{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:41:43Z","timestamp":1730266903787,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651399","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["When NAS Meets Anomaly Detection: In Search of Resource-Efficient Architectures in Surveillance Video"],"prefix":"10.1109","author":[{"given":"Haidong","family":"Kang","sequence":"first","affiliation":[{"name":"Northeastern University,College of Software,Shenyang,China"}]},{"given":"Lianbo","family":"Ma","sequence":"additional","affiliation":[{"name":"College of Software, Northeastern University, Shenyang, China, Foshan Graduate School of Innovation, Northeastern University, Foshan, China,Shenyang,China"}]},{"given":"Nan","family":"Li","sequence":"additional","affiliation":[{"name":"Northeastern University,College of Software,Shenyang,China"}]},{"given":"Jianlun","family":"Ma","sequence":"additional","affiliation":[{"name":"Northeastern University,College of Software,Shenyang,China"}]},{"given":"Jian","family":"Cheng","sequence":"additional","affiliation":[{"name":"China University of Mining and Technology,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2764330"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405874"},{"key":"ref3","article-title":"Two-stream convolutional networks for action recognition in videos","volume-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems","volume":"27","author":"Simonyan"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00718"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00193"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2015.2392531"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2818942"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2897594"},{"article-title":"Very deep convolutional networks for large-scale image recognition","year":"2014","author":"Simonyan","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.112.2100706"},{"article-title":"Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding","year":"2015","author":"Han","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s18030712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2016.2577031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.91"},{"article-title":"Yolov3: An incremental improvement","year":"2018","author":"Redmon","key":"ref17"},{"article-title":"Yolov4: Optimal speed and accuracy of object detection","year":"2020","author":"Bochkovskiy","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"ref20","first-page":"9627","article-title":"Fcos: Fully convolutional onestage object detection","volume-title":"Proceedings of the IEEE\/CVF International Conference on Computer Vision","author":"Tian"},{"article-title":"Neural architecture search with reinforcement learning","year":"2016","author":"Zoph","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014780"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504890"},{"article-title":"Guided evolution for neural architecture search","year":"2021","author":"Lopes","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2723483"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2723483"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3603704"},{"key":"ref29","first-page":"1","article-title":"Pareto-wise ranking classifier for multi-objective evolutionary neural architecture search","author":"Ma","year":"2023","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3365949"},{"article-title":"Darts: Differentiable architecture search","year":"2018","author":"Liu","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01099"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00716"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3065138"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33014780"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01246-5_2"},{"key":"ref40","first-page":"4095","article-title":"Efficient neural architecture search via parameters sharing","volume-title":"International Conference on Machine Learning","author":"Pham"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00138"},{"article-title":"Pc-darts: Partial channel connections for memory-efficient architecture search","year":"2019","author":"Xu","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58555-6_28"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01060"},{"key":"ref45","article-title":"Fire datasets 1"},{"key":"ref46","article-title":"Fire datasets 2"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.123"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-7687-1_79"},{"article-title":"When does label smoothing help?","year":"2019","author":"M\u00fcller","key":"ref49"},{"key":"ref50","first-page":"8026","article-title":"Pytorch: An imperative style, high-performance deep learning library","volume":"32","author":"Paszke","year":"2019","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651399.pdf?arnumber=10651399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:45:39Z","timestamp":1725950739000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651399","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}