{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:51:14Z","timestamp":1772045474510,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Comput Intell Syst"],"DOI":"10.1007\/s44196-025-00766-y","type":"journal-article","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:49:58Z","timestamp":1741085398000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["SED-NET: Real-Time Suspicious Event Detection via Deep Learning-Based Di-Stream Neural Network"],"prefix":"10.1007","volume":"18","author":[{"given":"D.","family":"Siva Senthil","sequence":"first","affiliation":[]},{"given":"T. S.","family":"Sivarani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"766_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.111021","volume":"158","author":"Q Yang","year":"2025","unstructured":"Yang, Q., Wang, C., Liu, P., Jiang, Z., Li, J.: Video anomaly detection via self-supervised and spatio-temporal proxy tasks learning. Pattern Recognit. 158, 111021 (2025)","journal-title":"Pattern Recognit."},{"issue":"10s","key":"766_CR2","first-page":"454","volume":"20","author":"K Shiva","year":"2024","unstructured":"Shiva, K., Etikani, P., Bhaskar, V.V.S.R., Mittal, A., Dave, A., Thakkar, D., Kanchetti, D., Munirathnam, R.: Suspicious detection in sensor data with machine learning: predictive maintenance for industrial systems. J. Electr. Syst. 20(10s), 454\u2013462 (2024)","journal-title":"J. Electr. Syst."},{"key":"766_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.revip.2024.100091","volume":"12","author":"V Belis","year":"2024","unstructured":"Belis, V., Odagiu, P., Aarrestad, T.K.: Machine learning for suspicious detection in particle physics. Rev. Phys. 12, 100091 (2024)","journal-title":"Rev. Phys."},{"key":"766_CR4","doi-asserted-by":"crossref","unstructured":"Palakurti, N.R.: Challenges and future directions in suspicious detection. In: Practical Applications of Data Processing, Algorithms, and Modeling, 269\u2013284 (2024)","DOI":"10.4018\/979-8-3693-2909-2.ch020"},{"key":"766_CR5","unstructured":"Jiang, M., Hou, C., Zheng, A., Han, S., Huang, H., Wen, Q., Hu, X., Zhao, Y.: Adgym: design choices for deep suspicious detection. Adv. Neural Inf. Process. Syst. 36 (2024)"},{"key":"766_CR6","doi-asserted-by":"crossref","unstructured":"Batzner, K., Heckler, L., K\u00f6nig, R.: Efficientad: accurate visual suspicious detection at millisecond-level latencies. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, pp. 128\u2013138 (2024)","DOI":"10.1109\/WACV57701.2024.00020"},{"key":"766_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, M., Zhou, X.: RealNet: a feature selection network with realistic synthetic suspicious for suspicious detection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 16699\u201316708 (2024)","DOI":"10.1109\/CVPR52733.2024.01580"},{"key":"766_CR8","doi-asserted-by":"crossref","unstructured":"Baitieva, A., Hurych, D., Besnier, V., Bernard, O.: Supervised suspicious detection for complex industrial images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, 17754\u201317762 (2024)","DOI":"10.1109\/CVPR52733.2024.01681"},{"key":"766_CR9","doi-asserted-by":"crossref","unstructured":"Str\u00e4ter, L.P., Salehi, M., Gavves, E., Snoek, C.G., Asano, Y.M.: GeneralAD: suspicious detection across domains by attending to distorted features. arXiv preprint arXiv:2407.12427. (2024).","DOI":"10.1007\/978-3-031-72913-3_25"},{"issue":"1","key":"766_CR10","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/s00779-021-01586-5","volume":"28","author":"K Rezaee","year":"2024","unstructured":"Rezaee, K., Rezakhani, S.M., Khosravi, M.R., Moghimi, M.K.: A survey on deep learning-based real-time crowd suspicious detection for secure distributed video surveillance. Pers. Ubiquitous Comput. 28(1), 135\u2013151 (2024)","journal-title":"Pers. Ubiquitous Comput."},{"issue":"2","key":"766_CR11","first-page":"1111","volume":"16","author":"S Mishra","year":"2024","unstructured":"Mishra, S., Jabin, S.: Suspicious detection in surveillance videos using deep autoencoder. Int. J. Inf. Technol. 16(2), 1111\u20131122 (2024)","journal-title":"Int. J. Inf. Technol."},{"key":"766_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103786","volume":"222","author":"S Saheel","year":"2024","unstructured":"Saheel, S., Alvi, A., Ani, A.R., Ahmed, T., Uddin, M.F.: Semi-supervised, Neural Network based approaches to face mask and suspicious detection in surveillance networks. J. Network Comput. Appl. 222, 103786 (2024)","journal-title":"J. Network Comput. Appl."},{"key":"766_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, M., Wang, J., Qi, Q., Zhuang, Z., Sun, H., Liao, J.: Cognition guided video suspicious detection framework for surveillance services. IEEE Trans. Serv. Comput. (2024).","DOI":"10.1109\/TSC.2024.3407588"},{"issue":"01","key":"766_CR14","first-page":"20","volume":"01","author":"DS Dakshina","year":"2023","unstructured":"Dakshina, D.S., Jayapriya, P., Kala, R.: Saree texture analysis and classification via deep learning framework. Int. J. Data Sci. Artif. Intell. 01(01), 20\u201325 (2023)","journal-title":"Int. J. Data Sci. Artif. Intell."},{"issue":"3","key":"766_CR15","doi-asserted-by":"publisher","first-page":"3045","DOI":"10.32604\/cmc.2021.014370","volume":"67","author":"K Lakshminarayanan","year":"2021","unstructured":"Lakshminarayanan, K., Muthukumaran, N., Robinson, Y.H., Shanmuganathan, V., Kadry, S., Nam, Y.: Deep learning-based hookworm detection in wireless capsule endoscopic image using adaboost classifier. Comput. Mater. Continua 67(3), 3045\u20133055 (2021)","journal-title":"Comput. Mater. Continua"},{"key":"766_CR16","doi-asserted-by":"crossref","unstructured":"Karthick, S., Muthukumaran, N.: Deep regression network for the single image super resolution of multimedia text image. In: 2023 IEEE 5th international conference on cybernetics, cognition and machine learning applications (ICCCMLA), 394\u2013399 (2023). IEEE.","DOI":"10.1109\/ICCCMLA58983.2023.10346975"},{"issue":"05","key":"766_CR17","first-page":"155","volume":"02","author":"MB Asha","year":"2024","unstructured":"Asha, M.B., Stebi, A.A.: Mass robot: predictive maintenance using stacked CNN BI-LSTM for cleaning robots. Int. J. Data Sci. Artif. Intell. 02(05), 155\u2013160 (2024)","journal-title":"Int. J. Data Sci. Artif. Intell."},{"key":"766_CR18","doi-asserted-by":"crossref","unstructured":"Ranjith, A., Vijayaragavan, S. P., Nirmalrani, V., Muthukumaran, N.: An IoT based monitoring system to detect animal in the railway track using deep learning neural network. In: 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), 1246\u20131253 (2022). IEEE","DOI":"10.1109\/ICESC54411.2022.9885303"},{"issue":"1","key":"766_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1186\/s12874-024-02141-5","volume":"24","author":"C Rotejanaprasert","year":"2024","unstructured":"Rotejanaprasert, C., Areechokchai, D., Maude, R.J.: Two-step spatiotemporal suspicious detection corrected for lag reporting time with application to real-time dengue surveillance in Thailand. BMC Med. Res. Methodol. 24(1), 10 (2024)","journal-title":"BMC Med. Res. Methodol."},{"key":"766_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18604-2","author":"R Kommanduri","year":"2024","unstructured":"Kommanduri, R., Ghorai, M.: Suspicious detection in video surveillance: a supervised inception encoder approach. Multimed. Tools Appl. (2024). https:\/\/doi.org\/10.1007\/s11042-024-18604-2","journal-title":"Multimed. Tools Appl."},{"key":"766_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2024.110898","volume":"157","author":"Y Su","year":"2025","unstructured":"Su, Y., Tan, Y., An, S., Xing, M., Feng, Z.: Semantic-driven dual consistency learning for weakly supervised video anomaly detection. Pattern Recognit. 157, 110898 (2025)","journal-title":"Pattern Recognit."},{"key":"766_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128796","volume":"614","author":"Y Zahid","year":"2025","unstructured":"Zahid, Y., Zarges, C., Tiddeman, B., Han, J.: Adversarial diffusion for few-shot scene adaptive video anomaly detection. Neurocomputer 614, 128796 (2025)","journal-title":"Neurocomputer"},{"issue":"7","key":"766_CR23","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.3390\/electronics12071517","volume":"12","author":"MH Sharif","year":"2023","unstructured":"Sharif, M.H., Jiao, L., Omlin, C.W.: Deep crowd suspicious detection by fusing reconstruction and prediction networks. Electronics 12(7), 1517 (2023)","journal-title":"Electronics"},{"key":"766_CR24","doi-asserted-by":"publisher","DOI":"10.1080\/0954898X.2024.2392772","author":"R Chaudhary","year":"2024","unstructured":"Chaudhary, R., Kumar, M.: Optimized deep maxout for crowd suspicious detection: A hybrid optimization-based model. Netw. Comput. Neural Syst. (2024). https:\/\/doi.org\/10.1080\/0954898X.2024.2392772","journal-title":"Netw. Comput. Neural Syst."},{"issue":"5","key":"766_CR25","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1177\/01655515211022665","volume":"49","author":"T Saba","year":"2023","unstructured":"Saba, T.: Real time suspicious detection in crowd using convolutional long short-term memory network. J. Inf. Sci. 49(5), 1145\u20131152 (2023)","journal-title":"J. Inf. Sci."},{"key":"766_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2024.128698","volume":"613","author":"Y Wang","year":"2025","unstructured":"Wang, Y., Zhou, J., Guan, J.: A lightweight video anomaly detection model with weak supervision and adaptive instance selection. Neurocomput. 613, 128698 (2025)","journal-title":"Neurocomput."},{"issue":"1","key":"766_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.vrih.2022.06.001","volume":"5","author":"W Shao","year":"2023","unstructured":"Shao, W., Rajapaksha, P., Wei, Y., Li, D., Crespi, N., Luo, Z.: COVAD: Content-oriented video suspicious detection using a self-attention-based deep learning model. Virtual Real. Intell. Hardw. 5(1), 24\u201341 (2023)","journal-title":"Virtual Real. Intell. Hardw."},{"key":"766_CR28","doi-asserted-by":"publisher","first-page":"2264","DOI":"10.1016\/j.procs.2023.01.202","volume":"218","author":"A Patwal","year":"2023","unstructured":"Patwal, A., Diwakar, M., Tripathi, V., Singh, P.: An investigation of videos for Suspicious behaviour detection. Procedia Comput. Sci. 218, 2264\u20132272 (2023)","journal-title":"Procedia Comput. Sci."},{"key":"766_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2023.101026","volume":"18","author":"M Qasim","year":"2023","unstructured":"Qasim, M., Verdu, E.: Video suspicious detection system using deep convolutional and recurrent models. Results Eng. 18, 101026 (2023)","journal-title":"Results Eng."},{"key":"766_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106173","volume":"123","author":"W Ullah","year":"2023","unstructured":"Ullah, W., Hussain, T., Ullah, F.U.M., Lee, M.Y., Baik, S.W.: TransCNN: hybrid CNN and transformer mechanism for surveillance suspicious detection. Eng. Appl. Artif. Intell. 123, 106173 (2023)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"17","key":"766_CR31","doi-asserted-by":"publisher","first-page":"20368","DOI":"10.1109\/JSEN.2023.3297205","volume":"23","author":"P Mohandas","year":"2023","unstructured":"Mohandas, P.: Sad: sensor-based suspicious detection system for smart junctions. IEEE Sensors J. 23(17), 20368\u201320378 (2023)","journal-title":"IEEE Sensors J."},{"key":"766_CR32","doi-asserted-by":"crossref","unstructured":"Jain, Y., Dabouei, A., Xu, M.: Cross-domain learning for video anomaly detection with limited supervision. In: European Conference on Computer Vision, Springer, Cham, pp 468\u2013484 (2025)","DOI":"10.1007\/978-3-031-73404-5_27"},{"issue":"3","key":"766_CR33","doi-asserted-by":"publisher","first-page":"3939","DOI":"10.32604\/csse.2023.034805","volume":"46","author":"S Ul Amin","year":"2023","unstructured":"Ul Amin, S., Kim, Y., Sami, I., Park, S., Seo, S.: An efficient attention-based strategy for suspicious detection in surveillance video. Comput. Syst. Sci. Eng. 46(3), 3939\u20133958 (2023)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"21","key":"766_CR34","doi-asserted-by":"publisher","first-page":"60213","DOI":"10.1007\/s11042-023-17861-x","volume":"83","author":"O Aydogdu","year":"2024","unstructured":"Aydogdu, O., Ekinci, M.: A data stream-based approach for suspicious detection in surveillance videos. Multimed. Tools Appl. 83(21), 60213\u201360241 (2024)","journal-title":"Multimed. Tools Appl."},{"issue":"18","key":"766_CR35","doi-asserted-by":"publisher","first-page":"10527","DOI":"10.1007\/s00521-024-09611-3","volume":"36","author":"SS Pereira","year":"2024","unstructured":"Pereira, S.S., Maia, J.E.B.: MC-MIL: video surveillance suspicious detection with multi-instance learning and multiple overlapped cameras. Neural Comput. Appl. 36(18), 10527\u201310543 (2024)","journal-title":"Neural Comput. Appl."}],"container-title":["International Journal of Computational Intelligence Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00766-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44196-025-00766-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44196-025-00766-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T10:50:11Z","timestamp":1741085411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44196-025-00766-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["766"],"URL":"https:\/\/doi.org\/10.1007\/s44196-025-00766-y","relation":{},"ISSN":["1875-6883"],"issn-type":[{"value":"1875-6883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,4]]},"assertion":[{"value":"12 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"My research guide reviewed and ethically approved this manuscript for publishing in this journal.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This article does not contain any studies with human or animal subjects performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and Animal Rights"}},{"value":"I certify that I have explained the nature and purpose of this study to the above-named individual, and I have discussed the potential benefits of this study participation. The questions the individual had about this study have been answered, and we will always be available to address future questions.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"45"}}