{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T14:57:39Z","timestamp":1771945059920,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T00:00:00Z","timestamp":1621123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T00:00:00Z","timestamp":1621123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s10489-021-02356-9","type":"journal-article","created":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T05:02:35Z","timestamp":1621141355000},"page":"1126-1143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Multi-Stream 3D latent feature clustering for abnormality detection in videos"],"prefix":"10.1007","volume":"52","author":[{"given":"Mujtaba","family":"Asad","sequence":"first","affiliation":[]},{"given":"He","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Enmei","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Aftab Ahmad","family":"Malik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,16]]},"reference":[{"key":"2356_CR1","unstructured":"Ruff L, Vandermeulen R, Goernitz N, Deecke L, Siddiqui S A, Binder A, M\u00fcller E, Kloft M (2018) Deep one-class classification. In: International conference on machine learning, pp 4393\u2013 4402"},{"key":"2356_CR2","doi-asserted-by":"crossref","unstructured":"Ravanbakhsh M, Nabi M, Mousavi H, Sangineto E, Sebe N (2018) Plug-and-play cnn for crowd motion analysis: an application in abnormal event detection. In: 2018 IEEE winter conference on applications of computer vision (WACV). IEEE, pp 1689\u20131698","DOI":"10.1109\/WACV.2018.00188"},{"key":"2356_CR3","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) A revisit of sparse coding based anomaly detection in stacked rnn framework. In: Proceedings of the ieee international conference on computer vision, pp 341\u2013349","DOI":"10.1109\/ICCV.2017.45"},{"key":"2356_CR4","doi-asserted-by":"crossref","unstructured":"Del Giorno A, Bagnell J A, Hebert M (2016) A discriminative framework for anomaly detection in large videos. In: European conference on computer vision. Springer, pp 334\u2013349","DOI":"10.1007\/978-3-319-46454-1_21"},{"key":"2356_CR5","doi-asserted-by":"crossref","unstructured":"Hinami R, Mei T, Satoh S (2017) Joint detection and recounting of abnormal events by learning deep generic knowledge. In: Proceedings of the IEEE international conference on computer vision, pp 3619\u20133627","DOI":"10.1109\/ICCV.2017.391"},{"key":"2356_CR6","doi-asserted-by":"crossref","unstructured":"Tudor Ionescu R, Smeureanu S, Alexe B, Popescu M (2017) Unmasking the abnormal events in video. In: Proceedings of the IEEE international conference on computer vision, pp 2895\u2013 2903","DOI":"10.1109\/ICCV.2017.315"},{"key":"2356_CR7","doi-asserted-by":"crossref","unstructured":"Ionescu R T, Smeureanu S, Popescu M, Alexe B (2019) Detecting abnormal events in video using narrowed normality clusters. In: 2019 IEEE winter conference on applications of computer vision (WACV) IEEE, pp 1951\u20131960","DOI":"10.1109\/WACV.2019.00212"},{"key":"2356_CR8","doi-asserted-by":"crossref","unstructured":"Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6536\u20136545","DOI":"10.1109\/CVPR.2018.00684"},{"key":"2356_CR9","doi-asserted-by":"crossref","unstructured":"Hasan M, Choi J, Neumann J, Roy-Chowdhury A K, Davis L S (2016) Learning temporal regularity in video sequences. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 733\u2013742","DOI":"10.1109\/CVPR.2016.86"},{"key":"2356_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.cviu.2016.10.010","volume":"156","author":"D Xu","year":"2017","unstructured":"Xu D, Yan Y, Ricci E, Sebe N (2017) Detecting anomalous events in videos by learning deep representations of appearance and motion. Comput Vis Image Underst 156:117\u2013127","journal-title":"Comput Vis Image Underst"},{"key":"2356_CR11","doi-asserted-by":"crossref","unstructured":"Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 6479\u20136488","DOI":"10.1109\/CVPR.2018.00678"},{"key":"2356_CR12","unstructured":"Fu Z, Hu W, Tan T (2005) Similarity based vehicle trajectory clustering and anomaly detection. In: IEEE international conference on image processing 2005, vol 20 IEEE, pp II\u2013602"},{"key":"2356_CR13","doi-asserted-by":"crossref","unstructured":"Wang X, Tieu K, Grimson E (2006) Learning semantic scene models by trajectory analysis. In: European conference on computer vision. Springer, pp 110\u2013123","DOI":"10.1007\/11744078_9"},{"key":"2356_CR14","doi-asserted-by":"crossref","unstructured":"Zhao B, Fei-Fei L, Xing E P (2011) Online detection of unusual events in videos via dynamic sparse coding. In: CVPR 2011. IEEE, pp 3313\u20133320","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"2356_CR15","doi-asserted-by":"crossref","unstructured":"Cong Y, Yuan J, Liu J (2011) Sparse reconstruction cost for abnormal event detection. In: CVPR 2011. IEEE, pp 3449\u20133456","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"2356_CR16","doi-asserted-by":"crossref","unstructured":"Lu C, Shi J, Jia J (2013) Abnormal event detection at 150 fps in matlab. In: Proceedings of the IEEE international conference on computer vision, pp 2720\u20132727","DOI":"10.1109\/ICCV.2013.338"},{"issue":"6","key":"2356_CR17","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TNNLS.2016.2521602","volume":"28","author":"X Zhu","year":"2016","unstructured":"Zhu X, Li X, Zhang S, Ju C, Wu X (2016) Robust joint graph sparse coding for unsupervised spectral feature selection. IEEE Trans Neural Netw Learn Syst 28(6):1263\u20131275","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"9","key":"2356_CR18","doi-asserted-by":"publisher","first-page":"3737","DOI":"10.1109\/TIP.2014.2332764","volume":"23","author":"X Zhu","year":"2014","unstructured":"Zhu X, Zhang L, Huang Z (2014) A sparse embedding and least variance encoding approach to hashing. IEEE Trans Image Process 23(9):3737\u20133750","journal-title":"IEEE Trans Image Process"},{"key":"2356_CR19","doi-asserted-by":"crossref","unstructured":"Tran D, Bourdev L, Fergus R, Torresani L, Paluri M (2015) Learning spatiotemporal features with 3d convolutional networks. In: Proceedings of the IEEE international conference on computer vision, pp 4489\u20134497","DOI":"10.1109\/ICCV.2015.510"},{"key":"2356_CR20","doi-asserted-by":"publisher","unstructured":"Asad M, Yang J, He J, Shamsolmoali P, He X (2020) Multi-frame feature-fusion-based model for violence detection. Vis Comput:1\u201317. https:\/\/doi.org\/10.1007\/s00371-020-01878-6","DOI":"10.1007\/s00371-020-01878-6"},{"key":"2356_CR21","unstructured":"Krizhevsky A, Sutskever I, Hinton G E (2012) Imagenet classification with deep convolutional neural networks. In: Advances in neural information processing systems, pp 1097\u20131105"},{"key":"2356_CR22","doi-asserted-by":"publisher","first-page":"105590","DOI":"10.1016\/j.knosys.2020.105590","volume":"194","author":"F P\u00e9rez-Hern\u00e1ndez","year":"2020","unstructured":"P\u00e9rez-Hern\u00e1ndez F, Tabik S, Lamas A, Olmos R, Fujita H, Herrera F (2020) Object detection binary classifiers methodology based on deep learning to identify small objects handled similarly: application in video surveillance. Knowl-Based Syst 194:105590","journal-title":"Knowl-Based Syst"},{"key":"2356_CR23","doi-asserted-by":"crossref","unstructured":"Mei S, Ji J, Geng Y, Zhang Z, Li X, Du Q (2019) Unsupervised spatial-spectral feature learning by 3d convolutional autoencoder for hyperspectral classification. IEEE Trans Geosci Remote Sens","DOI":"10.1109\/TGRS.2019.2908756"},{"key":"2356_CR24","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: 2010 IEEE computer society conference on computer vision and pattern recognition. IEEE, pp 1975\u20131981","DOI":"10.1109\/CVPR.2010.5539872"},{"issue":"9","key":"2356_CR25","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1016\/j.sigpro.2009.03.016","volume":"89","author":"P Antonakaki","year":"2009","unstructured":"Antonakaki P, Kosmopoulos D, Perantonis S J (2009) Detecting abnormal human behaviour using multiple cameras. Signal Process 89(9):1723\u20131738","journal-title":"Signal Process"},{"issue":"3","key":"2356_CR26","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.cviu.2010.10.008","volume":"115","author":"F Jiang","year":"2011","unstructured":"Jiang F, Yuan J, Tsaftaris S A, Katsaggelos A K (2011) Anomalous video event detection using spatiotemporal context. Comput Vis Image Underst 115(3):323\u2013333","journal-title":"Comput Vis Image Underst"},{"issue":"3","key":"2356_CR27","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D (2008) Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans Pattern Anal Mach Intell 30(3):555\u2013560","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2356_CR28","doi-asserted-by":"crossref","unstructured":"Saligrama V, Chen Z (2012) Video anomaly detection based on local statistical aggregates. In: 2012 IEEE conference on computer vision and pattern recognition. IEEE, pp 2112\u20132119","DOI":"10.1109\/CVPR.2012.6247917"},{"key":"2356_CR29","doi-asserted-by":"crossref","unstructured":"Feichtenhofer C, Pinz A, Zisserman A (2016) Convolutional two-stream network fusion for video action recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1933\u20131941","DOI":"10.1109\/CVPR.2016.213"},{"key":"2356_CR30","doi-asserted-by":"crossref","unstructured":"Zhong J-X, Li N, Kong W, Liu S, Li T H, Li G (2019) Graph convolutional label noise cleaner: Train a plug-and-play action classifier for anomaly detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1237\u20131246","DOI":"10.1109\/CVPR.2019.00133"},{"key":"2356_CR31","doi-asserted-by":"crossref","unstructured":"Jiang F, Wu Y, Katsaggelos A K (2007) Abnormal event detection from surveillance video by dynamic hierarchical clustering. In: 2007 IEEE international conference on image processing, vol 5. IEEE, pp V\u2013145","DOI":"10.1109\/ICIP.2007.4379786"},{"key":"2356_CR32","doi-asserted-by":"crossref","unstructured":"Bera A, Kim S, Manocha D (2016) Realtime anomaly detection using trajectory-level crowd behavior learning. In: Proceedings of the IEEE conference on computer vision and pattern recognition workshops, pp 50\u201357","DOI":"10.1109\/CVPRW.2016.163"},{"issue":"14","key":"2356_CR33","doi-asserted-by":"publisher","first-page":"19877","DOI":"10.1007\/s11042-019-7332-y","volume":"78","author":"JJ Athanesious","year":"2019","unstructured":"Athanesious J J, Chakkaravarthy S S, Vasuhi S, Vaidehi V (2019) Trajectory based abnormal event detection in video traffic surveillance using general potential data field with spectral clustering. Multimed Tools Appl 78(14):19877\u201319903","journal-title":"Multimed Tools Appl"},{"key":"2356_CR34","doi-asserted-by":"crossref","unstructured":"Tokmakov P, Hebert M, Schmid C (2020) Unsupervised learning of video representations via dense trajectory clustering. arXiv:2006.15731","DOI":"10.1007\/978-3-030-66096-3_28"},{"issue":"5","key":"2356_CR35","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TFUZZ.2012.2233479","volume":"21","author":"H Izakian","year":"2013","unstructured":"Izakian H, Pedrycz W, Jamal I (2013) Clustering spatiotemporal data: an augmented fuzzy c-means. IEEE Trans Fuzzy Syst 21(5):855\u2013868","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"2","key":"2356_CR36","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/s10559-019-00124-9","volume":"55","author":"SV Mashtalir","year":"2019","unstructured":"Mashtalir SV, Stolbovyi MI, Yakovlev SV (2019) Clustering video sequences by the method of harmonic k-means. Cybern Syst Anal 55(2):200\u2013206","journal-title":"Cybern Syst Anal"},{"key":"2356_CR37","doi-asserted-by":"crossref","unstructured":"Wang J, Cherian A, Porikli F (2017) Ordered pooling of optical flow sequences for action recognition. In: 2017 IEEE winter conference on applications of computer vision (WACV). IEEE, pp 168\u2013176","DOI":"10.1109\/WACV.2017.26"},{"key":"2356_CR38","doi-asserted-by":"crossref","unstructured":"Bilen H, Fernando B, Gavves E, Vedaldi A, Gould S (2016) Dynamic image networks for action recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 3034\u20133042","DOI":"10.1109\/CVPR.2016.331"},{"key":"2356_CR39","doi-asserted-by":"crossref","unstructured":"Zhou J T, Zhang L, Fang Z, Du J, Peng X, Yang X (2019) Attention-driven loss for anomaly detection in video surveillance. IEEE transactions on circuits and systems for video technology","DOI":"10.1109\/TCSVT.2019.2962229"},{"issue":"2","key":"2356_CR40","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1109\/TIT.1982.1056489","volume":"28","author":"S Lloyd","year":"1982","unstructured":"Lloyd S (1982) Least squares quantization in pcm. IEEE Trans Inf Theory 28(2):129\u2013137","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"2356_CR41","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv (CSUR) 41(3):15","journal-title":"ACM Comput Surv (CSUR)"},{"key":"2356_CR42","doi-asserted-by":"crossref","unstructured":"Abedalla L, Badarna M, Khalifa W, Yousef M (2019) K\u2013means based one-class svm classifier. In: International conference on database and expert systems applications. Springer, pp 45\u201353","DOI":"10.1007\/978-3-030-27684-3_7"},{"key":"2356_CR43","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1016\/j.patcog.2016.06.001","volume":"60","author":"D Wang","year":"2016","unstructured":"Wang D, Tan X (2016) Unsupervised feature learning with c-svddnet. Pattern Recogn 60:473\u2013485","journal-title":"Pattern Recogn"},{"key":"2356_CR44","unstructured":"Gu Q, Han J (2013) Clustered support vector machines. In: Artificial intelligence and statistics, pp 307\u2013315"},{"key":"2356_CR45","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE international conference on computer vision, pp 1026\u20131034","DOI":"10.1109\/ICCV.2015.123"},{"key":"2356_CR46","unstructured":"Vedaldi A, Fulkerson B (2008) VLFeat: An open and portable library of computer vision algorithms. http:\/\/www.vlfeat.org\/"},{"key":"2356_CR47","doi-asserted-by":"crossref","unstructured":"Chong Y S, Tay Y H (2017) Abnormal event detection in videos using spatiotemporal autoencoder. In: International symposium on neural networks. Springer, pp 189\u2013196","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"2356_CR48","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) Remembering history with convolutional lstm for anomaly detection. In: 2017 IEEE International conference on multimedia and expo (ICME). IEEE, pp 439\u2013444","DOI":"10.1109\/ICME.2017.8019325"},{"issue":"10","key":"2356_CR49","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou J T, Du J, Zhu H, Peng X, Liu Y, Goh R S M (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensic Secur 14(10):2537\u20132550","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2356_CR50","doi-asserted-by":"crossref","unstructured":"Kim J, Grauman K (2009) Observe locally, infer globally: a space-time mrf for detecting abnormal activities with incremental updates. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 2921\u20132928","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"2356_CR51","doi-asserted-by":"crossref","unstructured":"Mehran R, Oyama A, Shah M (2009) Abnormal crowd behavior detection using social force model. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 935\u2013942","DOI":"10.1109\/CVPR.2009.5206641"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02356-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02356-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02356-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T06:43:55Z","timestamp":1642142635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02356-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,16]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["2356"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02356-9","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,16]]},"assertion":[{"value":"13 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflict of interest to declare.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interest"}}]}}