{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T21:32:19Z","timestamp":1775511139095,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/iciinfs.2018.8721378","type":"proceedings-article","created":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T19:39:56Z","timestamp":1558985996000},"page":"163-167","source":"Crossref","is-referenced-by-count":14,"title":["DEARESt: Deep Convolutional Aberrant Behavior Detection in Real-world Scenarios"],"prefix":"10.1109","author":[{"given":"Kuldeep","family":"Biradar","sequence":"first","affiliation":[]},{"given":"Sachin","family":"Dube","sequence":"additional","affiliation":[]},{"given":"Santosh Kumar","family":"Vipparthi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2015.0271"},{"key":"ref11","article-title":"C2MSNet: A Novel approach for single image haze removal","author":"dudhane","year":"2018","journal-title":"arXiv preprint arXiv 1801 04144"},{"key":"ref12","article-title":"Depth Based End-to-End Deep Network for Human Action Recognition","author":"chaudhary","year":"2018","journal-title":"IET Computer Vision"},{"key":"ref13","first-page":"189","article-title":"Abnormal event detection in videos using spatiotemporal autoencoder","author":"ys","year":"2017","journal-title":"Internation symposium on neural networks"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s11760-016-0935-0","article-title":"An efficient system for anomaly detection using deep learning classifier","volume":"11","author":"ar","year":"2017","journal-title":"Signal Image and Video Processing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/844\/1\/012044"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.10.010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3007120.3007129"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.06.009"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298676"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24673-2_3"},{"key":"ref3","author":"diaz","year":"2002","journal-title":"inventors Innovation Inst assignee Video monitoring and security system"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.06.009"},{"key":"ref29","article-title":"UCF101: A dataset of 101 human actions classes from videos in the wild","author":"soomro","year":"2012","journal-title":"arXiv preprint arXiv 1212 0402"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2016.01.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.107"},{"key":"ref7","article-title":"Vitoria Lobo. Person-onperson violence detection in video data","author":"datta","year":"2002","journal-title":"ICPR"},{"key":"ref2","author":"monroe","year":"0","journal-title":"inventor e-Watch Inc assignee Multimedia surveillance and monitoring system including network configuration"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","article-title":"Anomaly detection and localization in crowded scenes","volume":"36","author":"li","year":"2014","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-008-0152-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2017.50"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.11.001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SIBGRAPI.2010.38"},{"key":"ref24","first-page":"3218","article-title":"P-cnn: Pose-based cnn features for action recognition","author":"ch\u00e9ron","year":"2015","journal-title":"Proceedings of the IEEE International Conference on Computer Vision"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref25","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2014","journal-title":"arXiv preprint arXiv 1409 1556"}],"event":{"name":"2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)","location":"Rupnagar, India","start":{"date-parts":[[2018,12,1]]},"end":{"date-parts":[[2018,12,2]]}},"container-title":["2018 IEEE 13th International Conference on Industrial and Information Systems (ICIIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8716289\/8721308\/08721378.pdf?arnumber=8721378","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T20:17:07Z","timestamp":1560802627000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8721378\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/iciinfs.2018.8721378","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}