{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T17:28:05Z","timestamp":1778347685522,"version":"3.51.4"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004681","name":"Higher Education Commission (HEC) of Pakistan through the Technology Development Fund","doi-asserted-by":"publisher","award":["TDF-02-161"],"award-info":[{"award-number":["TDF-02-161"]}],"id":[{"id":"10.13039\/501100004681","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3059170","type":"journal-article","created":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T02:46:38Z","timestamp":1613184398000},"page":"34366-34382","source":"Crossref","is-referenced-by-count":210,"title":["Weapon Detection in Real-Time CCTV Videos Using Deep Learning"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9699-6716","authenticated-orcid":false,"given":"Muhammad Tahir","family":"Bhatti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-1013","authenticated-orcid":false,"given":"Muhammad Gufran","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5634-7754","authenticated-orcid":false,"given":"Masood","family":"Aslam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0241-6267","authenticated-orcid":false,"given":"Muhammad Junaid","family":"Fiaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1016\/j.neunet.2020.09.013","article-title":"Real-time gun detection in CCTV: An open problem","volume":"132","author":"gonz\u00e1lez","year":"2020","journal-title":"Neural Netw"},{"key":"ref38","article-title":"Orientation aware object detection with application to firearms","author":"iqbal","year":"2019","journal-title":"arXiv 1904 10032"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref32","author":"chollet","year":"2019","journal-title":"Fchollet"},{"key":"ref31","article-title":"Theano: A Python framework for fast computation of mathematical expressions","author":"al-rfou","year":"2016","journal-title":"arXiv 1605 02688"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1117\/12.819998"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.05.012"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3154979.3154988"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IC4ME2.2018.8465583"},{"key":"ref34","year":"2016","journal-title":"Weapon detection in surveillance camera images"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref61","first-page":"111","article-title":"Data preprocessing for supervised leaning","volume":"1","author":"kotsiantis","year":"2006","journal-title":"Int J Comput Sci"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2007.4373499"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CogSIMA.2013.6523822"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1117\/12.800264"},{"key":"ref2","year":"2019","journal-title":"Global Study on Homicide"},{"key":"ref1","year":"2019","journal-title":"Christchurch Mosque Shootzings"},{"key":"ref20","year":"2019","journal-title":"Infographic History of Video Surveillance&#x2014;IFSEC Global |Security and Fire News and Resources"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.928758"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2004.829274"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2006.876287"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2382174"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SIPS.2005.1579889"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref50","first-page":"91","article-title":"Faster R-CNN: Towards real-time object detection with region proposal networks","author":"ren","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref51","year":"2019","journal-title":"Faster R-CNN Explained"},{"key":"ref59","author":"consulting","year":"2019","journal-title":"Selective Search for Object Detection (C++ \/ Python) |Learn OpenCV"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2015.2465908"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22362-4_19"},{"key":"ref55","year":"2019","journal-title":"Image"},{"key":"ref54","year":"2020","journal-title":"Object Detection Vs Object Recognition Vs Image Segmentation"},{"key":"ref53","article-title":"YOLOv4: Optimal speed and accuracy of object detection","author":"bochkovskiy","year":"2020","journal-title":"arXiv 2004 10934"},{"key":"ref52","year":"2019","journal-title":"Faster RCNN Object detection"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.06.083"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/EESCO.2015.7253863"},{"key":"ref40","year":"2017","journal-title":"Convolutional neural network"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IST.2015.7294538"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/22.942570"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2002.1020949"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2004.1404961"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSyst.2014.6926141"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DSPWS.2006.265386"},{"key":"ref18","first-page":"49","article-title":"evaluation of gunshot detection algorithms","author":"chacon-rodriguez","year":"2008","journal-title":"2008 Argentine School of Micro-Nanoelectronics Technology and Applications EAMTA"},{"key":"ref19","year":"2019","journal-title":"From Edison to Internet A History of Video Surveillance"},{"key":"ref4","article-title":"Video surveillance of public places","author":"ratcliffe","year":"2006"},{"key":"ref3","article-title":"CCTV: Literature review and bibliography","author":"deisman","year":"2003","journal-title":"Research and Evaluation Branch Community Contract and Aboriginal Policing Services Directorate"},{"key":"ref6","year":"2019","journal-title":"China&#x2019;s CCTV Surveillance Network Took Just 7 Minutes to Capture BBC Reporter"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s16010047"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.02.008"},{"key":"ref7","author":"cohen","year":"2009","journal-title":"Cctv Operational Requirements Manual 2009"},{"key":"ref49","article-title":"YOLOv3: An incremental improvement","author":"redmon","year":"2018","journal-title":"arXiv 1804 02767"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558630"},{"key":"ref46","first-page":"21","article-title":"SSD: Single shot multibox detector","author":"anguelov","year":"2016","journal-title":"Proc Eur Conf Comput Vis"},{"key":"ref45","year":"2019","journal-title":"A simple guide to the versions of the Inception Network"},{"key":"ref48","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"arXiv 1704 04861"},{"key":"ref47","year":"2019","journal-title":"Understanding SSD MultiBox&#x2014;Real-Time Object Detection in Deep Learning"},{"key":"ref42","year":"2019","journal-title":"VGG16&#x2014;Convolutional Network for Classification and Detection"},{"key":"ref41","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv 1409 1556"},{"key":"ref44","first-page":"1","article-title":"Inception-v4, inception-resnet and the impact of residual connections on learning","author":"szegedy","year":"2017","journal-title":"Proc 31st AAAI Conf Artif Intell"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09353483.pdf?arnumber=9353483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:23Z","timestamp":1639771043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9353483\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3059170","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}