{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:28:17Z","timestamp":1775251697451,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Open Access Initiative of the University of Bremen and the DFG via SuUB Bremen. Princess Nourah bint Abdulrahman University Researchers Supporting Project number","award":["PNURSP2025R440"],"award-info":[{"award-number":["PNURSP2025R440"]}]},{"name":"Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"},{"name":"Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Group Project","award":["RGP.2\/568\/45"],"award-info":[{"award-number":["RGP.2\/568\/45"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3579749","type":"journal-article","created":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T19:00:12Z","timestamp":1750100412000},"page":"108718-108731","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Deep Learner for Human Behavior Prediction Over Public Video Surveillance"],"prefix":"10.1109","volume":"13","author":[{"given":"Bayan","family":"Alabdullah","sequence":"first","affiliation":[{"name":"Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia"}]},{"given":"Bisma Batool","family":"Fatima","sequence":"additional","affiliation":[{"name":"Faculty of Computing and AI, Air University, Islamabad, Pakistan"}]},{"given":"Haifa F.","family":"Alhasson","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer, Qassim University, Buraydah, Saudi Arabia"}]},{"given":"Mohammed","family":"Alshehri","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Khalid University, Abha, Saudi Arabia"}]},{"given":"Yahya","family":"AlQahtani","sequence":"additional","affiliation":[{"name":"Department of Informatics and Computer Systems, King Khalid University, Abha, Saudi Arabia"}]},{"given":"Nouf","family":"Albhassabi","sequence":"additional","affiliation":[{"name":"Department of Cyber Security, College of Humanities, Umm Al-Qura University, Makkah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6850-9570","authenticated-orcid":false,"given":"Hui","family":"Liu","sequence":"additional","affiliation":[{"name":"Guodian Nanjing Automation Company Ltd., Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3417989"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icacs47775.2020.9055951"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2020.3027543"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2019.2905081"},{"key":"ref5","article-title":"A deep learning approach to video human behaviour recognition using convolutional autoencoders","author":"Pavuluri","year":"2023","journal-title":"arXiv:2311.04351"},{"key":"ref6","article-title":"Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes","author":"Sabokrou","year":"2016","journal-title":"arXiv:1609.00866"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1063\/5.0195646"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3122801"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icaem.2019.8853756"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/icaem.2019.8853757"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2013.2276151"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2021.3069927"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-023-01659-z"},{"issue":"2","key":"ref14","first-page":"339","article-title":"A survey on deep learning-based real-time crowd human behaviour recognition for secure distributed video surveillance","volume":"23","author":"Rezaee","year":"2024","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icassp49357.2023.10094566"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s22041476"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-17375-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-018-0574-4"},{"issue":"8","key":"ref19","first-page":"3634","article-title":"Feature encoding with autoencoders for weakly supervised human behaviour recognition","volume":"33","author":"Tian","year":"2022","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2019.2935975"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5020-3"},{"issue":"16","key":"ref22","first-page":"11","article-title":"Human behaviour recognition in crowds by fusion of novel feature descriptors","volume":"11","author":"Alzahrani","year":"2020","journal-title":"Int. Trans. J. Eng., Manage., Appl. Sci. Technol."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02294-y"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app142311075"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s23115024"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2020.04.031"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3214986"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s23104716"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ibcast54850.2022.9990434"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-008-0055-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-008-0194-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3267409"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/pets-winter.2009.5399556"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08463-7"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/avss.2016.7738074"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/e23050628"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-017-0830-x"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2023.029629"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/cvprw.2009.5206560"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11036735.pdf?arnumber=11036735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:31:09Z","timestamp":1751092269000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11036735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3579749","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}