{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T05:25:12Z","timestamp":1749533112459,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/spac46244.2018.8965455","type":"proceedings-article","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T02:51:08Z","timestamp":1579834268000},"page":"326-331","source":"Crossref","is-referenced-by-count":4,"title":["Smoking Behavior Detection Based on Hand Trajectory Tracking and Mouth Saturation Changes"],"prefix":"10.1109","author":[{"given":"Zhenkai","family":"Lin","sequence":"first","affiliation":[]},{"given":"Changfeng","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Yimin","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Jinping","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Research on indoor cigarette smoke detection algorithm based on video surveillance [D]","year":"2016","author":"bo","key":"ref10"},{"journal-title":"Smoke behavior recognition and research based on video smoke [D]","year":"2013","author":"hongjie","key":"ref11"},{"journal-title":"Research on gesture recognition algorithm for smoking behavior [D]","year":"2013","author":"chao","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2752367"},{"key":"ref14","first-page":"217","article-title":"Recognition of Smoking Gesture Using Smart Watch Technology[C]","author":"cole","year":"2016","journal-title":"International Conference on Health Informatics and Medical Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2017.7897312"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.neucom.2016.09.072","article-title":"Funnel-structured cascade for multi-view face detection with alignment-awareness[J]","volume":"221","author":"kan","year":"2017","journal-title":"Neurocomputing"},{"key":"ref17","first-page":"1","article-title":"Coarse-to-Fine Auto-Encoder Networks (CFAN) for Real-Time Face Alignment[C]","author":"zhang","year":"2014","journal-title":"European Conference on Computer Vision"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-2328-0"},{"key":"ref19","first-page":"1492","article-title":"Modeling and region detection of hand skin color based on Gauss model [J]","volume":"21","author":"shiqiang","year":"2016","journal-title":"Journal of Image and Graphics"},{"key":"ref4","first-page":"63","article-title":"A video smoke detection algorithm based on wavelet energy and optical flow eigen-values [J]","volume":"8","author":"li","year":"2013","journal-title":"Joural of Software"},{"key":"ref27","first-page":"1","article-title":"Real-time robust human tracking based on Lucas-Kanade optical flow and deep detection for embedded surveillance[C]","author":"vu","year":"2017","journal-title":"IEEE-Information Communication and Embedded Systems"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1016\/j.proeng.2013.08.140","article-title":"A real-time video fire flame and smoke detection algorithm [J]","volume":"62","author":"chunyu","year":"2013","journal-title":"Procedia Engineering"},{"key":"ref6","first-page":"1870","article-title":"Unmanned aerial vehicle based forest fire monitoring and detection using image processing technique[C]","author":"yuan","year":"2017","journal-title":"Guidance Navigation & Controls Conference"},{"key":"ref5","first-page":"166","article-title":"Early forest fire smoke detection algorithm based on image segmentation research[J]","volume":"53","author":"suping","year":"2017","journal-title":"Computer Engineering & Applications"},{"key":"ref8","first-page":"5485","article-title":"Fast Video Fire Detection Using Luminous Smoke and Textured Flame Features[J]","volume":"10","author":"ince","year":"2016","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"ref7","first-page":"1557","article-title":"Comparison and analysis of two kinds of image fire detection techniques[J]","volume":"36","author":"li","year":"2017","journal-title":"Fire Science & Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2013.10.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-016-0464-7"},{"key":"ref1","first-page":"1290","article-title":"Smoking detection algorithm based on mixture Gaussian model and frame difference method [J]","volume":"36","author":"guangzhen","year":"2015","journal-title":"Computer Engineering and Design"},{"key":"ref20","first-page":"500","article-title":"Face detection in video using combined data-mining and histogram based skin-color model[C]","author":"tsishkou","year":"2017","journal-title":"International Symposium on Image and Signal Processing and Analysis IEEE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2014.2302538"},{"key":"ref21","first-page":"773","article-title":"A Bayesian face detection algorithm based on skin color model [J]","volume":"23","author":"jing","year":"2006","journal-title":"Journal of Xidian University"},{"key":"ref24","first-page":"1739","article-title":"An ellipse model skin color detection method based on KL transform [J]","volume":"29","author":"jianpo","year":"2007","journal-title":"Journal of Electronics & Information Technology"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"696","DOI":"10.1109\/34.1000242","article-title":"Face Detection in Color Images [J]","volume":"24","author":"hsu","year":"2002","journal-title":"IEEE Trans on the Pattern Analysis and the Machine Intelligence"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-018-1442-z"},{"key":"ref25","first-page":"322","article-title":"Gesture segmentation based on YCrCb ellipse skin model and background subtraction[C]","author":"tan","year":"2016","journal-title":"International Conference on Progress in Informatics and Computing IEEE"}],"event":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2018,12,14]]},"location":"Jinan, China","end":{"date-parts":[[2018,12,17]]}},"container-title":["2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8959268\/8965430\/08965455.pdf?arnumber=8965455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T21:04:55Z","timestamp":1604091895000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8965455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/spac46244.2018.8965455","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}