{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:08:43Z","timestamp":1772935723056,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401754","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"4809-4814","source":"Crossref","is-referenced-by-count":0,"title":["LSM-CAD: A Lightweight and Semantic-Guided Multi-Model Algorithm for Campus Anomaly Detection"],"prefix":"10.1109","author":[{"given":"Changao","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer and Artificial Intelligence, Shandong University of Finance and Economics,Jinan,China"}]},{"given":"Ronghuai","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Shandong University of Finance and Economics,Jinan,China"}]},{"given":"Mei","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Finance and Taxation, Shandong University of Finance and Economics,Jinan,China"}]},{"given":"Zhiping","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Shandong University of Finance and Economics,Jinan,China"}]},{"given":"Peiguang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer and Artificial Intelligence, Shandong University of Finance and Economics,Jinan,China"}]}],"member":"263","reference":[{"issue":"5","key":"ref1","first-page":"22","article-title":"Campus anomaly behavior detection based on FasterNet model","volume":"34","author":"Guo","year":"2025","journal-title":"Commun. Inf. Technol."},{"issue":"10","key":"ref2","first-page":"123","article-title":"A security data governance framework integrating artificial intelligence in cloud computing platforms","author":"Lai","year":"2025","journal-title":"Cyberspace Secur. Inform."},{"issue":"4","key":"ref3","first-page":"74","article-title":"Development of an intelligent campus security platform supported by big data","author":"Li","year":"2025","journal-title":"China Auto-Identif. Technol."},{"key":"ref4","article-title":"Object detection with multimodal large vision-language models: An in-depth review","volume-title":"SSRN Preprint","author":"Sapkota","year":"2025"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.103517"},{"key":"ref6","first-page":"1","article-title":"A survey of automated prompt engineering techniques for large language models","author":"Ba","year":"2025","journal-title":"J. Comput. Sci. Explor."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00721"},{"key":"ref8","article-title":"Anomaly transformer: Time series anomaly detection with association discrepancy","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Xu","year":"2022"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.00509"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-43153-1_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/iccv51070.2023.00947"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01646"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/sym15020528"},{"key":"ref14","article-title":"BLIP-2: Bootstrapping languageimage pre-training with frozen image encoders and large language models","volume-title":"Proc. PMLR","author":"Li","year":"2023"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-demo.49"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01753"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52733.2024.01732"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01245"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref21","first-page":"232","article-title":"Constrained contrastive distribution learning for anomaly detection","volume-title":"Proc. Eur. Conf. Comput. Vis. (ECCV)","author":"Tian","year":"2022"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401754.pdf?arnumber=11401754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:39:14Z","timestamp":1772869154000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401754\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401754","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}