{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T23:13:29Z","timestamp":1775171609419,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"13","license":[{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s11760-025-04301-6","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T08:17:56Z","timestamp":1757492276000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimizing YOLOv8n using hOSVD for efficient object detection: towards real-time video surveillance applications"],"prefix":"10.1007","volume":"19","author":[{"given":"Alaa","family":"EL ICHI","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wissam","family":"Kaddah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marwa EL","family":"Bouz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isabelle","family":"Badoc","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,9,10]]},"reference":[{"key":"4301_CR1","doi-asserted-by":"publisher","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-End Object Detection with Transformers. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, JM. (eds) Computer Vision \u2013 ECCV 2020. ECCV 2020. Lecture Notes in Computer Science, vol 12346. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-58452-8_13 (2020)","DOI":"10.1007\/978-3-030-58452-8_13"},{"issue":"2","key":"4301_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/MSP.2013.2297439","volume":"32","author":"A Cichocki","year":"2015","unstructured":"Cichocki, A., Mandic, D.D., Lathauwer, L., Zhou, G., Zhao, Q., Caiafa, C., Phan, H.A.: Tensor decompositions for signal processing applications: From two-way to multiway component analysis. IEEE Sig. Process. Mag. 32(2), 145\u2013163 (2015). https:\/\/doi.org\/10.1109\/MSP.2013.2297439","journal-title":"IEEE Sig. Process. Mag."},{"key":"4301_CR3","doi-asserted-by":"crossref","unstructured":"Di Biase G., Blum H., Siegwart R., Cadena C.: Pixel-wise anomaly detection in complex driving scenes. IEEE\/CVF. Conf. Comput. Vis Pattern. Recognit (CVPR): 16918\u201316927, (2021)","DOI":"10.1109\/CVPR46437.2021.01664"},{"key":"4301_CR4","unstructured":"Dosovitskiy, A., Beyer, L., Kolesnikov, A., Weissenborn, D., Zhai, X., Unterthiner, T., Dehghani, M., Minderer, M., Heigold, G., Gelly, S., Uszkoreit, J., Houlsby, N. : An image is worth 16 \u00d7 16 words: Transformers for image recognition at scale, arXiv:2010.11929 (2020)"},{"key":"4301_CR5","doi-asserted-by":"crossref","unstructured":"Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accu-rate object detection and semantic segmentation, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition,580\u2013587(2014)","DOI":"10.1109\/CVPR.2014.81"},{"key":"4301_CR6","doi-asserted-by":"crossref","unstructured":"Girshick, R.: Fast r-cnn, Proceedings of the IEEE International Conference on Computer Vision, 1440\u20131448(2015)","DOI":"10.1109\/ICCV.2015.169"},{"key":"4301_CR7","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn, Proceedings of the IEEE International Conference on Computer Vision, 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"4301_CR8","doi-asserted-by":"crossref","unstructured":"Huang Z., Wu Y. : A survey on explainable anomaly detection for industrial Internet of Things. IEEE Conf Dependable Secure Comput (2022)","DOI":"10.1109\/DSC54232.2022.9888874"},{"key":"4301_CR9","unstructured":"Hubara, I., Courbariaux, M., Soudry, D., El-Yaniv, R., Bengio, Y.: Binarized Neural Networks, Advances in Neural Information Processing Systems (NeurIPS), (2016)"},{"key":"4301_CR10","doi-asserted-by":"crossref","unstructured":"Jacob, B., Kligys, S., Chen, B., Zhu, M., Tang, M., Howard, A., Adam, H., Kalenichenko, D.: Quantization and Training of Neural Networks for Efficient Integer-Arithmetic-Only Inference, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2018)","DOI":"10.1109\/CVPR.2018.00286"},{"issue":"3","key":"4301_CR11","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"TG Kolda","year":"2009","unstructured":"Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Rev. 51(3), 455\u2013500 (2009)","journal-title":"SIAM Rev."},{"key":"4301_CR12","doi-asserted-by":"crossref","unstructured":"Idelbayev, Y., Carreira-Perpi\u00f1\u00e1n, M.A.: Low-Rank Compression of Neural Nets: Learning the Rank of Each Layer, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2020)","DOI":"10.1109\/CVPR42600.2020.00807"},{"key":"4301_CR13","doi-asserted-by":"crossref","unstructured":"Lin, M., Ji, R., Wang, Y., Zhang, Y., Zhang, B., Tian, Y., Shao, L.: HRank: Filter Pruning Using High-Rank Feature Map, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2020)","DOI":"10.1109\/CVPR42600.2020.00160"},{"key":"4301_CR14","first-page":"113","volume":"406","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Ng, M.K.: Deep Neural Network Compression by Tucker Decomposition with Nonlinear Response. J. Comput. Appl. Math. 406, 113\u2013127 (2022)","journal-title":"J. Comput. Appl. Math."},{"key":"4301_CR15","doi-asserted-by":"crossref","unstructured":"Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z., Lin, S., Guo, B.: Swin transformer: Hierarchical vision transformer using shifted Windows, in Proc. IEEE\/CVF Int. Conf. Comput. Vis. (ICCV), (2021),","DOI":"10.1109\/ICCV48922.2021.00986"},{"key":"4301_CR16","doi-asserted-by":"crossref","unstructured":"Mohammadi, S., Perina, A., Kiani, H., Murino, V.: Angry crowds: Detecting violent events in videos. IEEE. Eur. Conf. Comput. Vis. (ECCV) (2016)","DOI":"10.1007\/978-3-319-46478-7_1"},{"key":"4301_CR17","doi-asserted-by":"crossref","unstructured":"Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 779\u2013788 (2016)","DOI":"10.1109\/CVPR.2016.91"},{"key":"4301_CR18","doi-asserted-by":"crossref","unstructured":"Redmon, J., Farhadi, A.: Yolo9000: better, faster, stronger, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 7263\u20147271(2016)","DOI":"10.1109\/CVPR.2017.690"},{"key":"4301_CR19","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster r-cnn: towards real-time object detec-tion with region proposal networks, Adv. Neural Inf. Process. Syst. 28 (2015)"},{"issue":"6","key":"4301_CR20","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object de-tection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"13","key":"4301_CR21","doi-asserted-by":"publisher","first-page":"3551","DOI":"10.1109\/TSP.2017.2690524","volume":"65","author":"ND Sidiropoulos","year":"2017","unstructured":"Sidiropoulos, N.D., De Lathauwer, L., Fu, X., Huang, K., Papalexakis, E.E., Faloutsos, C.: Tensor decomposition for signal processing and machine learning. IEEE Trans. Signal Process. 65(13), 3551\u20133582 (2017)","journal-title":"IEEE Trans. Signal Process."},{"key":"4301_CR22","doi-asserted-by":"crossref","unstructured":"Sultani W., Chen C., Shah M. : Real-world anomaly detection in surveillance videos. IEEE Conf Comput Vis Pattern Recognit (CVPR): 6479\u20136488, (2018)","DOI":"10.1109\/CVPR.2018.00678"},{"key":"4301_CR23","unstructured":"Thuan, D.: Evolution of yolo algorithm and yolov5: the state-of-the-art object detection algorithm, (2021)"},{"key":"4301_CR24","doi-asserted-by":"crossref","unstructured":"Tucker, L.R.: Some mathematical notes on three-mode factor analysis. Psychometrika 31, 279\u2013311 (1960))","DOI":"10.1007\/BF02289464"},{"key":"4301_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, C., Ni, B., Zhang, J., Zhao, Q., Zhang, W., Tian, Q.: Variational Convolutional Neural Network Pruning, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), (2019)","DOI":"10.1109\/CVPR.2019.00289"}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04301-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04301-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04301-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T03:26:26Z","timestamp":1759980386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04301-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,10]]},"references-count":25,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["4301"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04301-6","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,10]]},"assertion":[{"value":"2 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"1066"}}