{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:09Z","timestamp":1771701189058,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T00:00:00Z","timestamp":1571270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61571036, 61872030"],"award-info":[{"award-number":["61571036, 61872030"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,17]]},"DOI":"10.1145\/3358331.3358388","type":"proceedings-article","created":{"date-parts":[[2019,11,4]],"date-time":"2019-11-04T14:11:35Z","timestamp":1572876695000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Intrusion Detection and Tracking at Railway Crossing"],"prefix":"10.1145","author":[{"given":"Naxin","family":"Cai","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"given":"Houjin","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"given":"Yanfeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"given":"Yahui","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.10.041"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00642.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2010.2101613"},{"key":"e_1_3_2_1_4_1","first-page":"246","article-title":"Adaptive background mixture models for real-time tracking. Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149)","volume":"2","author":"Stauffer C.","year":"1999","journal-title":"IEEE"},{"key":"e_1_3_2_1_5_1","volume-title":"2009 Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance. IEEE, 25--30","author":"SanMiguel J. C.","year":"2009"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6472-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"F. Porikli Y. Ivanov T. Haga (2008). Robust abandoned object detection using dual foregrounds. EURASIP Journal on Advances in Signal Processing.  F. Porikli Y. Ivanov T. Haga (2008). Robust abandoned object detection using dual foregrounds. EURASIP Journal on Advances in Signal Processing.","DOI":"10.1155\/2008\/197875"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2011.5711550"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2015.7177804"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2009.74"},{"key":"e_1_3_2_1_11_1","unstructured":"F. S. Mahin M. N. Islam G. Schaefer M. A. R. Ahad (2015). A simple approach for abandoned object detection. Proceedings of the International Conference on Image Processing Computer Vision and Pattern Recognition (IPCV). The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp).  F. S. Mahin M. N. Islam G. Schaefer M. A. R. Ahad (2015). A simple approach for abandoned object detection. Proceedings of the International Conference on Image Processing Computer Vision and Pattern Recognition (IPCV). The Steering Committee of The World Congress in Computer Science Computer Engineering and Applied Computing (WorldComp)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2011.6027297"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2014.68"}],"event":{"name":"AIAM 2019: 2019 International Conference on Artificial Intelligence and Advanced Manufacturing","location":"Dublin Ireland","acronym":"AIAM 2019"},"container-title":["Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358388","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3358331.3358388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:08Z","timestamp":1750202588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3358331.3358388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,17]]},"references-count":13,"alternative-id":["10.1145\/3358331.3358388","10.1145\/3358331"],"URL":"https:\/\/doi.org\/10.1145\/3358331.3358388","relation":{},"subject":[],"published":{"date-parts":[[2019,10,17]]},"assertion":[{"value":"2019-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}