{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T21:05:00Z","timestamp":1758402300545,"version":"3.37.3"},"reference-count":88,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10489-021-02881-7","type":"journal-article","created":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:05:35Z","timestamp":1642205135000},"page":"10632-10649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Abnormal behavior detection using streak flow acceleration"],"prefix":"10.1007","volume":"52","author":[{"given":"Jun","family":"Jiang","sequence":"first","affiliation":[]},{"given":"XinYue","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7273-7499","authenticated-orcid":false,"given":"Mingliang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jinfeng","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Chengyuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,15]]},"reference":[{"key":"2881_CR1","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapour-Abarghouei A, Breckon TP (2019) GANomaly: Semi-supervised Anomaly Detection via Adversarial Training. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 11363 LNCS, pp 622\u2013637. https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39","DOI":"10.1007\/978-3-030-20893-6_39"},{"key":"2881_CR2","unstructured":"Bastan M, Yilmaz \u00d6 (2016) Multi-view Product Image Search Using ConvNets Features. CoRR"},{"key":"2881_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.patrec.2017.04.015","volume":"92","author":"A Ben Mabrouk","year":"2017","unstructured":"Ben Mabrouk A, Zagrouba E (2017) Spatio-temporal feature using optical flow based distribution for violence detection. Pattern Recogn Lett 92:62\u201367. https:\/\/doi.org\/10.1016\/j.patrec.2017.04.015","journal-title":"Pattern Recogn Lett"},{"key":"2881_CR4","doi-asserted-by":"publisher","unstructured":"Bilinski P, Bremond F (2016) Human violence recognition and detection in surveillance videos. In: 2016 13Th IEEE international conference on advanced video and signal based surveillance, AVSS 2016, pp 30\u201336. https:\/\/doi.org\/10.1109\/AVSS.2016.7738019","DOI":"10.1109\/AVSS.2016.7738019"},{"key":"2881_CR5","doi-asserted-by":"crossref","unstructured":"Bird N, Atev S, Caramelli N, Martin R, Masoud O, Papanikolopoulos N (2006) Real time, online detection of abandoned objects in public areas. In: Proceedings 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006. IEEE, pp 3775\u20133780","DOI":"10.1109\/ROBOT.2006.1642279"},{"issue":"12","key":"2881_CR6","doi-asserted-by":"publisher","first-page":"5288","DOI":"10.1109\/TIP.2015.2479561","volume":"24","author":"KW Cheng","year":"2015","unstructured":"Cheng KW, Chen YT, Fang WH (2015) Gaussian process regression-based video anomaly detection and localization with hierarchical feature representation. IEEE Trans Image Process 24(12):5288\u20135301","journal-title":"IEEE Trans Image Process"},{"key":"2881_CR7","doi-asserted-by":"publisher","unstructured":"Christoudias CM, Urtasun R, Darrell T (2008) Unsupervised feature selection via distributed coding for multi-view object recognition. In: 26Th IEEE conference on computer vision and pattern recognition, CVPR. IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/CVPR.2008.4587615","DOI":"10.1109\/CVPR.2008.4587615"},{"issue":"3","key":"2881_CR8","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/TCSVT.2016.2637778","volume":"27","author":"RVHM Colque","year":"2016","unstructured":"Colque RVHM, Caetano C, de Andrade MTL, Schwartz WR (2016) Histograms of optical flow orientation and magnitude and entropy to detect anomalous events in videos. IEEE Trans Circ Syst Video Technol 27(3):673\u2013682","journal-title":"IEEE Trans Circ Syst Video Technol"},{"key":"2881_CR9","doi-asserted-by":"crossref","unstructured":"Cui S, Wang S, Zhuo J, Li L, Huang Q, Tian Q (2020) Towards discriminability and diversity: Batch nuclear-norm maximization under label insufficient situations. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp 3941\u20133950","DOI":"10.1109\/CVPR42600.2020.00400"},{"key":"2881_CR10","doi-asserted-by":"publisher","unstructured":"Del Giorno A, Andrew Bagnell J, Hebert M (2016) A discriminative framework for anomaly detection in large videos. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 9909 LNCS, pp 334\u2013349. https:\/\/doi.org\/10.1007\/978-3-319-46454-1_21","DOI":"10.1007\/978-3-319-46454-1_21"},{"key":"2881_CR11","doi-asserted-by":"crossref","unstructured":"Diba A, Sharma V, Van Gool L (2017) Deep temporal linear encoding networks. In: Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, pp 2329\u20132338","DOI":"10.1109\/CVPR.2017.168"},{"key":"2881_CR12","doi-asserted-by":"crossref","unstructured":"Edison A, Jiji C (2015) Hsga: a novel acceleration descriptor for human action recognition. In: 2015 Fifth national conference on computer vision, pattern recognition, image processing and graphics (NCVPRIPG). IEEE, pp 1\u20134","DOI":"10.1109\/NCVPRIPG.2015.7489944"},{"key":"2881_CR13","doi-asserted-by":"crossref","unstructured":"Edison A, Jiji C (2017) Optical acceleration for motion description in videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 39\u201347","DOI":"10.1109\/CVPRW.2017.209"},{"issue":"5","key":"2881_CR14","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1007\/s11760-019-01428-1","volume":"13","author":"A Edison","year":"2019","unstructured":"Edison A, Jiji C (2019) Automated video analysis for action recognition using descriptors derived from optical acceleration. SIViP 13(5):915\u2013922","journal-title":"SIViP"},{"key":"2881_CR15","unstructured":"Eldar A Dense optical flow acceleration (2018). US Patent 10,074,151"},{"key":"2881_CR16","doi-asserted-by":"publisher","unstructured":"Feichtenhofer C, Pinz A, Zisserman A (2016) Convolutional two-stream network fusion for video action recognition. Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1933\u20131941. https:\/\/doi.org\/10.1109\/CVPR.2016.213. http:\/\/www.researchgate.net\/publication\/301878129","DOI":"10.1109\/CVPR.2016.213"},{"key":"2881_CR17","doi-asserted-by":"crossref","unstructured":"Gao M, Jiang J, Ma L, Zhou S, Zou G, Pan J, Liu Z (2019) Violent crowd behavior detection using deep learning and compressive sensing. In: 2019 Chinese control and decision conference (CCDC). IEEE, pp 5329\u20135333","DOI":"10.1109\/CCDC.2019.8832598"},{"issue":"04","key":"2881_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1117\/1.OE.57.4.043109","volume":"57","author":"M Gao","year":"2018","unstructured":"Gao M, Jiang J, Shen J, Zou G, Fu G (2018) Crowd motion segmentation and behavior recognition fusing streak flow and collectiveness. Opt Eng 57(04):1. https:\/\/doi.org\/10.1117\/1.oe.57.4.043109","journal-title":"Opt Eng"},{"key":"2881_CR19","doi-asserted-by":"publisher","unstructured":"Gao Y, Liu H, Sun X, Wang C, Liu Y (2016) Violence detection using Oriented VIolent Flows. Image Vis Comput 48-49:37\u201341. https:\/\/doi.org\/10.1016\/j.imavis.2016.01.006. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0262885616300063","DOI":"10.1016\/j.imavis.2016.01.006"},{"key":"2881_CR20","doi-asserted-by":"publisher","unstructured":"George M, Jose BR, Mathew J, Kokare P (2019) Autoencoder-based abnormal activity detection using parallelepiped spatio-temporal region. IET Comput Vis 13(1):23\u201330. https:\/\/doi.org\/10.1049\/iet-cvi.2018.5240. http:\/\/www.researchgate.net\/publication\/327509358","DOI":"10.1049\/iet-cvi.2018.5240"},{"key":"2881_CR21","doi-asserted-by":"crossref","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour MR, Venkatesh S, Hengel A (2020) Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In: 2019 IEEE\/CVF International conference on computer vision (ICCV)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"2881_CR22","doi-asserted-by":"crossref","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour MR, Venkatesh S, Hengel Avd (2019) Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision (ICCV)","DOI":"10.1109\/ICCV.2019.00179"},{"key":"2881_CR23","doi-asserted-by":"publisher","unstructured":"Hasan M, Choi J, Neumann J, Roy-Chowdhury AK, Davis LS (2016) Learning temporal regularity in video sequences. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 733\u2013742. https:\/\/doi.org\/10.1109\/CVPR.2016.86","DOI":"10.1109\/CVPR.2016.86"},{"key":"2881_CR24","doi-asserted-by":"crossref","unstructured":"Hassner T, Itcher Y, Kliper-Gross O (2012) Violent flows: Real-time detection of violent crowd behavior. In: 2012 IEEE Computer society conference on computer vision and pattern recognition workshops. IEEE, pp 1\u20136","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"2881_CR25","doi-asserted-by":"publisher","unstructured":"Hassner T, Itcher Y, Kliper-Gross O (2012) Violent flows: Real-time detection of violent crowd behavior. In: IEEE Computer society conference on computer vision and pattern recognition workshops, pp 1\u20136. https:\/\/doi.org\/10.1109\/CVPRW.2012.6239348","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"2881_CR26","doi-asserted-by":"crossref","unstructured":"Hinami R, Mei T, Satoh S (2017) Joint detection and recounting of abnormal events by learning deep generic knowledge. In: Proceedings of the IEEE International Conference on Computer Vision, pp 3619\u20133627","DOI":"10.1109\/ICCV.2017.391"},{"key":"2881_CR27","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.patcog.2015.11.018","volume":"59","author":"Z Huchuan","year":"2016","unstructured":"Huchuan Z, Ying R, Xiang S, Shun L (2016) Video anomaly detection based on locality sensitive hashing filters. Pattern Recogn J Pattern Recogn Soc 59:302\u2013311","journal-title":"Pattern Recogn J Pattern Recogn Soc"},{"key":"2881_CR28","doi-asserted-by":"publisher","unstructured":"Ionescu RT, Khan FS, Georgescu MI, Shao L (2019) Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 7834\u20137843. https:\/\/doi.org\/10.1109\/CVPR.2019.00803","DOI":"10.1109\/CVPR.2019.00803"},{"key":"2881_CR29","doi-asserted-by":"publisher","unstructured":"Ionescu RT, Smeureanu S, Alexe B, Popescu M (2017) Unmasking the Abnormal Events in Video. Proceedings of the IEEE International Conference on Computer Vision, 2914\u20132922. https:\/\/doi.org\/10.1109\/ICCV.2017.315. 1705.08182","DOI":"10.1109\/ICCV.2017.315"},{"key":"2881_CR30","doi-asserted-by":"crossref","unstructured":"Kataoka H, He Y, Shirakabe S, Satoh Y (2016) Motion representation with acceleration images. In: European conference on computer vision. Springer, pp 18\u201324","DOI":"10.1007\/978-3-319-49409-8_3"},{"key":"2881_CR31","unstructured":"Kingma DP, Ba J (2014) Adam: A method for stochastic optimization. arXiv:1412.6980"},{"key":"2881_CR32","doi-asserted-by":"publisher","unstructured":"Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. https:\/\/doi.org\/10.3390\/jimaging4020036","DOI":"10.3390\/jimaging4020036"},{"key":"2881_CR33","doi-asserted-by":"crossref","unstructured":"Kratz L, Nishino K (2009) Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. In: 2009 IEEE Conference on computer vision and pattern recognition. IEEE, pp 1446\u20131453","DOI":"10.1109\/CVPR.2009.5206771"},{"key":"2881_CR34","doi-asserted-by":"publisher","first-page":"2395","DOI":"10.1109\/TIP.2019.2948286","volume":"29","author":"S Lee","year":"2020","unstructured":"Lee S, Kim HG, Ro YM (2020) BMAN: Bidirectional Multi-Scale Aggregation networks for abnormal event detection. IEEE Trans Image Process 29:2395\u20132408","journal-title":"IEEE Trans Image Process"},{"key":"2881_CR35","doi-asserted-by":"publisher","unstructured":"Leyva R, Sanchez V, Li CT (2017) Video Anomaly Detection With Compact Feature Sets for Online Performance. IEEE Trans Image Process 26(7), 3463\u20133478. https:\/\/doi.org\/10.1109\/TIP.2017.2695105. http:\/\/www.ncbi.nlm.nih.gov\/pubmed\/28436865","DOI":"10.1109\/TIP.2017.2695105"},{"key":"2881_CR36","doi-asserted-by":"publisher","unstructured":"Li A, Miao Z, Cen Y (2017) Global anomaly detection in crowded scenes based on optical flow saliency. In: 2016 IEEE 18Th international workshop on multimedia signal processing, MMSP 2016. https:\/\/doi.org\/10.1109\/MMSP.2016.7813390","DOI":"10.1109\/MMSP.2016.7813390"},{"key":"2881_CR37","doi-asserted-by":"publisher","unstructured":"Li C, Han Z, Ye Q, Jiao J (2011) Abnormal behavior detection via sparse reconstruction analysis of trajectory. In: Proceedings - 6th International Conference on Image and Graphics, ICIG 2011, pp 807\u2013810. https:\/\/doi.org\/10.1109\/ICIG.2011.104. http:\/\/www.researchgate.net\/publication\/229033791","DOI":"10.1109\/ICIG.2011.104"},{"key":"2881_CR38","doi-asserted-by":"crossref","unstructured":"Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection\u2013a new baseline. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 6536\u20136545","DOI":"10.1109\/CVPR.2018.00684"},{"key":"2881_CR39","unstructured":"Liu Y, Li CL, P\u00f3czos B (2018) Classifier two sample test for video anomaly detections. In: BMVC, pp 71"},{"issue":"8","key":"2881_CR40","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1007\/s11263-018-1129-8","volume":"127","author":"C Lu","year":"2019","unstructured":"Lu C, Shi J, Wang W, Jia J (2019) Fast abnormal event detection. Int J Comput Vis 127(8):993\u20131011. https:\/\/doi.org\/10.1007\/s11263-018-1129-8","journal-title":"Int J Comput Vis"},{"key":"2881_CR41","unstructured":"Lucas BD, Kanade T (1997) An iterative image registration technique with an application tostereo vision. In: Proceedings of the 7th International Joint Conference on ArtificialIntelligence"},{"key":"2881_CR42","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) A revisit of sparse coding based anomaly detection in stacked rnn framework. In: Proceedings of the IEEE International Conference on Computer Vision, pp 341\u2013349","DOI":"10.1109\/ICCV.2017.45"},{"issue":"3","key":"2881_CR43","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TPAMI.2019.2944377","volume":"43","author":"W Luo","year":"2021","unstructured":"Luo W, Liu W, Lian D, Tang J, Duan L, Peng X, Gao S (2021) Video anomaly detection with sparse coding inspired deep neural networks. IEEE Trans Pattern Anal Mach Intell 43(3):1070\u20131084. https:\/\/doi.org\/10.1109\/TPAMI.2019.2944377","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2881_CR44","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.patrec.2017.04.015","volume":"92","author":"AB Mabrouk","year":"2017","unstructured":"Mabrouk AB, Zagrouba E (2017) Spatio-temporal feature using optical flow based distribution for violence detection. Pattern Recogn Lett 92:62\u201367","journal-title":"Pattern Recogn Lett"},{"key":"2881_CR45","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: 2010 IEEE Computer society conference on computer vision and pattern recognition. IEEE, pp 1975\u20131981","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"2881_CR46","doi-asserted-by":"publisher","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1975\u20131981. https:\/\/doi.org\/10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"2881_CR47","doi-asserted-by":"crossref","unstructured":"Mehran R, Moore BE, Shah M (2010) A streakline representation of flow in crowded scenes. In: European conference on computer vision. Springer, pp 439\u2013452","DOI":"10.1007\/978-3-642-15558-1_32"},{"key":"2881_CR48","unstructured":"Memisevic R (2012) On multi-view feature learning. arXiv:1206.4609"},{"key":"2881_CR49","doi-asserted-by":"crossref","unstructured":"Nallaivarothayan H, Fookes C, Denman S, Sridharan S (2014) An mrf based abnormal event detection approach using motion and appearance features. In: 2014 11Th IEEE international conference on advanced video and signal based surveillance (AVSS). IEEE, pp 343\u2013348","DOI":"10.1109\/AVSS.2014.6918692"},{"key":"2881_CR50","doi-asserted-by":"crossref","unstructured":"Nayak NM, Kamal AT, Roy-Chowdhury AK (2011) Vector field analysis for motion pattern identification in video. In: 2011 18Th IEEE international conference on image processing. IEEE, pp 2089\u20132092","DOI":"10.1109\/ICIP.2011.6115893"},{"issue":"6-7","key":"2881_CR51","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.imavis.2012.08.011","volume":"31","author":"NM Nayak","year":"2013","unstructured":"Nayak NM, Zhu Y, Roy-Chowdhury AK (2013) Vector field analysis for multi-object behavior modeling. Image Vis Comput 31(6-7):460\u2013472","journal-title":"Image Vis Comput"},{"key":"2881_CR52","doi-asserted-by":"crossref","unstructured":"Nguyen TN, Meunier J (2019) Anomaly detection in video sequence with appearance-motion correspondence","DOI":"10.1109\/ICCV.2019.00136"},{"key":"2881_CR53","unstructured":"Nievas EB, Suarez OD, Garcia GB, Sukthankar R (2011) Hockey fight detection dataset. In: Computer Analysis of Images and Patterns. Springer, pp 332\u2013339. http:\/\/visilab.etsii.uclm.es\/personas\/oscar\/FightDetection\/"},{"key":"2881_CR54","doi-asserted-by":"crossref","unstructured":"Ohmura J, Egashira A, Satoh S, Miyoshi T, Irie H, Yoshinaga T (2011) Multi-gpu acceleration of optical flow computation in visual functional simulation. In: 2011 Second international conference on networking and computing. IEEE, pp 228\u2013 234","DOI":"10.1109\/ICNC.2011.41"},{"key":"2881_CR55","doi-asserted-by":"crossref","unstructured":"Pang G, Yan C, Shen C, Hengel Avd, Bai X (2020) Self-trained deep ordinal regression for end-to-end video anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"2881_CR56","doi-asserted-by":"crossref","unstructured":"Park H, Noh J, Ham B (2020) Learning memory-guided normality for anomaly detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR)","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"2881_CR57","unstructured":"Radford A, Metz L, Chintala S (2016) Unsupervised representation learning with deep convolutional generative adversarial networks. 4th International Conference on Learning Representations, ICLR 2016 - Conference Track Proceedings. arXiv:1511.06434"},{"key":"2881_CR58","doi-asserted-by":"publisher","unstructured":"Rejitha MR, George SN (2019) An Unsupervised Abnormal Crowd Behavior Detection Technique using Farneback Algorithm. In: 2019 IEEE International conference on electronics, computing and communication technologies, CONECCT 2019, pp 1\u20135. https:\/\/doi.org\/10.1109\/CONECCT47791.2019.9012845","DOI":"10.1109\/CONECCT47791.2019.9012845"},{"key":"2881_CR59","doi-asserted-by":"publisher","unstructured":"Ruiz A, Lopez-de Teruel PE (2009) Diagram techniques for multiple view geometry. Proceedings of the IEEE International Conference on Computer Vision, pp 1865\u20131872. https:\/\/doi.org\/10.1109\/ICCV.2009.5459414","DOI":"10.1109\/ICCV.2009.5459414"},{"key":"2881_CR60","doi-asserted-by":"publisher","unstructured":"Schlegl T, Seeb\u00f6ck P, Waldstein SM, Schmidt-Erfurth U, Langs G (2017) Unsupervised anomaly detection with generative adversarial networks to guide marker discovery. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 10265 LNCS, pp 146\u2013147. https:\/\/doi.org\/10.1007\/978-3-319-59050-9_12","DOI":"10.1007\/978-3-319-59050-9_12"},{"key":"2881_CR61","unstructured":"Simonyan K, Zisserman A (2014) Two-stream convolutional networks for action recognition in videos. arXiv:1406.2199"},{"key":"2881_CR62","doi-asserted-by":"publisher","unstructured":"Singh K, Yamini Preethi K, Vineeth Sai K, Modi CN (2018) Designing an Efficient Framework for Violence Detection in Sensitive Areas using Computer Vision and Machine Learning Techniques. In: 2018 10Th international conference on advanced computing, ICoAC 2018, pp 74\u201379. https:\/\/doi.org\/10.1109\/ICoAC44903.2018.8939110","DOI":"10.1109\/ICoAC44903.2018.8939110"},{"key":"2881_CR63","doi-asserted-by":"crossref","unstructured":"Stephens K (2016) Human and group activity recognition from video sequences. Ph.D. thesis, University of York","DOI":"10.1109\/AVSS.2016.7738071"},{"key":"2881_CR64","doi-asserted-by":"publisher","unstructured":"Stephens K, Bors AG (2016) Grouping multi-vector streaklines for human activity identification. In: 2016 IEEE 12Th image, video, and multidimensional signal processing workshop, IVMSP 2016, pp 1\u20135. https:\/\/doi.org\/10.1109\/IVMSPW.2016.7528185","DOI":"10.1109\/IVMSPW.2016.7528185"},{"key":"2881_CR65","doi-asserted-by":"publisher","unstructured":"Sudhakaran S, Lanz O (2017) Learning to detect violent videos using convolutional long short-term memory. 2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017 pp 1\u20136. https:\/\/doi.org\/10.1109\/AVSS.2017.8078468. http:\/\/www.researchgate.net\/publication\/320662592","DOI":"10.1109\/AVSS.2017.8078468"},{"key":"2881_CR66","doi-asserted-by":"crossref","unstructured":"Sun Q, Liu H, Harada T (2016) Online growing neural gas for anomaly detection in changing surveillance scenes. Pattern Recogn:S0031320316302771","DOI":"10.1016\/j.patcog.2016.09.016"},{"key":"2881_CR67","doi-asserted-by":"publisher","unstructured":"Van Wijk JJ (2002) Image based flow visualization. In: Proceedings of the 29th Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH \u201902, pp 745\u2013754. https:\/\/doi.org\/10.1145\/566570.566646","DOI":"10.1145\/566570.566646"},{"key":"2881_CR68","doi-asserted-by":"publisher","unstructured":"Wang L, Xiong Y, Wang Z, Qiao Y, Lin D, Tang X, van Gool L (2016) Temporal segment networks: Towards good practices for deep action recognition. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 9912 LNCS, pp 20\u201336. https:\/\/doi.org\/10.1007\/978-3-319-46484-8_2","DOI":"10.1007\/978-3-319-46484-8_2"},{"issue":"2","key":"2881_CR69","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cviu.2006.08.008","volume":"105","author":"P Wang","year":"2007","unstructured":"Wang P, Ji Q (2007) Multi-view face and eye detection using discriminant features. Comput Vis Image Underst 105(2):99\u2013111","journal-title":"Comput Vis Image Underst"},{"issue":"3","key":"2881_CR70","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1109\/TPAMI.2008.87","volume":"31","author":"X Wang","year":"2009","unstructured":"Wang X, Ma X, Grimson WEL (2009) Unsupervised activity perception in crowded and complicated scenes using hierarchical bayesian models. IEEE Trans Pattern Anal Mach Intell 31(3):539\u2013555. https:\/\/doi.org\/10.1109\/TPAMI.2008.87","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"6","key":"2881_CR71","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1007\/s00138-016-0746-x","volume":"27","author":"X Wang","year":"2016","unstructured":"Wang X, Qi C (2016) Action recognition using edge trajectories and motion acceleration descriptor. Mach Vis Appl 27(6):861\u2013875","journal-title":"Mach Vis Appl"},{"key":"2881_CR72","doi-asserted-by":"publisher","unstructured":"Wang Y, Zhang Q, Li B (2016) Efficient unsupervised abnormal crowd activity detection based on a spatiotemporal saliency detector. 2016 IEEE Winter Conference on Applications of Computer Vision, WACV 2016 pp 1\u20139. https:\/\/doi.org\/10.1109\/WACV.2016.7477684. http:\/\/www.researchgate.net\/publication\/303563879","DOI":"10.1109\/WACV.2016.7477684"},{"key":"2881_CR73","doi-asserted-by":"publisher","first-page":"3513","DOI":"10.1109\/TIP.2021.3062192","volume":"30","author":"P Wu","year":"2021","unstructured":"Wu P, Liu J (2021) Learning causal temporal relation and feature discrimination for anomaly detection. IEEE Trans Image Process 30:3513\u20133527. https:\/\/doi.org\/10.1109\/TIP.2021.3062192","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"2881_CR74","doi-asserted-by":"publisher","first-page":"3389","DOI":"10.1016\/j.patcog.2012.03.010","volume":"45","author":"S Wu","year":"2012","unstructured":"Wu S, Wong HS (2012) Joint segmentation of collectively moving objects using a bag-of-words model and level set evolution. Pattern Recogn 45(9):3389\u20133401","journal-title":"Pattern Recogn"},{"key":"2881_CR75","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.neucom.2011.12.007","volume":"83","author":"G Xiong","year":"2012","unstructured":"Xiong G, Cheng J, Wu X, Chen YL, Ou Y, Xu Y (2012) An energy model approach to people counting for abnormal crowd behavior detection. Neurocomputing 83:121\u2013135. https:\/\/doi.org\/10.1016\/j.neucom.2011.12.007","journal-title":"Neurocomputing"},{"key":"2881_CR76","doi-asserted-by":"publisher","unstructured":"Xu D, Ricci E, Yan Y, Song J, Sebe N (2015) Learning Deep Representations of Appearance and Motion for Anomalous Event Detection, pp 8.1-8.12. https:\/\/doi.org\/10.5244\/c.29.8","DOI":"10.5244\/c.29.8"},{"key":"2881_CR77","doi-asserted-by":"crossref","unstructured":"Xu D, Ricci E, Yan Y, Song J, Sebe N (2015) Learning deep representations of appearance and motion for anomalous event detection. Computer Vision and Image Understanding","DOI":"10.5244\/C.29.8"},{"key":"2881_CR78","doi-asserted-by":"publisher","unstructured":"Xu L, Gong C, Yang J, Wu Q, Yao L (2014) Violent video detection based on moSIFT feature and sparse coding. In: ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp 3538\u20133542. https:\/\/doi.org\/10.1109\/ICASSP.2014.6854259","DOI":"10.1109\/ICASSP.2014.6854259"},{"issue":"1","key":"2881_CR79","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCDS.2018.2883368","volume":"12","author":"S Yan","year":"2020","unstructured":"Yan S, Smith JS, Lu W, Zhang B (2020) Abnormal event detection from videos using a two-stream recurrent variational autoencoder. IEEE Trans Cogni Dev Syst 12(1):30\u201342. https:\/\/doi.org\/10.1109\/TCDS.2018.2883368","journal-title":"IEEE Trans Cogni Dev Syst"},{"key":"2881_CR80","unstructured":"Zenati H, Foo CS, Lecouat B, Manek G, Chandrasekhar VR (2018) Efficient gan-based anomaly detection. arXiv:1802.06222"},{"key":"2881_CR81","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.patrec.2017.08.021","volume":"107","author":"T Zhang","year":"2018","unstructured":"Zhang T, Jia W, Gong C, Sun J, Song X (2018) Semi-supervised dictionary learning via local sparse constraints for violence detection. Pattern Recogn Lett 107:98\u2013104","journal-title":"Pattern Recogn Lett"},{"issue":"1","key":"2881_CR82","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11042-015-3133-0","volume":"76","author":"T Zhang","year":"2017","unstructured":"Zhang T, Jia W, Yang B, Yang J, He X, Zheng Z (2017) MoWLD: a robust motion image descriptor for violence detection. Multimed Tools Appl 76(1):1419\u20131438. https:\/\/doi.org\/10.1007\/s11042-015-3133-0","journal-title":"Multimed Tools Appl"},{"issue":"12","key":"2881_CR83","doi-asserted-by":"publisher","first-page":"7327","DOI":"10.1007\/s11042-015-2648-8","volume":"75","author":"T Zhang","year":"2016","unstructured":"Zhang T, Yang Z, Jia W, Yang B, Yang J, He X (2016) A new method for violence detection in surveillance scenes. Multimed Tools Appl 75(12):7327\u20137349. https:\/\/doi.org\/10.1007\/s11042-015-2648-8","journal-title":"Multimed Tools Appl"},{"key":"2881_CR84","doi-asserted-by":"crossref","unstructured":"Zhao X, Gong D, Medioni G (2012) Tracking using motion patterns for very crowded scenes. In: European conference on computer vision. Springer, pp 315\u2013328","DOI":"10.1007\/978-3-642-33709-3_23"},{"key":"2881_CR85","unstructured":"Zhao X, Medioni G (2011) Robust unsupervised motion pattern inference from video and applications. In: International conference on computer vision"},{"issue":"10","key":"2881_CR86","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou JT, Du J, Zhu H, Peng X, Liu Y, Goh RSM (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensic Secur 14(10):2537\u20132550. https:\/\/doi.org\/10.1109\/TIFS.2019.2900907","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"10","key":"2881_CR87","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou JT, Du J, Zhu H, Peng X, Liu Y, Goh RSM (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensic Secur 14(10):2537\u20132550","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"2881_CR88","doi-asserted-by":"publisher","unstructured":"Zhou P, Ding Q, Luo H, Hou X (2018) Violence detection in surveillance video using low-level features. PLos One 13(10):e0203668. https:\/\/doi.org\/10.1371\/journal.pone.0203668","DOI":"10.1371\/journal.pone.0203668"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02881-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-021-02881-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-021-02881-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T07:18:38Z","timestamp":1655709518000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-021-02881-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,15]]},"references-count":88,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["2881"],"URL":"https:\/\/doi.org\/10.1007\/s10489-021-02881-7","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2022,1,15]]},"assertion":[{"value":"29 September 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}