{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:25:06Z","timestamp":1757543106798,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T00:00:00Z","timestamp":1670889600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Jiangsu Province","award":["SJCX22_0161, BE2016904"],"award-info":[{"award-number":["SJCX22_0161, BE2016904"]}]},{"name":"National Key Research and Development Program of China","award":["2018YFC0407905"],"award-info":[{"award-number":["2018YFC0407905"]}]},{"name":"Fundamental Research Funds of China for the Central Universities","award":["B200202188"],"award-info":[{"award-number":["B200202188"]}]},{"name":"Jiangsu Water Conservancy Science and Technology Project","award":["2018057"],"award-info":[{"award-number":["2018057"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,13]]},"DOI":"10.1145\/3551626.3564972","type":"proceedings-article","created":{"date-parts":[[2022,12,7]],"date-time":"2022-12-07T00:55:45Z","timestamp":1670374545000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Intelligent Video Surveillance Platform Based on FFmpeg and Yolov5"],"prefix":"10.1145","author":[{"given":"Chuanxu","family":"Jiang","sequence":"first","affiliation":[{"name":"Hohai University, Nanjing, China"}]},{"given":"Yanfang","family":"Wang","sequence":"additional","affiliation":[{"name":"Hohai University, Nanjing, China"}]},{"given":"Qian","family":"Huang","sequence":"additional","affiliation":[{"name":"Hohai University, Nanjing, China"}]},{"given":"Yiming","family":"Wang","sequence":"additional","affiliation":[{"name":"Hohai University, Nanjing, China"}]},{"given":"Yuhan","family":"Dai","sequence":"additional","affiliation":[{"name":"Hohai University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,12,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"790","article-title":"Chinese Control and Decision Conference (CCDC)","volume":"2016","author":"Wang Q","year":"2016","unstructured":"Wang Q , Xu X , Huang G , Linux QT based configuration software development for mobile electric energy efficiency detection system\/\/ 2016 Chinese Control and Decision Conference (CCDC) . IEEE , 2016 : 790 -- 794 . Wang Q, Xu X, Huang G, et al. Linux QT based configuration software development for mobile electric energy efficiency detection system\/\/2016 Chinese Control and Decision Conference (CCDC). IEEE, 2016: 790--794.","journal-title":"IEEE"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.11.011"},{"key":"e_1_3_2_1_3_1","volume-title":"International Journal of Advanced Research in Engineering and Technology (IJARET)","author":"Mahto P","year":"2020","unstructured":"Mahto P , Garg P , Seth P , Refining yolov4 for vehicle detection . International Journal of Advanced Research in Engineering and Technology (IJARET) , 2020 , 11(5). Mahto P, Garg P, Seth P, et al. Refining yolov4 for vehicle detection. International Journal of Advanced Research in Engineering and Technology (IJARET), 2020, 11(5)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Rezatofighi H Tsoi N Gwak J Y etal Generalized intersection over union: A metric and a loss for bounding box regression\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019: 658--666.  Rezatofighi H Tsoi N Gwak J Y et al. Generalized intersection over union: A metric and a loss for bounding box regression\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. 2019: 658--666.","DOI":"10.1109\/CVPR.2019.00075"},{"key":"e_1_3_2_1_5_1","volume-title":"Microsoft coco: Common objects in context.European conference on computer vision","author":"Lin T Y","year":"2014","unstructured":"Lin T Y , Maire M , Belongie S , Microsoft coco: Common objects in context.European conference on computer vision . Springer , Cham , 2014 : 740--755. Lin T Y, Maire M, Belongie S, et al. Microsoft coco: Common objects in context.European conference on computer vision. Springer, Cham, 2014: 740--755."},{"key":"e_1_3_2_1_6_1","volume-title":"Deep learning. nature","author":"LeCun Y","year":"2015","unstructured":"LeCun Y , Bengio Y , Hinton G. Deep learning. nature , 2015 , 521(7553): 436--444. LeCun Y, Bengio Y, Hinton G. Deep learning. nature, 2015, 521(7553): 436--444."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Wang C Y Liao H Y M Wu Y H et al. CSPNet: A new backbone that can enhance learning capability of CNN\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops. 2020: 390--391.  Wang C Y Liao H Y M Wu Y H et al. CSPNet: A new backbone that can enhance learning capability of CNN\/\/Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops. 2020: 390--391.","DOI":"10.1109\/CVPRW50498.2020.00203"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Lin T Y Doll\u00e1r P Girshick R etal Feature pyramid networks for object detection\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 2117--2125.  Lin T Y Doll\u00e1r P Girshick R et al. Feature pyramid networks for object detection\/\/Proceedings of the IEEE conference on computer vision and pattern recognition. 2017: 2117--2125.","DOI":"10.1109\/CVPR.2017.106"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ghiasi G Lin T Y Le Q V. Nas-fpn: Learning scalable feature pyramid architecture for object detection\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019: 7036--7045.  Ghiasi G Lin T Y Le Q V. Nas-fpn: Learning scalable feature pyramid architecture for object detection\/\/Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition. 2019: 7036--7045.","DOI":"10.1109\/CVPR.2019.00720"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Liu S Qi L Qin H etal Path aggregation network for instance segmentation Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 8759--8768.  Liu S Qi L Qin H et al. Path aggregation network for instance segmentation Proceedings of the IEEE conference on computer vision and pattern recognition. 2018: 8759--8768.","DOI":"10.1109\/CVPR.2018.00913"},{"key":"e_1_3_2_1_11_1","volume-title":"A system for video surveillance and monitoring. VSAM final report","author":"Collins R. T.","year":"2000","unstructured":"Collins , R. T. , Lipton , A. J. , Kanade , T. , Fujiyoshi , H. , Duggins , D. , Tsin , Y. , ... & Wixson , L. ( 2000 ). A system for video surveillance and monitoring. VSAM final report , 2000(1--68), 1. Collins, R. T., Lipton, A. J., Kanade, T., Fujiyoshi, H., Duggins, D., Tsin, Y., ... & Wixson, L. (2000). A system for video surveillance and monitoring. VSAM final report, 2000(1--68), 1."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-008-0152-0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2000.868676"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.07.005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2021.103116"},{"key":"e_1_3_2_1_16_1","volume-title":"Video surveillance of public places","author":"Ratcliffe J.","year":"2006","unstructured":"Ratcliffe , J. ( 2006 ). Video surveillance of public places . Washington, DC : US Department of Justice , Office of Community Oriented Policing Services. Ratcliffe, J. (2006). Video surveillance of public places. Washington, DC: US Department of Justice, Office of Community Oriented Policing Services."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790123"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VS.1999.780272"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2007.4425357"},{"key":"e_1_3_2_1_20_1","volume-title":"CVPR 2011 (pp. 1937--1944)","author":"Brutzer S.","year":"2011","unstructured":"Brutzer , S. , H\u00f6ferlin , B. , & Heidemann , G. ( 2011 , June). Evaluation of background subtraction techniques for video surveillance . In CVPR 2011 (pp. 1937--1944) . IEEE. Brutzer, S., H\u00f6ferlin, B., & Heidemann, G. (2011, June). Evaluation of background subtraction techniques for video surveillance. In CVPR 2011 (pp. 1937--1944). IEEE."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2282613"},{"key":"e_1_3_2_1_22_1","first-page":"733","volume-title":"Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001 (Vol. 1","author":"Trajkovics M.","year":"2001","unstructured":"ess, D., Trajkovics , M. , Cohen-Solal , E. , Lyons , D. , & Jain , A. K. ( 2001 , July). A background model initialization algorithm for video surveillance . In Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001 (Vol. 1 , pp. 733 -- 740 ). IEEE. ess, D., Trajkovics, M., Cohen-Solal, E., Lyons, D., & Jain, A. K. (2001, July). A background model initialization algorithm for video surveillance. In Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001 (Vol. 1, pp. 733--740). IEEE."}],"event":{"name":"MMAsia '22: ACM Multimedia Asia","sponsor":["SIGMM ACM Special Interest Group on Multimedia"],"location":"Tokyo Japan","acronym":"MMAsia '22"},"container-title":["Proceedings of the 4th ACM International Conference on Multimedia in Asia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551626.3564972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551626.3564972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:00:26Z","timestamp":1750186826000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551626.3564972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,13]]},"references-count":22,"alternative-id":["10.1145\/3551626.3564972","10.1145\/3551626"],"URL":"https:\/\/doi.org\/10.1145\/3551626.3564972","relation":{},"subject":[],"published":{"date-parts":[[2022,12,13]]},"assertion":[{"value":"2022-12-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}