{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:32:36Z","timestamp":1775745156895,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1109\/iscc50000.2020.9219585","type":"proceedings-article","created":{"date-parts":[[2020,10,12]],"date-time":"2020-10-12T17:03:51Z","timestamp":1602522231000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["UAV-based Surveillance System: an Anomaly Detection Approach"],"prefix":"10.1109","author":[{"given":"Amira","family":"Chriki","sequence":"first","affiliation":[]},{"given":"Haifa","family":"Touati","sequence":"additional","affiliation":[]},{"given":"Hichem","family":"Snoussi","sequence":"additional","affiliation":[]},{"given":"Farouk","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1186\/s13040-017-0155-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref33","first-page":"1","article-title":"Privacy in mini-drone based video surveillance","author":"bonetto","year":"2015","journal-title":"2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG)"},{"key":"ref32","article-title":"Anomaly detection in video using predictive convolutional long short-term memory networks","author":"medel","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.07.016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.06.007"},{"key":"ref37","year":"0"},{"key":"ref36","first-page":"582","article-title":"Support vector method for novelty detection","author":"sch\u00f6lkopf","year":"2000","journal-title":"Advances in neural information processing systems"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2523\/IPTC-20111-MS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/s41074-019-0056-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1974.tb00994.x"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-008-0152-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766641"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766481"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.13031\/aea.13007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-9282-5_53"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2016.7900159"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18178\/ijfcc.2019.8.1.535"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2758379"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2016.2603528"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.26.5.051402"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5194\/isprs-archives-XLII-3-W4-291-2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600587CM"},{"key":"ref29","article-title":"Night-time outdoor surveillance with mobile cameras","author":"diego","year":"2012"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2514\/6.2018-0508"},{"key":"ref8","first-page":"15620","article-title":"The smart management of&#x2019; construction site\" in a post-seismic scenario using UAV photogrammetry","author":"dominici","year":"2018","journal-title":"EGU General Assembly Conference Abstracts"},{"key":"ref7","article-title":"Human Action Recognition in Drone Videos using a Few Aerial Training Examples","author":"sultani","year":"2019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICMECH.2017.7921137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2018.00429"},{"key":"ref1","first-page":"54","article-title":"Real-time traffic flow parameter estimation from UAV video based on ensemble classifier and optical flow","volume":"20","author":"ruimin","year":"2018","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683790"},{"key":"ref21","article-title":"Deep learning for anomaly detection: A survey","author":"chalapathy","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/AIKE.2019.00039"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5309-2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref23","first-page":"1","article-title":"Analyzing rare event, anomaly, novelty and outlier detection terms under the supervised classification framework","author":"carre\u00f1o","year":"2019","journal-title":"Artificial Intelligence Review"},{"key":"ref26","article-title":"Unsupervised video surveillance for anomaly detection of street traffic","author":"farooq muhammad","year":"2017","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2016.10.010"}],"event":{"name":"2020 IEEE Symposium on Computers and Communications (ISCC)","location":"Rennes, France","start":{"date-parts":[[2020,7,7]]},"end":{"date-parts":[[2020,7,10]]}},"container-title":["2020 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9213178\/9219543\/09219585.pdf?arnumber=9219585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:54:23Z","timestamp":1656438863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9219585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/iscc50000.2020.9219585","relation":{},"subject":[],"published":{"date-parts":[[2020,7]]}}}