{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:16:19Z","timestamp":1769746579240,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"visvesvaraya PhD Scheme","award":["MEITY-PHD-2608"],"award-info":[{"award-number":["MEITY-PHD-2608"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11042-021-11781-4","type":"journal-article","created":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T10:02:52Z","timestamp":1639476172000},"page":"5259-5277","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Crowd abnormality detection in video sequences using supervised convolutional neural network"],"prefix":"10.1007","volume":"81","author":[{"given":"Ruchika","family":"Lalit","sequence":"first","affiliation":[]},{"given":"Ravindra Kumar","family":"Purwar","sequence":"additional","affiliation":[]},{"given":"Shailesh","family":"Verma","sequence":"additional","affiliation":[]},{"given":"Anchal","family":"Jain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,14]]},"reference":[{"key":"11781_CR1","doi-asserted-by":"publisher","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D (2008) Robust real-time unusual event detection using multiple fixed-location monitors.\u00a0IEEE Trans Pattern Anal Mach Intell 30(3):555-560. https:\/\/doi.org\/10.1109\/TPAMI.2007.70825","DOI":"10.1109\/TPAMI.2007.70825"},{"key":"11781_CR2","doi-asserted-by":"publisher","unstructured":"Benezeth Y, Jodoin PM, Saligrama V, Rosenberger C (2009) Abnormal events detection based on spatio-temporalco-occurences. In: 2009 IEEE conference on computer vision and pattern recognition. IEEE, pp 2458-2465. https:\/\/doi.org\/10.1109\/CVPR.2009.5206686","DOI":"10.1109\/CVPR.2009.5206686"},{"key":"11781_CR3","doi-asserted-by":"crossref","unstructured":"Bishop CM (1995)\u00a0Neural networks for pattern recognition. Oxford University Press, Oxford","DOI":"10.1201\/9781420050646.ptb6"},{"key":"11781_CR4","doi-asserted-by":"publisher","unstructured":"Cheng JM, Wang HC (2004) A method of estimating the equal error rate for automatic speaker verification. In:\u00a02004 International Symposium on Chinese Spoken Language Processing. IEEE, pp 285-288. https:\/\/doi.org\/10.1109\/CHINSL.2004.1409642","DOI":"10.1109\/CHINSL.2004.1409642"},{"key":"11781_CR5","unstructured":"Chollet F (2018)\u00a0Deep learning with Python, vol 361. Manning, New York"},{"key":"11781_CR6","doi-asserted-by":"publisher","unstructured":"Cong Y, Yuan J, Liu J (2011) Sparse reconstruction cost for abnormal event detection. In: CVPR 2011. IEEE, pp 3449-3456. https:\/\/doi.org\/10.1109\/CVPR.2011.5995434","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"11781_CR7","doi-asserted-by":"publisher","unstructured":"Cong Y, Yuan J, Liu J (2013) Abnormal event detection in crowded scenes using sparse representation.\u00a0Pattern Recognit 46(7):1851-1864. https:\/\/doi.org\/10.1016\/j.patcog.2012.11.021","DOI":"10.1016\/j.patcog.2012.11.021"},{"key":"11781_CR8","unstructured":"CUHK Avenue dataset \u2013\u00a0http:\/\/www.cse.cuhk.edu.hk\/leojia\/projects\/detectabnormal\/dataset.html. Accessed 6 Dec 2021"},{"key":"11781_CR9","doi-asserted-by":"publisher","unstructured":"DelGiorno A, Bagnell JA, Hebert M (2016) A discriminative framework for anomaly detection in large videos. In: European Conference on Computer Vision. Springer, Cham, pp 334-349. https:\/\/doi.org\/10.1007\/978-3-319-46454-1_21","DOI":"10.1007\/978-3-319-46454-1_21"},{"key":"11781_CR10","doi-asserted-by":"publisher","unstructured":"Fang Z, Fei F, Fang Y, Lee C, Xiong N, Shu L, Chen S (2016) Abnormal event detection in crowded scenes based on deep learning.\u00a0Multimed Tools Appl 75(22):14617-14639. https:\/\/doi.org\/10.1007\/s11042-016-3316-3","DOI":"10.1007\/s11042-016-3316-3"},{"key":"11781_CR11","doi-asserted-by":"crossref","unstructured":"Farabet C, Couprie C, Najman L, LeCun Y (2012) Learning hierarchical features for scene labeling.\u00a0IEEE Trans Pattern Anal Mach Intell 35(8):1915-1929.\u00a0https:\/\/ieeexplore.ieee.org\/document\/6338939.\u00a0Accessed 6 Dec 2021","DOI":"10.1109\/TPAMI.2012.231"},{"key":"11781_CR12","doi-asserted-by":"publisher","unstructured":"Feichtenhofer C, Pinz A, Zisserman A (2016) Convolutionaltwo-streamnetworkfusionforvideoactionrecognition. In:\u00a0Proceedings of the IEEE conference on computer vision and pattern recognition, pp.1933-1941.\u00a0https:\/\/doi.org\/10.1109\/CVPR.2016.21","DOI":"10.1109\/CVPR.2016.21"},{"key":"11781_CR13","doi-asserted-by":"publisher","unstructured":"Feng Y, Yuan Y, Lu X (2017) Learning deep event models for crowd anomaly detection.\u00a0Neurocomputing 219:548-556. https:\/\/doi.org\/10.1016\/j.neucom.2016.09.063","DOI":"10.1016\/j.neucom.2016.09.063"},{"key":"11781_CR14","doi-asserted-by":"publisher","unstructured":"Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In:\u00a0Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580-587. https:\/\/doi.org\/10.1109\/CVPR.2014.81","DOI":"10.1109\/CVPR.2014.81"},{"key":"11781_CR15","doi-asserted-by":"publisher","unstructured":"Hasan M, Choi J, Neumann J, Roy-Chowdhury AK, Davis LS (2016) Learning temporal regularity in video sequences. In:\u00a0Proceedings of the IEEE conference on computer vision and pattern recognition, pp 733-742. https:\/\/doi.org\/10.1109\/CVPR.2016.86","DOI":"10.1109\/CVPR.2016.86"},{"key":"11781_CR16","doi-asserted-by":"publisher","unstructured":"Hassner T, Itcher Y, Kliper-Gross O (2012) Violent-Flows: Real-time detection of violent crowd behavior. In:\u00a02012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE, pp 1-6. https:\/\/doi.org\/10.1109\/CVPRW.2012.6239348","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"11781_CR17","doi-asserted-by":"publisher","unstructured":"Hinami R, Mei T, Satoh SI (2017) Joint detection and recounting of abnormal events by learning deep generic knowledge. In:\u00a0Proceedings of the IEEE International Conference on Computer Vision, pp 3619-3627. https:\/\/doi.org\/10.1109\/ICCV.2017.39","DOI":"10.1109\/ICCV.2017.39"},{"key":"11781_CR18","doi-asserted-by":"publisher","unstructured":"Hu X, Huang Y, Gao X, Luo L, Duan Q (2018) Squirrel-cage local binary pattern and its application in video anomaly detection.\u00a0IEEE Trans Inf Forensics Secur 14(4):1007-1022. https:\/\/doi.org\/10.1109\/TIFS.2018.2868617L","DOI":"10.1109\/TIFS.2018.2868617L"},{"key":"11781_CR19","doi-asserted-by":"publisher","unstructured":"Huang S, Huang D, Zhou X (2018) Learning multimodal deep representations for crowd anomaly event detection.\u00a0Math Prob Eng 2018. https:\/\/doi.org\/10.1155\/2018\/6323942","DOI":"10.1155\/2018\/6323942"},{"key":"11781_CR20","doi-asserted-by":"publisher","unstructured":"Irani M, Boiman O (2005) Detecting irregularities in images and videos. In:\u00a0Proc ICCV. https:\/\/doi.org\/10.1007\/s11263-006-0009-9","DOI":"10.1007\/s11263-006-0009-9"},{"key":"11781_CR21","doi-asserted-by":"crossref","unstructured":"Jager M, Knoll C, Hamprecht FA (2008) Weakly supervised learning of a classifier for unusual event detection. IEEE Trans Image Process 17(9):1700\u20131708","DOI":"10.1109\/TIP.2008.2001043"},{"key":"11781_CR22","doi-asserted-by":"publisher","unstructured":"Kim J, Grauman K (2009) Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates. In:\u00a02009 IEEE conference on computer vision and pattern recognition. IEEE, pp 2921-2928. https:\/\/doi.org\/10.1109\/CVPR.2009.5206569","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"11781_CR23","doi-asserted-by":"publisher","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2012) Imagenet classification with deep convolutional neural networks.\u00a0Adv Neural Inf Process Syst 25:1097-1105. https:\/\/doi.org\/10.1145\/3065386","DOI":"10.1145\/3065386"},{"key":"11781_CR24","doi-asserted-by":"publisher","unstructured":"Kumar M, Bhatnagar C (2017) Crowd behavior recognition using hybrid tracking model and genetic algorithm enabled neural network.\u00a0Int J Comput Intell Syst 10(1):234-246. https:\/\/doi.org\/10.2991\/ijcis.2017.10.1.16","DOI":"10.2991\/ijcis.2017.10.1.16"},{"key":"11781_CR25","doi-asserted-by":"publisher","unstructured":"Lalit R, Purwar R (2019) Abnormality detection using LBP features and K-means labelling based feed-forward neural network in video sequence.\u00a0Int J Innov Technol Explor Eng (IJITEE) 8(9S):629-633. https:\/\/doi.org\/10.35940\/ijitee.I1100.0789S19","DOI":"10.35940\/ijitee.I1100.0789S19"},{"key":"11781_CR26","doi-asserted-by":"publisher","unstructured":"Li HP, Hu ZY, Wu YH, Wu FC (2007) Behavior modeling and abnormality detection based on semi-supervised learning method.\u00a0Ruan Jian Xue Bao(J Softw) 18(3):527-537. https:\/\/doi.org\/10.1360\/jos180527","DOI":"10.1360\/jos180527"},{"key":"11781_CR27","doi-asserted-by":"publisher","unstructured":"Li W, Mahadevan V, Vasconcelos N (2013) Anomaly detection and localization in crowded scenes.\u00a0IEEE Trans Pattern Anal Mach Intell 36(1):18-32. https:\/\/doi.org\/10.1109\/TPAMI.2013.111","DOI":"10.1109\/TPAMI.2013.111"},{"key":"11781_CR28","doi-asserted-by":"publisher","unstructured":"Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection\u2013a new baseline. In\u00a0Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 6536-6545. https:\/\/doi.org\/10.1109\/ICME.2017.8019325","DOI":"10.1109\/ICME.2017.8019325"},{"key":"11781_CR29","doi-asserted-by":"publisher","unstructured":"Luo W, Liu W, Gao S (2017) Remembering history with convolutional LSTM for anomaly detection. In:\u00a02017 IEEE International Conference on Multimedia and Expo (ICME). IEEE, pp 439-444. https:\/\/doi.org\/10.1109\/ICME.2017.8019325","DOI":"10.1109\/ICME.2017.8019325"},{"key":"11781_CR30","doi-asserted-by":"publisher","unstructured":"Luo W, Liu W, Gao S (2017) A revisit of sparse coding based anomaly detection in stacked RNN framework. In:\u00a0Proceedings of the IEEE International Conference on Computer Vision, pp 341-349. https:\/\/doi.org\/10.1109\/ICCV.2017.45","DOI":"10.1109\/ICCV.2017.45"},{"key":"11781_CR31","doi-asserted-by":"publisher","unstructured":"Lv F, Nevatia R (2007) Single view human action recognition using key pose matching and viterbi path searching. In:\u00a02007 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, pp 1-8. https:\/\/doi.org\/10.1109\/CVPR.2007.383131","DOI":"10.1109\/CVPR.2007.383131"},{"key":"11781_CR32","doi-asserted-by":"publisher","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomalydetectionincrowdedscenes. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE, pp\u00a01975-1981. https:\/\/doi.org\/10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"11781_CR33","doi-asserted-by":"publisher","unstructured":"Mehran R, Oyama A, Shah M (2009) Abnormal crowd behavior detection using social force model. In: 2009 IEEE Conference on Computer Vision and Pattern Recognition. IEEE, pp 935-942. https:\/\/doi.org\/10.1109\/CVPR.2009.5206641","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"11781_CR34","doi-asserted-by":"publisher","unstructured":"Sabokrou M, Khalooei M, Fathy M, Adeli E (2018) Adversarially learned one-class classifier for novelty detection. In;\u00a0Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 3379-3388. https:\/\/doi.org\/10.1109\/CVPR.2018.00356","DOI":"10.1109\/CVPR.2018.00356"},{"key":"11781_CR35","doi-asserted-by":"publisher","unstructured":"Sabokrou M, Fayyaz M, Fathy M, Moayed Z, Klette R (2018) Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes. Comput Vis Image Underst 172:88-97. https:\/\/doi.org\/10.1016\/j.cviu.2018.02.006","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"11781_CR36","doi-asserted-by":"publisher","unstructured":"Sabzalian B, Marvi H, Ahmadyfard A (2019) Deep and sparse features for anomaly detection and localization in video. In: 2019 4th International Conferenceon Pattern Recognition and Image Analysis (IPRIA). IEEE, pp 173-178. https:\/\/doi.org\/10.1109\/PRIA.2019.8786007","DOI":"10.1109\/PRIA.2019.8786007"},{"key":"11781_CR37","doi-asserted-by":"publisher","unstructured":"Sikdar A, Chowdhury AS (2020) An adaptive training-less framework for anomaly detection in crowd scenes. Neurocomputing 415:317-331. https:\/\/doi.org\/10.1016\/j.neucom.2020.07.058","DOI":"10.1016\/j.neucom.2020.07.058"},{"key":"11781_CR38","unstructured":"Simonyan K, Zisserman A (2014) Two-stream convolutional networks for action recognition in videos.\u00a0arXiv preprint arXiv:1406.2199"},{"key":"11781_CR39","doi-asserted-by":"publisher","unstructured":"Singh K, Rajora S, Vishwakarma DK, Tripathi G, Kumar S, Walia GS (2020) Crowd anomaly detection using aggregation of ensembles of fine-tuned convnets.\u00a0Neurocomputing 371:188-198. https:\/\/doi.org\/10.1016\/j.neucom.2019.08.059","DOI":"10.1016\/j.neucom.2019.08.059"},{"key":"11781_CR40","doi-asserted-by":"publisher","unstructured":"Sun J, Shao J, He C (2019) Abnormal event detection for video surveillance using deep one-class learning. Multimed Tools Appl 78(3):3633-3647. https:\/\/doi.org\/10.1007\/s11042-017-5244-2","DOI":"10.1007\/s11042-017-5244-2"},{"key":"11781_CR41","doi-asserted-by":"publisher","unstructured":"Tang Y, Zhao L, Zhang S, Gong C, Li G, Yang J (2020) Integrating prediction and reconstruction for anomaly detection.\u00a0Pattern Recognit Lett 129:123-130. https:\/\/doi.org\/10.1016\/j.patrec.2019.11.024","DOI":"10.1016\/j.patrec.2019.11.024"},{"key":"11781_CR42","doi-asserted-by":"publisher","unstructured":"Tudor Ionescu R, Smeureanu S, Alexe B, Popescu M (2017) Unmasking the abnormal events in video. In: Proceedings of the IEEE International Conference on Computer Vision, pp 2895-2903. https:\/\/doi.org\/10.1109\/ICCV.2017.315","DOI":"10.1109\/ICCV.2017.315"},{"key":"11781_CR43","unstructured":"UCSD Dataset\u2013http:\/\/www.svcl.ucsd.edu\/projects\/anomaly\/dataset.htm.\u00a0Accessed 6 Dec 2021"},{"key":"11781_CR44","doi-asserted-by":"publisher","unstructured":"Wang Y, Li X, Ding X (2016) Probabilistic framework of visual anomaly detection for unbalanced data.\u00a0Neurocomputing 201:12-18. https:\/\/doi.org\/10.1016\/j.neucom.2016.03.038","DOI":"10.1016\/j.neucom.2016.03.038"},{"key":"11781_CR45","doi-asserted-by":"publisher","unstructured":"Xu D, Ricci E, Yan Y, Song J, Sebe N (2015) Learning deep representations of appearance and motion for anomalous event detection. arXiv preprint arXiv:1510.01553. https:\/\/doi.org\/10.5244\/C.29.8","DOI":"10.5244\/C.29.8"},{"key":"11781_CR46","doi-asserted-by":"publisher","unstructured":"Zhang XX, Liu H, Gao Y, Hu DH (2009) Detecting abnormal events via hierarchical Dirichlet processes. In:\u00a0Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin, Heidelberg, pp 278-289. https:\/\/doi.org\/10.1007\/978-3-642-01307-2_27","DOI":"10.1007\/978-3-642-01307-2_27"},{"key":"11781_CR47","doi-asserted-by":"publisher","unstructured":"Zhang X, Ma D, Yu H, Huang Y, Howell P, Stevens B (2020) Scene perception guided crowd anomaly detection. Neurocomputing 414:291-302. https:\/\/doi.org\/10.1016\/j.neucom.2020.07.019","DOI":"10.1016\/j.neucom.2020.07.019"},{"key":"11781_CR48","doi-asserted-by":"publisher","unstructured":"Zou X, Bhanu B (2008) Anomalous activity classification in the distributed camera network. In:\u00a02008 15th IEEE International Conference on Image Processing. IEEE, pp 781-784. https:\/\/doi.org\/10.1109\/ICIP.2008.4711871","DOI":"10.1109\/ICIP.2008.4711871"}],"updated-by":[{"DOI":"10.1007\/s11042-022-13375-0","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11781-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11781-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11781-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T06:14:39Z","timestamp":1655187279000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11781-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":48,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["11781"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11781-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,14]]},"assertion":[{"value":"30 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2022","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-022-13375-0","URL":"https:\/\/doi.org\/10.1007\/s11042-022-13375-0","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}