{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T21:03:32Z","timestamp":1773781412362,"version":"3.50.1"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3,30]]},"DOI":"10.1109\/icai55435.2022.9773464","type":"proceedings-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T19:50:03Z","timestamp":1652817003000},"page":"79-83","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time Anomaly Detection for Smart and Safe City Using Spatiotemporal Deep Learning"],"prefix":"10.1109","author":[{"given":"Rabia","family":"Hasib","sequence":"first","affiliation":[{"name":"University of Engineering and Technology,Department of Computer Systems Engineering,Peshawar,Pakistan"}]},{"given":"Atif","family":"Jan","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology,Department of Electrical Engineering,Peshawar,Pakistan"}]},{"given":"Gul Muhammad","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Engineering and Technology,Department of Electrical Engineering,Peshawar,Pakistan"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.imavis.2010.11.003","article-title":"Goal-based trajec-tory analysis for unusual behaviour detection in intelligent surveillance","volume":"29","author":"frederick","year":"2011","journal-title":"Image and Vision Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001415550113"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59081-3_23"},{"key":"ref13","first-page":"301","article-title":"Ab-normal events detection based on trajectory clustering","author":"ghrab","year":"2016","journal-title":"2016 13th International Conference on Computer Graphics Imaging and Visual-ization (CGiV)"},{"key":"ref14","first-page":"2054","article-title":"Chaotic invariants of lagrangian particle trajectories for anomaly detection in crowded scenes","author":"shandong","year":"2010","journal-title":"2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/11744047_33"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206569"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAIS46528.2019.9074586"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2114-2"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CAC48633.2019.8996830"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46478-7_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICAI52203.2021.9445263"},{"key":"ref8","first-page":"18","article-title":"Anomaly detection and localization in crowded scenes","volume":"36","author":"li","year":"2013","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70825"},{"key":"ref2","author":"keval","year":"2009","journal-title":"Effective Design Configuration and Use of Digital CCTV"},{"key":"ref9","author":"raghavendra","year":"2006","journal-title":"Unusual Crowd Activity Dataset of University of Minnesota"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2020.107515"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3002-4_43"},{"key":"ref21","article-title":"Two-stream convolutional net-works for action recognition in videos","author":"simonyan","year":"2014","journal-title":"ArXiv Preprint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2012.59"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2018.2845742"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.86"},{"key":"ref25","first-page":"4489","article-title":"Learning spatiotemporal features with 3d convolutional networks","author":"tran","year":"2015","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"}],"event":{"name":"2022 2nd International Conference on Artificial Intelligence (ICAI)","location":"Islamabad, Pakistan","start":{"date-parts":[[2022,3,30]]},"end":{"date-parts":[[2022,3,31]]}},"container-title":["2022 2nd International Conference on Artificial Intelligence (ICAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9773362\/9773374\/09773464.pdf?arnumber=9773464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T20:41:17Z","timestamp":1655239277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9773464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,30]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icai55435.2022.9773464","relation":{},"subject":[],"published":{"date-parts":[[2022,3,30]]}}}