{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:57:55Z","timestamp":1761897475164},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T00:00:00Z","timestamp":1603497600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,24]]},"DOI":"10.1109\/uv50937.2020.9426191","type":"proceedings-article","created":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T21:14:40Z","timestamp":1620767680000},"page":"1-7","source":"Crossref","is-referenced-by-count":11,"title":["Real-Time Anomaly Detection and Feature Analysis Based on Time Series for Surveillance Video"],"prefix":"10.1109","author":[{"given":"Ruoyu","family":"Xue","sequence":"first","affiliation":[]},{"given":"Jingyuan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yajun","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2330853"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2015.7301284"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2011.6027327"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2018.090103"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2015.08.010"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00678"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0212-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.02.006"},{"article-title":"Anomaly detection using one-class neural networks","year":"2018","author":"chalapathy","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1061\/1\/012012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.103915"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/UV.2018.8642118"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2015.7177459"},{"article-title":"Rwf-2000: An open large scale video database for violence detection","year":"2019","author":"cheng","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WIAMIS.2008.53"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2935975"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2009.5414535"},{"journal-title":"The appropriate and effective use of security technologies in U S schools A guide for schools and law enforcement agencies","year":"2005","author":"green","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383267"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2016.7532491"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.273"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70825"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2011.09.009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2008.4587510"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2683483.2683556"},{"journal-title":"Surveillance camera statistics which cities have the most cctv cameras?","year":"2020","author":"bischoff","key":"ref7"},{"journal-title":"A world with a billion cameras watching you is just around the corner","year":"0","key":"ref2"},{"journal-title":"Deep learning for anomaly detection A survey","year":"2019","author":"chalapathy","key":"ref9"},{"year":"0","key":"ref1"},{"article-title":"Lstm-based system-call language modeling and robust ensemble method for designing host-based intrusion detection systems","year":"2016","author":"kim","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"article-title":"Anomaly detection in road traffic using visual surveillance: A survey","year":"2019","author":"kumaran","key":"ref21"},{"journal-title":"Motion-aware feature for improved video anomaly detection","year":"2019","author":"zhu","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2020.2984093"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00133"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472023"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5651958"}],"event":{"name":"2020 5th International Conference on Universal Village (UV)","start":{"date-parts":[[2020,10,24]]},"location":"Boston, MA, USA","end":{"date-parts":[[2020,10,27]]}},"container-title":["2020 5th International Conference on Universal Village (UV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9426067\/9426188\/09426191.pdf?arnumber=9426191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T15:18:22Z","timestamp":1656602302000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9426191\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,24]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/uv50937.2020.9426191","relation":{},"subject":[],"published":{"date-parts":[[2020,10,24]]}}}