{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:15:26Z","timestamp":1773155726653,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s11390-024-3702-7","type":"journal-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:01:56Z","timestamp":1726203716000},"page":"1029-1039","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Balancing Accuracy and Training Time in Federated Learning for Violence Detection in Surveillance Videos: A Study of Neural Network Architectures"],"prefix":"10.1007","volume":"39","author":[{"given":"Quentin","family":"Pajon","sequence":"first","affiliation":[]},{"given":"Swan","family":"Serre","sequence":"additional","affiliation":[]},{"given":"Hugo","family":"Wissocq","sequence":"additional","affiliation":[]},{"given":"L\u00e9o","family":"Rabaud","sequence":"additional","affiliation":[]},{"given":"Siba","family":"Haidar","sequence":"additional","affiliation":[]},{"given":"Antoun","family":"Yaacoub","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"issue":"7","key":"3702_CR1","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1007\/s42452-021-04534-3","volume":"3","author":"W F Youssef","year":"2021","unstructured":"Youssef W F, Haidar S, Joly P. Automatic textual description of interactions between two objects in surveillance videos. SN Applied Sciences, 2021, 3(7): 695. DOI: https:\/\/doi.org\/10.1007\/s42452-021-04534-3.","journal-title":"SN Applied Sciences"},{"issue":"19","key":"3702_CR2","doi-asserted-by":"publisher","first-page":"9901","DOI":"10.3390\/app12199901","volume":"12","author":"R Gosselin","year":"2022","unstructured":"Gosselin R, Vieu L, Loukil F, Benoit A. Privacy and security in federated learning: A survey. Applied Sciences, 2022, 12(19): 9901. DOI: https:\/\/doi.org\/10.3390\/app12199901.","journal-title":"Applied Sciences"},{"issue":"10","key":"3702_CR3","doi-asserted-by":"publisher","first-page":"9530","DOI":"10.1109\/JIOT.2020.2991416","volume":"7","author":"R Hu","year":"2020","unstructured":"Hu R, Guo Y X, Li H N, Pei Q Q, Gong Y M. Personalized federated learning with differential privacy. IEEE Internet of Things Journal, 2020, 7(10): 9530\u20139539. DOI: https:\/\/doi.org\/10.1109\/JIOT.2020.2991416.","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"3702_CR4","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3387107","volume":"63","author":"Y Cheng","year":"2020","unstructured":"Cheng Y, Liu Y, Chen T J, Yang Q. Federated learning for privacy-preserving AI. Communications of the ACM, 2020, 63(12): 33\u201336. DOI: https:\/\/doi.org\/10.1145\/3387107.","journal-title":"Communications of the ACM"},{"issue":"1","key":"3702_CR5","first-page":"93","volume":"55","author":"K Crawford","year":"2014","unstructured":"Crawford K, Schultz J. Big data and due process: Toward a framework to redress predictive privacy harms. Boston College Law Review, 2014, 55(1): 93\u2013128.","journal-title":"Boston College Law Review"},{"issue":"7714","key":"3702_CR6","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1038\/d41586-018-05707-8","volume":"559","author":"J Zou","year":"2018","unstructured":"Zou J, Schiebinger L. AI can be sexist and racist\u2014It\u2019s time to make it fair. Nature, 2018, 559(7714): 324\u2013326. DOI: https:\/\/doi.org\/10.1038\/d41586-018-05707-8.","journal-title":"Nature"},{"key":"3702_CR7","first-page":"77","volume-title":"Proc. the 1st Conference on Fairness, Accountability and Transparency","author":"J Buolamwini","year":"2018","unstructured":"Buolamwini J, Gebru T. Gender shades: Intersectional accuracy disparities in commercial gender classification. In Proc. the 1st Conference on Fairness, Accountability and Transparency, Feb. 2018, pp.77\u201391."},{"issue":"2","key":"3702_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/2053951716679679","volume":"3","author":"B D Mittelstadt","year":"2016","unstructured":"Mittelstadt B D, Allo P, Taddeo M, Wachter S, Floridi L. The ethics of algorithms: Mapping the debate. Big Data & Society, 2016, 3(2): 1\u201321. DOI: https:\/\/doi.org\/10.1177\/2053951716679679.","journal-title":"Big Data & Society"},{"key":"3702_CR9","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.24251\/HICSS.2019.258","volume-title":"Proc. the 52nd Hawaii International Conference on System Sciences","author":"D Greene","year":"2019","unstructured":"Greene D, Hoffmann A L, Stark L. Better, nicer, clearer, fairer: A critical assessment of the movement for ethical artificial intelligence and machine learning. In Proc. the 52nd Hawaii International Conference on System Sciences, Jan. 2019, pp.2122\u20132131. DOI: https:\/\/doi.org\/10.24251\/HICSS.2019.258."},{"key":"3702_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CVPRW.2012.6239348","volume-title":"Proc. the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops","author":"T Hassner","year":"2012","unstructured":"Hassner T, Itcher Y, Kliper-Gross O. Violent flows: Realtime detection of violent crowd behavior. In Proc. the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, Jun. 2012, pp.1\u20136. DOI: https:\/\/doi.org\/10.1109\/CVPRW.2012.6239348."},{"key":"3702_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.imavis.2016.01.006","volume":"48\u201349","author":"Y Gao","year":"2016","unstructured":"Gao Y, Liu H, Sun X H, Wang C, Liu Y. Violence detection using oriented violent flows. Image and Vision Computing, 2016, 48\u201349: 37\u201341. DOI: https:\/\/doi.org\/10.1016\/j.imavis.2016.01.006.","journal-title":"Image and Vision Computing"},{"key":"3702_CR12","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-3-319-14364-4_53","volume-title":"Proc. the 10th International Symposium on Advances in Visual Computing","author":"C H Ding","year":"2014","unstructured":"Ding C H, Fan S K, Zhu M, Feng W G, Jia B Z. Violence detection in video by using 3D convolutional neural networks. In Proc. the 10th International Symposium on Advances in Visual Computing, Dec. 2014, pp.551\u2013558. DOI: https:\/\/doi.org\/10.1007\/978-3-319-14364-4_53."},{"key":"3702_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/AVSS.2019.8909883","volume-title":"Proc. the 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","author":"J Li","year":"2019","unstructured":"Li J, Jiang X H, Sun T F, Xu K. Efficient violence detection using 3D convolutional neural networks. In Proc. the 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Sept. 2019, pp.1\u20138. DOI: https:\/\/doi.org\/10.1109\/AVSS.2019.8909883."},{"key":"3702_CR14","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1109\/CVPR.2017.243","volume-title":"Proc. the 2017 IEEE Conference on Computer Vision and Pattern Recognition","author":"G Huang","year":"2017","unstructured":"Huang G, Liu Z, Van Der Maaten L, Weinberger K Q. Densely connected convolutional networks. In Proc. the 2017 IEEE Conference on Computer Vision and Pattern Recognition, Jul. 2017, pp.2261\u20132269. DOI: https:\/\/doi.org\/10.1109\/CVPR.2017.243."},{"key":"3702_CR15","doi-asserted-by":"publisher","first-page":"802","DOI":"10.5555\/2969239.2969329","volume-title":"Proc. the 28th International Conference on Neural Information Processing Systems","author":"X J Shi","year":"2015","unstructured":"Shi X J, Chen Z R, Wang H, Yeung D Y, Wong W K, Woo W C. Convolutional LSTM network: A machine learning approach for precipitation nowcasting. In Proc. the 28th International Conference on Neural Information Processing Systems, Dec. 2015, pp.802\u2013810. DOI: https:\/\/doi.org\/10.5555\/2969239.2969329."},{"key":"3702_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/AVSS.2017.8078468","volume-title":"Proc. the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","author":"S Sudhakaran","year":"2017","unstructured":"Sudhakaran S, Lanz O. Learning to detect violent videos using convolutional long short-term memory. In Proc. the 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Aug. 29-Sept. 1, 2017, pp.1\u20136. DOI: https:\/\/doi.org\/10.1109\/AVSS.2017.8078468."},{"key":"3702_CR17","doi-asserted-by":"publisher","first-page":"4183","DOI":"10.1109\/ICPR48806.2021.9412502","volume-title":"Proc. the 25th International Conference on Pattern Recognition (ICPR)","author":"M Cheng","year":"2021","unstructured":"Cheng M, Cai K J, Li M. RWF-2000: An open large scale video database for violence detection. In Proc. the 25th International Conference on Pattern Recognition (ICPR), Jan. 2021, pp.4183\u20134190. DOI: https:\/\/doi.org\/10.1109\/ICPR48806.2021.9412502."},{"key":"3702_CR18","first-page":"1273","volume-title":"Proc. the 20th International Conference on Artificial Intelligence and Statistics","author":"B McMahan","year":"2017","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas B A Y. Communication-efficient learning of deep networks from decentralized data. In Proc. the 20th International Conference on Artificial Intelligence and Statistics, Apr. 2017, pp.1273\u20131282."},{"key":"3702_CR19","volume-title":"Proc. the 3rd Conference on Machine Learning and Systems","author":"T Li","year":"2020","unstructured":"Li T, Sahu A K, Zaheer M, Sanjabi M, Talwalkar A, Smith V. Federated optimization in heterogeneous networks. In Proc. the 3rd Conference on Machine Learning and Systems, Mar. 2020."},{"key":"3702_CR20","volume-title":"Proc. the 35th International Conference on Neural Information Processing Systems","author":"S P Karimireddy","year":"2021","unstructured":"Karimireddy S P, Jaggi M, Kale S, Mohri M, Reddi S J, Stich S U, Suresh A T. Breaking the centralized barrier for cross-device federated learning. In Proc. the 35th International Conference on Neural Information Processing Systems, Dec. 2021, Article No.2196"},{"key":"3702_CR21","volume-title":"Proc. the 9th International Conference on Learning Representations","author":"S J Reddi","year":"2020","unstructured":"Reddi S J, Charles Z, Zaheer M, Garrett Z, Rush K, Kone\u010dn\u1ef3 J, Kumar S, McMahan H B. Adaptive federated optimization. In Proc. the 9th International Conference on Learning Representations, May 2020."},{"key":"3702_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892150","volume-title":"Proc. the 2022 International Joint Conference on Neural Networks (IJCNN)","author":"V E D S Silva","year":"2022","unstructured":"Silva V E D S, Lacerda T B, Miranda P B C, Nascimento A C A, Furtado A P C. Federated learning for physical violence detection in videos. In Proc. the 2022 International Joint Conference on Neural Networks (IJCNN), Jul. 2022. DOI: https:\/\/doi.org\/10.1109\/IJCNN55064.2022.9892150."},{"key":"3702_CR23","doi-asserted-by":"publisher","first-page":"160580","DOI":"10.1109\/ACCESS.2021.3131315","volume":"9","author":"P Sernani","year":"2021","unstructured":"Sernani P, Falcionelli N, Tomassini S, Contardo P, Dragoni A F. Deep learning for automatic violence detection: Tests on the AIRTLab dataset. IEEE Access, 2021, 9: 160580\u2013160595. DOI: https:\/\/doi.org\/10.1109\/ACCESS.2021.3131315.","journal-title":"IEEE Access"},{"key":"3702_CR24","doi-asserted-by":"publisher","first-page":"4489","DOI":"10.1109\/ICCV.2015.510","volume-title":"Proc. the 2015 IEEE International Conference on Computer Vision","author":"D Tran","year":"2015","unstructured":"Tran D, Bourdev L, Fergus R, Torresani L, Paluri M. Learning spatiotemporal features with 3D convolutional networks. In Proc. the 2015 IEEE International Conference on Computer Vision, Dec. 2015, pp.4489\u20134497. DOI: https:\/\/doi.org\/10.1109\/ICCV.2015.510."},{"key":"3702_CR25","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1109\/WACV.2017.58","volume-title":"Proc. the 2017 IEEE Winter Conference on Applications of Computer Vision (WACV)","author":"L N Smith","year":"2017","unstructured":"Smith L N. Cyclical learning rates for training neural networks. In Proc. the 2017 IEEE Winter Conference on Applications of Computer Vision (WACV), Mar. 2017, pp.464\u2013472. DOI: https:\/\/doi.org\/10.1109\/WACV.2017.58."},{"key":"3702_CR26","doi-asserted-by":"publisher","DOI":"10.1117\/12.2520589","volume-title":"Proc. SPIE 11006, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications","author":"L N Smith","year":"2019","unstructured":"Smith L N, Topin N. Super-convergence: Very fast training of neural networks using large learning rates. In Proc. SPIE 11006, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, May 2019, Article No.1100612. DOI: https:\/\/doi.org\/10.1117\/12.2520589."},{"key":"3702_CR27","unstructured":"Howard A G, Zhu M L, Chen B, Kalenichenko D, Wang W J, Weyand T, Andreetto M, Adam H. MobileNets: Efficient convolutional neural networks for mobile vision applications. arXiv: 1704.04861, 2017. https:\/\/arxiv.org\/abs\/1704.04861, Jul. 2024."},{"key":"3702_CR28","doi-asserted-by":"publisher","first-page":"5534","DOI":"10.1109\/ICCV.2017.590","volume-title":"Proc. the 2017 IEEE International Conference on Computer Vision","author":"Z F Qiu","year":"2017","unstructured":"Qiu Z F, Yao T, Mei T. Learning spatio-temporal representation with pseudo-3D residual networks. In Proc. the 2017 IEEE International Conference on Computer Vision, Oct. 2017, pp.5534\u20135542. DOI: https:\/\/doi.org\/10.1109\/ICCV.2017.590."},{"key":"3702_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/IJCNN52387.2021.9534280","volume-title":"Proc. the 2021 International Joint Conference on Neural Networks (IJCNN)","author":"Z Islam","year":"2021","unstructured":"Islam Z, Rukonuzzaman M, Ahmed R, Kabir M H, Farazi M. Efficient two-stream network for violence detection using separable convolutional LSTM. In Proc. the 2021 International Joint Conference on Neural Networks (IJCNN), Jul. 2021, pp.1\u20138. DOI: https:\/\/doi.org\/10.1109\/IJCNN52387.2021.9534280."},{"key":"3702_CR30","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-642-23678-5_39","volume-title":"Proc. the 14th International Conference on Computer Analysis of Images and Patterns","author":"E Bermejo Nievas","year":"2011","unstructured":"Bermejo Nievas E, Deniz Suarez O, Bueno Garc\u00eda G, Sukthankar R. Violence detection in video using computer vision techniques. In Proc. the 14th International Conference on Computer Analysis of Images and Patterns, Aug. 2011, pp.332\u2013339. DOI: https:\/\/doi.org\/10.1007\/978-3-642-23678-5_39."},{"key":"3702_CR31","doi-asserted-by":"publisher","first-page":"106587","DOI":"10.1016\/j.dib.2020.106587","volume":"33","author":"M Bianculli","year":"2020","unstructured":"Bianculli M, Falcionelli N, Sernani P, Tomassini P, Contardo P, Lombardi M, Dragoni A F. A dataset for automatic violence detection in videos. Data in Brief, 2020, 33: 106587. DOI: https:\/\/doi.org\/10.1016\/j.dib.2020.106587.","journal-title":"Data in Brief"},{"key":"3702_CR32","unstructured":"Beutel D J, Topal T, Mathur A, Qiu X C, Fernandez-Marques J, Gao Y, Sani L, Li K H, Parcollet T, de Gusm\u00e3o P P B, Lane N D. Flower: A friendly federated learning research framework. arXiv: 2007.14390, 2020. https:\/\/arxiv.org\/abs\/2007.14390, Jul. 2024."},{"issue":"3","key":"3702_CR33","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li T, Sahu A K, Talwalkar A, Smith V. Federated learning: Challenges, methods, and future directions. IEEE Signal Processing Magazine, 2020, 37(3): 50\u201360. DOI: https:\/\/doi.org\/10.1109\/MSP.2020.2975749.","journal-title":"IEEE Signal Processing Magazine"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3702-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-024-3702-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-024-3702-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T23:01:23Z","timestamp":1733439683000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-024-3702-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["3702"],"URL":"https:\/\/doi.org\/10.1007\/s11390-024-3702-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"22 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"<b>Conflict of Interest<\/b> The authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics"}}]}}