{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:54:22Z","timestamp":1767707662911},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-04007-9","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T10:03:41Z","timestamp":1629194621000},"page":"3940-3954","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A novel two-stream structure for video anomaly detection in smart city management"],"prefix":"10.1007","volume":"78","author":[{"given":"Yuxuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Ka Lok","family":"Man","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Sheng-Uei","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"4007_CR1","doi-asserted-by":"crossref","unstructured":"Melvin AAR, Kathrine GJW, Ilango SS, Vimal S, Rho S, Xiong NN, Nam Y (2021) Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud. Transactions on Emerging Telecommunications Technologies","DOI":"10.1002\/ett.4287"},{"issue":"3","key":"4007_CR2","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.cviu.2010.10.008","volume":"115","author":"F Jiang","year":"2011","unstructured":"Jiang F, Yuan J, Tsaftaris SA, Katsaggelos AK (2011) Anomalous video event detection using spatiotemporal context. Comput Vision Image Underst 115(3):323\u2013333","journal-title":"Comput Vision Image Underst"},{"issue":"4","key":"4007_CR3","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.imavis.2010.11.003","volume":"29","author":"F Tung","year":"2011","unstructured":"Tung F, Zelek JS, Clausi DA (2011) Goal-based trajectory analysis for unusual behaviour detection in intelligent surveillance. Image Vis Comput 29(4):230\u2013240","journal-title":"Image Vis Comput"},{"issue":"8","key":"4007_CR4","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.cviu.2011.03.003","volume":"115","author":"S Calderara","year":"2011","unstructured":"Calderara S, Heinemann U, Prati A, Cucchiara R, Tishby N (2011) Detecting anomalies in people\u2019s trajectories using spectral graph analysis. Comput Vision Image Underst 115(8):1099\u20131111","journal-title":"Comput Vision Image Underst"},{"issue":"11","key":"4007_CR5","doi-asserted-by":"publisher","first-page":"13173","DOI":"10.1007\/s11042-017-4940-2","volume":"77","author":"MG Narasimhan","year":"2018","unstructured":"Narasimhan MG, Kamath S (2018) Dynamic video anomaly detection and localization using sparse denoising autoencoders. Multimed Tools Appl 77(11):13173\u201313195","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"4007_CR6","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam A, Rivlin E, Shimshoni I, Reinitz D (2008) Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans Pattern Anal Mach Intell 30(3):555\u2013560","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"4007_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/j.neucom.2016.08.156","volume":"277","author":"S Wang","year":"2018","unstructured":"Wang S, Zhu E, Yin J, Porikli F (2018) Video anomaly detection and localization by local motion based joint video representation and ocelm. Neurocomputing 277:161\u2013175","journal-title":"Neurocomputing"},{"key":"4007_CR8","doi-asserted-by":"crossref","unstructured":"Gong D, Liu L, Le V, Saha B, Mansour M. R, Venkatesh S, Hengel A. v. d (2019) Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. In Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 1705\u20131714","DOI":"10.1109\/ICCV.2019.00179"},{"key":"4007_CR9","doi-asserted-by":"crossref","unstructured":"Abati D, Porrello A, Calderara S, Cucchiara R (2019) Latent space autoregression for novelty detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 481\u2013490","DOI":"10.1109\/CVPR.2019.00057"},{"key":"4007_CR10","doi-asserted-by":"crossref","unstructured":"Chong Y. S, Tay Y. H (2017) Abnormal event detection in videos using spatiotemporal autoencoder. in International Symposium on Neural Networks, pp. 189\u2013196, Springer","DOI":"10.1007\/978-3-319-59081-3_23"},{"issue":"10","key":"4007_CR11","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou JT, Du J, Zhu H, Peng X, Liu Y, Goh RSM (2019) Anomalynet: an anomaly detection network for video surveillance. IEEE Trans Inf Forensics Secur 14(10):2537\u20132550","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"4007_CR12","doi-asserted-by":"crossref","unstructured":"Liu W, Luo W, Lian D, Gao S (2018) Future frame prediction for anomaly detection-a new baseline. in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition pp 6536\u20136545","DOI":"10.1109\/CVPR.2018.00684"},{"key":"4007_CR13","unstructured":"Medel JR, Savakis A (2016) Anomaly detection in video using predictive convolutional long short-term memory networks,\u201d arXiv preprint arXiv:1612.00390"},{"key":"4007_CR14","doi-asserted-by":"crossref","unstructured":"Jiang F, Chen Z, Nazir A, Shi W, Lim W, Liu S, Rho S (2021) Combining fields of experts (foe) and k-svd methods in pursuing natural image priors. Journal of Visual Communication and Image Representation 78:103142","DOI":"10.1016\/j.jvcir.2021.103142"},{"issue":"8","key":"4007_CR15","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"4007_CR16","unstructured":"Zhao Y,\u00a0Zhang J, Man K.\u00a0L (2020) Lstm-based model for unforeseeable event detection from video data,\u201d in CICET 2020. p.\u00a041"},{"key":"4007_CR17","unstructured":"Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556"},{"key":"4007_CR18","doi-asserted-by":"crossref","unstructured":"Tran D, Bourdev L, Fergus R, Torresani L, Paluri M (2015) Learning spatiotemporal features with 3d convolutional networks. in Proceedings of the IEEE International Conference on Computer Vision. pp 4489\u20134497","DOI":"10.1109\/ICCV.2015.510"},{"key":"4007_CR19","doi-asserted-by":"crossref","unstructured":"Sultani W, Chen C, Shah M (2018) Real-world anomaly detection in surveillance videos. in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp 6479\u20136488","DOI":"10.1109\/CVPR.2018.00678"},{"key":"4007_CR20","unstructured":"Suarez JJP, Naval\u00a0Jr PC (2020) A survey on deep learning techniques for video anomaly detection. arXiv preprint arXiv:2009.14146"},{"issue":"10","key":"4007_CR21","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.3390\/math9101133","volume":"9","author":"M Maqsood","year":"2021","unstructured":"Maqsood M, Bukhari M, Ali Z, Gillani S, Mehmood I, Rho S, Jung Y (2021) A residual-learning-based multi-scale parallel-convolutions-assisted efficient cad system for liver tumor detection. Mathematics 9(10):1133","journal-title":"Mathematics"},{"key":"4007_CR22","doi-asserted-by":"crossref","unstructured":"Pang G, Yan C, Shen C, A. v. d. Hengel, X. Bai, (2020) Self-trained deep ordinal regression for end-to-end video anomaly detection. in Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp 12173\u201312182","DOI":"10.1109\/CVPR42600.2020.01219"},{"key":"4007_CR23","unstructured":"Simonyan K, Zisserman A (2014) Two-stream convolutional networks for action recognition in videos. arXiv preprint arXiv:1406.2199"},{"key":"4007_CR24","doi-asserted-by":"crossref","unstructured":"Del Giorno A, Bagnell JA, Hebert M (2016) A discriminative framework for anomaly detection in large videos. Springer. in European Conference on Computer Vision. pp. 334\u2013349, Springer, 2016","DOI":"10.1007\/978-3-319-46454-1_21"},{"issue":"1","key":"4007_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-020-0490-z","volume":"2020","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Man KL, Smith J, Siddique K, Guan S-U (2020) Improved two-stream model for human action recognition. EURASIP J Image Video Process 2020(1):1\u20139","journal-title":"EURASIP J Image Video Process"},{"key":"4007_CR26","doi-asserted-by":"crossref","unstructured":"Parmar P, Tran Morris B (2017) Learning to score olympic events. in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. pp 20\u201328","DOI":"10.1109\/CVPRW.2017.16"},{"issue":"1\u20133","key":"4007_CR27","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0004-3702(81)90024-2","volume":"17","author":"BK Horn","year":"1981","unstructured":"Horn BK, Schunck BG (1981) Determining optical flow. Artif Intell 17(1\u20133):185\u2013203","journal-title":"Artif Intell"},{"key":"4007_CR28","volume-title":"An iterative image registration technique with an application to stereo vision","author":"BD Lucas","year":"1981","unstructured":"Lucas BD, Kanade T et al (1981) An iterative image registration technique with an application to stereo vision. Vancouver, British Columbia"},{"issue":"3","key":"4007_CR29","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1023\/B:VISI.0000011205.11775.fd","volume":"56","author":"S Baker","year":"2004","unstructured":"Baker S, Matthews I (2004) Lucas-kanade 20 years on: a unifying framework. Int J Comput Vision 56(3):221\u2013255","journal-title":"Int J Comput Vision"},{"issue":"12","key":"4007_CR30","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1038\/nbt1206-1565","volume":"24","author":"WS Noble","year":"2006","unstructured":"Noble WS (2006) What is a support vector machine? Nat Biotechnol 24(12):1565\u20131567","journal-title":"Nat Biotechnol"},{"key":"4007_CR31","doi-asserted-by":"crossref","unstructured":"Ketkar N (2017) Introduction to pytorch. In Deep learning with python. pp. 195\u2013208, Springer","DOI":"10.1007\/978-1-4842-2766-4_12"},{"issue":"8","key":"4007_CR32","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1016\/j.patrec.2005.10.010","volume":"27","author":"T Fawcett","year":"2006","unstructured":"Fawcett T (2006) An introduction to roc analysis. Pattern Recogn Lett 27(8):861\u2013874","journal-title":"Pattern Recogn Lett"},{"key":"4007_CR33","doi-asserted-by":"crossref","unstructured":"Szegedy C, Vanhoucke V, Ioffe S, Shlens J, Wojna Z (2016) Rethinking the inception architecture for computer vision. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. pp 2818\u20132826","DOI":"10.1109\/CVPR.2016.308"},{"key":"4007_CR34","doi-asserted-by":"crossref","unstructured":"Lu C, Shi J, Jia J (2013) Abnormal event detection at 150. In Proceedings of the IEEE International Conference on Computer Vision. pp 2720\u20132727","DOI":"10.1109\/ICCV.2013.338"},{"key":"4007_CR35","doi-asserted-by":"crossref","unstructured":"Zhong J-X, Li N, Kong W, Liu S, Li TH, Li G (2019) Graph convolutional label noise cleaner: Train a plug-and-play action classifier for anomaly detection. In Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. pp 1237\u20131246","DOI":"10.1109\/CVPR.2019.00133"},{"key":"4007_CR36","unstructured":"Gianchandani U,\u00a0Tirupattur P,\u00a0Shah M (2019) Weakly-supervised spatiotemporal anomaly detection. University of Central Florida Center for Research in Computer Vision REU"},{"key":"4007_CR37","doi-asserted-by":"publisher","first-page":"102986","DOI":"10.1016\/j.scs.2021.102986","volume":"71","author":"MM Rathore","year":"2021","unstructured":"Rathore MM, Paul A, Rho S, Khan M, Vimal S, Shah SA (2021) Smart traffic control: identifying driving-violations using fog devices with vehicular cameras in smart cities. Sustain Cities Soc 71:102986","journal-title":"Sustain Cities Soc"},{"key":"4007_CR38","doi-asserted-by":"publisher","first-page":"6465","DOI":"10.1109\/ACCESS.2020.3047266","volume":"9","author":"M Bukhari","year":"2020","unstructured":"Bukhari M, Bajwa KB, Gillani S, Maqsood M, Durrani MY, Mehmood I, Ugail H, Rho S (2020) An efficient gait recognition method for known and unknown covariate conditions. IEEE Access 9:6465\u20136477","journal-title":"IEEE Access"},{"key":"4007_CR39","doi-asserted-by":"crossref","unstructured":"Bilal M, Maqsood M, Yasmin S, Hasan NU, Rho S (2021) A transfer learning-based efficient spatiotemporal human action recognition framework for long and overlapping action classes. J Supercomput pp 1\u201336","DOI":"10.1007\/s11227-021-03957-4"},{"key":"4007_CR40","unstructured":"Dosovitskiy A, Beyer L, KolesnikovA,\u00a0Weissenborn D,\u00a0Zhai X,\u00a0Unterthiner T, Dehghani M,\u00a0Minderer M,\u00a0Heigold G,\u00a0Gelly S, et\u00a0al. (2020) An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04007-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04007-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04007-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T13:22:41Z","timestamp":1644240161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04007-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["4007"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04007-9","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"4 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}