{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:33:05Z","timestamp":1776184385645,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11760-023-02895-3","type":"journal-article","created":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T20:02:32Z","timestamp":1704312152000},"page":"2231-2241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An intelligent adaptive learning framework for fake video detection using spatiotemporal features"],"prefix":"10.1007","volume":"18","author":[{"given":"Allada","family":"Koteswaramma","sequence":"first","affiliation":[]},{"given":"M. Babu","family":"Rao","sequence":"additional","affiliation":[]},{"given":"G. Jaya","family":"Suma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,3]]},"reference":[{"key":"2895_CR1","doi-asserted-by":"publisher","first-page":"4029","DOI":"10.1007\/s11760-023-02633-9","volume":"17","author":"U Masud","year":"2023","unstructured":"Masud, U., Sadiq, M., Masood, S., El-Latif, A.A.A.: LW-deepfakenet: a lightweight time distributed CNN-LSTM network for real-time deep fake video detection. Signal Image Video Process. 17, 4029\u20134037 (2023). https:\/\/doi.org\/10.1007\/s11760-023-02633-9","journal-title":"Signal Image Video Process."},{"key":"2895_CR2","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s11760-022-02227-x","volume":"17","author":"M Aloraini","year":"2023","unstructured":"Aloraini, M.: FaceMD: convolutional neural network-based spatiotemporal fusion facial manipulation detection. Signal Image Video Process. 17, 247\u2013255 (2023). https:\/\/doi.org\/10.1007\/s11760-022-02227-x","journal-title":"Signal Image Video Process."},{"key":"2895_CR3","doi-asserted-by":"publisher","first-page":"4123","DOI":"10.1007\/s11760-023-02644-6","volume":"17","author":"Z Hu","year":"2023","unstructured":"Hu, Z., Duan, Q., Zhang, P., Tao, H.: An attention-erasing stripe pyramid network for face forgery detection. Signal Image Video Process. 17, 4123\u20134131 (2023). https:\/\/doi.org\/10.1007\/s11760-023-02644-6","journal-title":"Signal Image Video Process."},{"key":"2895_CR4","doi-asserted-by":"publisher","first-page":"109456","DOI":"10.1016\/j.knosys.2022.109456","volume":"253","author":"W Ullah","year":"2022","unstructured":"Ullah, W., Hussain, T., Khan, Z.A., Haroon, U., Baik, S.W.: Intelligent dual stream CNN and echo state network for anomaly detection. Knowl. Based Syst. 253, 109456 (2022). https:\/\/doi.org\/10.1016\/j.knosys.2022.109456","journal-title":"Knowl. Based Syst."},{"key":"2895_CR5","doi-asserted-by":"publisher","first-page":"109496","DOI":"10.1016\/j.asoc.2022.109496","volume":"128","author":"M Hashemzadeh","year":"2022","unstructured":"Hashemzadeh, M., Farajzadeh, N., Heydari, M.: Smoke detection in video using convolutional neural networks and efficient spatiotemporal features. Appl. Soft Comput. 128, 109496 (2022). https:\/\/doi.org\/10.1016\/j.asoc.2022.109496","journal-title":"Appl. Soft Comput."},{"key":"2895_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.119079","volume":"214","author":"AM Kamoona","year":"2023","unstructured":"Kamoona, A.M., Gostar, A.K., Bab-Hadiashar, A., Hoseinnezhad, R.: Multiple instance-based video anomaly detection using deep temporal encoding\u2013decoding. Expert Syst. Appl. 214, 119079 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.119079","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"2895_CR7","doi-asserted-by":"publisher","first-page":"4251","DOI":"10.1007\/s40747-022-00712-x","volume":"8","author":"H Zhang","year":"2022","unstructured":"Zhang, H., Li, H.: Interactive spatio-temporal feature learning network for video foreground detection. Complex Intell. Syst. 8(5), 4251\u20134263 (2022). https:\/\/doi.org\/10.1007\/s40747-022-00712-x","journal-title":"Complex Intell. Syst."},{"issue":"29","key":"2895_CR8","doi-asserted-by":"publisher","first-page":"42325","DOI":"10.1007\/s11042-022-13536-1","volume":"81","author":"S Aftab","year":"2022","unstructured":"Aftab, S., Ali, S.F., Mahmood, A., Suleman, U.: A boosting framework for human posture recognition using spatio-temporal features along with radon transform. Multimed. Tools Appl. 81(29), 42325\u201342351 (2022). https:\/\/doi.org\/10.1007\/s11042-022-13536-1","journal-title":"Multimed. Tools Appl."},{"key":"2895_CR9","doi-asserted-by":"publisher","first-page":"103115","DOI":"10.1016\/j.jag.2022.103115","volume":"115","author":"W Yu","year":"2022","unstructured":"Yu, W., Huang, Q.: A deep encoder-decoder network for anomaly detection in driving trajectory behavior under spatio-temporal context. Int. J. Appl. Earth Obs. Geoinf. 115, 103115 (2022). https:\/\/doi.org\/10.1016\/j.jag.2022.103115","journal-title":"Int. J. Appl. Earth Obs. Geoinf."},{"key":"2895_CR10","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1016\/j.future.2021.10.033","volume":"129","author":"W Ullah","year":"2022","unstructured":"Ullah, W., Ullah, A., Hussain, T., Muhammad, K., Heidari, A.A., Del Ser, J., Baik, S.W., De Albuquerque, V.H.: Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance big video data. Future Gener. Comput. Syst. 129, 286\u2013297 (2022). https:\/\/doi.org\/10.1016\/j.future.2021.10.033","journal-title":"Future Gener. Comput. Syst."},{"key":"2895_CR11","doi-asserted-by":"publisher","first-page":"109436","DOI":"10.1016\/j.knosys.2022.109436","volume":"252","author":"SE Bekhouche","year":"2022","unstructured":"Bekhouche, S.E., Ruichek, Y., Dornaika, F.: Driver drowsiness detection in video sequences using hybrid selection of deep features. Knowl. Based Syst. 252, 109436 (2022). https:\/\/doi.org\/10.1016\/j.knosys.2022.109436","journal-title":"Knowl. Based Syst."},{"key":"2895_CR12","doi-asserted-by":"publisher","first-page":"104078","DOI":"10.1016\/j.imavis.2020.104078","volume":"106","author":"R Nayak","year":"2021","unstructured":"Nayak, R., Pati, U.C., Das, S.K.: A comprehensive review on deep learning-based methods for video anomaly detection. Image Vis. Comput. 106, 104078 (2021). https:\/\/doi.org\/10.1016\/j.imavis.2020.104078","journal-title":"Image Vis. Comput."},{"issue":"3","key":"2895_CR13","doi-asserted-by":"publisher","first-page":"103289","DOI":"10.1016\/j.ipm.2023.103289","volume":"60","author":"W Ullah","year":"2023","unstructured":"Ullah, W., Hussain, T., Baik, S.W.: Vision transformer attention with multi-reservoir echo state network for anomaly recognition. Inf. Process. Manag. 60(3), 103289 (2023). https:\/\/doi.org\/10.1016\/j.ipm.2023.103289","journal-title":"Inf. Process. Manag."},{"key":"2895_CR14","doi-asserted-by":"publisher","first-page":"107102","DOI":"10.1016\/j.asoc.2021.107102","volume":"103","author":"A Ullah","year":"2021","unstructured":"Ullah, A., Muhammad, K., Ding, W., Palade, V., Haq, I.U., Baik, S.W.: Efficient activity recognition using lightweight CNN and DS-GRU network for surveillance applications. Appl. Soft Comput. 103, 107102 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2021.107102","journal-title":"Appl. Soft Comput."},{"key":"2895_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2023.03.042","author":"L Wu","year":"2023","unstructured":"Wu, L., Huang, C., Zhao, S., Li, J., Zhao, J., Cui, Z., Yu, Z., Xu, Y., Zhang, M.: Robust fall detection in video surveillance based on weakly supervised learning. Neural Netw. (2023). https:\/\/doi.org\/10.1016\/j.neunet.2023.03.042","journal-title":"Neural Netw."},{"key":"2895_CR16","doi-asserted-by":"publisher","first-page":"115057","DOI":"10.1016\/j.eswa.2021.115057","volume":"179","author":"S Gul","year":"2021","unstructured":"Gul, S., Malik, M.I., Khan, G.M., Shafait, F.: Multi-view gait recognition system using spatio-temporal features and deep learning. Expert Syst. Appl. 179, 115057 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2021.115057","journal-title":"Expert Syst. Appl."},{"key":"2895_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105759","volume":"119","author":"NN Pandey","year":"2023","unstructured":"Pandey, N.N., Muppalaneni, N.B.: Dumodds: dual modeling approach for drowsiness detection based on spatial and spatio-temporal features. Eng. Appl. Artif. Intell. 119, 105759 (2023). https:\/\/doi.org\/10.1016\/j.engappai.2022.105759","journal-title":"Eng. Appl. Artif. Intell."},{"key":"2895_CR18","doi-asserted-by":"publisher","first-page":"108282","DOI":"10.1109\/SoutheastCon51012.2023.10115139","volume":"189","author":"K Thakkar","year":"2023","unstructured":"Thakkar, K., Lo, D.: Video normalization in identifying fake videos using a long short-term memory model. Southeast Con. 189, 108282 (2023). https:\/\/doi.org\/10.1109\/SoutheastCon51012.2023.10115139","journal-title":"Southeast Con."},{"key":"2895_CR19","doi-asserted-by":"publisher","first-page":"100713","DOI":"10.1016\/j.iot.2023.100713","volume":"22","author":"SK Mohammed","year":"2023","unstructured":"Mohammed, S.K., Singh, S., Mizouni, R., Otrok, H.: A deep learning framework for target localization in error-prone environment. Int. Things 22, 100713 (2023). https:\/\/doi.org\/10.1016\/j.iot.2023.100713","journal-title":"Int. Things"},{"key":"2895_CR20","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.neucom.2021.12.004","volume":"473","author":"H Tian","year":"2022","unstructured":"Tian, H., Ma, X., Wu, H., Li, Y.: Skeleton-based abnormal gait recognition with spatio-temporal attention enhanced gait-structural graph convolutional networks. Neurocomputing 473, 116\u2013126 (2022). https:\/\/doi.org\/10.1016\/j.neucom.2021.12.004","journal-title":"Neurocomputing"},{"key":"2895_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-022-13496-6","volume":"20","author":"N Aslam","year":"2022","unstructured":"Aslam, N., Kolekar, M.H.: Unsupervised anomalous event detection in videos using spatio-temporal inter-fused autoencoder. Multimed. Tools Appl. 20, 1\u201326 (2022). https:\/\/doi.org\/10.1007\/s11042-022-13496-6","journal-title":"Multimed. Tools Appl."},{"key":"2895_CR22","doi-asserted-by":"publisher","first-page":"1311","DOI":"10.1007\/s11042-020-09552-8","volume":"80","author":"SK Mohanty","year":"2021","unstructured":"Mohanty, S.K., Rup, S.: An adaptive background modeling for foreground detection using spatio-temporal features. Multimed. Tools Appl. 80, 1311\u20131341 (2021). https:\/\/doi.org\/10.1007\/s11042-020-09552-8","journal-title":"Multimed. Tools Appl."},{"issue":"12","key":"2895_CR23","doi-asserted-by":"publisher","first-page":"16995","DOI":"10.1007\/s11042-018-7083-1","volume":"78","author":"B Fakhar","year":"2019","unstructured":"Fakhar, B., RashidyKanan, H., Behrad, A.: Event detection in soccer videos using unsupervised learning of spatio-temporal features based on pooled spatial pyramid model. Multimed. Tools Appl. 78(12), 16995\u201317025 (2019). https:\/\/doi.org\/10.1007\/s11042-018-7083-1","journal-title":"Multimed. Tools Appl."},{"key":"2895_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13369-022-07321-3","volume":"102","author":"S Suratkar","year":"2022","unstructured":"Suratkar, S., Kazi, F.: Deep fake video detection using transfer learning approach. Arab. J. Sci. Eng. 102, 1\u20131 (2022). https:\/\/doi.org\/10.1007\/s13369-022-07321-3","journal-title":"Arab. J. Sci. Eng."},{"key":"2895_CR25","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.neucom.2019.07.024","volume":"362","author":"B Liu","year":"2019","unstructured":"Liu, B., Liu, Q., Zhang, T., Yang, Y.: MSSTResNet-TLD: a robust tracking method based on tracking-learning-detection framework by using multi-scale spatio-temporal residual network feature model. Neurocomputing 362, 175\u2013194 (2019). https:\/\/doi.org\/10.1016\/j.neucom.2019.07.024","journal-title":"Neurocomputing"},{"key":"2895_CR26","doi-asserted-by":"publisher","first-page":"24533","DOI":"10.1007\/s11042-021-10647-z","volume":"80","author":"DT Dehkordy","year":"2021","unstructured":"Dehkordy, D.T., Rasoolzadegan, A.: A new machine learning-based method for android malware detection on imbalanced dataset. Multimed. Tools Appl. 80, 24533\u201324554 (2021). https:\/\/doi.org\/10.1007\/s11042-021-10647-z","journal-title":"Multimed. Tools Appl."},{"key":"2895_CR27","doi-asserted-by":"publisher","first-page":"167059","DOI":"10.1109\/ACCESS.2020.3022855","volume":"8","author":"K Sadaf","year":"2020","unstructured":"Sadaf, K., Sultana, J.: Intrusion detection based on auto encoder and isolation forest in fog computing. IEEE Access 8, 167059\u2013167068 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3022855","journal-title":"IEEE Access"},{"issue":"6","key":"2895_CR28","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s42979-021-00775-6","volume":"2","author":"P Meesad","year":"2021","unstructured":"Meesad, P.: Thai fake news detection based on information retrieval, natural language processing and machine learning. SN Comput. Sci. 2(6), 425 (2021). https:\/\/doi.org\/10.1007\/s42979-021-00775-6","journal-title":"SN Comput. Sci."},{"key":"2895_CR29","doi-asserted-by":"publisher","first-page":"1841","DOI":"10.1109\/TIFS.2020.3045937","volume":"16","author":"CZ Yang","year":"2020","unstructured":"Yang, C.Z., Ma, J., Wang, S., Liew, A.W.C.: Preventing deepfake attacks on speaker authentication by dynamic lip movement analysis. IEEE Trans. Inf. Forensics Secur. 16, 1841\u20131854 (2020). https:\/\/doi.org\/10.1109\/TIFS.2020.3045937","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"2895_CR30","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/TBIOM.2020.3010312","volume":"2","author":"G Heusch","year":"2020","unstructured":"Heusch, G., George, A., Geissb\u00fchler, D., Mostaani, Z., Marcel, S.: Deep models and shortwave infrared information to detect face presentation attacks. IEEE Trans. Biom. Behav. Identity Sci. 2(4), 399\u2013409 (2020). https:\/\/doi.org\/10.1109\/TBIOM.2020.3010312","journal-title":"IEEE Trans. Biom. Behav. Identity Sci."},{"issue":"2","key":"2895_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2023.3241080","volume":"7","author":"R Fan","year":"2023","unstructured":"Fan, R., Si, C., Yi, W., Wan, Q.: YOLO-DoA: a new data-driven method of DoA estimation based on YOLO neural network framework. IEEE Sens. Lett. 7(2), 1\u20134 (2023). https:\/\/doi.org\/10.1109\/LSENS.2023.3241080","journal-title":"IEEE Sens. Lett."},{"key":"2895_CR32","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014). https:\/\/doi.org\/10.1016\/j.advengsoft.2013.12.007","journal-title":"Adv. Eng. Softw."},{"issue":"5","key":"2895_CR33","doi-asserted-by":"publisher","first-page":"3095","DOI":"10.3390\/app13053095","volume":"13","author":"N Bansal","year":"2023","unstructured":"Bansal, N., Aljrees, T., Yadav, D.P., Singh, K.U., Kumar, A., Verma, G.K., Singh, T.: Real-time advanced computational intelligence for deep fake video detection. Appl. Sci. 13(5), 3095 (2023). https:\/\/doi.org\/10.3390\/app13053095","journal-title":"Appl. Sci."},{"issue":"8","key":"2895_CR34","doi-asserted-by":"publisher","first-page":"9727","DOI":"10.1007\/s13369-022-07321-3","volume":"48","author":"S Suratkar","year":"2023","unstructured":"Suratkar, S., Kazi, F.: Deep fake video detection using transfer learning approach. Arab. J. Sci. Eng. 48(8), 9727\u20139737 (2023). https:\/\/doi.org\/10.1007\/s13369-022-07321-3","journal-title":"Arab. J. Sci. Eng."},{"key":"2895_CR35","doi-asserted-by":"publisher","first-page":"103649","DOI":"10.1016\/j.cviu.2023.103649","volume":"229","author":"H Zhou","year":"2023","unstructured":"Zhou, H., Jiang, F., Lu, H.: SSDA-YOLO: Semi-supervised domain adaptive YOLO for cross-domain object detection. Comput. Vis. Image Underst. 229, 103649 (2023). https:\/\/doi.org\/10.1016\/j.cviu.2023.103649","journal-title":"Comput. Vis. Image Underst."},{"issue":"2","key":"2895_CR36","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1080\/23307706.2022.2033644","volume":"10","author":"S Suratkar","year":"2023","unstructured":"Suratkar, S., Bhiungade, S., Pitale, J., Soni, K., Badgujar, T., Kazi, F.: Deep-fake video detection approaches using convolutional\u2013recurrent neural networks. J. Control. Decis. 10(2), 198\u2013214 (2023). https:\/\/doi.org\/10.1080\/23307706.2022.2033644","journal-title":"J. Control. Decis."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02895-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-023-02895-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-023-02895-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T20:02:15Z","timestamp":1710878535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-023-02895-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["2895"],"URL":"https:\/\/doi.org\/10.1007\/s11760-023-02895-3","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,3]]},"assertion":[{"value":"15 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All applicable institutional and\/or national guidelines for the care and use of animals were followed.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"For this type of analysis, formal consent is not needed.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}