, Liao X, Liu W, Liu X, Cheng P, Mei T (2023) Fastreid: a pytorch toolbox for general instance re-identification. In: Proceedings of the 31st ACM International Conference on Multimedia, 9664\u20139667. https:\/\/doi.org\/10.1145\/3581783.361346","DOI":"10.1145\/3581783.361346"},{"issue":"5","key":"10664_CR6","doi-asserted-by":"publisher","first-page":"4282","DOI":"10.1103\/physreve.51.4282","volume":"51","author":"D Helbing","year":"1995","unstructured":"Helbing D, Moln\u00e1r P (1995) Social force model for pedestrian dynamics. Phys Rev E 51(5):4282\u20134286. https:\/\/doi.org\/10.1103\/physreve.51.4282","journal-title":"Phys Rev E"},{"key":"10664_CR7","doi-asserted-by":"publisher","unstructured":"Isafiade, O. E., & Bagula, A. B. (2017). Fostering smart city development in developing nations: a crime series data analytics approach. 2017 ITU Kaleidoscope: challenges for a data-driven society (ITU K), 1\u20138. IEEE. https:\/\/doi.org\/10.23919\/itu-wt.2017.8246992","DOI":"10.23919\/itu-wt.2017.8246992"},{"issue":"9","key":"10664_CR8","doi-asserted-by":"publisher","first-page":"3051","DOI":"10.3390\/s21093051","volume":"21","author":"D Kim","year":"2021","unstructured":"Kim D, Ihm SY, Son Y (2021) Two-level blockchain system for digital crime evidence management. Sensors 21(9):3051. https:\/\/doi.org\/10.3390\/s21093051","journal-title":"Sensors"},{"key":"10664_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102023","volume":"55","author":"J Laufs","year":"2020","unstructured":"Laufs J, Borrion H, Bradford B (2020) Security and the smart city: a systematic review. Sustain Cities Soc 55:102023. https:\/\/doi.org\/10.1016\/j.scs.2020.102023","journal-title":"Sustain Cities Soc"},{"key":"10664_CR10","doi-asserted-by":"publisher","unstructured":"Lee, J. G., Han, J., & Whang, K. Y. (2007). Trajectory clustering: a partition-and-group framework. In: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, 593\u2013604. https:\/\/doi.org\/10.1145\/1247480.1247546","DOI":"10.1145\/1247480.1247546"},{"key":"10664_CR11","doi-asserted-by":"publisher","unstructured":"Mangalam K, Girase H, Agarwal S, Lee KH, Adeli E, Malik J, Gaidon A (2020) It is not the journey but the destination: endpoint conditioned trajectory prediction. In: Computer vision\u2013ECCV 2020: 16th European conference, Glasgow, UK, August 23\u201328, 2020, Proceedings, Part II 16. Springer International Publishing, pp. 759\u2013776. https:\/\/doi.org\/10.1007\/978-3-030-58536-5_45","DOI":"10.1007\/978-3-030-58536-5_45"},{"key":"10664_CR12","doi-asserted-by":"publisher","unstructured":"Mangalam K, An Y, Girase H, Malik J (2021) From goals, waypoints & paths to long term human trajectory forecasting. In: Proceedings of the IEEE\/CVF international conference on computer vision, pp. 15233\u201315242. https:\/\/doi.org\/10.1109\/iccv48922.2021.01495","DOI":"10.1109\/iccv48922.2021.01495"},{"key":"10664_CR13","doi-asserted-by":"publisher","unstructured":"Morris B, Trivedi M (2009) Learning trajectory patterns by clustering: experimental studies and comparative evaluation. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition, 312\u2013319. IEEE. https:\/\/doi.org\/10.1109\/cvpr.2009.5206559","DOI":"10.1109\/cvpr.2009.5206559"},{"issue":"6","key":"10664_CR14","doi-asserted-by":"publisher","first-page":"3502","DOI":"10.3390\/app13063502","volume":"13","author":"DH Nguyen","year":"2023","unstructured":"Nguyen DH, Seo A, Nnamdi NP, Son Y (2023) False alarm reduction method for weakness static analysis using BERT model. Appl Sci 13(6):3502. https:\/\/doi.org\/10.3390\/app13063502","journal-title":"Appl Sci"},{"issue":"16","key":"10664_CR15","doi-asserted-by":"publisher","first-page":"5162","DOI":"10.3390\/s24165162","volume":"24","author":"A Seo","year":"2024","unstructured":"Seo A, Woo S, Son Y (2024a) Enhanced vision-based taillight signal recognition for analyzing forward vehicle behavior. Sensors 24(16):5162. https:\/\/doi.org\/10.3390\/s24165162","journal-title":"Sensors"},{"key":"10664_CR16","doi-asserted-by":"publisher","unstructured":"Seo A, Kim YT, Yang JS, Lee Y, Son Y (2024) Software weakness detection in solidity smart contracts using control and data flow analysis: a novel approach with graph neural networks. Electronics (2079\u20139292), 13(16). https:\/\/doi.org\/10.3390\/electronics13163162","DOI":"10.3390\/electronics13163162"},{"key":"10664_CR17","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11263-011-0459-6","volume":"95","author":"X Wang","year":"2011","unstructured":"Wang X, Ma KT, Ng GW, Grimson WEL (2011) Trajectory analysis and semantic region modeling using nonparametric hierarchical bayesian models. Int J Comput Vision 95:287\u2013312. https:\/\/doi.org\/10.1007\/s11263-011-0459-6","journal-title":"Int J Comput Vision"},{"key":"10664_CR18","doi-asserted-by":"publisher","unstructured":"Xu Y, Piao Z, Gao S (2018) Encoding crowd interaction with deep neural network for pedestrian trajectory prediction. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 5275\u20135284. https:\/\/doi.org\/10.1109\/cvpr.2018.00553","DOI":"10.1109\/cvpr.2018.00553"},{"key":"10664_CR19","doi-asserted-by":"publisher","unstructured":"Yamaguchi K, Berg AC, Ortiz LE, Berg TL (2011) Who are you with and where are you going? In CVPR. IEEE. https:\/\/doi.org\/10.1109\/cvpr.2011.5995468","DOI":"10.1109\/cvpr.2011.5995468"},{"issue":"6","key":"10664_CR20","doi-asserted-by":"publisher","first-page":"2872","DOI":"10.1109\/tpami.2021.3054775","volume":"44","author":"M Ye","year":"2021","unstructured":"Ye M, Shen J, Lin G, Xiang T, Shao L, Hoi SC (2021) Deep learning for person re-identification: a survey and outlook. IEEE Trans Pattern Anal Mach Intell 44(6):2872\u20132893. https:\/\/doi.org\/10.1109\/tpami.2021.3054775","journal-title":"IEEE Trans Pattern Anal Mach Intell"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10664-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-025-10664-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-025-10664-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:18:49Z","timestamp":1751501929000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-025-10664-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":20,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10664"],"URL":"https:\/\/doi.org\/10.1007\/s00500-025-10664-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-4001818\/v1","asserted-by":"object"}]},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5]]},"assertion":[{"value":"18 January 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human participants and\/or animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}