{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:26Z","timestamp":1740123506466,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,11,29]],"date-time":"2017-11-29T00:00:00Z","timestamp":1511913600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61375017"],"award-info":[{"award-number":["61375017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multidim Syst Sign Process"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11045-017-0540-6","type":"journal-article","created":{"date-parts":[[2017,11,29]],"date-time":"2017-11-29T10:34:48Z","timestamp":1511951688000},"page":"1895-1904","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A learning-based approach for leaf detection in traffic surveillance video"],"prefix":"10.1007","volume":"29","author":[{"given":"Li","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaoping","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Jiaxiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"issue":"11","key":"540_CR1","doi-asserted-by":"crossref","first-page":"2982","DOI":"10.1109\/TIM.2010.2047129","volume":"59","author":"C Alippi","year":"2010","unstructured":"Alippi, C., Boracchi, G., Camplani, R., & Roveri, M. (2010). Detecting external disturbances on the camera lens in wireless multimedia sensor networks. IEEE Transaction on Instrumentation and Measurement, 59(11), 2982\u20132990.","journal-title":"IEEE Transaction on Instrumentation and Measurement"},{"issue":"1","key":"540_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17700\/jai.2015.6.1.152","volume":"6","author":"O Babatunde","year":"2015","unstructured":"Babatunde, O., Armstrong, L., Diepeveen, D., & Leng, J. (2015). A survey of computer-based vision systems for automatic identification of plant species. Journal of Agricultural Informatics, 6(1), 1\u201311.","journal-title":"Journal of Agricultural Informatics"},{"issue":"9","key":"540_CR3","doi-asserted-by":"crossref","first-page":"3072","DOI":"10.1109\/TLA.2015.7350061","volume":"13","author":"JGA Barbedo","year":"2015","unstructured":"Barbedo, J. G. A. (2015). Identifying central features of cotton leaves in digital images with difficult backgrounds. IEEE Latin America Transactions, 13(9), 3072\u20133079.","journal-title":"IEEE Latin America Transactions"},{"key":"540_CR4","doi-asserted-by":"crossref","unstructured":"Borges, P. V. K., Mayer, J., & Izquierdo, E. (2008) A probabilistic model for flood detection in video sequences. In IEEE International Conference on Image Processing, San Diego, CA, Oct 2008 (pp. 13\u201316).","DOI":"10.1109\/ICIP.2008.4711679"},{"key":"540_CR5","doi-asserted-by":"crossref","unstructured":"Bottou, L. (2012). Stochastic gradient descent tricks. In G.\u00a0Montavon, G.\u00a0B. Orr, & K.-R. Muller (Eds.), Neural Networks: Tricks of the Trade (Vol. 7700, pp. 421\u2013436). Lecture Notes in Computer Science, Berlin: Springer.","DOI":"10.1007\/978-3-642-35289-8_25"},{"key":"540_CR6","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.asoc.2016.03.016","volume":"45","author":"Y Campos","year":"2016","unstructured":"Campos, Y., Sossa, H., & Pajares, G. (2016). Spatio-temporal analysis for obstacle detection in agricultural videos. Applied Soft Computing, 45, 86\u201397.","journal-title":"Applied Soft Computing"},{"key":"540_CR7","doi-asserted-by":"crossref","unstructured":"Cerutti, G., Tougne, L., Mille, J., Vacavant, A., & Coquin, D. (2013) A model-based approach for compound leaves understanding and identification. In Proceedings of the IEEE International Conference on Image Processing, Melbourne, VIC, 2013 (pp. 1471\u20131475).","DOI":"10.1109\/ICIP.2013.6738302"},{"issue":"3","key":"540_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., & Lin, C.-J. (2011). LIBSVM: A library for support vector machines. ACM Transaction on Intelligent Systems and Technology, 2(3), 1\u201317.","journal-title":"ACM Transaction on Intelligent Systems and Technology"},{"key":"540_CR9","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.dsp.2016.07.020","volume":"58","author":"Li Chen","year":"2016","unstructured":"Chen, Li, Zhu, Dawei, Tian, Jing, & Liu, Jiaxiang. (2016). Dust particle detection in traffic surveillance video using motion singularity analysis. Digital Signal Processing, 58, 127\u2013133.","journal-title":"Digital Signal Processing"},{"key":"540_CR10","doi-asserted-by":"crossref","unstructured":"Dudek, R., Cuenca, C., & Quintana, F. (2009). An automatic optical flow based method for the detection and restoration of non-repetitive damaged zones in image sequences. In H. Badioze Zaman, P. Robinson, M. Petrou, P. Olivier, H. Schroder, & T. Shih (Eds.), Visual Informatics: Bridging Research and Practice (Vol. 5857, pp. 800\u2013810).","DOI":"10.1007\/978-3-642-05036-7_76"},{"key":"540_CR11","doi-asserted-by":"crossref","unstructured":"Einecke, N., Gandhi, H., & Deigmoller, J. (2014). Detection of camera artifacts from camera images. In IEEE International Conference on Intelligent Transportation Systems, Qingdao, China, 2014 (pp. 603\u2013610).","DOI":"10.1109\/ITSC.2014.6957756"},{"key":"540_CR12","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/j.asoc.2013.10.003","volume":"14","author":"ME Elalami","year":"2014","unstructured":"Elalami, M. E. (2014). A new matching strategy for content based image retrieval system. Applied Soft Computing, 14, 407\u2013418.","journal-title":"Applied Soft Computing"},{"issue":"5","key":"540_CR13","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.1109\/TIP.2015.2400214","volume":"24","author":"M Grand-Brochier","year":"2015","unstructured":"Grand-Brochier, M., Vacavant, A., Cerutti, G., Kurtz, C., Weber, J., & Tougne, L. (2015). Tree leaves extraction in natural images: Comparative study of preprocessing tools and segmentation methods. IEEE Transaction on Image Processing, 24(5), 1549\u20131560.","journal-title":"IEEE Transaction on Image Processing"},{"key":"540_CR14","doi-asserted-by":"crossref","unstructured":"Kang, L., Ye, P., Li, Y., & Doermann, D. (2014). Convolutional neural networks for no-reference image quality assessment. In Proceedings of the IEEE International Conference on Computer Vision and Pattern Recognition, Columbus, OH, June 2014 (pp. 1733\u20131740).","DOI":"10.1109\/CVPR.2014.224"},{"key":"540_CR15","volume-title":"Fundamentals of statistical signal processing: estimation theory","author":"SM Kay","year":"1993","unstructured":"Kay, S. M. (1993). Fundamentals of statistical signal processing: estimation theory. Englewood Cliffs, NJ: PTR Prentice-Hall."},{"key":"540_CR16","doi-asserted-by":"crossref","unstructured":"Kumar, N., Belhumeur, P., Biswas, A., Jacobs, D., Kress, W. J., Lopez, I. C., & Soares, J. V. B. (2012). Leafsnap: A computer vision system for automatic plant species identification. In Proceedings of the European Conference on Computer Vision, Firenze, Italy, 2012 (pp. 502\u2013516).","DOI":"10.1007\/978-3-642-33709-3_36"},{"key":"540_CR17","doi-asserted-by":"crossref","unstructured":"Lin, D. -T., & Wu, C. -H. (2012). Real-time active tampering detection of surveillance camera and implementation on digital signal processor. In Interenational Conference on Intelligent Information Hiding and Multimedia Signal Processing, Piraeus, July 2012 (pp. 383\u2013386).","DOI":"10.1109\/IIH-MSP.2012.99"},{"issue":"5","key":"540_CR18","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/LSP.2010.2043888","volume":"17","author":"AK Moorthy","year":"2010","unstructured":"Moorthy, A. K., & Bovik, A. C. (2010). A two-step framework for constructing blind image quality indices. IEEE Signal Processing Letters, 17(5), 513\u2013516.","journal-title":"IEEE Signal Processing Letters"},{"key":"540_CR19","doi-asserted-by":"crossref","unstructured":"Saglam, A., & Temizel, A. (2009). Real-time adaptive camera tamper detection for video surveillance. In IEEE International Conference on Advanced Video and Signal Based Surveillance, Genova, 2009 (pp. 430\u2013435).","DOI":"10.1109\/AVSS.2009.29"},{"issue":"2","key":"540_CR20","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1109\/TITS.2014.2340701","volume":"16","author":"B Tian","year":"2015","unstructured":"Tian, B., Morris, B. T., Tang, M., Liu, Y., Yao, Y., Gou, C., et al. (2015). Hierarchical and networked vehicle surveillance in its: A survey. IEEE Transactions on Intelligent Transportation Systems, 16(2), 557\u2013580.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"540_CR21","doi-asserted-by":"crossref","unstructured":"Toreyin, B. U., & Cetin, A. E. (2006). Wavelet based detection of moving tree branches and leaves in video. In IEEE International Symposium on Circuits and Systems (pp. 4, pp.\u2013934).","DOI":"10.1109\/ISCAS.2006.1692739"},{"key":"540_CR22","doi-asserted-by":"crossref","unstructured":"Vedaldi, A., & Lenc, K. (2015). MatConvNet: Convolutional neural networks for MATLAB. In Proceedings of the ACM International Conference on Multimedia, Brisbane, Australia, 2015 (pp. 689\u2013692).","DOI":"10.1145\/2733373.2807412"},{"key":"540_CR23","doi-asserted-by":"crossref","unstructured":"Wang, B., Brown, D., Gao, Y., & Salle, J. L. (2013). Mobile plant leaf identification using smart-phones. In Proceedings of the IEEE International Conference on Image Processing, Melbourne, VIC, 2013 (pp. 4417\u20134421).","DOI":"10.1109\/ICIP.2013.6738910"},{"key":"540_CR24","doi-asserted-by":"crossref","unstructured":"Wang, W., Dong, J., & Tan, T. (2009). A survey of passive image tampering detection. In A. T. S. Ho, Y. Q. Shi, H. J. Kim & M. Barni (Eds.), Digital Watermarking (Vol. 5703, pp. 308\u2013322). Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-03688-0_27"}],"container-title":["Multidimensional Systems and Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11045-017-0540-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0540-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11045-017-0540-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T04:41:26Z","timestamp":1603428086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11045-017-0540-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,29]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["540"],"URL":"https:\/\/doi.org\/10.1007\/s11045-017-0540-6","relation":{},"ISSN":["0923-6082","1573-0824"],"issn-type":[{"type":"print","value":"0923-6082"},{"type":"electronic","value":"1573-0824"}],"subject":[],"published":{"date-parts":[[2017,11,29]]}}}