{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T06:35:47Z","timestamp":1773470147866,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T00:00:00Z","timestamp":1658534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T00:00:00Z","timestamp":1658534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["2016YFB0501805"],"award-info":[{"award-number":["2016YFB0501805"]}]},{"name":"the Project of Research and Integrated Demonstration on the Technology of Unmanned Driving and Autonomous Operation of Agricultural Machinery","award":["Z201100008020008"],"award-info":[{"award-number":["Z201100008020008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10489-022-03903-8","type":"journal-article","created":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T08:05:02Z","timestamp":1658563502000},"page":"7728-7740","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Intelligent abnormal behavior detection using double sparseness method"],"prefix":"10.1007","volume":"53","author":[{"given":"Huiyu","family":"Mu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7267-5283","authenticated-orcid":false,"given":"Ruizhi","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zeqiu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,23]]},"reference":[{"issue":"3","key":"3903_CR1","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D (2008) Robust real-time unusual event detection using multiple fixedlocation monitors. IEEE Trans Pattern Anal Mach Intell 30(3):555\u2013560. https:\/\/doi.org\/10.1109\/TPAMI.2007.70825","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3903_CR2","doi-asserted-by":"publisher","unstructured":"Akcay S, Atapourabarghouei A, Breckon T (2018) Ganomaly: semi-supervised anomaly detection via adversarial training. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 622\u2013637. https:\/\/doi.org\/10.1007\/978-3-030-20893-6_39","DOI":"10.1007\/978-3-030-20893-6_39"},{"issue":"6","key":"3903_CR3","doi-asserted-by":"publisher","first-page":"1115","DOI":"10.1007\/s11760-018-1267-z","volume":"12","author":"S Amraee","year":"2018","unstructured":"Amraee S, Vafaei A, Jamshidi K, Adibi P (2018) Abnormal event detection in crowded scenes using one-class svm. Signal Image and Video Process 12(6):1115\u20131123. https:\/\/doi.org\/10.1007\/s11760-018-1267-z","journal-title":"Signal Image and Video Process"},{"key":"3903_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10489-021-02356-9","volume":"145","author":"M Asad","year":"2021","unstructured":"Asad M, Jiang H, Yang J, Tu E, Malik AA (2021) Multi-stream 3D latent feature clustering for abnormality detection in videos. Appl Intell 145:1\u201318. https:\/\/doi.org\/10.1007\/s10489-021-02356-9","journal-title":"Appl Intell"},{"issue":"5","key":"3903_CR5","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/TPAMI.2018.2823766","volume":"41","author":"B Barz","year":"2019","unstructured":"Barz B, Rodner E, Garcia Y, Denzler J (2019) Detecting regions of maximal divergence for spatio-temporal anomaly detection. IEEE Trans Pattern Anal Mach Intell 41(5):1088\u20131101. https:\/\/doi.org\/10.1109\/TPAMI.2018.2823766","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3903_CR6","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.eswa.2017.03.052","volume":"81","author":"G Batchuluun","year":"2017","unstructured":"Batchuluun G, Kim JH, Hong HG, Kang JK, Park KR (2017) Fuzzy system based human behavior recognition by combining behavior prediction and recognition. Expert Syst Appl 81:108\u2013133. https:\/\/doi.org\/10.1016\/j.eswa.2017.03.052","journal-title":"Expert Syst Appl"},{"key":"3903_CR7","doi-asserted-by":"publisher","unstructured":"Cao J, Pang Y, Xie J, Khan F, Shao L (2021) From handcrafted to deep features for pedestrian detection: a survey. IEEE Trans Pattern Anal Mach Intell, 1-23. https:\/\/doi.org\/10.1109\/tpami.2021.3076733","DOI":"10.1109\/tpami.2021.3076733"},{"issue":"2","key":"3903_CR8","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1117\/1.JRS.13.026513","volume":"13","author":"H Chang","year":"2019","unstructured":"Chang H, Wang T, Li A, Fang H (2019) Local hyperspectral anomaly detection method based on low-rank and sparse matrix decomposition. J Appl Remote Sens 13(2):345\u2013352. https:\/\/doi.org\/10.1117\/1.JRS.13.026513","journal-title":"J Appl Remote Sens"},{"key":"3903_CR9","doi-asserted-by":"publisher","unstructured":"Chatfield K, Simonyan K, Vedaldi A, Zisserman A (2014) Return of the devil in the details: delving deep into convolutional nets. Computer Science pp 1\u201311. https:\/\/doi.org\/10.5244\/C.28.6","DOI":"10.5244\/C.28.6"},{"issue":"3","key":"3903_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273\u2013297.https:\/\/doi.org\/10.1023\/A:1022627411411","journal-title":"Mach Learn"},{"issue":"219","key":"3903_CR11","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.neucom.2016.09.063","volume":"219","author":"Y Feng","year":"2017","unstructured":"Feng Y, Yuan Y, Lu X (2017) Learning deep event models for crowd anomaly detection. Neurocomputing. 219(219):548\u2013556. https:\/\/doi.org\/10.1016\/j.neucom.2016.09.063","journal-title":"Neurocomputing."},{"key":"3903_CR12","doi-asserted-by":"publisher","unstructured":"Garcia J, Varona L, Leskovsky P, Nieto M (2016) On-line normality modeling and anomaly event detection using spatio-temporal motion patterns. In: Proceeding of International Conference on Imaging for Crime Detection and Prevention, pp. 1\u20136. https:\/\/doi.org\/10.1049\/ic.2016.0070","DOI":"10.1049\/ic.2016.0070"},{"issue":"1","key":"3903_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1049\/iet-cvi.2018.5240","volume":"13","author":"M George","year":"2019","unstructured":"George M, Jose B, Mathew J, Kokare P (2019) Autoencoder-based abnormal activity detection using parallelepiped spatio-temporal region. IET Comput Vis 13(1):23\u201330. https:\/\/doi.org\/10.1049\/iet-cvi.2018.5240","journal-title":"IET Comput Vis"},{"issue":"6","key":"3903_CR14","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.1109\/TSP.2019.2892026","volume":"67","author":"E Hou","year":"2019","unstructured":"Hou E, Yilmaz Y, Hero A (2019) Anomaly detection in partially observed traffic networks. IEEE Trans Signal Process 67(6):1461\u20131476. https:\/\/doi.org\/10.1109\/TSP.2019.2892026","journal-title":"IEEE Trans Signal Process"},{"key":"3903_CR15","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.knosys.2017.02.024","volume":"123","author":"G Huang","year":"2017","unstructured":"Huang G, Yang Z, Chen X, Ji G (2017) An innovative one-class least squares support vector machine model based on continuous cognition. Knowledge Based System 123:217\u2013228. https:\/\/doi.org\/10.1016\/j.knosys.2017.02.024","journal-title":"Knowledge Based System"},{"key":"3903_CR16","doi-asserted-by":"publisher","unstructured":"Ionescu R T, Khan F S, Georgescu M I, Shao L (2019) Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 7842\u20137851. https:\/\/doi.org\/10.1109\/CVPR.2019.00803","DOI":"10.1109\/CVPR.2019.00803"},{"key":"3903_CR17","doi-asserted-by":"publisher","unstructured":"Jaberi M, Pensky M, Foroosh H (2015) Swift: sparse withdrawal of inliers in a first trial. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition. pp. 4849\u20134857. https:\/\/doi.org\/10.1109\/CVPR.2015.7299118","DOI":"10.1109\/CVPR.2015.7299118"},{"key":"3903_CR18","doi-asserted-by":"publisher","unstructured":"Joshi A, Namboodiri V (2019) Unsupervised synthesis of anomalies in videos: transforming the normal. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138. https:\/\/doi.org\/10.1109\/IJCNN.2019.8852035","DOI":"10.1109\/IJCNN.2019.8852035"},{"key":"3903_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.engappai.2021.104354","volume":"104","author":"A Jvs","year":"2021","unstructured":"Jvs A, Mg A, Wt B et al (2021) VASP: an autoencoder-based approach for multivariate anomaly detection and robust time series prediction with application in motorsport. Eng Appl Artif Intell 104:1\u201317. https:\/\/doi.org\/10.1016\/j.engappai.2021.104354","journal-title":"Eng Appl Artif Intell"},{"key":"3903_CR20","doi-asserted-by":"publisher","unstructured":"Kim J, Grauman K (2009) Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2921\u20132928. https:\/\/doi.org\/10.1109\/CVPR.2009.5206569","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"3903_CR21","unstructured":"Kimura D, Narita M, Munawar A, Tachibana R (2019) Spatially-weighted anomaly detection with regression model. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition. pp.1\u20134"},{"issue":"5","key":"3903_CR22","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1109\/TPAMI.2013.209","volume":"36","author":"J Kittler","year":"2014","unstructured":"Kittler J, Christmas W, De Campos T, Windridge D, Yan F, Illingworth J, Osman M (2014) Domain anomaly detection in machine perception: a system architecture and taxonomy. IEEE Trans Pattern Anal Mach Intell 36(5):845\u2013859. https:\/\/doi.org\/10.1109\/TPAMI.2013.209","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3903_CR23","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.engappai.2017.10.001","volume":"67","author":"KE Ko","year":"2018","unstructured":"Ko KE, Sim KB (2018) Deep convolutional framework for abnormal behavior detection in a smart surveillance system. Eng Appl Artif Intell 67:226\u2013234. https:\/\/doi.org\/10.1016\/j.engappai.2017.10.001","journal-title":"Eng Appl Artif Intell"},{"key":"3903_CR24","doi-asserted-by":"publisher","unstructured":"Lu C, Shi J, Jia J (2014) Abnormal event detection at 150 fps in matlab. In: Proceeding of IEEE International Conference on Computer Vision, pp. 2720\u20132727 https:\/\/doi.org\/10.1109\/ICCV.2013.338","DOI":"10.1109\/ICCV.2013.338"},{"key":"3903_CR25","doi-asserted-by":"publisher","unstructured":"Ma C, Miao Z, Li M, Song S, Yang M (2018) Detecting anomalous trajectories via recurrent neural networks. In: Proceeding of Asian Conference on Computer Vision, pp. 370\u2013382 https:\/\/doi.org\/10.1007\/978-3-030-20870-7_23","DOI":"10.1007\/978-3-030-20870-7_23"},{"key":"3903_CR26","doi-asserted-by":"publisher","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, 1975-1981. https:\/\/doi.org\/10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"3903_CR27","doi-asserted-by":"publisher","unstructured":"Mu H, Sun R, Yuan G, Shi G (2021) Positive unlabeled learning-based anomaly detection in videos. Int J Intell Syst, 1-22. https:\/\/doi.org\/10.1002\/int.22437","DOI":"10.1002\/int.22437"},{"issue":"3","key":"3903_CR28","doi-asserted-by":"publisher","first-page":"522","DOI":"10.5755\/j01.itc.50.3.27864","volume":"50","author":"H Mu","year":"2021","unstructured":"Mu H, Sun R, Yuan G, Wang Y (2021) Abnormal human behavior detection in videos: a review. Inf Technol Control 50(3):522\u2013545. https:\/\/doi.org\/10.5755\/j01.itc.50.3.27864","journal-title":"Inf Technol Control"},{"key":"3903_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.patrec.2017.07.016","volume":"105","author":"M Ribeiro","year":"2018","unstructured":"Ribeiro M, Lazzaretti A, Lopes H (2018) A study of deep convolutional auto-encoders for anomaly detection in videos. Pattern Recogn Lett 105:13\u201322. https:\/\/doi.org\/10.1016\/j.patrec.2017.07.016","journal-title":"Pattern Recogn Lett"},{"key":"3903_CR30","doi-asserted-by":"publisher","unstructured":"Rodrigues R, N Bhargava, Velmurugan R, Chaudhuri S (2020) Multi-timescale trajectory prediction for abnormal human activity detection. In: Proceeding of IEEE Winter Conference on Applications of Computer Vision, 2615\u20132623 https:\/\/doi.org\/10.1109\/WACV45572.2020.9093633","DOI":"10.1109\/WACV45572.2020.9093633"},{"issue":"6","key":"3903_CR31","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1109\/TSMCC.2012.2215319","volume":"42","author":"A Sodemann","year":"2012","unstructured":"Sodemann A, Ross M, Borghetti B (2012) A review of anomaly detection in automated surveillance. IEEE Trans Syst Man Cybern 42(6):1257\u20131272. https:\/\/doi.org\/10.1109\/TSMCC.2012.2215319","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"3903_CR32","doi-asserted-by":"publisher","unstructured":"Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, 6479\u20136488. https:\/\/doi.org\/10.1109\/CVPR.2018.00678","DOI":"10.1109\/CVPR.2018.00678"},{"issue":"3","key":"3903_CR33","doi-asserted-by":"publisher","first-page":"3633","DOI":"10.1007\/s11042-017-5244-2","volume":"78","author":"J Sun","year":"2019","unstructured":"Sun J, Shao J, He C (2019) Abnormal event detection for video surveillance using deep one-class learning. Multimed Tools Appl 78(3):3633\u20133647. https:\/\/doi.org\/10.1007\/s11042-017-5244-2","journal-title":"Multimed Tools Appl"},{"key":"3903_CR34","doi-asserted-by":"publisher","unstructured":"Sun C, Jia YD, Song H, and Wu YW (2021) Adversarial 3D convolutional auto-encoder for abnormal event detection in videos. IEEE Trans Multimedia, PP(99):1-14. https:\/\/doi.org\/10.1109\/TMM.2020.3023303","DOI":"10.1109\/TMM.2020.3023303"},{"key":"3903_CR35","doi-asserted-by":"publisher","first-page":"103554","DOI":"10.1016\/j.engappai.2020.103554","volume":"91","author":"K Wang","year":"2020","unstructured":"Wang K, Lan H (2020) Robust support vector data description for novelty detection with contaminated data. Eng Appl Artif Intell 91:103554. https:\/\/doi.org\/10.1016\/j.engappai.2020.103554","journal-title":"Eng Appl Artif Intell"},{"issue":"12","key":"3903_CR36","doi-asserted-by":"publisher","first-page":"17130","DOI":"10.3390\/s131217130","volume":"13","author":"T Wang","year":"2013","unstructured":"Wang T, Chen J, Zhou Y, Snoussi H (2013) Online least squares one-class support vector machines-based abnormal visual event detection. Sensors. 13(12):17130\u201317155. https:\/\/doi.org\/10.3390\/s131217130","journal-title":"Sensors."},{"key":"3903_CR37","doi-asserted-by":"publisher","unstructured":"Xu D, Ricci E, Yan Y, Song J, Sebe N (2015) Learning deep representations of appearance and motion for anomalous event detection. In: Proceeding of British Machine Vision Conference on Computer Vision and Image Understanding, 1\u201318. https:\/\/doi.org\/10.1016\/j.cviu.2016.10.010","DOI":"10.1016\/j.cviu.2016.10.010"},{"issue":"5","key":"3903_CR38","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/TMM.2018.2818942","volume":"20","author":"K Xu","year":"2018","unstructured":"Xu K, Jiang X, Sun T (2018) Anomaly detection based on stacked sparse coding with intra-frame classification strategy. IEEE Trans Multimedia 20(5):1062\u20131074. https:\/\/doi.org\/10.1109\/TMM.2018.2818942","journal-title":"IEEE Trans Multimedia"},{"key":"3903_CR39","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1007\/s10489-017-1104-z","volume":"48","author":"QY Yu","year":"2018","unstructured":"Yu QY, Luo YL, Chen CM, Wang XH (2018) Trajectory outlier detection approach based on common slices sub-sequence. Appl Intell 48:2661\u20132680. https:\/\/doi.org\/10.1007\/s10489-017-1104-z","journal-title":"Appl Intell"},{"key":"3903_CR40","doi-asserted-by":"publisher","unstructured":"Zhang J, Wang K, Zhu W, Zhong P (2015) Least squares fuzzy one-class support vector machine for imbalanced data. International Journal of Signal Processing, Image Processing and Pattern Recognition, 8, 299-308. https:\/\/doi.org\/10.14257\/ijsip.2015.8.8.31","DOI":"10.14257\/ijsip.2015.8.8.31"},{"key":"3903_CR41","doi-asserted-by":"publisher","unstructured":"Zhao B, Li F, Xing E (2011) Online detection of unusual events in videos via dynamic sparse coding. In: Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 3313\u20133320. https:\/\/doi.org\/10.1109\/CVPR.2011.5995524","DOI":"10.1109\/CVPR.2011.5995524"},{"issue":"2","key":"3903_CR42","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/s10489-017-0978-0","volume":"48","author":"Y Zhao","year":"2018","unstructured":"Zhao Y, Xi P, Li B, Li Z (2018) Sparse kernel minimum squared error using householder transformation and givens rotation. Appl Artif Intell 48(2):390\u2013415. https:\/\/doi.org\/10.1007\/s10489-017-0978-0","journal-title":"Appl Artif Intell"},{"key":"3903_CR43","doi-asserted-by":"publisher","first-page":"104177","DOI":"10.1016\/j.engappai.2021.104177","volume":"100","author":"YP Zhao","year":"2021","unstructured":"Zhao YP, Xie YL, Ye ZF (2021) A new dynamic radius SVDD for fault detection of aircraft engine. Eng Appl Artif Intell 100:104177. https:\/\/doi.org\/10.1016\/j.engappai.2021.104177","journal-title":"Eng Appl Artif Intell"},{"issue":"10","key":"3903_CR44","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"J Zhou","year":"2019","unstructured":"Zhou J, Du J, Zhu H, Peng X, Liu Y, Goh R (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensics Secur 14(10):2537\u20132550. https:\/\/doi.org\/10.1109\/TIFS.2019.2900907","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03903-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-022-03903-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-022-03903-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,16]],"date-time":"2023-03-16T02:23:39Z","timestamp":1678933419000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-022-03903-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,23]]},"references-count":44,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3903"],"URL":"https:\/\/doi.org\/10.1007\/s10489-022-03903-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,23]]},"assertion":[{"value":"14 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}