{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:08:56Z","timestamp":1767773336237,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tcss.2022.3230262","type":"journal-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T18:40:12Z","timestamp":1674067212000},"page":"207-215","source":"Crossref","is-referenced-by-count":16,"title":["Captionomaly: A Deep Learning Toolbox for Anomaly Captioning in Social Surveillance Systems"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6283-1112","authenticated-orcid":false,"given":"Adit","family":"Goyal","sequence":"first","affiliation":[{"name":"Department of Computer Science, Northwestern University, Evanston, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0157-0967","authenticated-orcid":false,"given":"Murari","family":"Mandal","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar, India"}]},{"given":"Vikas","family":"Hassija","sequence":"additional","affiliation":[{"name":"School of Computer Engineering, Kalinga Institute of Industrial Technology, Bhubaneswar, India"}]},{"given":"Moayad","family":"Aloqaily","sequence":"additional","affiliation":[{"name":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI), Masdar City, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6730-3060","authenticated-orcid":false,"given":"Vinay","family":"Chamola","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering and APPCAIR, BITS-Pilani, Pilani, India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TII.2020.2998818"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TII.2020.3037286"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TCCN.2021.3102971"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/3439950"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TII.2021.3078192"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TITS.2022.3146024"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TVT.2021.3113807"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TSMCC.2012.2215319"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11554-021-01113-y"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.3390\/s19245538"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/s42979-021-00487-x"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TMM.2019.2924576"},{"key":"ref13","article-title":"Image captioning and classification of dangerous situations","volume-title":"arXiv:1711.02578","author":"Arriaga","year":"2017"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s00034-019-01306-8"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref16","first-page":"1079","article-title":"Delving deeper into the decoder for video captioning","volume-title":"Proc. ECAI","author":"Chen"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/CVPR.2017.634"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CVPR.2016.571"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.asoc.2021.107489"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.eswa.2020.113187"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/s10618-018-0585-7"},{"key":"ref22","first-page":"1","article-title":"The IAPR TC-12 benchmark: A new evaluation resource for visual information systems","volume-title":"Proc. Int. Workshop Image","volume":"2","author":"Grubinger"},{"key":"ref23","article-title":"Deep weakly-supervised anomaly detection","volume-title":"arXiv:1910.13601","author":"Pang","year":"2019"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/CVPR42600.2020.01219"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ICTAI.2016.0062"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/CVPR.2016.497"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/CVPR.2017.111"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/CVPR.2017.339"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.24963\/ijcai.2020\/88"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/CVPR42600.2020.01311"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.18653\/v1\/2020.emnlp-main.61"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-030-01261-8_22"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/CVPR.2019.00854"},{"key":"ref34","first-page":"1019","article-title":"A theoretically grounded application of dropout in recurrent neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"29","author":"Gal"},{"key":"ref35","article-title":"Layer normalization","volume-title":"arXiv:1607.06450","author":"Lei Ba","year":"2016"},{"key":"ref36","first-page":"561","article-title":"Support vector machines for multiple-instance learning","volume-title":"Proc. NIPS","volume":"2","author":"Andrews"},{"key":"ref37","article-title":"When, where, and what? A new dataset for anomaly detection in driving videos","volume-title":"arXiv:2004.03044","author":"Yao","year":"2020"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/TPAMI.2013.111"},{"key":"ref39","first-page":"190","article-title":"Collecting highly parallel data for paraphrase evaluation","volume-title":"Proc. 49th Annu. Meeting Assoc. Comput. Linguistics: Hum. Lang. Technol.","author":"Chen"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ICCV.2015.510"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-030-01216-8_43"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/10414252\/10021309.pdf?arnumber=10021309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T19:05:55Z","timestamp":1733252755000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10021309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2022.3230262","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}