{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T14:47:09Z","timestamp":1775486829310,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T00:00:00Z","timestamp":1600128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T00:00:00Z","timestamp":1600128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11042-020-09774-w","type":"journal-article","created":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T10:03:01Z","timestamp":1600164181000},"page":"2599-2620","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":59,"title":["Deep learning and handcrafted features for one-class anomaly detection in UAV video"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9320-7814","authenticated-orcid":false,"given":"Amira","family":"Chriki","sequence":"first","affiliation":[]},{"given":"Haifa","family":"Touati","sequence":"additional","affiliation":[]},{"given":"Hichem","family":"Snoussi","sequence":"additional","affiliation":[]},{"given":"Farouk","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,15]]},"reference":[{"key":"9774_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.chemolab.2015.10.003","volume":"149","author":"D Ballabio","year":"2015","unstructured":"Ballabio D (2015) A MATLAB toolbox for Principal Component Analysis and unsupervised exploration of data structure. Chemometr Intell Lab Syst 149:1\u20139","journal-title":"Chemometr Intell Lab Syst"},{"key":"9774_CR2","doi-asserted-by":"crossref","unstructured":"Bera A, Kim S, Manocha D (2016) Realtime anomaly detection using trajectory-level crowd behavior learning. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 50\u201357","DOI":"10.1109\/CVPRW.2016.163"},{"key":"9774_CR3","doi-asserted-by":"crossref","unstructured":"Bonetto M, Korshunov P, Ramponi G, et al. (2015) Privacy in mini-drone based video surveillance. In: 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG). IEEE, pp 1\u20136","DOI":"10.1109\/FG.2015.7285023"},{"key":"9774_CR4","doi-asserted-by":"crossref","unstructured":"Bouindour S, Hu R, Snoussi H (2019) Enhanced Convolutional Neural Network for Abnormal Event Detection in Video Streams. In: 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, pp 172\u2013178","DOI":"10.1109\/AIKE.2019.00039"},{"issue":"7","key":"9774_CR5","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1016\/S0031-3203(96)00142-2","volume":"30","author":"AP Bradley","year":"1997","unstructured":"Bradley AP (1997) The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern recognition 30(7):1145\u20131159","journal-title":"Pattern recognition"},{"issue":"4","key":"9774_CR6","doi-asserted-by":"publisher","first-page":"481","DOI":"10.13031\/aea.13007","volume":"35","author":"Y Cai","year":"2019","unstructured":"Cai Y, Ma L, Liu G (2019) A Night-time Anomaly Detection System of Hog Activities Based on Passive Infrared Detector. Appl Eng Agric 35 (4):481\u2013493","journal-title":"Appl Eng Agric"},{"key":"9774_CR7","doi-asserted-by":"publisher","first-page":"3575","DOI":"10.1007\/s10462-019-09771-y","volume":"53","author":"A Carre\u00f1o","year":"2020","unstructured":"Carre\u00f1o A, Inza I, Lozano JA (2020) Analyzing rare event, anomaly, novelty and outlier detection terms under the supervised classification framework. Artif Intell Rev 53:3575\u20133594. https:\/\/doi.org\/10.1007\/s10462-019-09771-y","journal-title":"Artif Intell Rev"},{"key":"9774_CR8","doi-asserted-by":"crossref","unstructured":"Chalapathy R, Chawla S (2019) Deep learning for anomaly detection: A survey. arXiv:1901.03407","DOI":"10.1145\/3394486.3406704"},{"issue":"5","key":"9774_CR9","doi-asserted-by":"publisher","first-page":"051402","DOI":"10.1117\/1.JEI.26.5.051402","volume":"26","author":"Y-T Chan","year":"2017","unstructured":"Chan Y-T, Wang S-J, Tsai C-H (2017) Extracting foreground ensemble features to detect abnormal crowd behavior in intelligent video-surveillance systems. Journal of Electronic Imaging 26(5):051402","journal-title":"Journal of Electronic Imaging"},{"issue":"3","key":"9774_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM computing surveys (CSUR) 41(3):1\u201358","journal-title":"ACM computing surveys (CSUR)"},{"issue":"3","key":"9774_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang C-C, Lin C-J (2011) LIBSVM: A library for support vector machines. ACM transactions on intelligent systems and technology (TIST) 2(3):1\u201327","journal-title":"ACM transactions on intelligent systems and technology (TIST)"},{"issue":"1","key":"9774_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1186\/s13040-017-0155-3","volume":"10","author":"D Chicco","year":"2017","unstructured":"Chicco D (2017) Ten quick tips for machine learning in computational biology. BioData mining 10(1):35","journal-title":"BioData mining"},{"key":"9774_CR13","doi-asserted-by":"publisher","first-page":"106877","DOI":"10.1016\/j.comnet.2019.106877","volume":"163","author":"A Chriki","year":"2019","unstructured":"Chriki A, Touati H, Snoussi H, Kamoun F (2019) FANET: Communication, mobility models and security issues. Comput Netw 163:106877","journal-title":"Comput Netw"},{"key":"9774_CR14","doi-asserted-by":"crossref","unstructured":"Chriki A, Touati H, Snoussi H, Kamoun F (2019) UAV-GCS Centralized Data-Oriented Communication Architecture for Crowd Surveillance Applications. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 2064\u20132069","DOI":"10.1109\/IWCMC.2019.8766641"},{"key":"9774_CR15","doi-asserted-by":"crossref","unstructured":"Chriki A, Touati H, Snoussi H, Kamoun F (2019) Centralized Cognitive Radio Based Frequency Allocation for UAVs Communication. In: 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 1674\u20131679","DOI":"10.1109\/IWCMC.2019.8766481"},{"key":"9774_CR16","doi-asserted-by":"crossref","unstructured":"Cinelli LP, Thomaz LA, Da Silva AF, et al. (2017) Foreground segmentation for anomaly detection in surveillance videos using deep residual networks. Proceedings of the XXXV simp\u00f3sio Brasileiro De telecomunica\u00e7\u00f5es E Processamento De Sinais, Sao Pedro, Brazil, pp 3\u20136","DOI":"10.14209\/sbrt.2017.74"},{"issue":"3","key":"9774_CR17","first-page":"273","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C, Vapnik V (1995) Support-vector networks. Machine learning 20(3):273\u2013297","journal-title":"Machine learning"},{"key":"9774_CR18","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR\u201905). IEEE, pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"9774_CR19","unstructured":"Diego F, Evangelidis G, Serrat J, Evangelidis G, Serrat J (2012) \u201cNight-time outdoor surveillance with mobile cameras\u201d"},{"issue":"7","key":"9774_CR20","doi-asserted-by":"publisher","first-page":"1858","DOI":"10.1109\/TIP.2010.2095873","volume":"20","author":"F Diego","year":"2010","unstructured":"Diego F, Ponsa D, Serrat J, et al. (2010) Video alignment for change detection. IEEE Trans Image Process 20(7):1858\u20131869","journal-title":"IEEE Trans Image Process"},{"key":"9774_CR21","unstructured":"ExtractHOGFeatures (2020) MathWorks. https:\/\/ch.mathworks.com\/help\/vision\/ref\/extracthogfeatures.html. Accessed 25 January"},{"key":"9774_CR22","doi-asserted-by":"crossref","unstructured":"Fahn C-S, Ling J, Yeh M-Y, et al. (2019) Abnormal Maritime Activity Detection in Satellite Image Sequences Using Trajectory Features. International Journal of Future Computer and Communication, 8(1)","DOI":"10.18178\/ijfcc.2019.8.1.535"},{"key":"9774_CR23","unstructured":"Farooq MU, Khan NA, Ali MS (2017) Unsupervised video surveillance for anomaly detection of street traffic International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"9774_CR24","doi-asserted-by":"crossref","unstructured":"Golda T, Murzyn N, Qu C, et al. (2019) What goes around comes around: Cycle-Consistency-based Short-Term Motion Prediction for Anomaly Detection using Generative Adversarial Networks. In: 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, pp 1\u20138","DOI":"10.1109\/AVSS.2019.8909853"},{"key":"9774_CR25","unstructured":"Googlenet (2020) MathWorks. https:\/\/ch.mathworks.com\/help\/deeplearning\/ref\/googlenet.html. Accessed 15 January"},{"issue":"725\/36","key":"9774_CR26","first-page":"725","volume":"10","author":"G Gordon","year":"2012","unstructured":"Gordon G, Tibshirani R (2012) Karush-kuhn-tucker conditions. Optimization 10(725\/36):725","journal-title":"Optimization"},{"issue":"5-6","key":"9774_CR27","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00138-008-0152-0","volume":"19","author":"N Haering","year":"2008","unstructured":"Haering N, Venetianer P, Lipton A (2008) The evolution of video surveillance: an overview. Mach Vis Appl 19(5-6):279\u2013290","journal-title":"Mach Vis Appl"},{"key":"9774_CR28","doi-asserted-by":"crossref","unstructured":"Henrio J, Nakashima T (2018) Anomaly Detection in Videos Recorded by Drones in a Surveillance Context. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2503\u20132508","DOI":"10.1109\/SMC.2018.00429"},{"key":"9774_CR29","doi-asserted-by":"crossref","unstructured":"Kawachi Y, Koizumi Y, Murata S, et al. (2019) A two-class hyper-spherical autoencoder for supervised anomaly detection. In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, pp 3047\u20133051","DOI":"10.1109\/ICASSP.2019.8683790"},{"issue":"2","key":"9774_CR30","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran BR, Thomas DM, Parakkal R (2018) An overview of deep learning based methods for unsupervised and semi-supervised anomaly detection in videos. Journal of Imaging 4(2):36","journal-title":"Journal of Imaging"},{"key":"9774_CR31","doi-asserted-by":"crossref","unstructured":"Klaser A, Marsza\u0142ek M, Schmid C (2008) A spatio-temporal descriptor based on 3d-gradients","DOI":"10.5244\/C.22.99"},{"issue":"2","key":"9774_CR32","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1023\/B:VISI.0000029664.99615.94","volume":"60","author":"DG Lowe","year":"2004","unstructured":"Lowe DG (2004) Distinctive image features from scale-invariant keypoints. International journal of computer vision 60(2):91\u2013110","journal-title":"International journal of computer vision"},{"key":"9774_CR33","doi-asserted-by":"crossref","unstructured":"Lu X, Ma C, Ni B, et al. (2018) Deep regression tracking with shrinkage loss. In: Proceedings of the European conference on computer vision (ECCV), pp 353\u2013369","DOI":"10.1007\/978-3-030-01264-9_22"},{"key":"9774_CR34","unstructured":"Lu X, Ma C, Ni B, et al. (2019) Adaptive region proposal with channel regularization for robust object tracking IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"9774_CR35","unstructured":"Medel JR, Savakis A (2016) Anomaly detection in video using predictive convolutional long short-term memory networks. arXiv:1612.00390"},{"key":"9774_CR36","first-page":"561","volume-title":"Detection of anomalies in human action using optical flow and gradient tensor. in : smart intelligent computing and applications","author":"SR Mishra","year":"2020","unstructured":"Mishra SR, Mishra TK, Sarkar A, et al. (2020) Detection of anomalies in human action using optical flow and gradient tensor. in : smart intelligent computing and applications. Springer, Singapore, pp 561\u2013570"},{"issue":"2","key":"9774_CR37","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.2017.1600587CM","volume":"55","author":"NH Motlagh","year":"2017","unstructured":"Motlagh NH, Bagaa M, Taleb T (2017) UAV Based IoT platform: A crowd surveillance use case. IEEE Commun Mag 55(2):128\u2013134","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"9774_CR38","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TII.2019.2938527","volume":"16","author":"R Nawaratne","year":"2019","unstructured":"Nawaratne R, Alahakoon D, De Silva D, et al. (2019) Spatiotemporal anomaly detection using deep learning for Real-Time video surveillance. IEEE Transactions on Industrial Informatics 16(1):393\u2013402","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"9774_CR39","doi-asserted-by":"crossref","unstructured":"Olatunji IE, Cheng C-H (2019) Video analytics for visual surveillance and applications: an overview and survey. In: Machine learning paradigms, Springer, Cham, pp 475\u2013515","DOI":"10.1007\/978-3-030-15628-2_15"},{"key":"9774_CR40","doi-asserted-by":"crossref","unstructured":"Patil N, Biswas PK (2016) Global abnormal events detection in surveillance video\u2014A hierarchical approach. In: 2016 Sixth International Symposium on Embedded Computing and System Design (ISED), IEEE, pp 217\u2013222","DOI":"10.1109\/ISED.2016.7977085"},{"issue":"11","key":"9774_CR41","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1080\/14786440109462720","volume":"2","author":"KLIII Pearson","year":"1901","unstructured":"Pearson K L III (1901) On lines and planes of closest fit to systems of points in space. The London Edinburgh, and Dublin Philosophical Magazine and Journal of Science 2(11):559\u2013572","journal-title":"The London Edinburgh, and Dublin Philosophical Magazine and Journal of Science"},{"key":"9774_CR42","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.patrec.2017.07.016","volume":"105","author":"M Ribeiro","year":"2018","unstructured":"Ribeiro M, Lazzaretti AE, Lopes HS (2018) A study of deep convolutional auto-encoders for anomaly detection in videos. Pattern Recogn Lett 105:13\u201322","journal-title":"Pattern Recogn Lett"},{"key":"9774_CR43","doi-asserted-by":"crossref","unstructured":"Saini R, Ahmed A, Dogra DP, et al. (2017) Surveillance scene segmentation based on trajectory classification using supervised learning. In: Proceedings of International Conference on Computer Vision and Image Processing, Springer, Singapore, pp 261\u2013271","DOI":"10.1007\/978-981-10-2104-6_24"},{"key":"9774_CR44","unstructured":"Sch\u00f6lkopf B, Williamson RC, Smola AJ, et al. (2000) Support vector method for novelty detection. In: Advances in neural information processing systems, pp 582\u2013588"},{"issue":"2","key":"9774_CR45","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1111\/j.2517-6161.1974.tb00994.x","volume":"36","author":"M Stone","year":"1974","unstructured":"Stone M (1974) Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society: Series B (Methodological) 36 (2):111\u2013133","journal-title":"Journal of the Royal Statistical Society: Series B (Methodological)"},{"key":"9774_CR46","doi-asserted-by":"crossref","unstructured":"Szegedy C, Liu W, Jia Y, et al. (2015) Going deeper with convolutions. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 1\u20139","DOI":"10.1109\/CVPR.2015.7298594"},{"issue":"3","key":"9774_CR47","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TCSI.2017.2758379","volume":"65","author":"LA Thomaz","year":"2017","unstructured":"Thomaz LA, Jardim E, Da Silva AF, et al. (2017) Anomaly detection in moving-camera video sequences using principal subspace analysis. IEEE Transactions on Circuits and Systems I: Regular Papers 65(3):1003\u20131015","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"issue":"13","key":"9774_CR48","doi-asserted-by":"publisher","first-page":"17375","DOI":"10.1007\/s11042-017-5309-2","volume":"77","author":"T Wang","year":"2018","unstructured":"Wang T, Qiao M, Zhu A, et al. (2018) Abnormal event detection via covariance matrix for optical flow-based feature. Multimedia Tools and Applications 77(13):17375\u201317395","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"9774_CR49","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TIFS.2014.2315971","volume":"9","author":"T Wang","year":"2014","unstructured":"Wang T, Snoussi H (2014) Detection of abnormal visual events via global optical flow orientation histogram. IEEE Transactions on Information Forensics and Security 9(6):988\u2013998","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"1","key":"9774_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s41074-019-0056-0","volume":"11","author":"Y Wang","year":"2019","unstructured":"Wang Y, Yoshihashi R, Kawakami R, et al. (2019) Unsupervised anomaly detection with compact deep features for wind turbine blade images taken by a drone. IPSJ Transactions on Computer Vision and Applications 11(1):1\u20137","journal-title":"IPSJ Transactions on Computer Vision and Applications"},{"key":"9774_CR51","doi-asserted-by":"crossref","unstructured":"Wang S, Zhu E, Yin J, et al. (2016) Anomaly detection in crowded scenes by SL-HOF descriptor and foreground classification. In: 2016 23rd International Conference on Pattern Recognition (ICPR), IEEE, pp 3398\u20133403","DOI":"10.1109\/ICPR.2016.7900159"},{"key":"9774_CR52","doi-asserted-by":"crossref","unstructured":"Wei JY, Zhao JF, Zhao YY, et al. (2018) Unsupervised anomaly detection for traffic surveillance based on background modeling. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp 129\u2013136","DOI":"10.1109\/CVPRW.2018.00025"},{"key":"9774_CR53","doi-asserted-by":"crossref","unstructured":"Wittek P (2014) Unsupervised Learning. In: Quantum machine learning: what quantum computing means to data mining. Academic Press","DOI":"10.1016\/B978-0-12-800953-6.00005-0"},{"key":"9774_CR54","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.cviu.2016.10.010","volume":"156","author":"D Xu","year":"2017","unstructured":"Xu D, Yan Y, Ricci E, et al. (2017) Detecting anomalous events in videos by learning deep representations of appearance and motion. Comput Vis Image Underst 156:117\u2013127","journal-title":"Comput Vis Image Underst"},{"key":"9774_CR55","unstructured":"Yan W, Yu L (2019) On accurate and reliable anomaly detection for gas turbine combustors: A deep learning approach. arXiv:1908.09238"},{"key":"9774_CR56","doi-asserted-by":"crossref","unstructured":"Zhai X, Liu K, Nash W, et al. (2020) Smart Autopilot Drone System for Surface Surveillance and Anomaly Detection via Customizable Deep Neural Network. In: International Petroleum Technology Conference. International Petroleum Technology Conference","DOI":"10.2523\/IPTC-20111-MS"},{"key":"9774_CR57","first-page":"319","volume":"3","author":"A Zhang","year":"2019","unstructured":"Zhang A, Lipton ZC, Li M, et al. (2019) Dive into Deep Learning. Unpublished draft Retrieved 3:319","journal-title":"Unpublished draft Retrieved"},{"key":"9774_CR58","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1016\/j.image.2016.06.007","volume":"47","author":"S Zhou","year":"2016","unstructured":"Zhou S, Shen W, Zeng D, et al. (2016) Spatial\u2013temporal convolutional neural networks for anomaly detection and localization in crowded scenes. Signal Process Image Commun 47:358\u2013368","journal-title":"Signal Process Image Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09774-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09774-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09774-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T21:24:03Z","timestamp":1723584243000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09774-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,15]]},"references-count":58,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["9774"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09774-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,15]]},"assertion":[{"value":"18 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}