{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:19:43Z","timestamp":1761664783333,"version":"3.35.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T00:00:00Z","timestamp":1734566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s11760-024-03640-0","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T13:12:32Z","timestamp":1734613952000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Feature selection algorithm assisted residual channel attention spatio-temporal auto encoder for video anomaly detection"],"prefix":"10.1007","volume":"19","author":[{"given":"M. Lakshmi","family":"Prasudha","sequence":"first","affiliation":[]},{"given":"Vidyullatha","family":"Sukhavasi","sequence":"additional","affiliation":[]},{"given":"Kandula","family":"Neha","sequence":"additional","affiliation":[]},{"given":"Poonam Shaylesh","family":"Lunawat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"issue":"2","key":"3640_CR1","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13735-022-00227-8","volume":"11","author":"DR Patrikar","year":"2022","unstructured":"Patrikar, D.R., Parate, M.R.: Anomaly detection using edge computing in video surveillance system. Int. J. Multimed. Inf. Retr. 11(2), 85\u2013110 (2022)","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"3640_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, M., Wang, J., Qi, Q., Sun, H., Zhuang, Z., Ren, P., ... & Liao, J.: Multi-scale video anomaly detection by multi-grained spatio-temporal representation learning. In\u00a0Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition\u00a017385\u201317394 (2024).","DOI":"10.1109\/CVPR52733.2024.01646"},{"issue":"19","key":"3640_CR3","doi-asserted-by":"publisher","first-page":"10011","DOI":"10.3390\/app121910011","volume":"12","author":"F Caetano","year":"2022","unstructured":"Caetano, F., Carvalho, P., Cardoso, J.: Deep anomaly detection for in-vehicle monitoring\u2014an application-oriented review. Appl. Sci. 12(19), 10011 (2022)","journal-title":"Appl. Sci."},{"key":"3640_CR4","doi-asserted-by":"publisher","first-page":"109765","DOI":"10.1016\/j.patcog.2023.109765","volume":"143","author":"W Shao","year":"2023","unstructured":"Shao, W., Xiao, R., Rajapaksha, P., Wang, M., Crespi, N., Luo, Z., Minerva, R.: Video anomaly detection with NTCN-ML: A novel TCN for multi-instance learning. Pattern Recogn. 143, 109765 (2023)","journal-title":"Pattern Recogn."},{"issue":"4","key":"3640_CR5","doi-asserted-by":"publisher","first-page":"3319","DOI":"10.1007\/s10462-022-10258-6","volume":"56","author":"S Chandrakala","year":"2023","unstructured":"Chandrakala, S., Deepak, K., Revathy, G.: Anomaly detection in surveillance videos: A thematic taxonomy of deep models, review and performance analysis. Artif. Intell. Rev. 56(4), 3319\u20133368 (2023)","journal-title":"Artif. Intell. Rev."},{"key":"3640_CR6","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.isatra.2021.07.010","volume":"125","author":"M Z\u00fcfle","year":"2022","unstructured":"Z\u00fcfle, M., Moog, F., Lesch, V., Krupitzer, C., Kounev, S.: A machine learning-based workflow for automatic detection of anomalies in machine tools. ISA Trans. 125, 445\u2013458 (2022)","journal-title":"ISA Trans."},{"key":"3640_CR7","doi-asserted-by":"crossref","unstructured":"Affonso, G. A., De Menezes, A. L., Nunes, R. B., & Almonfrey, D.: Using artificial intelligence for anomaly detection using security cameras. In\u00a02021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 1\u20135 (2021). IEEE.","DOI":"10.1109\/ICECCME52200.2021.9591068"},{"issue":"1","key":"3640_CR8","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s00779-021-01586-5","volume":"28","author":"K Rezaee","year":"2024","unstructured":"Rezaee, K., Rezakhani, S.M., Khosravi, M.R., Moghimi, M.K.: A survey on deep learning-based real-time crowd anomaly detection for secure distributed video surveillance. Pers. Ubiquit. Comput. 28(1), 135\u2013151 (2024)","journal-title":"Pers. Ubiquit. Comput."},{"key":"3640_CR9","doi-asserted-by":"publisher","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","volume":"9","author":"AB Nassif","year":"2021","unstructured":"Nassif, A.B., Talib, M.A., Nasir, Q., Dakalbab, F.M.: Machine learning for anomaly detection: A systematic review. Ieee Access 9, 78658\u201378700 (2021)","journal-title":"Ieee Access"},{"key":"3640_CR10","first-page":"1","volume":"60","author":"S Wang","year":"2021","unstructured":"Wang, S., Wang, X., Zhang, L., Zhong, Y.: Auto-AD: autonomous hyperspectral anomaly detection network based on fully convolutional autoencoder. IEEE Trans. Geosci. Remote Sens. 60, 1\u201314 (2021)","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"issue":"1","key":"3640_CR11","first-page":"81","volume":"46","author":"AL Thomas","year":"2022","unstructured":"Thomas, A.L., Piza, E.L., Welsh, B.C., Farrington, D.P.: The internationalisation of cctv surveillance: Effects on crime and implications for emerging technologies. Int. J. Comp. Appl. Crim. Just. 46(1), 81\u2013102 (2022)","journal-title":"Int. J. Comp. Appl. Crim. Just."},{"key":"3640_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19116-9","author":"A Elmetwally","year":"2024","unstructured":"Elmetwally, A., Eldeeb, R., Elmougy, S.: Deep learning based anomaly detection in real-time video. Multimed. Tools Appl. (2024). https:\/\/doi.org\/10.1007\/s11042-024-19116-9","journal-title":"Multimed. Tools Appl."},{"key":"3640_CR13","doi-asserted-by":"crossref","unstructured":"Tian, Y., Pang, G., Chen, Y., Singh, R., Verjans, J. W., & Carneiro, G.: Weakly-supervised video anomaly detection with robust temporal feature magnitude learning. In\u00a0Proceedings of the IEEE\/CVF International Conference on Computer Vision, 4975\u20134986 (2021).","DOI":"10.1109\/ICCV48922.2021.00493"},{"key":"3640_CR14","doi-asserted-by":"crossref","unstructured":"Liu, Z., Nie, Y., Long, C., Zhang, Q., & Li, G.: A hybrid video anomaly detection framework via memory-augmented flow reconstruction and flow-guided frame prediction. In\u00a0Proceedings of the IEEE\/CVF International Conference on Computer Vision, 13588\u201313597 (2021).","DOI":"10.1109\/ICCV48922.2021.01333"},{"issue":"5","key":"3640_CR15","first-page":"2498","volume":"69","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Liu, J., Lin, J., Zhao, M., Song, L.: Appearance-motion united auto-encoder framework for video anomaly detection. IEEE Trans. Circuits Syst. II Express Briefs 69(5), 2498\u20132502 (2022)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"issue":"1","key":"3640_CR16","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11760-020-01740-1","volume":"15","author":"K Deepak","year":"2021","unstructured":"Deepak, K., Chandrakala, S., Mohan, C.K.: Residual spatiotemporal autoencoder for unsupervised video anomaly detection. SIViP 15(1), 215\u2013222 (2021)","journal-title":"SIViP"},{"key":"3640_CR17","doi-asserted-by":"crossref","unstructured":"Wang, G., Wang, Y., Qin, J., Zhang, D., Bao, X., & Huang, D.: Video anomaly detection by solving decoupled spatio-temporal jigsaw puzzles. In\u00a0European Conference on Computer Vision, 494\u2013511 (2022). Cham: Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-20080-9_29"},{"issue":"1","key":"3640_CR18","first-page":"387","volume":"37","author":"Y Chen","year":"2023","unstructured":"Chen, Y., Liu, Z., Zhang, B., Fok, W., Qi, X., Wu, Y.C.: Mgfn: Magnitude-contrastive glance-and-focus network for weakly-supervised video anomaly detection. Proc. AAAI Confer. Artif. Intell. 37(1), 387\u2013395 (2023)","journal-title":"Proc. AAAI Confer. Artif. Intell."},{"issue":"14","key":"3640_CR19","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1049\/ipr2.12258","volume":"15","author":"B Wan","year":"2021","unstructured":"Wan, B., Jiang, W., Fang, Y., Luo, Z., Ding, G.: Anomaly detection in video sequences: A benchmark and computational model. IET Image Proc. 15(14), 3454\u20133465 (2021)","journal-title":"IET Image Proc."},{"key":"3640_CR20","doi-asserted-by":"publisher","first-page":"108703","DOI":"10.1016\/j.patcog.2022.108703","volume":"129","author":"M Cho","year":"2022","unstructured":"Cho, M., Kim, T., Kim, W.J., Cho, S., Lee, S.: Unsupervised video anomaly detection via normalizing flows with implicit latent features. Pattern Recogn. 129, 108703 (2022)","journal-title":"Pattern Recogn."},{"key":"3640_CR21","first-page":"101026","volume":"18","author":"M Qasim","year":"2023","unstructured":"Qasim, M., Verdu, E.: Video anomaly detection system using deep convolutional and recurrent models. Res. Eng. 18, 101026 (2023)","journal-title":"Res. Eng."},{"key":"3640_CR22","unstructured":"Wu, C., Shao, S., Tunc, C., Satam, P., & Hariri, S.: An explainable and efficient deep learning framework for video anomaly detection.\u00a0Cluster computing, 1\u201323 (2022)."},{"issue":"17","key":"3640_CR23","doi-asserted-by":"publisher","first-page":"6563","DOI":"10.3390\/s22176563","volume":"22","author":"SW Khan","year":"2022","unstructured":"Khan, S.W., Hafeez, Q., Khalid, M.I., Alroobaea, R., Hussain, S., Iqbal, J., Ullah, S.S.: Anomaly detection in traffic surveillance videos using deep learning. Sensors 22(17), 6563 (2022)","journal-title":"Sensors"},{"issue":"3","key":"3640_CR24","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.32604\/csse.2023.034805","volume":"46","author":"S Ul Amin","year":"2023","unstructured":"Ul Amin, S., Kim, Y., Sami, I., Park, S., Seo, S.: An efficient attention-based strategy for anomaly detection in surveillance video. Comput. Syst. Sci. Eng. 46(3), 3939\u20133958 (2023)","journal-title":"Comput. Syst. Sci. Eng."},{"key":"3640_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Y., Liu, J., Zhao, M., Yang, D., Zhu, X., & Song, L.: Learning appearance-motion normality for video anomaly detection. In\u00a02022 IEEE International Conference on Multimedia and Expo (ICME), 1\u20136 (2022). IEEE.","DOI":"10.1109\/ICME52920.2022.9859727"},{"issue":"3","key":"3640_CR26","doi-asserted-by":"publisher","first-page":"3240","DOI":"10.1007\/s10489-022-03613-1","volume":"53","author":"VT Le","year":"2023","unstructured":"Le, V.T., Kim, Y.G.: Attention-based residual autoencoder for video anomaly detection. Appl. Intell. 53(3), 3240\u20133254 (2023)","journal-title":"Appl. Intell."},{"issue":"3","key":"3640_CR27","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.3390\/app12031021","volume":"12","author":"S Vosta","year":"2022","unstructured":"Vosta, S., Yow, K.C.: A cnn-rnn combined structure for real-world violence detection in surveillance cameras. Appl. Sci. 12(3), 1021 (2022)","journal-title":"Appl. Sci."},{"key":"3640_CR28","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.neucom.2018.10.076","volume":"330","author":"A Castillo","year":"2019","unstructured":"Castillo, A., Tabik, S., P\u00e9rez, F., Olmos, R., Herrera, F.: Brightness guided pre-processing for automatic cold steel weapon detection in surveillance videos with deep learning. Neurocomputing 330, 151\u2013161 (2019)","journal-title":"Neurocomputing"},{"issue":"5","key":"3640_CR29","doi-asserted-by":"publisher","first-page":"4099","DOI":"10.1007\/s00521-022-07854-6","volume":"35","author":"JO Agushaka","year":"2023","unstructured":"Agushaka, J.O., Ezugwu, A.E., Abualigah, L.: Gazelle optimization algorithm: a novel nature-inspired metaheuristic optimizer. Neural Comput. Appl. 35(5), 4099\u20134131 (2023)","journal-title":"Neural Comput. Appl."},{"key":"3640_CR30","unstructured":"DAS, S., Rao, K. S., Gopal, H. P., & Reddy, L. K.: The crime data analysis using machine learning. Spast abstracts,\u00a01(01), (2021)."},{"issue":"1","key":"3640_CR31","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.3233\/JIFS-231187","volume":"45","author":"A Babiyola","year":"2023","unstructured":"Babiyola, A., Aruna, S., Sumithra, S., Buvaneswari, B.: A hybrid learning frame work for recognition abnormal events intended from surveillance videos. J. Intell Fuzzy Syst. 45(1), 1089\u20131102 (2023)","journal-title":"J. Intell Fuzzy Syst."},{"key":"3640_CR32","doi-asserted-by":"crossref","unstructured":"Qasim Gandapur, M., & Verd\u00fa, E.: ConvGRU-CNN: Spatiotemporal deep learning for real-world anomaly detection in video surveillance system. (2023).","DOI":"10.9781\/ijimai.2023.05.006"},{"key":"3640_CR33","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1016\/j.procs.2023.01.202","volume":"218","author":"A Patwal","year":"2023","unstructured":"Patwal, A., Diwakar, M., Tripathi, V., Singh, P.: An investigation of videos for abnormal behavior detection. Proc. Comput. Sci. 218, 2264\u20132272 (2023)","journal-title":"Proc. Comput. Sci."},{"key":"3640_CR34","unstructured":"Quintero, R. F., & Benitez-Restrepo, H. D.: Anomaly detection in surveillance videos using spatio-temporal context information."},{"key":"3640_CR35","doi-asserted-by":"crossref","unstructured":"Karim, H., Doshi, K., & Yilmaz, Y.: Real-time weakly supervised video anomaly detection. In Proceedings of the IEEE\/CVF winter conference on applications of computer vision, 6848\u20136856 (2024).","DOI":"10.1109\/WACV57701.2024.00670"},{"issue":"2","key":"3640_CR36","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1007\/s11760-023-02828-0","volume":"18","author":"W Liang","year":"2024","unstructured":"Liang, W., Zhang, J., Zhan, Y.: Weakly supervised video anomaly detection based on spatial\u2013temporal feature fusion enhancement. SIViP 18(2), 1111\u20131118 (2024)","journal-title":"SIViP"},{"issue":"3","key":"3640_CR37","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.3390\/app14031032","volume":"14","author":"B Asal","year":"2024","unstructured":"Asal, B., Can, A.B.: Ensemble-based knowledge distillation for video anomaly detection. Appl. Sci. 14(3), 1032 (2024)","journal-title":"Appl. Sci."},{"issue":"11","key":"3640_CR38","doi-asserted-by":"publisher","first-page":"7823","DOI":"10.1007\/s00371-023-03210-4","volume":"40","author":"A Mumtaz","year":"2024","unstructured":"Mumtaz, A., Sargano, A.B., Habib, Z.: AnomalyNet: A spatiotemporal motion-aware CNN approach for detecting anomalies in real-world autonomous surveillance. Vis. Comput. 40(11), 7823\u20137844 (2024)","journal-title":"Vis. Comput."},{"issue":"1","key":"3640_CR39","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00530-023-01237-0","volume":"30","author":"C Li","year":"2024","unstructured":"Li, C., Chen, M.: Dy-MIL: dynamic multiple-instance learning framework for video anomaly detection. Multimed. Syst. 30(1), 11 (2024)","journal-title":"Multimed. Syst."},{"key":"3640_CR40","doi-asserted-by":"publisher","first-page":"124013","DOI":"10.1016\/j.eswa.2024.124013","volume":"251","author":"S Basak","year":"2024","unstructured":"Basak, S., Gautam, A.: Diffusion-based normality pre-training for weakly supervised video anomaly detection. Expert Syst. Appl. 251, 124013 (2024)","journal-title":"Expert Syst. Appl."},{"key":"3640_CR41","doi-asserted-by":"crossref","unstructured":"Adel, R., Youssif, A., & Mostafa, M.: Transfer learning model for anomalous event recognition in big video data. (2024).","DOI":"10.21203\/rs.3.rs-4514423\/v1"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03640-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03640-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03640-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T14:57:27Z","timestamp":1738335447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03640-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,19]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["3640"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03640-0","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"type":"print","value":"1863-1703"},{"type":"electronic","value":"1863-1711"}],"subject":[],"published":{"date-parts":[[2024,12,19]]},"assertion":[{"value":"15 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 September 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 October 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors involved have agreed to participate in this submitted article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All the authors involved in this manuscript give full consent for publication of this submitted article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"148"}}