{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T02:20:28Z","timestamp":1776219628520,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T00:00:00Z","timestamp":1713830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T00:00:00Z","timestamp":1713830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03164-7","type":"journal-article","created":{"date-parts":[[2024,4,23]],"date-time":"2024-04-23T16:01:58Z","timestamp":1713888118000},"page":"417-427","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["YOLO-based anomaly activity detection system for human behavior analysis and crime mitigation"],"prefix":"10.1007","volume":"18","author":[{"given":"K.","family":"Ganagavalli","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"V.","family":"Santhi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,4,23]]},"reference":[{"key":"3164_CR1","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1016\/j.procs.2018.07.112","volume":"133","author":"Shubham Shinde","year":"2018","unstructured":"Shinde, Shubham, Kothari, Ashwin, Gupta, Vikram: YOLO based Human Action Recognition and Localization. Proc. Comput. Sci. 133, 831\u2013838 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.07.112","journal-title":"Proc. Comput. Sci."},{"key":"3164_CR2","doi-asserted-by":"publisher","unstructured":"Luo, W., Liu, W., Gao, S.: A revisit of sparse coding based anomaly detection in stacked RNN framework, 2017 IEEE International Conference on Computer Vision (ICCV), 2017, pp. 341-349, https:\/\/doi.org\/10.1109\/ICCV.2017.45","DOI":"10.1109\/ICCV.2017.45"},{"key":"3164_CR3","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v14i04.8513","author":"H Xu","year":"2018","unstructured":"Xu, H., Li, L., Fang, M., Zhang, F.: Movement human actions recognition based on machine learning. Int. J. Online Eng. (2018). https:\/\/doi.org\/10.3991\/ijoe.v14i04.8513","journal-title":"Int. J. Online Eng."},{"issue":"4","key":"3164_CR4","doi-asserted-by":"publisher","first-page":"9229","DOI":"10.1007\/s10586-018-2114-2","volume":"22","author":"J Wang","year":"2019","unstructured":"Wang, J., Xia, L.: Abnormal behavior detection in videos using deep learning. Clust. Comput. 22(4), 9229\u20139239 (2019). https:\/\/doi.org\/10.1007\/s10586-018-2114-2","journal-title":"Clust. Comput."},{"key":"3164_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107394","author":"Su Xinfeng Zhang","year":"2020","unstructured":"Xinfeng Zhang, Su., Yang, Jiulong Zhang, Zhang, Weishan: Video anomaly detection and localization using motion-field shape description and homogeneity testing. Pattern Recognit. (2020). https:\/\/doi.org\/10.1016\/j.patcog.2020.107394","journal-title":"Pattern Recognit."},{"key":"3164_CR6","doi-asserted-by":"crossref","unstructured":"Liang, G., Lv, Y., Li, S., Zhang, S., Zhang, Y.: Unsupervised video summarization with a convolutional attentive adversarial network. ArXiv. \/abs\/2105.11131. (2021)","DOI":"10.1016\/j.patcog.2022.108840"},{"issue":"3","key":"3164_CR7","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.3390\/app12031021","volume":"12","author":"S Vosta","year":"2022","unstructured":"Vosta, S., Yow, K.-C.: A CNN-RNN combined structure for real-world violence detection in surveillance cameras. Appl. Sci. 12(3), 1021 (2022). https:\/\/doi.org\/10.3390\/app12031021","journal-title":"Appl. Sci."},{"key":"3164_CR8","doi-asserted-by":"publisher","first-page":"4505","DOI":"10.1109\/TIP.2021.3072863","volume":"30","author":"H Lv","year":"2021","unstructured":"Lv, H., Zhou, C., Cui, Z., Xu, C., Li, Y., Yang, J.: Localizing anomalies from weakly-labeled videos. IEEE Trans. Image Process. 30, 4505\u20134515 (2021). https:\/\/doi.org\/10.1109\/TIP.2021.3072863","journal-title":"IEEE Trans. Image Process."},{"key":"3164_CR20","doi-asserted-by":"crossref","unstructured":"Morais, R., Le, V., Tran, T., Saha, B., Mansour, M., Venkatesh S.: Learning regularity in skeleton trajectories for anomaly detection in videos, Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 11996\u201312004, Jun. 2019.","DOI":"10.1109\/CVPR.2019.01227"},{"key":"3164_CR22","doi-asserted-by":"crossref","unstructured":"Weinzaepfel, P., Harchaoui, Z., Schmid C.: Learning to track for spatiotemporal action localization. In IEEE Int. Conf. on Computer Vision and Pattern Recognition, June 2015.","DOI":"10.1109\/ICCV.2015.362"},{"key":"3164_CR9","doi-asserted-by":"crossref","unstructured":"Sultani W., Chen C., Shah M.: (2018) Real-world anomaly detection in surveillance videos, Cornell University Library, arXiv:1801.04264","DOI":"10.1109\/CVPR.2018.00678"},{"key":"3164_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.cviu.2014.02.006","volume":"124","author":"Yan Yan","year":"2014","unstructured":"Yan, Yan, Shen, Haoquan, Liu, Gaowen, Ma, Zhigang, Gao, Chenqiang, Sebe, Nicu: Coupling GLocal structural for feature selection with sparsity for image and video classification. Comput. Vis. Image Underst. 124, 99\u2013109 (2014). https:\/\/doi.org\/10.1016\/j.cviu.2014.02.006","journal-title":"Comput. Vis. Image Underst."},{"key":"3164_CR13","doi-asserted-by":"crossref","unstructured":"Zhong, J.X., Li, N., Kong, W., Liu, S., Li T.H., Li, G.: Graph convolutional label noise cleaner: Train a plug- and-play action classifier for anomaly detection, Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 1237\u20131246, Jun, 2019.","DOI":"10.1109\/CVPR.2019.00133"},{"key":"3164_CR14","unstructured":"Zhu, Y., Newsam, S.: Motion-aware feature for improved video anomaly detection, Proc. Brit. Mach. Vis. Conf. (BMVC), pp. 1\u201312, 2019."},{"key":"3164_CR12","volume-title":"Chapter 7\u2014efficient deep learning approaches for health informatics deep learning and parallel computing environment for bioengineering systems","author":"TM Navamani","year":"2019","unstructured":"Navamani, T.M.: Chapter 7\u2014efficient deep learning approaches for health informatics deep learning and parallel computing environment for bioengineering systems. Academic Press, Cambridge (2019)"},{"key":"3164_CR15","doi-asserted-by":"crossref","unstructured":"Liu, W., Luo, W., Lian, D., Gao, S.: Future frame prediction for anomaly detection\u2014A new baseline, Proc. IEEE\/CVF Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 6536\u20136545, Jun. 2018.","DOI":"10.1109\/CVPR.2018.00684"},{"key":"3164_CR18","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 FPS in MATLAB, Proc. IEEE Int. Conf. Comput. Vis. (ICCV), pp. 2720\u20132727, Dec. 2013.","DOI":"10.1109\/ICCV.2013.338"},{"issue":"1","key":"3164_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2014)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"3164_CR16","doi-asserted-by":"crossref","unstructured":"Chong, Y.S., Tay, Y.H.: Abnormal event detection in videos using spatiotemporal autoencoder, Proc. Int. Symp. Neural Netw., pp. 189\u2013196, 2017.","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"3164_CR21","doi-asserted-by":"crossref","unstructured":"Ionescu, R.T. et al.: Object-centric auto-encoders and dummy anomalies for abnormal event detection in video. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019.","DOI":"10.1109\/CVPR.2019.00803"},{"issue":"1\u201312","key":"3164_CR11","first-page":"4","volume":"4","author":"S Blunsden","year":"2010","unstructured":"Blunsden, S., Fisher, R.B.: The BEHAVE video dataset: ground truthed video for multi-person behavior classification. Ann. BMVA. 4(1\u201312), 4 (2010)","journal-title":"Ann. BMVA."},{"key":"3164_CR19","doi-asserted-by":"crossref","unstructured":"Ramachandra, Jones, M.J.: Street scene: A new dataset and evaluation protocol for video anomaly detection, Proc. IEEE Winter Conf. Appl. Comput. Vis. (WACV), pp. 2569\u20132578, Mar. 2020.","DOI":"10.1109\/WACV45572.2020.9093457"},{"key":"3164_CR23","doi-asserted-by":"crossref","unstructured":"Thi Thi Zin, Pyke Tin, Hama H, Toriu T.: Unattended object intelligent analyzer for consumer video surveillance, IEEE Trans. on Consumer Electronics Vol. 57, No. 2, pp. 549\u2013557, May. 2011.","DOI":"10.1109\/TCE.2011.5955191"},{"key":"3164_CR24","doi-asserted-by":"publisher","unstructured":"Zin, T.T., Tin, P., Toriu, T., Hama H.: A Markov random walk model for loitering people detection, Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, Germany, 2010, pp. 680\u2013683, https:\/\/doi.org\/10.1109\/IIHMSP.2010.172.","DOI":"10.1109\/IIHMSP.2010.172"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03164-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03164-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03164-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T12:26:51Z","timestamp":1719318411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03164-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,23]]},"references-count":24,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3164"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03164-7","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,23]]},"assertion":[{"value":"27 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"In accordance with publisher and my ethical obligation as a researcher, I am reporting that there are no relevant financial or non-financial competing interests to report.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}