{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T17:03:09Z","timestamp":1758992589783},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T00:00:00Z","timestamp":1677715200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s11042-023-14917-w","type":"journal-article","created":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T03:03:05Z","timestamp":1677726185000},"page":"28895-28915","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Detection and localization of anomalies in video surveillance using novel optimization based deep convolutional neural network"],"prefix":"10.1007","volume":"82","author":[{"given":"Baliram Sambhaji","family":"Gayal","sequence":"first","affiliation":[]},{"given":"Sandip Raosaheb","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,2]]},"reference":[{"key":"14917_CR1","doi-asserted-by":"crossref","unstructured":"Aberkane S, Elarbi-Boudihir M (2022) Deep reinforcement learning-based anomaly detection for video surveillance. Informatica 46(2)","DOI":"10.31449\/inf.v46i2.3603"},{"key":"14917_CR2","unstructured":"Avenue Dataset, http:\/\/www.cse.cuhk.edu.hk\/leojia\/projects\/detectabnormal\/dataset.html. Accessed April 2021"},{"key":"14917_CR3","doi-asserted-by":"publisher","unstructured":"Basharat A, Gritai A, Shah M (2008) Learning object motion patterns for anomaly detection and improved object detection. Proc Cvpr IEEE, pp 1\u20138. https:\/\/doi.org\/10.1109\/CVPR.2008.4587510","DOI":"10.1109\/CVPR.2008.4587510"},{"key":"14917_CR4","doi-asserted-by":"crossref","unstructured":"Bolme DS, Beveridge J R, Draper BA, Lui Y M (2010) Visual object tracking using adaptive correlation filters. In: Proc Twenty-Third IEEE conf on computer vision and pattern recog CVPR 2010, San Francisco","DOI":"10.1109\/CVPR.2010.5539960"},{"key":"14917_CR5","unstructured":"Cewu L, Shi J, Jia J (2013) Abnormal event detection at 150 fps in matlab. In :Proc IEEE inter conf on computer vision,\u00a0Sydney, pp2720\u20132727"},{"issue":"4","key":"14917_CR6","first-page":"1","volume":"15","author":"K Deepak","year":"2020","unstructured":"Deepak K, Chandrakala S, Mohan CK (2020) Residual spatiotemporal autoencoder for unsupervised video anomaly detection. Signal Image Video P 15(4):1\u20138","journal-title":"Signal Image Video P"},{"key":"14917_CR7","doi-asserted-by":"crossref","unstructured":"Deshpande K, Punn NS, Sonbhadra SK, Agarwal S (2022) Anomaly detection in surveillance videos using transformer based attention model. arXiv preprint arXiv:2206.01524","DOI":"10.1007\/978-981-99-1648-1_17"},{"key":"14917_CR8","doi-asserted-by":"publisher","first-page":"103915","DOI":"10.1016\/j.imavis.2020.103915","volume":"98","author":"C Dongyue","year":"2020","unstructured":"Dongyue C, Wang P, YueL Zhang Y, Jia T (2020) Anomaly detection in surveillance video based on bidirectional prediction. Image Vis Comput 98:103915","journal-title":"Image Vis Comput"},{"key":"14917_CR9","doi-asserted-by":"crossref","unstructured":"Duman E, Erdem A (2019) Anomaly Detection in videos using optical flow and convolutional autoencoder. IEEE Access 7(99):183914\u2013183923","DOI":"10.1109\/ACCESS.2019.2960654"},{"key":"14917_CR10","doi-asserted-by":"crossref","unstructured":"ELHarrouss O, Moujahid D, Elkaitouni SE, Tairi H (2015) Moving objects detection based on thresholding operations for video surveillance systems. IEEE\/ACS 12th inter conf compu syst appli (AICCSA) IEEE 1-5","DOI":"10.1109\/AICCSA.2015.7507180"},{"issue":"2","key":"14917_CR11","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1007\/s11063-019-10113-w","volume":"52","author":"Z Fuqiang","year":"2020","unstructured":"Fuqiang Z, Wang L, Li Z, Zuo W, Tan H (2020) Unsupervised learning approach for abnormal event detection in surveillance video by hybrid autoencoder. Neural Process Lett 52(2):961\u2013975","journal-title":"Neural Process Lett"},{"key":"14917_CR12","doi-asserted-by":"publisher","unstructured":"Guha P, Biswas A, Mukerjee A, Sateesh P, Venkatesh KS (2006) Surveillance video mining. Proc visual inform Eng IEEE. https:\/\/doi.org\/10.1049\/CP:20060572","DOI":"10.1049\/CP:20060572"},{"key":"14917_CR13","doi-asserted-by":"crossref","unstructured":"Hao Y, Li J, Wang N, Wang X, Gao X (2022) Spatiotemporal consistency-enhanced network for video anomaly detection. Pattern Recognit 121","DOI":"10.1016\/j.patcog.2021.108232"},{"key":"14917_CR14","doi-asserted-by":"crossref","unstructured":"Hui X-f, Wu Y-j (2012) Research on simple moving average trading system based on SVM. Proc 2012 Inter Conf Man Sci & Eng 19th Annual Conf Proc 1393\u20131397","DOI":"10.1109\/ICMSE.2012.6414356"},{"issue":"22","key":"14917_CR15","doi-asserted-by":"publisher","first-page":"15101","DOI":"10.1007\/s11042-015-2453-4","volume":"75","author":"C Kai-Wen","year":"2016","unstructured":"Kai-Wen C, Chen Y-T, Fang W-H (2016) An efficient subsequence search for video anomaly detection and localization. Multimed Tools Appl 75(22):15101\u201315122","journal-title":"Multimed Tools Appl"},{"key":"14917_CR16","unstructured":"Ke X, Jiang X, Sun T (2018) An intra-frame classification network for video Anomaly Detection and localization. Proc of 11th inter congress on image and signal process, BioMedical Eng and inform (CISP-BMEI) 1-6"},{"key":"14917_CR17","doi-asserted-by":"crossref","unstructured":"Khan M, Hussain T, Tanveer M, Sannino G, de Albuquerque VHC (2019) Cost-effective video summarization using deep CNN with hierarchical weighted fusion for IoT surveillance networks. IEEE Internet Things 7(5):4455-4463","DOI":"10.1109\/JIOT.2019.2950469"},{"key":"14917_CR18","doi-asserted-by":"crossref","unstructured":"Kratz L, Nishino K (2009) Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. Proc Cvpr IEEE 1446-1453","DOI":"10.1109\/CVPR.2009.5206771"},{"key":"14917_CR19","doi-asserted-by":"crossref","unstructured":"Liu S, Liu D, Srivastava G, Po\u0142ap D, Wo\u017aniak M (2020) Overview of correlation filter based algorithms in object tracking. Complex Intell Syst 7(3)","DOI":"10.1007\/s40747-020-00161-4"},{"key":"14917_CR20","doi-asserted-by":"crossref","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: Proceedings of IEEE Comput Soc Conf 1975-1981","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"14917_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"14917_CR22","doi-asserted-by":"publisher","first-page":"103303","DOI":"10.1016\/j.micpro.2020.103303","volume":"79","author":"M Murugesan","year":"2020","unstructured":"Murugesan M, Thilagamani S (2020) Efficient anomaly detection in surveillance videos based on multi layer perception recurrent neural network. Microprocess Microsyst 79:103303","journal-title":"Microprocess Microsyst"},{"key":"14917_CR23","doi-asserted-by":"crossref","unstructured":"Pawar K, Attar V (2022) Deep learning model based on cascaded autoencoders and one-class learning for detection and localization of anomalies from surveillance videos. IET Biometrics","DOI":"10.1049\/bme2.12064"},{"key":"14917_CR24","doi-asserted-by":"crossref","unstructured":"Peter T, Sebastian T, Doretto G, Krahnstoever N, Rittscher J, Yu T (2008) Unified crowd segmentation. European conf comput vision 691\u2013704","DOI":"10.1007\/978-3-540-88693-8_51"},{"key":"14917_CR25","unstructured":"Qi X, Ji G, Hu Z (n.d.) Retraining Generative Adversarial Auto-encoder for Video Anomaly Detection, Available at SSRN 4273563"},{"key":"14917_CR26","doi-asserted-by":"publisher","first-page":"19457","DOI":"10.1109\/ACCESS.2021.3054040","volume":"9","author":"T Sameema","year":"2021","unstructured":"Sameema T, Farooq H, Jaleel A, Wasif SM (2021) Anomaly detection with particle filtering for online video surveillance. IEEE Access 9:19457\u201319468","journal-title":"IEEE Access"},{"key":"14917_CR27","unstructured":"Shandong W, Moore BE, Shah M (2010) Chaotic invariants of lagrangian particle trajectories for anomaly detection in crowded scenes. 2010 IEEE computer society conf computer vision pattern recog conf 2054\u20132060"},{"key":"14917_CR28","unstructured":"ShanghaiTech Campus dataset, https:\/\/svip-lab.github.io\/dataset\/campus_dataset.html. Accessed Sept 2021"},{"key":"14917_CR29","first-page":"43","volume":"779","author":"H Sharma","year":"2018","unstructured":"Sharma H, Hazrati G, Bansal JC (2018) Spider monkey optimization algorithm. Evol Swarm Intel Algorithms 779:43\u201359","journal-title":"Evol Swarm Intel Algorithms"},{"issue":"9","key":"14917_CR30","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1109\/LSP.2015.2410031","volume":"22","author":"X Tan","year":"2015","unstructured":"Tan X, Zhang C, Zha H (2015) Learning to detect anomalies in surveillance video. IEEE Signal Process Lett 22(9):1477\u20131481","journal-title":"IEEE Signal Process Lett"},{"key":"14917_CR31","unstructured":"UCSD Anomaly Detection Dataset, http:\/\/www.svcl.ucsd.edu\/projects\/anomaly\/dataset.html#:~:text=UCSD%20Anomaly%20Detection%20Dataset&text=The%20UCSD%20Anomaly%20Detection%20Dataset,the%20video%20contains%20only%20pedestrians. Accessed April 2021"},{"issue":"11","key":"14917_CR32","first-page":"1","volume":"80","author":"U Waseem","year":"2020","unstructured":"Waseem U, Ullah A, Haq IU, Muhammad K, Sajjad M, Baik SW (2020) CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks. Multimed Tools Appl 80(11):1\u201317","journal-title":"Multimed Tools Appl"},{"key":"14917_CR33","doi-asserted-by":"publisher","first-page":"107394","DOI":"10.1016\/j.patcog.2020.107394","volume":"105","author":"Z Xinfeng","year":"2020","unstructured":"Xinfeng Z, Yang S, Zhang J, Zhang W (2020) Video anomaly detection and localization using motion-field shape description and homogeneity testing. Pattern Recog 105:107394","journal-title":"Pattern Recog"},{"issue":"4","key":"14917_CR34","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TSMC.2016.2638048","volume":"47","author":"B Yu","year":"2017","unstructured":"Yu B, Liu Y, Sun Q (2017) A content-adaptively sparse reconstruction method for abnormal events Detection with low-rank property. IEEE Trans Syst Man Cybern Syst 47(4):704\u2013716","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"14917_CR35","doi-asserted-by":"crossref","unstructured":"Yunzuo Z, Zhang S, Guo Y (2019) Research on the key-frame extraction of surveillance video based on motion velocity. Pro IEEE inter conf signal, inform data process (ICSIDP) IEEE 1-3","DOI":"10.1109\/ICSIDP47821.2019.9173052"},{"key":"14917_CR36","doi-asserted-by":"crossref","unstructured":"Zhao Y, Deng B, Shen C, Liu Y, Lu H, Hua X-S (2017) Spatio-temporal autoencoder for video anomaly detection. Pro 25th ACM int conf Mult 1933-1941","DOI":"10.1145\/3123266.3123451"},{"key":"14917_CR37","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.patrec.2020.09.019","volume":"140","author":"W Zhiguo","year":"2020","unstructured":"Zhiguo W, Yang Z, Zhang Y-J (2020) A promotion method for generation error-based video anomaly detection. Pattern Recogn Lett 140:88\u201394","journal-title":"Pattern Recogn Lett"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14917-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-14917-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-14917-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T10:32:53Z","timestamp":1690021973000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-14917-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,2]]},"references-count":37,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["14917"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-14917-w","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,2]]},"assertion":[{"value":"21 October 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}