{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T15:10:33Z","timestamp":1777043433927,"version":"3.51.4"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T00:00:00Z","timestamp":1759536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s13198-025-02986-z","type":"journal-article","created":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T09:11:43Z","timestamp":1759569103000},"page":"347-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Abnormal behavior detection and classification using deep learning combined intelligent system"],"prefix":"10.1007","volume":"17","author":[{"given":"Aparna","family":"Gullapelly","sequence":"first","affiliation":[]},{"given":"Sivaneasan","family":"Balakrishnan","sequence":"additional","affiliation":[]},{"given":"Mohammed Ali","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Prasun","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,4]]},"reference":[{"issue":"2","key":"2986_CR27","doi-asserted-by":"publisher","first-page":"2173","DOI":"10.1007\/s13369-022-07092-x","volume":"48","author":"F Abdullah","year":"2023","unstructured":"Abdullah F, Jalal A (2023) Semantic segmentation based crowd tracking and anomaly detection via neuro-fuzzy classifier in smart surveillance system. Arab J Sci Eng 48(2):2173\u20132190. https:\/\/doi.org\/10.1007\/s13369-022-07092-x","journal-title":"Arab J Sci Eng"},{"key":"2986_CR22","doi-asserted-by":"publisher","first-page":"75884","DOI":"10.1109\/ACCESS.2023.3293537","volume":"11","author":"F Abdullah","year":"2023","unstructured":"Abdullah F, Abdelhaq M, Alsaqour R, Alatiyyah MH, Alnowaiser K, Alotaibi SS, Park J (2023) Context aware crowd tracking and anomaly detection via deep learning and social force model. IEEE Access 11:75884\u201375898. https:\/\/doi.org\/10.1109\/ACCESS.2023.3293537","journal-title":"IEEE Access"},{"issue":"8","key":"2986_CR41","doi-asserted-by":"publisher","first-page":"4077","DOI":"10.1007\/s12652-021-03323-5","volume":"13","author":"T Alafif","year":"2022","unstructured":"Alafif T, Alzahrani B, Cao Y, Alotaibi R, Barnawi A, Chen M (2022) Generative adversarial network based abnormal behavior detection in massive crowd videos: a Hajj case study. J Ambient Intell Hum Comput 13(8):4077\u20134088. https:\/\/doi.org\/10.1007\/s12652-021-03323-5","journal-title":"J Ambient Intell Hum Comput"},{"issue":"5","key":"2986_CR42","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3390\/electronics12051165","volume":"12","author":"T Alafif","year":"2023","unstructured":"Alafif T, Hadi A, Allahyani M, Alzahrani B, Alhothali A, Alotaibi R, Barnawi A (2023) Hybrid classifiers for spatio-temporal abnormal behavior detection, tracking, and recognition in massive Hajj crowds. Electron 12(5):1165. https:\/\/doi.org\/10.3390\/electronics12051165","journal-title":"Electron"},{"key":"2986_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3555154","author":"T Alafif","year":"2025","unstructured":"Alafif T, Jassas M, Abdel-Hakim AE, Alfattni G, Althobaiti H, Ikram M, Alharbi A, Alsharif H, Alshamrani M, Alharbi E, Alsubait T (2025) Towards an integrated intelligent framework for crowd control and management (IICCM). IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2025.3555154","journal-title":"IEEE Access"},{"key":"2986_CR45","doi-asserted-by":"publisher","first-page":"129281","DOI":"10.1016\/j.neucom.2024.129281","volume":"622","author":"A Alasiry","year":"2025","unstructured":"Alasiry A, Qayyum M (2025) A region based salient stacking optimized detector (ReSOD) for an effective anomaly detection and video tracking in surveillance systems. Neurocomputing 622:129281. https:\/\/doi.org\/10.1016\/j.neucom.2024.129281","journal-title":"Neurocomputing"},{"issue":"16","key":"2986_CR11","doi-asserted-by":"publisher","first-page":"6080","DOI":"10.3390\/s22166080","volume":"22","author":"A Aldayri","year":"2022","unstructured":"Aldayri A, Albattah W (2022) Taxonomy of anomaly detection techniques in crowd scenes. Sens 22(16):6080. https:\/\/doi.org\/10.3390\/s22166080","journal-title":"Sens"},{"issue":"10","key":"2986_CR38","doi-asserted-by":"publisher","first-page":"15673","DOI":"10.1007\/s11042-022-13967-w","volume":"82","author":"A Alhothali","year":"2023","unstructured":"Alhothali A, Balabid A, Alharthi R, Alzahrani B, Alotaibi R, Barnawi A (2023) Anomalous event detection and localization in dense crowd scenes. Multimed Tools Appl 82(10):15673\u201315694. https:\/\/doi.org\/10.1007\/s11042-022-13967-w","journal-title":"Multimedia Tools Appl"},{"key":"2986_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3545256","author":"AA Alsabei","year":"2025","unstructured":"Alsabei AA, Alsubait TM, Alhakami HH (2025) Enhancing crowd safety at hajj: Real-time detection of abnormal behavior using YOLOv9. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2025.3545256","journal-title":"IEEE Access"},{"issue":"3","key":"2986_CR43","doi-asserted-by":"publisher","first-page":"2299","DOI":"10.32604\/csse.2023.031169","volume":"45","author":"L Amudha","year":"2023","unstructured":"Amudha L, PushpaLakshmi R (2023) Performance analysis of hybrid RR algorithm for anomaly detection in streaming data. Comput Syst Sci Eng 45(3):2299\u20132312. https:\/\/doi.org\/10.32604\/csse.2023.031169","journal-title":"Comput Syst Sci Eng"},{"issue":"12","key":"2986_CR1","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1007\/s12652-024-04868-x","volume":"15","author":"VF Asl","year":"2024","unstructured":"Asl VF, Karasfi B, Masoumi B, Keyvanpour MR (2024) Abnormal behaviors recognition in crowd environments based on semi-supervised deep learning and hierarchical approach. J Ambient Intell Hum Comput 15(12):3925\u20133943. https:\/\/doi.org\/10.1007\/s12652-024-04868-x","journal-title":"J Ambient Intell Hum Comput"},{"key":"2986_CR35","doi-asserted-by":"publisher","first-page":"104108","DOI":"10.1016\/j.jvcir.2024.104108","volume":"100","author":"N Aslam","year":"2024","unstructured":"Aslam N, Kolekar MH (2024) TransGANomaly: transformer based generative adversarial network for video anomaly detection. J Visual Commun Image Represent 100:104108. https:\/\/doi.org\/10.1016\/j.jvcir.2024.104108","journal-title":"J Visual Commun Image Represent"},{"key":"2986_CR26","doi-asserted-by":"publisher","first-page":"e895","DOI":"10.7717\/peerj-cs.895","volume":"8","author":"MR Bhuiyan","year":"2022","unstructured":"Bhuiyan MR, Abdullah J, Hashim N, Al Farid F, Haque MA, Uddin J, Isa WNM, Husen MN, Abdullah N (2022) A deep crowd density classification model for Hajj pilgrimage using fully convolutional neural network. PeerJ Comput Sci 8:e895. https:\/\/doi.org\/10.7717\/peerj-cs.895","journal-title":"PeerJ Comput Sci"},{"issue":"1","key":"2986_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-023-00779-4","volume":"10","author":"MR Bhuiyan","year":"2023","unstructured":"Bhuiyan MR, Abdullah J, Hashim N, Farid FA, Uddin J (2023) Hajj pilgrimage abnormal crowd movement monitoring using optical flow and FCNN. J Big Data 10(1):1\u201321. https:\/\/doi.org\/10.1186\/s40537-023-00779-4","journal-title":"J Big Data"},{"issue":"9","key":"2986_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11760-025-04291-5","volume":"19","author":"MR Bhuiyan","year":"2025","unstructured":"Bhuiyan MR, Abdullah J, Hashim N, Farid FA, Isa WNM, Uddin J, Karim HA, Mansor S, Balaganesh D, Sarker MT (2025) Optical flow and deep learning-based anomaly detection for Hajj pilgrimage crowd monitoring. Signal Image Video Process 19(9):1\u201310. https:\/\/doi.org\/10.1007\/s11760-025-04291-5","journal-title":"Signal Image Video Process"},{"issue":"6","key":"2986_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.14569\/IJACSA.2023.01406104","volume":"14","author":"Y Bu","year":"2023","unstructured":"Bu Y, Chen T, Duan H, Liu M, Xue Y (2023) Unusual human behavior detection system in Real-Time video systems. Int J Adv Comput Sci Appl 14(6):1\u201320. https:\/\/doi.org\/10.14569\/IJACSA.2023.01406104","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"9","key":"2986_CR31","doi-asserted-by":"publisher","first-page":"11825","DOI":"10.1007\/s11042-021-11887-9","volume":"81","author":"CW Chang","year":"2022","unstructured":"Chang CW, Chang CY, Lin YY (2022) A hybrid CNN and LSTM-based deep learning model for abnormal behavior detection. Multimedia Tools Appl 81(9):11825\u201311843. https:\/\/doi.org\/10.1007\/s11042-021-11887-9","journal-title":"Multimedia Tools Appl"},{"key":"2986_CR17","doi-asserted-by":"publisher","unstructured":"Gawande UGU, Hajari KHK, Golhar Y (2023) Novel pedestrian detection and suspicious activity recognition using enhanced YOLOv5 and motion feature map. 1:7896\u201337538. https:\/\/doi.org\/10.21203\/rs.3.rs-2750031\/v1","DOI":"10.21203\/rs.3.rs-2750031\/v1"},{"issue":"37\u201338","key":"2986_CR29","doi-asserted-by":"publisher","first-page":"27511","DOI":"10.1007\/s11042-020-09277-8","volume":"79","author":"M George","year":"2020","unstructured":"George M, Jose BR, Mathew J (2020) Abnormal activity detection using shear transformed spatio-temporal regions at the surveillance network edge. Multimedia Tools Appl 79(37\u201338):27511\u201327532. https:\/\/doi.org\/10.1007\/s11042-020-09277-8","journal-title":"Multimedia Tools Appl"},{"key":"2986_CR53","doi-asserted-by":"publisher","first-page":"128187","DOI":"10.1016\/j.neucom.2024.128187","volume":"600","author":"Y He","year":"2024","unstructured":"He Y, Qin Y, Chen L, Zhang P, Ben X (2024) Efficient abnormal behavior detection with adaptive weight distribution. Neurocomputing 600:128187. https:\/\/doi.org\/10.1016\/j.neucom.2024.128187","journal-title":"Neurocomputing"},{"key":"2986_CR24","doi-asserted-by":"publisher","unstructured":"Heda L, Sahare P (2025) Design of an improved graph-based model for real-time threat detection and dynamic evacuation management using crowd behaviour analysis. Int J Inf Technol 1\u201314. https:\/\/doi.org\/10.1007\/s41870-025-02489-x","DOI":"10.1007\/s41870-025-02489-x"},{"issue":"24","key":"2986_CR16","doi-asserted-by":"publisher","first-page":"22099","DOI":"10.1007\/s00521-022-07660-0","volume":"34","author":"Z Jiang","year":"2022","unstructured":"Jiang Z, Song G, Qian Y, Wang Y (2022) A deep learning framework for detecting and localizing abnormal pedestrian behaviors at grade crossings. Neural Comput Appl 34(24):22099\u201322113. https:\/\/doi.org\/10.1007\/s00521-022-07660-0","journal-title":"Neural Comput Appl"},{"issue":"5","key":"2986_CR4","doi-asserted-by":"publisher","first-page":"70177","DOI":"10.1002\/eng2.70177","volume":"7","author":"SA Kasegn","year":"2025","unstructured":"Kasegn SA, Mwangi RW, Kimwele M, Abebe SL (2025) Enhancing surveillance video abnormal behavior detection using deep convolutional generative adversarial network with GRU model. Eng Rep 7(5):70177. https:\/\/doi.org\/10.1002\/eng2.70177","journal-title":"Eng Rep"},{"issue":"19","key":"2986_CR40","doi-asserted-by":"publisher","first-page":"3105","DOI":"10.3390\/electronics11193105","volume":"11","author":"AA Khan","year":"2022","unstructured":"Khan AA, Nauman MA, Shoaib M, Jahangir R, Alroobaea R, Alsafyani M, Binmahfoudh A, Wechtaisong C (2022) Crowd anomaly detection in video frames using fine-tuned AlexNet model. Electron 11(19):3105. https:\/\/doi.org\/10.3390\/electronics11193105","journal-title":"Electron"},{"key":"2986_CR30","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.040310","author":"MJ Kim","year":"2023","unstructured":"Kim MJ, Jeon BU, Yoo H, Chung K (2023) Abnormal behavior detection using deep-learning-based video data structuring. Intell Autom Soft Comput 37(2):1\u201320. https:\/\/doi.org\/10.32604\/iasc.2023.040310"},{"key":"2986_CR54","doi-asserted-by":"publisher","first-page":"127444","DOI":"10.1016\/j.neucom.2024.127444","volume":"579","author":"R Kommanduri","year":"2024","unstructured":"Kommanduri R, Ghorai M (2024) DAST-Net: dense visual attention augmented spatio-temporal network for unsupervised video anomaly detection. Neurocomputing 579:127444. https:\/\/doi.org\/10.1016\/j.neucom.2024.127444","journal-title":"Neurocomputing"},{"issue":"1","key":"2986_CR25","doi-asserted-by":"publisher","first-page":"14442","DOI":"10.1038\/s41598-023-41231-0","volume":"13","author":"M Kumar","year":"2023","unstructured":"Kumar M, Patel AK, Biswas M, Shitharth S (2023) Attention-based bidirectional-long short-term memory for abnormal human activity detection. Sci Rep 13(1):14442. https:\/\/doi.org\/10.1038\/s41598-023-41231-0","journal-title":"Sci Rep"},{"issue":"4","key":"2986_CR39","doi-asserted-by":"publisher","first-page":"5259","DOI":"10.1007\/s11042-021-11781-4","volume":"81","author":"R Lalit","year":"2022","unstructured":"Lalit R, Purwar RK, Verma S, Jain A (2022) Crowd abnormality detection in video sequences using supervised convolutional neural network. Multimed Tools Appl 81(4):5259\u20135277. https:\/\/doi.org\/10.1007\/s11042-021-11781-4","journal-title":"Multimedia Tools Appl"},{"issue":"3","key":"2986_CR52","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/s00530-024-01320-0","volume":"30","author":"S Lei","year":"2024","unstructured":"Lei S, Song J, Wang T, Wang F, Yan Z (2024) Attention U-Net based on multi-scale feature extraction and WSDAN data augmentation for video anomaly detection. Multimed Syst 30(3):118. https:\/\/doi.org\/10.1007\/s00530-024-01320-0","journal-title":"Multimedia Syst"},{"issue":"7","key":"2986_CR14","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/s10489-025-06485-3","volume":"55","author":"C Liu","year":"2025","unstructured":"Liu C, Gong L, Chen X (2025) Multi-scale Spatiotemporal normality learning for unsupervised video anomaly detection. Appl Intell 55(7):584. https:\/\/doi.org\/10.1007\/s10489-025-06485-3","journal-title":"Appl Intell"},{"key":"2986_CR47","doi-asserted-by":"publisher","first-page":"6810","DOI":"10.1109\/TIFS.2024.3423388","volume":"19","author":"L Luo","year":"2024","unstructured":"Luo L, Xie S, Yin H, Peng C, Ong YS (2024) Detecting and quantifying crowd-level abnormal behaviors in crowd events. IEEE Trans Inf Forensics Secur 19:6810\u20136823. https:\/\/doi.org\/10.1109\/TIFS.2024.3423388","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2986_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2021.104229","author":"RF Mansour","year":"2021","unstructured":"Mansour RF, Escorcia-Gutierrez J, Gamarra M, Villanueva JA, Leal N (2021) Intelligent video anomaly detection and classification using faster RCNN with deep reinforcement learning model. Image Vis Comput 112:104229. https:\/\/doi.org\/10.1016\/j.imavis.2021.104229","journal-title":"Image Vis Comput"},{"key":"2986_CR50","doi-asserted-by":"publisher","unstructured":"Murali E, Sheela AS, Paul MA, Muthu V, Felix AY (2025) Learning normal patterns via conv-LSTM for video anomaly detection using likelihood statistical texture feature representation in surveillance videos. Int J Syst Assur Eng Manage 1\u201312. https:\/\/doi.org\/10.1007\/s13198-025-02892-4","DOI":"10.1007\/s13198-025-02892-4"},{"issue":"7","key":"2986_CR32","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s10462-025-11206-w","volume":"58","author":"R Nasir","year":"2025","unstructured":"Nasir R, Jalil Z, Nasir M, Alsubait T, Ashraf M, Saleem S (2025) An enhanced framework for real-time dense crowd abnormal behavior detection using YOLOv8. Artif. Intell Rev 58(7):202. https:\/\/doi.org\/10.1007\/s10462-025-11206-w","journal-title":"Intell Rev"},{"issue":"1","key":"2986_CR18","doi-asserted-by":"publisher","first-page":"254","DOI":"10.32604\/cmc.2022.022147","volume":"71","author":"MA Nauman","year":"2022","unstructured":"Nauman MA, Shoaib M (2022) Identification of anomalous behavioral patterns in crowd scenes. Comput Mater Continua 71(1):254. https:\/\/doi.org\/10.32604\/cmc.2022.022147","journal-title":"Comput Mater Continua"},{"issue":"9","key":"2986_CR5","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.1093\/comjnl\/bxac071","volume":"66","author":"TH Noor","year":"2023","unstructured":"Noor TH (2023) Behavior analysis-based IoT services for crowd management. Comput J 66(9):2208\u20132219. https:\/\/doi.org\/10.1093\/comjnl\/bxac071","journal-title":"Comput J"},{"key":"2986_CR10","doi-asserted-by":"publisher","unstructured":"Nuhu AS, Saeed A, Faye I, (2021) A Comparative analysis of techniques for crowd behaviour detection in dense scenes. Platform: J. Sci. Technol 4(2):32\u201341. https:\/\/doi.org\/10.61762\/pjstvol4iss2art12757","DOI":"10.61762\/pjstvol4iss2art12757"},{"issue":"9","key":"2986_CR51","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11760-025-04341-y","volume":"19","author":"D Patrikar","year":"2025","unstructured":"Patrikar D, Parate M, Dhengre N (2025) Dual-Stage attention mechanism for robust video anomaly detection and localization. Signal Image Video Process 19(9):729. https:\/\/doi.org\/10.1007\/s11760-025-04341-y","journal-title":"Signal Image Video Process"},{"key":"2986_CR19","doi-asserted-by":"publisher","first-page":"100454","DOI":"10.1016\/j.measen.2022.100454","volume":"24","author":"P Pattan","year":"2022","unstructured":"Pattan P, Arjunagi S (2022) A human behavior analysis model to track object behavior in surveillance videos. Meas : Sens 24:100454. https:\/\/doi.org\/10.1016\/j.measen.2022.100454","journal-title":"Meas : Sens"},{"key":"2986_CR33","doi-asserted-by":"publisher","first-page":"104414","DOI":"10.1016\/j.jvcir.2025.104414","volume":"108","author":"P Pitchandi","year":"2025","unstructured":"Pitchandi P, Sadu VB, Kalaipoonguzhali V, Arivukarasi M (2025) A novel video anomaly detection using hybrid sand Cat swarm optimization with backpropagation neural network by UCSD ped 1 dataset. J Visual Commun Image Represent 108:104414. https:\/\/doi.org\/10.1016\/j.jvcir.2025.104414","journal-title":"J Visual Commun Image Represent"},{"key":"2986_CR48","doi-asserted-by":"publisher","first-page":"109879","DOI":"10.1016\/j.compeleceng.2024.109879","volume":"120","author":"SM Rahimpour","year":"2024","unstructured":"Rahimpour SM, Kazemi M, Moallem P, Safayani M (2024) Video anomaly detection using transformers and ensemble of convolutional auto-encoders. Comput Electr Eng 120:109879. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109879","journal-title":"Comput Electr Eng"},{"issue":"4","key":"2986_CR49","doi-asserted-by":"publisher","first-page":"4925","DOI":"10.1007\/s10586-023-04233-1","volume":"27","author":"S Roka","year":"2024","unstructured":"Roka S, Diwakar M (2024) DSLSTM: a deep convolutional encoder\u2013decoder architecture for abnormality detection in video surveillance. Cluster Comput 27(4):4925\u20134940. https:\/\/doi.org\/10.1007\/s10586-023-04233-1","journal-title":"Cluster Comput"},{"issue":"1","key":"2986_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44196-025-00766-y","volume":"18","author":"D Siva Senthil","year":"2025","unstructured":"Siva Senthil D, Sivarani TS (2025) SED-NET: Real-Time suspicious event detection via deep learning-based Di-Stream neural network. Int J Comput Intell Syst 18(1):1\u201319. https:\/\/doi.org\/10.1007\/s44196-025-00766-y","journal-title":"Int J Comput Intell Syst"},{"key":"2986_CR7","doi-asserted-by":"publisher","first-page":"131","DOI":"10.22937\/IJCSNS.2021.21.4.18","volume":"21","author":"I Usman","year":"2021","unstructured":"Usman I, Albesher AA (2021) Abnormal crowd behavior detection using heuristic search and motion awareness. Int J Comput Sci Netw Secur 21:131\u2013139. https:\/\/doi.org\/10.22937\/IJCSNS.2021.21.4.18","journal-title":"Int J Comput Sci Netw Secur"},{"issue":"11","key":"2986_CR2","doi-asserted-by":"publisher","first-page":"7513","DOI":"10.1007\/s11760-024-03292-0","volume":"18","author":"V Valarmathi","year":"2024","unstructured":"Valarmathi V, Sudha S (2024) Enhancing public safety: a hybrid Conv_Trans-OptBiSVM approach for real-time abnormal behavior detection in crowded environments. Signal Image Video Process 18(11):7513\u20137525. https:\/\/doi.org\/10.1007\/s11760-024-03292-0","journal-title":"Image Video Process"},{"key":"2986_CR3","doi-asserted-by":"publisher","first-page":"113051","DOI":"10.1016\/j.knosys.2025.113051","volume":"310","author":"Y Wu","year":"2025","unstructured":"Wu Y, Feng S, Wu Y, Wang J, Zhou S, Yuan M, Hu Z, Wu C (2025a) Masked region disparity-based unsafe behavior detection via campus monitoring device images. Knowl Based Syst 310:113051. https:\/\/doi.org\/10.1016\/j.knosys.2025.113051","journal-title":"Knowl Based Syst"},{"issue":"1","key":"2986_CR13","doi-asserted-by":"publisher","first-page":"103880","DOI":"10.1016\/j.ipm.2024.103880","volume":"62","author":"Y Wu","year":"2025","unstructured":"Wu Y, Qiu L, Wang J, Feng S (2025b) The use of convolutional neural networks for abnormal behavior recognition in crowd scenes. Inf Process Manage 62(1):103880. https:\/\/doi.org\/10.1016\/j.ipm.2024.103880","journal-title":"Inf Process Manage"},{"key":"2986_CR34","doi-asserted-by":"publisher","first-page":"107299","DOI":"10.1016\/j.neunet.2025.107299","volume":"187","author":"J Xiao","year":"2025","unstructured":"Xiao J, Wu J, Wang S, Yu Q, Xie H, Wang YF (2025) Probabilistic memory auto-encoding network for abnormal behavior detection in surveillance video. Neural Netw 187:107299. https:\/\/doi.org\/10.1016\/j.neunet.2025.107299","journal-title":"Neural Netw"},{"key":"2986_CR21","doi-asserted-by":"publisher","unstructured":"Xing M, Feng Z, Su Y, Zhang Y, Oh C, Gribova V, Filaretoy VF, Huang D (2025) Spatio-temporal graph-based self-labeling for video anomaly detection. Neurocomputing 129576. https:\/\/doi.org\/10.1016\/j.neucom.2025.129576","DOI":"10.1016\/j.neucom.2025.129576"},{"key":"2986_CR36","doi-asserted-by":"publisher","first-page":"126561","DOI":"10.1016\/j.neucom.2023.126561","volume":"553","author":"Y Yang","year":"2023","unstructured":"Yang Y, Fu Z, Naqvi SM (2023) Abnormal event detection for video surveillance using an enhanced two-stream fusion method. Neurocomputing 553:126561. https:\/\/doi.org\/10.1016\/j.neucom.2023.126561","journal-title":"Neurocomputing"},{"key":"2986_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3549144","author":"S Zhang","year":"2025","unstructured":"Zhang S, Gong M, Lin Y, Li H, Gao Ym, Zhang Y (2025) Dual distillation fusion for weakly supervised anomaly detection in surveillance videos. IEEE Trans Circuits Syst Video Technol. https:\/\/doi.org\/10.1109\/TCSVT.2025.3549144","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"2986_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12652-023-04691-w","volume":"1","author":"S Zou","year":"2023","unstructured":"Zou S, Min W, Zhu M (2023) Mutual supervised learning enhanced appearance and motion association for video anomalous behavior detection. J Ambient Intell Hum Comput 1:1\u201311. https:\/\/doi.org\/10.1007\/s12652-023-04691-w","journal-title":"J Ambient Intell Hum Comput"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02986-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-025-02986-z","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-025-02986-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:54:36Z","timestamp":1772006076000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-025-02986-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,4]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["2986"],"URL":"https:\/\/doi.org\/10.1007\/s13198-025-02986-z","relation":{"references":[{"id-type":"doi","id":"10.32604\/iasc.2023.040310","asserted-by":"subject"}]},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,4]]},"assertion":[{"value":"14 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}