{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:24:10Z","timestamp":1778347450094,"version":"3.51.4"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-20161-7","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T02:08:24Z","timestamp":1726106904000},"page":"26609-26643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Crowd dynamics analysis and behavior recognition in surveillance videos based on deep learning"],"prefix":"10.1007","volume":"84","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3783-3140","authenticated-orcid":false,"given":"Anum","family":"Ilyas","sequence":"first","affiliation":[]},{"given":"Narmeen","family":"Bawany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"20161_CR1","doi-asserted-by":"crossref","unstructured":"Shivakumar SHYG, Mohana HS (2017) Crowd behavior analysis: a survey. International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT), pp 169\u2013178","DOI":"10.1109\/ICRAECT.2017.66"},{"key":"20161_CR2","unstructured":"Benesch H (2003) Atlas de la psychologie"},{"key":"20161_CR3","doi-asserted-by":"publisher","unstructured":"Rajpoot Q, Jensen CD (2014) Security and privacy in video surveillance: requirements and challenges. 29th IFIP International Information Security Conference (SEC), vol. 428, pp 69\u2013184. https:\/\/doi.org\/10.1007\/978-3-642-55415-5_14","DOI":"10.1007\/978-3-642-55415-5_14"},{"key":"20161_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s00138-008-0152-0","volume":"19","author":"N Haering","year":"2008","unstructured":"Haering N, Venetianer PL, Lipton A (2008) The evolution of video surveillance: an overview. Mach Vis Appl 19:5\u20136. https:\/\/doi.org\/10.1007\/s00138-008-0152-0","journal-title":"Mach Vis Appl"},{"issue":"12","key":"20161_CR5","doi-asserted-by":"publisher","first-page":"15695","DOI":"10.1007\/s10489-022-04233-5","volume":"53","author":"M Yang","year":"2023","unstructured":"Yang M, Tian S, Rao AS, Rajasegarar S, Palaniswami M, Zhou Z (2023) An efficient deep neural model for detecting crowd anomalies in videos. Appl Intell 53(12):15695\u201315710. https:\/\/doi.org\/10.1007\/s10489-022-04233-5","journal-title":"Appl Intell"},{"key":"20161_CR6","doi-asserted-by":"publisher","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos N (2010) Anomaly detection in crowded scenes. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp 1975\u20131981. https:\/\/doi.org\/10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"20161_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18630-0","author":"S Garg","year":"2024","unstructured":"Garg S, Sharma S, Dhariwal S, Priya WD, Singh M, Ramesh S (2024) Human crowd behaviour analysis based on video segmentation and classification using expectation\u2013maximization with deep learning architectures. Multimedia Tools Appl. https:\/\/doi.org\/10.1007\/s11042-024-18630-0","journal-title":"Multimedia Tools Appl"},{"key":"20161_CR8","doi-asserted-by":"crossref","unstructured":"Xu F, Rao Y, Wang Q (2017) An unsupervised abnormal crowd behavior detection algorithm. In: International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), vol. 1, pp 219\u2013223","DOI":"10.1109\/SPAC.2017.8304279"},{"key":"20161_CR9","doi-asserted-by":"publisher","unstructured":"Boominathan L, Kruthiventi SSS, Venkatesh Babu R (2016) CrowdNet: A deep convolutional network for dense crowd counting. MM 2016 - Proceedings of the ACM Multimedia Conference, pp 640\u2013644. https:\/\/doi.org\/10.1145\/2964284.2967300","DOI":"10.1145\/2964284.2967300"},{"key":"20161_CR10","doi-asserted-by":"publisher","unstructured":"Bermejo Nievas E, Deniz Suarez O, Bueno G, Garc\u00eda, Sukthankar R (2011) Violence detection in video using computer vision techniques. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6855 LNCS, no. PART 2, pp 332\u2013339. https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39\/COVER","DOI":"10.1007\/978-3-642-23678-5_39\/COVER"},{"key":"20161_CR11","doi-asserted-by":"publisher","unstructured":"Hassner T, Itcher\u00a0Y, Kliper-Gross O (2012) Violent flows: Real-time detection of violent crowd behavior. 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. Providence, pp. 1\u20136. https:\/\/doi.org\/10.1109\/CVPRW.2012.6239348","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"20161_CR12","doi-asserted-by":"publisher","unstructured":"Idrees H, Saleemi I, Seibert C, Shah M (2013) Multi-source multi-scale counting in extremely dense crowd images. In:\u00a0IEEE Conference on Computer Vision and Pattern Recognition, pp 2547\u20132554. https:\/\/doi.org\/10.1109\/CVPR.2013.329","DOI":"10.1109\/CVPR.2013.329"},{"key":"20161_CR13","unstructured":"Langewiesche W (2018) The 10-minute mecca stampede that made history"},{"key":"20161_CR14","unstructured":"Stampede in mourning procession in Sukkur leaves six dead - Pakistan - DAWN.COM. https:\/\/www.dawn.com\/news\/1703951. Accessed 15 Aug 2022"},{"issue":"5","key":"20161_CR15","doi-asserted-by":"publisher","first-page":"3383","DOI":"10.1007\/s11831-020-09504-3","volume":"28","author":"S Xu","year":"2021","unstructured":"Xu S, Wang J, Shou W, Ngo T, Sadick A-M, Wang X (2021) Computer Vision Techniques in construction: a critical review. Arch Comput Methods Eng 28(5):3383\u20133397. https:\/\/doi.org\/10.1007\/s11831-020-09504-3","journal-title":"Arch Comput Methods Eng"},{"issue":"1","key":"20161_CR16","doi-asserted-by":"publisher","first-page":"538","DOI":"10.11591\/ijece.v10i1.pp538-548","volume":"10","author":"P Patel","year":"2020","unstructured":"Patel P, Thakkar A (2020) The upsurge of deep learning for computer vision applications. Int J Electr Comput Eng 10(1):538\u2013548. https:\/\/doi.org\/10.11591\/ijece.v10i1.pp538-548","journal-title":"Int J Electr Comput Eng"},{"key":"20161_CR17","doi-asserted-by":"publisher","unstructured":"Voulodimos A, Doulamis N, Doulamis A, Protopapadakis E. Deep learning for computer vision: A brief review, computational intelligence and neuroscience, vol 2018, p 7068349. https:\/\/doi.org\/10.1155\/2018\/7068349","DOI":"10.1155\/2018\/7068349"},{"issue":"8","key":"20161_CR18","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1109\/TPAMI.2012.269","volume":"35","author":"R Salakhutdinov","year":"2013","unstructured":"Salakhutdinov R, Tenenbaum JB, Torralba A (2013) Learning with Hierarchical-Deep Models. IEEE Trans Pattern Anal Mach Intell 35(8):1958\u20131971. https:\/\/doi.org\/10.1109\/TPAMI.2012.269","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"20161_CR19","doi-asserted-by":"publisher","unstructured":"Potok TE et al (2018) A study of complex deep learning networks on high-performance, neuromorphic, and quantum computers. ACM J Emerg Technol Comput Syst 14(2). https:\/\/doi.org\/10.1145\/3178454","DOI":"10.1145\/3178454"},{"key":"20161_CR20","doi-asserted-by":"publisher","unstructured":"Shinde PP, Shah S (2018) A review of machine learning and deep learning applications. Proceedings \u2013\u20092018 4th International Conference on Computing, Communication Control and Automation, ICCUBEA, pp 1\u20136. https:\/\/doi.org\/10.1109\/ICCUBEA.2018.8697857","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"key":"20161_CR21","volume-title":"Review of deep learning: concepts, CNN architectures, challenges, applications, future directions","author":"L Alzubaidi","year":"2021","unstructured":"Alzubaidi L et al (2021) Review of deep learning: concepts, CNN architectures, challenges, applications, future directions, vol 8. no. 1. Springer International Publishing"},{"key":"20161_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/B978-0-12-822822-7.00003-X","volume-title":"Neural Engineering Techniques for Autism Spectrum Disorder","author":"S Mostafa","year":"2021","unstructured":"Mostafa S, Wu F-X (2021) Chapter 3 - diagnosis of autism spectrum disorder with convolutional autoencoder and structural MRI images. In: El-Baz AS, Suri JS (eds) in Neural Engineering techniques for Autism Spectrum Disorder. Academic, pp 23\u201338"},{"key":"20161_CR23","doi-asserted-by":"publisher","unstructured":"Taye MM (2023) Theoretical understanding of convolutional neural network: concepts, architectures, applications, future directions. Computation 11(3). https:\/\/doi.org\/10.3390\/computation11030052","DOI":"10.3390\/computation11030052"},{"key":"20161_CR24","doi-asserted-by":"publisher","unstructured":"Van Houdt G, Mosquera C, N\u00e1poles G (Dec. 2020) A review on the long short-term memory model. Artif Intell Rev 53. https:\/\/doi.org\/10.1007\/s10462-020-09838-1","DOI":"10.1007\/s10462-020-09838-1"},{"key":"20161_CR25","doi-asserted-by":"publisher","unstructured":"Yao L, Guan Y (2018) An Improved LSTM structure for Natural Language Processing, pp 565\u2013569. https:\/\/doi.org\/10.1109\/IICSPI.2018.8690387","DOI":"10.1109\/IICSPI.2018.8690387"},{"issue":"1","key":"20161_CR26","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1007\/s12652-020-02761-x","volume":"13","author":"H Abbasimehr","year":"2022","unstructured":"Abbasimehr H, Paki R (2022) Improving time series forecasting using LSTM and attention models. J Ambient Intell Humaniz Comput 13(1):673\u2013691. https:\/\/doi.org\/10.1007\/s12652-020-02761-x","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"20161_CR27","doi-asserted-by":"publisher","unstructured":"Bhatia S, Chauhan T, Gupta S, Gambhir S, Panchal JH (2023) An approach to recognize human activities based on ConvLSTM and LRCN. In: (2023) 6th International Conference on Information Systems and Computer Networks (ISCON), pp 1\u20136. https:\/\/doi.org\/10.1109\/ISCON57294.2023.10112060","DOI":"10.1109\/ISCON57294.2023.10112060"},{"key":"20161_CR28","doi-asserted-by":"publisher","unstructured":"Parui SK, Biswas SK, Das S, Chakraborty M, Purkayastha B (2023) An efficient violence detection system from video clips using ConvLSTM and Keyframe Extraction. In: 11th International Conference on Internet of Everything, Microwave Engineering, Communication and Networks (IEMECON), pp 1\u20135. https:\/\/doi.org\/10.1109\/IEMECON56962.2023.10092302","DOI":"10.1109\/IEMECON56962.2023.10092302"},{"key":"20161_CR29","doi-asserted-by":"publisher","unstructured":"Estacio B, Prikladnicki R, Mora M, Notari G, Caroli P, Olchik A (2014) Software kaizen: Using agile to form high-perfomance software development teams. Proceedings \u2013\u20092014 Agile Conference, AGILE 2014, no. July, pp 1\u201310. https:\/\/doi.org\/10.1109\/AGILE.2014.10","DOI":"10.1109\/AGILE.2014.10"},{"issue":"3","key":"20161_CR30","doi-asserted-by":"publisher","first-page":"38","DOI":"10.23919\/JCIN.2019.8917884","volume":"4","author":"Y Zhao","year":"2019","unstructured":"Zhao Y, Liu S, Xue F, Chen B, Chen X (2019) DeepCount: crowd counting with wi-fi using deep learning. J Commun Infor Netw 4(3):38\u201352. https:\/\/doi.org\/10.23919\/JCIN.2019.8917884","journal-title":"J Commun Infor Netw"},{"key":"20161_CR31","doi-asserted-by":"publisher","unstructured":"Mahadevan V, Li W, Bhalodia V, Vasconcelos\u00a0N (2010) Anomaly detection in crowded scenes. 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, pp 1975\u20131981. https:\/\/doi.org\/10.1109\/CVPR.2010.5539872","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"20161_CR32","doi-asserted-by":"publisher","unstructured":"Khaleghi A, Moin MS (2018) Improved anomaly detection in surveillance videos based on a deep learning method, Artificial Intelligence and Robotics, IRANOPEN 2018 and the 8th Conference on Artificial Intelligence and Robotics, pp 73\u201381. https:\/\/doi.org\/10.1109\/RIOS.2018.8406634","DOI":"10.1109\/RIOS.2018.8406634"},{"key":"20161_CR33","doi-asserted-by":"publisher","unstructured":"Zhang C, Li H, Wang X, Yang X (2015) Cross-scene crowd counting via deep convolutional neural networks. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 07-12-June, pp 833\u2013841. https:\/\/doi.org\/10.1109\/CVPR.2015.7298684","DOI":"10.1109\/CVPR.2015.7298684"},{"key":"20161_CR34","doi-asserted-by":"publisher","unstructured":"Zhang Y, Zhou D, Chen S, Gao S, Ma Y (2016) Single-image crowd counting via multi-column convolutional neural network. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2016-December, pp 589\u2013597. https:\/\/doi.org\/10.1109\/CVPR.2016.70","DOI":"10.1109\/CVPR.2016.70"},{"key":"20161_CR35","doi-asserted-by":"publisher","unstructured":"Marsden M, McGuinness K, Little S, O\u2019Connor NE (2017) ResnetCrowd: A residual deep learning architecture for crowd counting, violent behaviour detection and crowd density level classification. 14th IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2017.\u00a0https:\/\/doi.org\/10.1109\/AVSS.2017.8078482","DOI":"10.1109\/AVSS.2017.8078482"},{"key":"20161_CR36","doi-asserted-by":"publisher","unstructured":"Akti S, Tataroglu GA, Ekenel HK (2019) Vision-based fight detection from surveillance cameras. 9th International Conference on Image Processing Theory, Tools and Applications, IPTA 2019.\u00a0https:\/\/doi.org\/10.1109\/IPTA.2019.8936070","DOI":"10.1109\/IPTA.2019.8936070"},{"key":"20161_CR37","doi-asserted-by":"publisher","unstructured":"Ding C, Fan S, Zhu M, Feng W, Jia B (2014) Violence detection in video by using 3D convolutional neural networks. In: Bebis G, et al (eds) Advances in Visual Computing. ISVC 2014. Lecture Notes in Computer Science, vol 8888. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-14364-4_53","DOI":"10.1007\/978-3-319-14364-4_53"},{"issue":"3","key":"20161_CR38","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1093\/comjnl\/bxaa061","volume":"65","author":"A Mumtaz","year":"2022","unstructured":"Mumtaz A, Sargano AB, Habib Z (2022) Fast learning through deep multi-net CNN Model for violence recognition in video surveillance. Comput J 65(3):457\u2013472. https:\/\/doi.org\/10.1093\/comjnl\/bxaa061","journal-title":"Comput J"},{"key":"20161_CR39","doi-asserted-by":"publisher","first-page":"43947","DOI":"10.1007\/s11042-022-13227-x","volume":"81","author":"S Waqar","year":"2022","unstructured":"Waqar S, Khan UG, Waseem MH, Qayyum S (2022) The utility of datasets in crowd modelling and analysis: a survey. Multimedia Tools Appl 81:43947\u201343978. https:\/\/doi.org\/10.1007\/s11042-022-13227-x","journal-title":"Multimedia Tools Appl"},{"issue":"5","key":"20161_CR40","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s11554-021-01116-9","volume":"18","author":"F Rezaei","year":"2021","unstructured":"Rezaei F, Yazdi M (2021) Real-time crowd behavior recognition in surveillance videos based on deep learning methods. J Real-Time Image Proc 18(5):1669\u20131679. https:\/\/doi.org\/10.1007\/s11554-021-01116-9","journal-title":"J Real-Time Image Proc"},{"issue":"0","key":"20161_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/15472450.2020.1746909","volume":"0","author":"Y Li","year":"2020","unstructured":"Li Y, Sarvi M, Khoshelham K, Haghani M (2020) Multi-view crowd congestion monitoring system based on an ensemble of convolutional neural network classifiers. J Intell Transp Syst 0(0):1\u201312. https:\/\/doi.org\/10.1080\/15472450.2020.1746909","journal-title":"J Intell Transp Syst"},{"key":"20161_CR42","doi-asserted-by":"publisher","unstructured":"D. J. S. R et al (2019) Real time violence detection Framework for Football Stadium comprising of Big Data Analysis and Deep Learning through bidirectional LSTM. Comput Netw.) https:\/\/doi.org\/10.1016\/j.comnet.2019.01.028","DOI":"10.1016\/j.comnet.2019.01.028"},{"key":"20161_CR43","doi-asserted-by":"crossref","unstructured":"Idrees H et al (2018) Composition loss for counting, density map estimation and localization in dense crowds BT - Computer Vision \u2013 ECCV 2018, pp 544\u2013559","DOI":"10.1007\/978-3-030-01216-8_33"},{"key":"20161_CR44","doi-asserted-by":"publisher","unstructured":"Song H, Liang H, Li H, Dai Z, Yun X (Dec. 2019) Vision-based vehicle detection and counting system using deep learning in highway scenes. Eur Transp Res Rev 11. https:\/\/doi.org\/10.1186\/s12544-019-0390-4","DOI":"10.1186\/s12544-019-0390-4"},{"key":"20161_CR45","doi-asserted-by":"publisher","unstructured":"Rabiee H, Haddadnia J, Mousavi H, Kalantarzadeh M, Nabi\u00a0M, Murino V (2016) Novel dataset for fine-grained abnormal behavior understanding in crowd. 2016 13th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Colorado Springs, pp 95\u2013101. https:\/\/doi.org\/10.1109\/AVSS.2016.7738074","DOI":"10.1109\/AVSS.2016.7738074"},{"key":"20161_CR46","unstructured":"Bashir F, Porikli F (2006) IEEE International Workshop on Performance Evaluation of Tracking and Surveillance (PETS). Performance Evaluation of Object Detection and Tracking Systems, pp 7\u201314"},{"issue":"4","key":"20161_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0120448","volume":"10","author":"IS Gracia","year":"2015","unstructured":"Gracia IS, Suarez OD, Garcia GB, Kim TK (2015) Fast fight detection. PLoS ONE 10(4):1\u201319. https:\/\/doi.org\/10.1371\/journal.pone.0120448","journal-title":"PLoS ONE"},{"key":"20161_CR48","doi-asserted-by":"publisher","unstructured":"Bermejo Nievas E, Deniz Suarez O, Bueno Garc\u00eda G, Sukthankar R (2011) Violence Detection in video using computer vision techniques. In: Real P, Diaz-Pernil D, Molina-Abril H, Berciano A, Kropatsch W (eds) Computer Analysis of Images and Patterns. CAIP 2011. Lecture Notes in Computer Science, vol 6855. Springer, Berlin, Heidelberg. https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39","DOI":"10.1007\/978-3-642-23678-5_39"},{"key":"20161_CR49","unstructured":"Ma K, Doescher M, Bodden C (2015) Anomaly detection in crowded scenes using dense trajectories. Univ Wisconsin-Madison"},{"key":"20161_CR50","doi-asserted-by":"crossref","unstructured":"Varghese EB, B SMT (2018) A Deep Learning Approach to Predict Crowd Behavior based on emotion, vol 1. Springer International Publishing","DOI":"10.1007\/978-3-030-04375-9_25"},{"key":"20161_CR51","doi-asserted-by":"publisher","unstructured":"Islam MZ, Liu J, Li J, Liu L, Kang W (2019) A semantics aware random forest for text classification. International Conference on Information and Knowledge Management, Proceedings, pp 1061\u20131070. https:\/\/doi.org\/10.1145\/3357384.3357891","DOI":"10.1145\/3357384.3357891"},{"key":"20161_CR52","doi-asserted-by":"publisher","unstructured":"Jiang X et al (2021) Density-aware multi-task learning for crowd counting, IEEE Trans Multimed 23(XX):443\u2013453. https:\/\/doi.org\/10.1109\/TMM.2020.2980945","DOI":"10.1109\/TMM.2020.2980945"},{"issue":"1","key":"20161_CR53","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1109\/TKDE.2021.3077056","volume":"35","author":"R Jiang","year":"2023","unstructured":"Jiang R et al (2023) DeepCrowd: a deep model for large-scale Citywide Crowd Density and Flow Prediction. IEEE Trans Knowl Data Eng 35(1):276\u2013290. https:\/\/doi.org\/10.1109\/TKDE.2021.3077056","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"1","key":"20161_CR54","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1142\/S2196888820500013","volume":"7","author":"SA Sumon","year":"2020","unstructured":"Sumon SA, Goni R, Bin Hashem N, Shahria T, Rahman RM (2020) Violence detection by Pretrained Modules with different deep learning approaches. Vietnam J Comput Sci 7(1):19\u201340. https:\/\/doi.org\/10.1142\/S2196888820500013","journal-title":"Vietnam J Comput Sci"},{"key":"20161_CR55","doi-asserted-by":"publisher","first-page":"16283","DOI":"10.1109\/ACCESS.2022.3147519","volume":"10","author":"K Yousaf","year":"2022","unstructured":"Yousaf K, Nawaz T (2022) A deep learning-based Approach for Inappropriate Content detection and classification of YouTube Videos. IEEE Access 10:16283\u201316298. https:\/\/doi.org\/10.1109\/ACCESS.2022.3147519","journal-title":"IEEE Access"},{"key":"20161_CR56","doi-asserted-by":"publisher","first-page":"39172","DOI":"10.1109\/ACCESS.2019.2906275","volume":"7","author":"W Song","year":"2019","unstructured":"Song W, Zhang D, Zhao X, Yu J, Zheng R, Wang A (2019) A Novel Violent Video Detection Scheme based on modified 3D convolutional neural networks. IEEE Access 7:39172\u201339179. https:\/\/doi.org\/10.1109\/ACCESS.2019.2906275","journal-title":"IEEE Access"},{"issue":"11","key":"20161_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s19112472","volume":"19","author":"FUM Ullah","year":"2019","unstructured":"Ullah FUM, Ullah A, Muhammad K, Haq IU, Baik SW (2019) Violence detection using spatiotemporal features with 3D convolutional neural network. Sens (Switzerland) 19(11):1\u201315. https:\/\/doi.org\/10.3390\/s19112472","journal-title":"Sens (Switzerland)"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20161-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-20161-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-20161-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T22:37:16Z","timestamp":1757111836000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-20161-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":57,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["20161"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-20161-7","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"1 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that there are no competing interests associated with the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The author declares that ethical considerations were assured throughout the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}]}}