{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T20:30:44Z","timestamp":1771792244181,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T00:00:00Z","timestamp":1749600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s11760-025-04341-y","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T15:15:25Z","timestamp":1749654925000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Dual-Stage attention mechanism for robust video anomaly detection and localization"],"prefix":"10.1007","volume":"19","author":[{"given":"Devashree","family":"Patrikar","sequence":"first","affiliation":[]},{"given":"Mayur","family":"Parate","sequence":"additional","affiliation":[]},{"given":"Nikhil","family":"Dhengre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,11]]},"reference":[{"key":"4341_CR1","doi-asserted-by":"crossref","unstructured":"Muzammul, M., Li, X.: Comprehensive review of deep learning-based tiny object detection: challenges, strategies, and future directions. Knowledge and Information Systems, 1\u201389 (2025)","DOI":"10.1007\/s10115-025-02375-9"},{"issue":"2","key":"4341_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s13735-022-00227-8","volume":"11","author":"DR Patrikar","year":"2022","unstructured":"Patrikar, D.R., Parate, M.R.: Anomaly detection using edge computing in video surveillance system. Int. J. Multimed. Inf. Retr. 11(2), 85\u2013110 (2022)","journal-title":"Int. J. Multimed. Inf. Retr."},{"key":"4341_CR3","unstructured":"Shi, X., Chen, Z., Wang, H., Yeung, D.-Y., Wong, W.-K., Woo, W.-c.: Convolutional lstm network: A machine learning approach for precipitation nowcasting. Advances in neural information processing systems 28 (2015)"},{"key":"4341_CR4","doi-asserted-by":"crossref","unstructured":"Woo, S., Park, J., Lee, J.-Y., Kweon, I.S.: Cbam: Convolutional block attention module. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3\u201319 (2018)","DOI":"10.1007\/978-3-030-01234-2_1"},{"issue":"3","key":"4341_CR5","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3103\/S0146411622030026","volume":"56","author":"S Kitayama","year":"2022","unstructured":"Kitayama, S., Saito, K.: Time series prediction using radial basis function network with transformation of training data and its applications. Autom. Control. Comput. Sci. 56(3), 239\u2013252 (2022)","journal-title":"Autom. Control. Comput. Sci."},{"key":"4341_CR6","doi-asserted-by":"crossref","unstructured":"Ranjan, A., Black, M.J.: Optical flow estimation using a spatial pyramid network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 4161\u20134170 (2017)","DOI":"10.1109\/CVPR.2017.291"},{"key":"4341_CR7","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.patrec.2022.03.004","volume":"156","author":"D Li","year":"2022","unstructured":"Li, D., Nie, X., Li, X., Zhang, Y., Yin, Y.: Context-related video anomaly detection via generative adversarial network. Pattern Recognit. Lett. 156, 183\u2013189 (2022)","journal-title":"Pattern Recognit. Lett."},{"key":"4341_CR8","doi-asserted-by":"crossref","unstructured":"Hong, S., Ahn, S., Jo, Y., Park, S.: Making anomalies more anomalous: Video anomaly detection using a novel generator and destroyer. IEEE Access (2024)","DOI":"10.1109\/ACCESS.2024.3374383"},{"issue":"22","key":"4341_CR9","doi-asserted-by":"publisher","first-page":"34259","DOI":"10.1007\/s11042-023-14840-0","volume":"82","author":"VA Kotkar","year":"2023","unstructured":"Kotkar, V.A., Sucharita, V.: Fast anomaly detection in video surveillance system using robust spatiotemporal and deep learning methods. Multimed. Tools Appl. 82(22), 34259\u201334286 (2023)","journal-title":"Multimed. Tools Appl."},{"issue":"3","key":"4341_CR10","doi-asserted-by":"publisher","first-page":"3240","DOI":"10.1007\/s10489-022-03613-1","volume":"53","author":"V-T Le","year":"2023","unstructured":"Le, V.-T., Kim, Y.-G.: Attention-based residual autoencoder for video anomaly detection. Appl. Intell. 53(3), 3240\u20133254 (2023)","journal-title":"Appl. Intell."},{"key":"4341_CR11","doi-asserted-by":"publisher","first-page":"80716","DOI":"10.1109\/ACCESS.2020.2988796","volume":"8","author":"KP Sinaga","year":"2020","unstructured":"Sinaga, K.P., Yang, M.-S.: Unsupervised k-means clustering algorithm. IEEE Access 8, 80716\u201380727 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2988796","journal-title":"IEEE Access"},{"key":"4341_CR12","volume-title":"Introduction to neural networks with Java","author":"HT Jeff","year":"2005","unstructured":"Jeff, H.T.: Introduction to neural networks with Java. Inc, Heaton Research (2005)"},{"key":"4341_CR13","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 1975\u20131981 (2010). IEEE","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"4341_CR14","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 fps in matlab. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2720\u20132727 (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"4341_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhou, D., Chen, S., Gao, S., Ma, Y.: Single-image crowd counting via multi-column convolutional neural network. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 589\u2013597 (2016)","DOI":"10.1109\/CVPR.2016.70"},{"key":"4341_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108213","volume":"122","author":"Y Chang","year":"2022","unstructured":"Chang, Y., Tu, Z., Xie, W., Luo, B., Zhang, S., Sui, H., Yuan, J.: Video anomaly detection with spatio-temporal dissociation. Pattern Recogn. 122, 108213 (2022)","journal-title":"Pattern Recogn."},{"key":"4341_CR17","doi-asserted-by":"crossref","unstructured":"Rahimpour, S.M., Kazemi, M., Moallem, P., Safayani, M.: Video anomaly detection based on attention and efficient spatio-temporal feature extraction. The Visual Computer, 1\u201317 (2024)","DOI":"10.1007\/s00371-024-03361-y"},{"key":"4341_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, S., Luo, X., Liu, X., Zhang, R.: Video anomaly detection with both normal and anomaly memory modules. The Visual Computer, 1\u201313 (2024)","DOI":"10.1007\/s00371-024-03584-z"},{"key":"4341_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.patrec.2021.11.001","volume":"155","author":"T Ganokratanaa","year":"2022","unstructured":"Ganokratanaa, T., Aramvith, S., Sebe, N.: Video anomaly detection using deep residual-spatiotemporal translation network. Pattern Recogn. Lett. 155, 143\u2013150 (2022)","journal-title":"Pattern Recogn. Lett."},{"key":"4341_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2023.103860","volume":"95","author":"R Kommanduri","year":"2023","unstructured":"Kommanduri, R., Ghorai, M.: Bi-read: Bi-residual autoencoder based feature enhancement for video anomaly detection. J. Vis. Commun. Image Represent. 95, 103860 (2023)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"4341_CR21","doi-asserted-by":"crossref","unstructured":"Deng, H., Zhang, Z., Zou, S., Li, X.: Bi-directional frame interpolation for unsupervised video anomaly detection. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 2634\u20132643 (2023)","DOI":"10.1109\/WACV56688.2023.00266"},{"key":"4341_CR22","doi-asserted-by":"crossref","unstructured":"Yang, Y., Fu, Z., Naqvi, S.M.: Abnormal event detection for video surveillance using an enhanced two-stream fusion method. Neurocomputing 553, 126561 (2023)","DOI":"10.1016\/j.neucom.2023.126561"},{"key":"4341_CR23","doi-asserted-by":"crossref","unstructured":"Taghinezhad, N., Yazdi, M.: A new unsupervised video anomaly detection using multi-scale feature memorization and multipath temporal information prediction. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3237028"},{"issue":"5","key":"4341_CR24","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1049\/ipr2.12720","volume":"17","author":"MM Ali","year":"2023","unstructured":"Ali, M.M.: Real-time video anomaly detection for smart surveillance. IET Image Proc. 17(5), 1375\u20131388 (2023)","journal-title":"IET Image Proc."},{"issue":"4","key":"4341_CR25","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.3390\/s23042358","volume":"23","author":"M Islam","year":"2023","unstructured":"Islam, M., Dukyil, A.S., Alyahya, S., Habib, S.: An iot enable anomaly detection system for smart city surveillance. Sensors 23(4), 2358 (2023)","journal-title":"Sensors"},{"issue":"10","key":"4341_CR26","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TIFS.2019.2900907","volume":"14","author":"JT Zhou","year":"2019","unstructured":"Zhou, J.T., Du, J., Zhu, H., Peng, X., Liu, Y., Goh, R.S.M.: Anomalynet: An anomaly detection network for video surveillance. IEEE Trans. Inf. Forensics Secur. 14(10), 2537\u20132550 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04341-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-025-04341-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-025-04341-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T14:50:02Z","timestamp":1751554202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-025-04341-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,11]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["4341"],"URL":"https:\/\/doi.org\/10.1007\/s11760-025-04341-y","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,11]]},"assertion":[{"value":"1 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 June 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have adhered to all ethical guidelines and principles.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"All authors have checked the manuscript and agreed to the submission. There is no conflict of interest between the authors. All authors have equally contributed to the work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest\/Competing interests"}}],"article-number":"729"}}