{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:23:03Z","timestamp":1730298183811,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/spac46244.2018.8965465","type":"proceedings-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:51:08Z","timestamp":1579816268000},"page":"114-119","source":"Crossref","is-referenced-by-count":1,"title":["Camera Abnormal Movement and Foreign Object Invasion Detection Based on Cumulative Edge Distribution Probability Model"],"prefix":"10.1109","author":[{"given":"Xiangru","family":"Yu","sequence":"first","affiliation":[]},{"given":"Fudong","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Yimin","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Jinping","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIP.2010.2101613"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1908","DOI":"10.1109\/TIP.2010.2045169","article-title":"Semantics-preserving bag-of-words models and applications","volume":"19","author":"wu","year":"2010","journal-title":"IEEE Transactions on Image Processing"},{"key":"ref12","first-page":"216","article-title":"Object classification and recognition using bagof-words (bow) model","author":"ali","year":"2016","journal-title":"IEEE Int C on Signal Processing and Its Applications"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1134\/S1054661816010065"},{"key":"ref14","first-page":"580","article-title":"Rich feature hierarchies for accurate object detection and semantic segmentation","author":"girshick","year":"2014","journal-title":"IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref15","first-page":"91","article-title":"Faster r-cnn: towards real-time object detection with region proposal networks","volume":"39","author":"ren","year":"2015","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"year":"2017","author":"guo","article-title":"Image matching algorithm based on multiple feature fusion and its application","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CISP-BMEI.2017.8302044"},{"key":"ref18","first-page":"432","article-title":"A classification method of epithelial cells and clue cells based on multi-scale texture analysis","author":"guo","year":"2017","journal-title":"International Congress on Image and Signal Processing Biomedical Engineering and Informatics"},{"year":"2017","author":"ding","article-title":"Detection system of potential accidents around transmission line based on image difference","key":"ref19"},{"key":"ref4","first-page":"725","article-title":"An efficient r-kde model for the segmentation of dynamic scenes","author":"zhu","year":"2012","journal-title":"International Conference on Pattern Recognition"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TII.2017.2757457"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TPAMI.2003.1233909"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/IWSSIP.2013.6623450"},{"key":"ref8","first-page":"341","article-title":"Real-time adaptive background segmentation","author":"butler","year":"2003","journal-title":"International Conference on Multimedia and Expo"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TCSVT.2013.2243649"},{"key":"ref2","first-page":"4749","article-title":"Smoke detection using spatial and temporal analyses","volume":"8","author":"lee","year":"2012","journal-title":"Int Journal of Innovative Computing Information and Control"},{"key":"ref1","first-page":"1093","article-title":"Intelligent visual surveillance:a review","volume":"38","author":"huang","year":"2015","journal-title":"Chinese Journal of Computers"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCSVT.2011.2158335"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1142\/S0218001417540064"},{"key":"ref22","first-page":"2564","article-title":"Orb: An efficient alternative to sift or surf","author":"rublee","year":"2012","journal-title":"International Conference on Computer Vision"},{"key":"ref21","first-page":"569","article-title":"Algorithm of moving target tracking based on sift feature optical flow","volume":"42","author":"li","year":"2015","journal-title":"Computer Science"}],"event":{"name":"2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2018,12,14]]},"location":"Jinan, China","end":{"date-parts":[[2018,12,17]]}},"container-title":["2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8959268\/8965430\/08965465.pdf?arnumber=8965465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T14:49:27Z","timestamp":1643294967000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8965465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/spac46244.2018.8965465","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}