{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:10:49Z","timestamp":1768518649299,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-02945-8","type":"journal-article","created":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T14:04:26Z","timestamp":1716818666000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Video Anomaly Detection Based on HSOE-FAST Modified Deep Neural Network"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4866-1279","authenticated-orcid":false,"given":"Anil Kumar","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Rupak","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Rudra Pratap","family":"Ojha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"issue":"5","key":"2945_CR1","first-page":"2279","volume":"10","author":"JG Munyua","year":"2021","unstructured":"Munyua JG, Wambugu G, Njenga ST. A Survey of deep learning solutions for anomaly detection in surveillance videos. Int J Comput Info Technol. 2021;10(5):2279\u20130764.","journal-title":"International Journal of Computer and Information Technology"},{"key":"2945_CR2","volume-title":"Deep learning based semi-supervised video anomaly detection","author":"M Baradaran","year":"2023","unstructured":"Baradaran M. Deep learning based semi-supervised video anomaly detection. PhD diss.: University Laval, Canada; 2023."},{"issue":"2","key":"2945_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/jimaging4020036","volume":"4","author":"BR Kiran","year":"2018","unstructured":"Kiran BR, Thomas DM, Parakkal R. An overview of deep learning-based methods for unsupervised and semi-supervised anomaly detection in videos. J Imaging. 2018;4(2):36.","journal-title":"J Imaging"},{"key":"2945_CR4","unstructured":"Doshi K. Video anomaly detection: practical challenges for learning algorithms. PhD diss. University of South Florida. 2022."},{"key":"2945_CR5","unstructured":"Kumaran SK, Dogra DP, Roy PP, and Mitra A. Video trajectory classification and anomaly detection using hybrid CNN-VAE. ar Xiv preprint arXiv:1812.07203. 2018."},{"key":"2945_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107706","volume":"112","author":"V Zavrtanik","year":"2021","unstructured":"Zavrtanik V, Kristan M, Sko\u010daj D. Reconstruction by inpainting for visual anomaly detection. Pattern Recogn. 2021;112: 107706.","journal-title":"Pattern Recogn"},{"key":"2945_CR7","doi-asserted-by":"crossref","unstructured":"Doshi K, and Yilmaz Y. Rethinking video anomaly detection-a continual learning approach. In: Proceedings of the IEEE\/CVF Winter Conference on applications of computer vision, 2022; pp. 3961\u20133970.","DOI":"10.1109\/WACV51458.2022.00309"},{"key":"2945_CR8","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cviu.2018.02.006","volume":"172","author":"M Sabokrou","year":"2018","unstructured":"Sabokrou M, Fayyaz M, Fathy M, Moayed Z, Klette R. Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes. Comput Vis Image Underst. 2018;172:88\u201397.","journal-title":"Comput Vis Image Underst"},{"key":"2945_CR9","doi-asserted-by":"crossref","unstructured":"Munir M, Chattha MA, Dengel A, Ahmed S. A comparative analysis of traditional and deep learning-based anomaly detection methods for streaming data. In: 2019 18th IEEE International Conference on Machine Learning and applications (ICMLA), 2019; pp. 561\u2013566. IEEE.","DOI":"10.1109\/ICMLA.2019.00105"},{"issue":"16","key":"2945_CR10","doi-asserted-by":"publisher","first-page":"5488","DOI":"10.3390\/s21165488","volume":"21","author":"GS Chadha","year":"2021","unstructured":"Chadha GS, Islam I, Schwung A, Ding SX. Deep convolutional clustering-based time series anomaly detection. Sensors. 2021;21(16):5488.","journal-title":"Sensors"},{"key":"2945_CR11","doi-asserted-by":"crossref","unstructured":"Toshniwal A, Kavi M, Jayashree R. Overview of anomaly detection techniques in machine learning. In: 2020 fourth International Conference on I-SMAC (IoT in social, mobile, analytics and cloud) (I-SMAC), 2020; pp. 808\u2013815. IEEE.","DOI":"10.1109\/I-SMAC49090.2020.9243329"},{"issue":"2","key":"2945_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang G, Shen C, Cao L, Hengel AVD. Deep learning for anomaly detection: A review. ACM Comput Surv (CSUR). 2021;54(2):1\u201338.","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"12","key":"2945_CR13","doi-asserted-by":"publisher","first-page":"5320","DOI":"10.3390\/app11125320","volume":"11","author":"R Al-amri","year":"2021","unstructured":"Al-amri R, Murugesan RK, Man M, Abdulateef AL, Al-Sharafi M, Alkahtani AA. A review of machine learning and deep learning techniques for anomaly detection in IoT data. Appl Sci. 2021;11(12):5320.","journal-title":"Appl Sci"},{"key":"2945_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078","volume":"106","author":"R Nayak","year":"2021","unstructured":"Nayak R, Pati UC, Das SK. A comprehensive review on deep learning-based methods for vide o anomaly detection. Image Vis Comput. 2021;106: 104078.","journal-title":"Image Vis Comput"},{"issue":"1","key":"2945_CR15","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/TII.2019.2938527","volume":"16","author":"R Nawaratne","year":"2019","unstructured":"Nawaratne R, Alahakoon D, Silva DD, Yu X. Spatiotemporal anomaly detection using deep learning for real-time video surveillance. IEEE Trans Industr Inf. 2019;16(1):393\u2013402.","journal-title":"IEEE Trans Industr Inf"},{"key":"2945_CR16","unstructured":"Mohammadi B, Mahmood F, Sabokrou M. Image\/video deep anomaly detection: a survey. arXiv preprint arXiv:2103.01739 2021."},{"key":"2945_CR17","doi-asserted-by":"publisher","first-page":"104229","DOI":"10.1016\/j.imavis.2021.104229","volume":"112","author":"RF Mansour","year":"2021","unstructured":"Mansour RF, Escorcia-Gutierrez J, Gamarra M, Jair AV, Leal N. Intelligent video anomaly detection and classification using faster RCNN with deep reinforcement learning model. Image Vis Comput. 2021;112:104229.","journal-title":"Image Vis Comput"},{"issue":"9","key":"2945_CR18","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.3390\/math10091555","volume":"10","author":"SUI Amin","year":"2022","unstructured":"Amin SUI, Sareer M, Ullah M, Sajjad M, Cheikh FA, Hijji M, Hijji A, Muhammad K. EADN: an efficient deep learning model for anomaly detection in videos. Mathematics. 2022;10(9):1555.","journal-title":"Mathematics"},{"key":"2945_CR19","doi-asserted-by":"crossref","unstructured":"Wang Z, Zou Y, Zhang Z. Cluster attention contrast for video anomaly detection. In: Proceedings of the 28th ACM International Conference on multimedia, 2020; pp. 2463\u20132471.","DOI":"10.1145\/3394171.3413529"},{"key":"2945_CR20","doi-asserted-by":"crossref","unstructured":"Yu G, Wang S, Cai Z, Zhu E, Chuanfu X, Jianping Y, Kloft M. Cloze test helps: Effective video anomaly detection via learning to complete video events. In: Proceedings of the 28th ACM International Conference on multimedia, 2020; pp. 583\u2013591.","DOI":"10.1145\/3394171.3413973"},{"issue":"1","key":"2945_CR21","doi-asserted-by":"publisher","first-page":"012074","DOI":"10.1088\/1742-6596\/1921\/1\/012074","volume":"1921","author":"B Prabha","year":"2021","unstructured":"Prabha B, Shanker NR, Priya M, Ganesh E. Human anomalous activity detection: shape and motion approach in crowded scenes. J Phys Conf Ser. 2021;1921(1):012074.","journal-title":"J Phys Conf Ser"},{"key":"2945_CR22","doi-asserted-by":"publisher","first-page":"108213","DOI":"10.1016\/j.patcog.2021.108213","volume":"122","author":"Y Chang","year":"2022","unstructured":"Chang Y, Tu Z, Xie W, Luo B, Zhang S, Sui H, Yuan J. Video anomaly detection with spatio-temporal dissociation. Pattern Recognit. 2022;122:108213. https:\/\/doi.org\/10.1016\/j.patcog.2021.108213.","journal-title":"Pattern Recognit"},{"key":"2945_CR23","doi-asserted-by":"publisher","unstructured":"Baradaran M, Bergevin R. Object class aware video anomaly detection through image translation. In: 2022 19th Conference on Robots and Vision (CRV), Toronto, ON, Canada, 2022; pp. 90\u201397. https:\/\/doi.org\/10.1109\/CRV55824.2022.00020.","DOI":"10.1109\/CRV55824.2022.00020"},{"issue":"6","key":"2945_CR24","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3390\/jimaging4060079","volume":"4","author":"KG Gunale","year":"2018","unstructured":"Gunale KG, Mukherji P. Deep learning with a spatiotemporal descriptor of appearance and motion estimation for video anomaly detection. J Imaging. 2018;4(6):79.","journal-title":"J Imaging"},{"issue":"1","key":"2945_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/09720529.2009.10698214","volume":"12","author":"G Iovane","year":"2009","unstructured":"Iovane G, Ingenito G, Leone M. Motion tracking using fuzzy logic and consistent labeling for multiple objects in multiple cameras vision. J Discrete Math Sci Cryptogr. 2009;12(1):1\u201342.","journal-title":"J Discrete Math Sci Cryptogr"},{"issue":"8","key":"2945_CR26","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1080\/09720529.2020.1804132","volume":"25","author":"P Girdhar","year":"2022","unstructured":"Girdhar P, Johri P, Virmani D. Incept_LSTM: Accession for human activity concession in automatic surveillance. J Discrete Math Sci Cryptogr. 2022;25(8):2259\u201373.","journal-title":"J Discrete Math Sci Cryptogr"},{"issue":"7","key":"2945_CR27","doi-asserted-by":"publisher","first-page":"1987","DOI":"10.1080\/09720529.2022.2133239","volume":"25","author":"K Amrutha","year":"2022","unstructured":"Amrutha K, Prabu P. Effortless and beneficial processing of natural languages using transformers. Journal of Discrete Mathematical Sciences and Cryptography. 2022;25(7):1987\u20132005.","journal-title":"Journal of Discrete Mathematical Sciences and Cryptography"},{"issue":"1","key":"2945_CR28","first-page":"29","volume":"42","author":"NS Murthy","year":"2021","unstructured":"Murthy NS, Jainuddin SK. An improved dark channel prior based defogging algorithm for video sequences. J Inf Optim Sci. 2021;42(1):29\u201339.","journal-title":"J Inf Optim Sci"},{"issue":"2","key":"2945_CR29","first-page":"289","volume":"21","author":"B Abul-Huda","year":"2000","unstructured":"Abul-Huda B, Abu-Rukah Y. Application of multi-media database system in detection and expectation of groundwater quality degradation: a case study-North Jordan. J Inf Optim Sci. 2000;21(2):289\u2013304.","journal-title":"J Inf Optim Sci"},{"key":"2945_CR30","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.comcom.2023.06.014","volume":"209","author":"T Khan","year":"2023","unstructured":"Khan T, Singh K, Shariq M, Ahmad K, Savita KS, Ahmadian A, Conti M. An efficient trust-based decision-making approach for WSNs: Machine learning-oriented approach. Comput Commun. 2023;209:217\u201329.","journal-title":"Comput Commun"},{"key":"2945_CR31","doi-asserted-by":"publisher","first-page":"104078","DOI":"10.1016\/j.imavis.2020.104078","volume":"106","author":"R Nayak","year":"2021","unstructured":"Nayak R, Pati UC, Das SK. A comprehensive review on deep learning-based methods for video anomaly detection. Image Vis Comput. 2021;106:104078.","journal-title":"Image Vis Comput"},{"key":"2945_CR32","doi-asserted-by":"publisher","first-page":"88170","DOI":"10.1109\/ACCESS.2020.2993373","volume":"8","author":"F Dong","year":"2020","unstructured":"Dong F, Zhang Yu, Nie X. Dual discriminator generative adversarial network for video anomaly detection. IEEE Access. 2020;8:88170\u20136.","journal-title":"IEEE Access"},{"key":"2945_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107515","volume":"107","author":"P Wu","year":"2020","unstructured":"Wu P, Liu J, Li M, Sun Y, Shen F. Fast sparse coding networks for anomaly detection in videos. Pattern Recogn. 2020;107: 107515.","journal-title":"Pattern Recogn"},{"issue":"12","key":"2945_CR34","doi-asserted-by":"publisher","first-page":"3993","DOI":"10.3390\/s21123993","volume":"21","author":"MI Sarker","year":"2021","unstructured":"Sarker MI, Losada-Guti\u00e9rrez C, Marron-Romera M, Fuentes-Jim\u00e9nez D, Luengo-S\u00e1nchez S. Semi-supervised anomaly detection in video-surveillance scenes in the wild. Sensors. 2021;21(12):3993.","journal-title":"Sensors"},{"issue":"16","key":"2945_CR35","doi-asserted-by":"publisher","first-page":"4110","DOI":"10.3390\/rs14164110","volume":"14","author":"D Avola","year":"2022","unstructured":"Avola D, Cannistraci I, Cascio M, Cinque L, Diko A, Fagioli A, Foresti GL, et al. A novel gan-based anomaly detection and localization method for aerial video surveillance at low altitude. Remote Sens. 2022;14(16):4110.","journal-title":"Remote Sens"},{"issue":"1","key":"2945_CR36","doi-asserted-by":"publisher","first-page":"248","DOI":"10.3390\/app13010248","volume":"13","author":"EMCL Ekanayake","year":"2022","unstructured":"Ekanayake EMCL, Lei Y, Li C. Crowd density level estimation and anomaly detection using multicolumn multistage bilinear convolution attention network (MCMS-BCNN-Attention). Appl Sci. 2022;13(1):248.","journal-title":"Appl Sci"},{"issue":"11","key":"2945_CR37","doi-asserted-by":"publisher","first-page":"5024","DOI":"10.3390\/s23115024","volume":"23","author":"H-T Duong","year":"2023","unstructured":"Duong H-T, Le V-T, Hoang VT. Deep learning-based anomaly detection in video surveillance: a survey. Sensors. 2023;23(11):5024.","journal-title":"Sensors"},{"issue":"8","key":"2945_CR38","doi-asserted-by":"publisher","first-page":"11891","DOI":"10.1109\/TITS.2021.3108504","volume":"23","author":"KK Santhosh","year":"2021","unstructured":"Santhosh KK, Dogra DP, Roy PP, Mitra A. Vehicular trajectory classification and traffic anomaly detection in videos using a hybrid CNN-VAE Architecture. IEEE Trans Intell Transp Syst. 2021;23(8):11891\u2013902.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"11","key":"2945_CR39","doi-asserted-by":"publisher","first-page":"2927","DOI":"10.1109\/TPDS.2014.2363668","volume":"33","author":"Qi Zhang","year":"2021","unstructured":"Zhang Qi, Han R, Xin G, Liu CH, Wang G, Chen LY. Lightweight and accurate DNN-based anomaly detection at edge. IEEE Trans Parallel Distrib Syst. 2021;33(11):2927\u201342.","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"11","key":"2945_CR40","doi-asserted-by":"publisher","first-page":"7677","DOI":"10.1109\/TCSVT.2022.3181452","volume":"32","author":"Z Zheng","year":"2022","unstructured":"Zheng Z, Liu W, Liu R, Wang L, Mao L, Qiu Q, Ling G. Anomaly detection of metro station tracks based on sequential updatable anomaly detection framework. IEEE Trans Circuits Syst Video Technol. 2022;32(11):7677\u201391.","journal-title":"IEEE Trans Circuits Syst Video Technol"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02945-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-02945-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-02945-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T14:17:49Z","timestamp":1716819469000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-02945-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":40,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2024,6]]}},"alternative-id":["2945"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-02945-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"16 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The corresponding author declares that there is no conflict of interest on behalf of all authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"No human participants, human material, human data, or animals were involved in this research.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and \/or Animals"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"588"}}