{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:59:21Z","timestamp":1754488761230,"version":"3.28.0"},"reference-count":71,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/ascc.2015.7244871","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:36:58Z","timestamp":1441946218000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Modeling video-based anomaly detection using deep architectures: Challenges and possibilities"],"prefix":"10.1109","author":[{"family":"Yong Shean Chong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Yong Haur Tay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922653"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ESTMED.2008.4696991"},{"key":"ref39","first-page":"29","article-title":"Sequential deep learning for human action recognition","author":"baccouche","year":"2011","journal-title":"Human Behavior &#x2026;"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.223"},{"year":"2010","key":"ref33"},{"key":"ref32","first-page":"1","article-title":"A survey on deep learning: one small step toward AI","author":"mo","year":"2012"},{"key":"ref31","article-title":"Large-Scale Feature Learning With Spike-and-Slab Sparse Coding","author":"goodfellow","year":"2012","journal-title":"arXiv preprint ar Xiv 1206 6407"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-013-0248-5"},{"key":"ref37","first-page":"1197","article-title":"Synergistic face detection and pose estimation with energy-based models","volume":"8","author":"osadchy","year":"2007","journal-title":"Journal of Machine Learning Research"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553469"},{"key":"ref34","article-title":"Deep Learning Tutorial","author":"lecun","year":"2013","journal-title":"CiteSeer"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.151"},{"key":"ref62","first-page":"1","article-title":"Generating Sequences With Recurrent Neural Networks","author":"graves","year":"2013"},{"key":"ref61","first-page":"128","volume":"5782","author":"mirowski","year":"2009"},{"key":"ref63","first-page":"1033","article-title":"Learning recurrent neural networks with Hessian-free optimization","author":"martens","year":"2011","journal-title":"Proceedings of the 28th International Conference on Machine Learning 2011"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.11.018"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995434"},{"key":"ref65","first-page":"1","article-title":"Discovering multiscale dynamical features with hierarchical Echo State Networks","author":"jaeger","year":"2007","journal-title":"Jacobs University Bremen Tech Rep"},{"key":"ref66","first-page":"1025","article-title":"Two Distributed-State Models For Generating High-Dimensional Time Series","volume":"12","author":"taylor","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-006-0009-9"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270346"},{"key":"ref68","first-page":"235","article-title":"Toward Supervised Anomaly Detection","volume":"46","author":"g\u00b7\u00b7ornitz","year":"2013"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2178594"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.273"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459201"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315249"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.1.15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383515"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995402"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738032"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36175-8_22"},{"key":"ref50","first-page":"75","article-title":"Deep Learning in Neural Networks: An Overview","volume":"abs 1404 7","author":"schmidhuber","year":"2014","journal-title":"CoRR"},{"article-title":"Deep Learning For Sequential Pattern Recognition","year":"2013","author":"safari","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383515"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2010.10.008"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.2012070"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-670-2"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383072"},{"key":"ref53","article-title":"Real-time Bayesian anomaly detection in streaming environmental data","volume":"46","author":"hill","year":"2010","journal-title":"Water Resources Research"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126548"},{"key":"ref10","first-page":"32","article-title":"Event Detection in Video Streams","author":"piciarelli","year":"2011","journal-title":"IEEE Computer Society"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.006"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70711"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.937393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s140406370"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AIPR.2008.4906450"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2280061"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/1420326X12469734"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1109\/TSMCB.2012.2199310","article-title":"Incremental learning for video-based gait recognition with LBP flow","volume":"43","author":"hu","year":"2013","journal-title":"IEEE Transactions on Cybernetics"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2013.6475006"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2009.16"},{"key":"ref3","first-page":"1","article-title":"The Science of Anomaly Detection","author":"hawkins","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"129","DOI":"10.22436\/jmcs.04.02.03","article-title":"Surveying Different Aspects of Anomaly Detection and Its Applications","volume":"4","author":"noori","year":"2012","journal-title":"Mathematics in Computer Science"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s130201635"},{"article-title":"Anomaly detection in video sequences","year":"2013","author":"alberto","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639343"},{"article-title":"Activity Recognition: Gait Analysis and Recognition","year":"2009","author":"tzovaras","key":"ref9"},{"key":"ref46","doi-asserted-by":"crossref","DOI":"10.1561\/9781601982957","volume":"2","author":"bengio","year":"2009","journal-title":"Learning Deep Architectures for AI"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995496"},{"article-title":"Learning deep visual representations","year":"2013","author":"goh","key":"ref48"},{"key":"ref47","article-title":"Three Classes of Deep Learning Architectures and Their Applications: A Tutorial Survey","author":"deng","year":"2013","journal-title":"Research microsoft com"},{"key":"ref42","article-title":"Multimodal deep learning","author":"ngiam","year":"2011","journal-title":"Machine Learning"},{"key":"ref41","first-page":"647","article-title":"DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition","author":"donahue","year":"0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2014.01.008"},{"key":"ref43","first-page":"1","article-title":"Deep Learning of Invariant Spatio-Temporal Features from Video","author":"chen","year":"2010","journal-title":"NIPS Workshop"}],"event":{"name":"2015 10th Asian Control Conference (ASCC)","start":{"date-parts":[[2015,5,31]]},"location":"Kota Kinabalu","end":{"date-parts":[[2015,6,3]]}},"container-title":["2015 10th Asian Control Conference (ASCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7209153\/7244373\/07244871.pdf?arnumber=7244871","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T05:24:01Z","timestamp":1599542641000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7244871\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":71,"URL":"https:\/\/doi.org\/10.1109\/ascc.2015.7244871","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}