{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T21:05:07Z","timestamp":1750712707025,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T00:00:00Z","timestamp":1663804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NO.61976120","NO.61971245","NO.61871241"],"award-info":[{"award-number":["NO.61976120","NO.61971245","NO.61871241"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Nanjing University State Key Lab. for Novel Software Technology","award":["KFKT2019B15"],"award-info":[{"award-number":["KFKT2019B15"]}]},{"name":"Nantong Science and Technology Program","award":["JC2021131"],"award-info":[{"award-number":["JC2021131"]}]},{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["KYCX21_3084","KYCX22_3340"],"award-info":[{"award-number":["KYCX21_3084","KYCX22_3340"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11042-022-13834-8","type":"journal-article","created":{"date-parts":[[2022,9,22]],"date-time":"2022-09-22T06:03:09Z","timestamp":1663826589000},"page":"12557-12575","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["MPAT: multi-path attention temporal method for video anomaly detection"],"prefix":"10.1007","volume":"82","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7500-4979","authenticated-orcid":false,"given":"Hongjun","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5501-5424","authenticated-orcid":false,"given":"Xiaohu","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3772-3344","authenticated-orcid":false,"given":"Chaobo","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4571-175X","authenticated-orcid":false,"given":"Xulin","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1350-5732","authenticated-orcid":false,"given":"Jinyi","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4219-6171","authenticated-orcid":false,"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3263-5620","authenticated-orcid":false,"given":"Zhengguang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,22]]},"reference":[{"issue":"5","key":"13834_CR1","doi-asserted-by":"publisher","first-page":"651","DOI":"10.3844\/jcssp.2020.651.659","volume":"16","author":"AK Aggarwal","year":"2020","unstructured":"Aggarwal AK (2020) Enhancement of gps position accuracy using machine vision and deep learning techniques. J Comput Sci 16(5):651\u2013659","journal-title":"J Comput Sci"},{"key":"13834_CR2","unstructured":"Aggarwal AK (2015) On the use of artificial intelligence techniques in transportation systems. Int J Soft Comput Eng 5(5):21\u201324"},{"key":"13834_CR3","doi-asserted-by":"publisher","first-page":"4077","DOI":"10.1007\/s12652-021-03323-5","volume":"13","author":"T Alafif","year":"2021","unstructured":"Alafif T, Alzahrani B, Cao Y, Alotaibi R, Barnawi A, Chen M (2021) Generative adversarial network based abnormal behavior detection in massive crowd videos: a hajj case study. J Ambient Intell Humaniz Comput 13:4077\u20134088","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"13834_CR4","first-page":"91","volume":"65","author":"K Ashwani","year":"2013","unstructured":"Ashwani K, Atsuhiko B, Shintaro O, Takeshi O, Katsushi I (2013) Global coordinate adjustment of the 3d survey models under unstable gps conditio. Seisan Kenkyu 65(2):91\u201395","journal-title":"Seisan Kenkyu"},{"key":"13834_CR5","unstructured":"Ashwani K, Yoshihiro S, Takeshi O, Shintaro O, Katsushi I (2014) Improving gps position accuracy by identification of reflected gps signals using range data for modeling of urban structures. Seisan Kenkyu 66(2):101\u2013107"},{"key":"13834_CR6","doi-asserted-by":"crossref","unstructured":"Chauhan S, Singh M, Ashwani K (2021) Data science and data analytics: artificial intelligence and machine learning integrated based approach. Chapman and Hall\/CRC, Boca Raton","DOI":"10.1201\/9781003111290-1-2"},{"key":"13834_CR7","doi-asserted-by":"crossref","unstructured":"Chen H, Shen J, Wang L, Song J (2017) Leveraging stacked denoising autoencoder in prediction of pathogen-host protein-protein interactions. Processing of the 2017 IEEE international congress on big data: 368-375","DOI":"10.1109\/BigDataCongress.2017.54"},{"key":"13834_CR8","doi-asserted-by":"crossref","unstructured":"Cong Y, Yuan J, Liu J (2011) Sparse reconstruction cost for abnormal event detection. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 3449\u20133456","DOI":"10.1109\/CVPR.2011.5995434"},{"issue":"3","key":"13834_CR9","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TCSVT.2016.2589859","volume":"27","author":"S Cosar","year":"2017","unstructured":"Cosar S, Donatiello G, Bogorny V, Garate C, Alvares LO, Bremond F (2017) Toward abnormal trajectory and event detection in video surveillance. IEEE Trans Circuits Syst Video Technol 27(3):683\u2013695","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"13834_CR10","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B, Schmid C (2006) Human detection using oriented histograms of flow and appearance. Processing of the 9th European conference on computer vision: 428-441","DOI":"10.1007\/11744047_33"},{"key":"13834_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ins.2020.03.034","volume":"524","author":"H Fanta","year":"2020","unstructured":"Fanta H, Shao Z, Ma L (2020) SiTGRU: single-tunnelled gated recurrent unit for abnormality detection. Inf Sci 524:15\u201332","journal-title":"Inf Sci"},{"key":"13834_CR12","doi-asserted-by":"crossref","unstructured":"Giorno AD, Bagnell JA, Hebert M (2016) A discriminative framework for anomaly detection in large videos. Processing of the Eur Conf Comput Vis: 334\u2013349","DOI":"10.1007\/978-3-319-46454-1_21"},{"issue":"6","key":"13834_CR13","doi-asserted-by":"publisher","first-page":"2153","DOI":"10.1007\/s11554-020-01029-z","volume":"17","author":"QL Han","year":"2020","unstructured":"Han QL, Wang HF, Yang L, Wu M, Kou JQ, Du QS, Li NF (2020) Real-time adversarial GAN-based abnormal crowd behavior detection. J Real-Time Image Proc 17(6):2153\u20132162","journal-title":"J Real-Time Image Proc"},{"key":"13834_CR14","doi-asserted-by":"crossref","unstructured":"Hasan M, Choi J, Neumann J, Roy-Chowdhury AK, Davis LS (2016) Learning temporal regularity in video sequences. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 733\u2013742","DOI":"10.1109\/CVPR.2016.86"},{"key":"13834_CR15","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"13834_CR16","doi-asserted-by":"crossref","unstructured":"Ionescu RT, Smeureanu S, Alexe B, Popescu M (2017) Unmasking the abnormal events in video. Processing of the IEEE Int Conf Comput Vis: 2914\u20132922.","DOI":"10.1109\/ICCV.2017.315"},{"key":"13834_CR17","doi-asserted-by":"crossref","unstructured":"Kim J, Grauman K (2009) Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 2921\u20132928","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"13834_CR18","unstructured":"Kingma D, Ba J (2015) Adam: a method for stochastic optimization. Processing of the International Conference on Learning Representations"},{"key":"13834_CR19","doi-asserted-by":"crossref","unstructured":"Kratz L, Nishino K (2009) Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. Processing of the IEEE conference on computer vision and pattern recognition: 1446-1453","DOI":"10.1109\/CVPR.2009.5206771"},{"issue":"1","key":"13834_CR20","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li W, Mahadevan V, Vasconcelos N (2014) Anomaly detection and localization in crowded scenes. IEEE Trans Pattern Anal Mach Intell 36(1):18\u201332","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"11","key":"13834_CR21","doi-asserted-by":"publisher","first-page":"3954","DOI":"10.1109\/JSTARS.2018.2833382","volume":"11","author":"RR Li","year":"2018","unstructured":"Li RR, Liu WJ, Yang L, Sun SH, Hu W, Zhang F, Li W (2018) DeepUNet: a deep fully convolutional network for pixel-level sea-land segmentation. IEEE J Sel Top Appl Earth Obs Remote Sens 11(11):3954\u20133962","journal-title":"IEEE J Sel Top Appl Earth Obs Remote Sens"},{"key":"13834_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TMM.2020.2984093","volume":"203","author":"NJ Li","year":"2021","unstructured":"Li NJ, Chang FL, Liu CS (2021) Spatial-temporal Cascade autoencoder for video anomaly detection in crowded scenes. IEEE Trans Multimedia 203:203\u2013215","journal-title":"IEEE Trans Multimedia"},{"key":"13834_CR23","doi-asserted-by":"crossref","unstructured":"Liu W, Luo WX, Lian DZ, Gao SH (2018) Future frame prediction for anomaly detection -- a new baseline. Processing of the IEEE Conf Comput Vis Pattern Recognit: 6536\u20136545","DOI":"10.1109\/CVPR.2018.00684"},{"key":"13834_CR24","doi-asserted-by":"crossref","unstructured":"Lu C, Shi J, Jia J (2013) Abnormal event detection at 150 fps in MATLAB. Processing of the IEEE International Conference on Computer Vision, Sydney: 2720\u20132727","DOI":"10.1109\/ICCV.2013.338"},{"key":"13834_CR25","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) A revisit of sparse coding based anomaly detection in stacked RNN framework. Processing of the IEEE international conference on computer vision: 341-349","DOI":"10.1109\/ICCV.2017.45"},{"key":"13834_CR26","doi-asserted-by":"crossref","unstructured":"Luo W, Liu W, Gao S (2017) Remembering history with convolutional LSTM for anomaly detection. Processing of the IEEE international conference on multimedia and expo: 439-444","DOI":"10.1109\/ICME.2017.8019325"},{"issue":"3","key":"13834_CR27","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TPAMI.2019.2944377","volume":"43","author":"W Luo","year":"2021","unstructured":"Luo W, Liu W, Lian D, Tang J, Duan L, Peng X, Gao S (2021) Video anomaly detection with sparse coding inspired deep neural networks. IEEE Trans Pattern Anal Mach Intell 43(3):1070\u20131084","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"22","key":"13834_CR28","doi-asserted-by":"publisher","first-page":"7508","DOI":"10.3390\/s21227508","volume":"21","author":"Z Ma","year":"2021","unstructured":"Ma Z, Machado JJM, Tavares JMRS (2021) Weakly supervised video anomaly detection based on 3d convolution and lstm. Sensors. 21(22):7508","journal-title":"Sensors."},{"key":"13834_CR29","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) anomaly detection in crowded scenes. Processing of the IEEE Conf Comput Vis Pattern Recognit: 1975-1981","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"13834_CR30","unstructured":"Mathieu M, Couprie C, LeCun Y (2015) Deep multi-scale video prediction beyond mean square error. Processing of the International Conference on Learning Representations"},{"key":"13834_CR31","unstructured":"Medel JR, Savakis A (2016) Anomaly detection in video using predictive convolutional long short-term memory networks. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 1\u201327"},{"key":"13834_CR32","doi-asserted-by":"crossref","unstructured":"Mehran R, Oyama A, Shah M (2009) Abnormal crowd behavior detection using social force model. Processing of the IEEE Conf Comput Vis Pattern Recognit: 935\u2013942","DOI":"10.1109\/CVPR.2009.5206641"},{"key":"13834_CR33","unstructured":"Navneet N, Triggs B (2005) Histograms of oriented gradients for human detection. Processing of the IEEE conference on computer vision and pattern recognition: 886-893"},{"key":"13834_CR34","doi-asserted-by":"crossref","unstructured":"Park H, Noh J, Ham B (2020) Learning memory-guided normality for anomaly detection. Processing of the IEEE Conf Comput Vis pattern Recognit: 14360-14369","DOI":"10.1109\/CVPR42600.2020.01438"},{"key":"13834_CR35","unstructured":"Paszke A, Gross S, Chintala S, Chanan G, Yang E, Devito Z, Lin Z, Desmaison A, Antiga L, Lerer A (2017) Automatic differentiation in PyTorch. Processing of the Conference and Workshop on Neural Information Processing Systems"},{"key":"13834_CR36","unstructured":"Tay N, Connie T, Ong TS, Teh PS (2016) Abnormal behavior recognition using CNN-LSTM with attention mechanism. Proceedings of the 1st international conference on electrical, control and instrumentation engineering: 1-5"},{"issue":"2","key":"13834_CR37","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.30.2.023009","volume":"30","author":"DL Wang","year":"2021","unstructured":"Wang DL, Wang SY (2021) Abnormal event detection algorithm based on dual attention future frame prediction and gap fusion discrimination. Journal of Electronic Imaging 30(2):023009","journal-title":"Journal of Electronic Imaging"},{"key":"13834_CR38","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.cviu.2016.10.010","volume":"156","author":"D Xu","year":"2017","unstructured":"Xu D, Yan Y, Ricci E, Sebe N (2017) Detecting anomalous events in videos by learning deep representations of appearance and motion. Comput Vis Image Under 156:117\u2013127","journal-title":"Comput Vis Image Under"},{"issue":"1","key":"13834_CR39","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/TCDS.2018.2883368","volume":"12","author":"SY Yan","year":"2020","unstructured":"Yan SY, Smith JS, Lu WJ, Zhang BL (2020) Abnormal event detection from videos using a two-stream recurrent variational autoencode. IEEE Trans Cognit Devel Syst 12(1):30\u201342","journal-title":"IEEE Trans Cognit Devel Syst"},{"key":"13834_CR40","doi-asserted-by":"crossref","unstructured":"Ye M, Peng X, Gan W, Wu W, Qiao Y (2019) Anopcn: video anomaly detection via deep predictive coding network. Processing of the 27th ACM Int Conf multimedia: 1805-1813","DOI":"10.1145\/3343031.3350899"},{"key":"13834_CR41","doi-asserted-by":"crossref","unstructured":"Yong SC, Yong HT (2017) Abnormal event detection in videos using spatiotemporal autoencoder. Processing of the international symposium on neural networks: 189-196","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"13834_CR42","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1016\/j.patcog.2015.09.005","volume":"51","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Lu HC, Zhang LH, Ruan X (2016) Combining motion and appearance cues for anomaly detection. Pattern Recogn 51:443\u2013452","journal-title":"Pattern Recogn"},{"issue":"9","key":"13834_CR43","doi-asserted-by":"publisher","first-page":"3694","DOI":"10.1109\/TCSVT.2020.3039798","volume":"31","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Nie XS, He RD, Chen M, Yin YL (2021) Normality learning in multispace for video anomaly detection. IEEE Trans Circuits Syst Video Technol 31(9):3694\u20133706","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"13834_CR44","doi-asserted-by":"crossref","unstructured":"Zhao B, Fei-Fei L, Xing EP (2011) Online detection of unusual events in videos via dynamic sparse coding. Processing of the IEEE Conference on Computer Vision and Pattern Recognition: 3313\u20133320","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"13834_CR45","doi-asserted-by":"crossref","unstructured":"Zhao Y, Deng B, Shen C, Liu Y, Lu H, Hua XS (2017) Spatio-temporal autoencoder for video anomaly detection. Proceedings of the 2017 ACM on multimedia conference: 1933-1941","DOI":"10.1145\/3123266.3123451"},{"key":"13834_CR46","doi-asserted-by":"crossref","unstructured":"Zhao Y, Deng B, Shen C, Liu Y, Lu H, Hua XS (2017) Spatiotemporal AutoEncoder for video anomaly detection. Processing of the 25th ACM multimedia Conf: 1933-1941","DOI":"10.1145\/3123266.3123451"},{"key":"13834_CR47","doi-asserted-by":"crossref","unstructured":"Zhou XG, Zhang LQ (2015) Abnormal event detection using recurrent neural network. Processing of the international conference on computer sciences and applications: 222-226","DOI":"10.1109\/CSA.2015.64"},{"key":"13834_CR48","doi-asserted-by":"crossref","unstructured":"Zhou S, Wei S, Dan Z, Zhang Z (2015) Unusual event detection in crowded scenes by trajectory analysis. Processing of the IEEE international conference on acoustics: 1300-1304","DOI":"10.1109\/ICASSP.2015.7178180"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13834-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-022-13834-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-022-13834-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T09:59:18Z","timestamp":1677837558000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-022-13834-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,22]]},"references-count":48,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["13834"],"URL":"https:\/\/doi.org\/10.1007\/s11042-022-13834-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2022,9,22]]},"assertion":[{"value":"18 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/competing interests"}}]}}