{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T12:06:59Z","timestamp":1774872419486,"version":"3.50.1"},"reference-count":65,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T00:00:00Z","timestamp":1676851200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,2,20]]},"DOI":"10.1109\/icacs55311.2023.10089730","type":"proceedings-article","created":{"date-parts":[[2023,4,5]],"date-time":"2023-04-05T17:30:05Z","timestamp":1680715805000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Multi-Pedestrians Anomaly Detection via Conditional Random Field and Deep Learning"],"prefix":"10.1109","author":[{"given":"Faisal","family":"Abdullah","sequence":"first","affiliation":[{"name":"Air University,Dept. of Computer Science,Islamabad,Pakistan"}]},{"given":"Ahmad","family":"Jalal","sequence":"additional","affiliation":[{"name":"Air University,Dept. of Computer Science,Islamabad,Pakistan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07758-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13227-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3434183"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21608\/ijicis.2021.84588.1112"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0739-4_75"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89131-2_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-022-07092-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01586-5"},{"key":"ref9","article-title":"Deep activity recognition based on patterns discovery for healthcare monitoring","volume-title":"Proc. on IEEE","author":"Madiha"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2018.8536280"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00026"},{"key":"ref12","article-title":"Anomaly detection using hierarchical temporal memory in crowd management","author":"Bamaqa","year":"2020","journal-title":"Proc. on CBDC"},{"key":"ref13","article-title":"A novel framework for human action recognition based on features fusion and decision tree","volume-title":"Proc. on IEEE","author":"Fatima"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-020-00554-y"},{"key":"ref15","article-title":"Abnormal action recognition in crowd scenes via deep data mining and random forest","author":"Israr","year":"2023","journal-title":"Proc. on IEEE ACS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/csde53843.2021.9718486"},{"key":"ref17","article-title":"Highway traffic surveillance over UAV dataset via Blob detection and histogram of gradient","volume-title":"Proc. on IEEE","author":"Asifa"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-015-1955-8"},{"key":"ref19","article-title":"Automatic human posture estimation for sport activity recognition with entropy markov model","author":"Nadeem","year":"2021","journal-title":"Proc. on MTA"},{"key":"ref20","article-title":"An End-to-End Human Abnormal Behavior Detection Framework for Crowd with Mental Disorders","author":"Hao","year":"2021","journal-title":"Proc. on IEEE Journal of BHI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3434183"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISAECT53699.2021.9668517"},{"key":"ref23","article-title":"WHITE STAG model: Wise human interaction tracking and estimation descriptors","author":"Mahmood","year":"2020","journal-title":"Proc. on MTA"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/110181"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-021-00756-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07758-5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/s22166080"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/e23050628"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982906"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.019"},{"key":"ref31","article-title":"Anomaly detection in surveillance videos: A survey","author":"Zhiguo","year":"2020","journal-title":"Proc. on JTU"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI55435.2022.9773772"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.059"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/C-CODE.2019.8680993"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/837"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-018-00012-w"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1108\/IJCS-07-2020-0013"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC53490.2021.9693003"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref40","article-title":"Automated body parts estimation and detection using salient maps and Gaussian matrix model","author":"Ayesha","year":"2021","journal-title":"proc. on IEEE, IBCAST"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62395-5_23"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.07.008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.20965\/jaciii.2017.p0235"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/21681163.2021.1986859"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/120187"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667145"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2018.2856189"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2016.0044"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900907"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2846411"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tcds.2018.2866838"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03439-5"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5244-2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.019"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-019-01647-0"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-019-09792-7"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3293537"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00051"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAI54018.2021.9651452"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01223"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70738"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851750"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09774-w"}],"event":{"name":"2023 4th International Conference on Advancements in Computational Sciences (ICACS)","location":"Lahore, Pakistan","start":{"date-parts":[[2023,2,20]]},"end":{"date-parts":[[2023,2,22]]}},"container-title":["2023 4th International Conference on Advancements in Computational Sciences (ICACS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10089613\/10089626\/10089730.pdf?arnumber=10089730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T11:12:12Z","timestamp":1709464332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10089730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,20]]},"references-count":65,"URL":"https:\/\/doi.org\/10.1109\/icacs55311.2023.10089730","relation":{},"subject":[],"published":{"date-parts":[[2023,2,20]]}}}