{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:25:51Z","timestamp":1758248751612,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647884","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Integrated Framework for Identification of Suspicious Activity for Remote Sensing Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-9763-2356","authenticated-orcid":false,"given":"Ravi Kumar","family":"Gupta","sequence":"first","affiliation":[{"name":"Electronics &amp; Communication, Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2196-4573","authenticated-orcid":false,"given":"Sachin","family":"Kumar","sequence":"additional","affiliation":[{"name":"Electronics &amp; Communication, Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0043-1068","authenticated-orcid":false,"given":"Pooja","family":"Khanna","sequence":"additional","affiliation":[{"name":"Computer Science, Amity University Uttar Pradesh, Lucknow Campus, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5569-0307","authenticated-orcid":false,"given":"Pragya","family":"Pragya","sequence":"additional","affiliation":[{"name":"Department of Chemistry, MVD College, University of Lucknow, Lucknow, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2645610"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-02-2022-0034"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jayapratha C. H. Salome Hema Chitra and R. Mahalakshmi Priya. \"Suspicious Crime Identification and Detection Based on Social Media Crime Analysis Using Machine Learning Algorithms.\"\u00a0Soft Computing: Theories and Applications: Proceedings of SoCTA 2022. Singapore: Springer Nature Singapore 2023. 831-843.","DOI":"10.1007\/978-981-19-9858-4_71"},{"key":"e_1_3_2_1_4_1","volume-title":"2438-2447","author":"Gawande","year":"2023","unstructured":"Gawande, Ujwalla, Kamal Hajari, and Yogesh Golhar. \"Real-Time Deep Learning Approach for Pedestrian Detection and Suspicious Activity Recognition.\"\u00a0Procedia Computer Science\u00a0218 (2023): 2438-2447."},{"key":"e_1_3_2_1_5_1","volume-title":"Communication and Security: Proceedings of I3CS2021","author":"Agarwal","year":"2022","unstructured":"Agarwal, Mitushi, \"Suspicious Activity Detection in Surveillance Applications Using Slow-Fast Convolutional Neural Network.\"\u00a0Advances in Data Computing, Communication and Security: Proceedings of I3CS2021. Singapore: Springer Nature Singapore, 2022. 647-658."},{"key":"e_1_3_2_1_6_1","volume-title":"IEEE","author":"Filonenko","year":"2017","unstructured":"Filonenko, Alexander, Laksono Kurnianggoro, and Kang-Hyun Jo. \"A fuzzy model-based integration framework for vision-based intelligent surveillance systems.\"\u00a02017 IEEE International Conference on Mechatronics (ICM). IEEE, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"SPIE","author":"Zin","year":"2014","unstructured":"Zin, Thi Thi, \"An integrated framework for detecting suspicious behaviors in video surveillance.\"\u00a0Video Surveillance and Transportation Imaging Applications 2014. Vol. 9026. SPIE, 2014."},{"key":"e_1_3_2_1_8_1","volume-title":"Fully Convolutional Networks for Dense Semantic Labeling of High-Resolution Aerial Imagery. arXiv","author":"Sherrah J.","year":"2016","unstructured":"Sherrah, J. Fully Convolutional Networks for Dense Semantic Labeling of High-Resolution Aerial Imagery. arXiv 2016, preprint. arXiv:1606.02585."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2016.2645610"},{"key":"e_1_3_2_1_10_1","first-page":"7","article-title":"Automatic Target Detection in Satellite Images using Deep Learning","volume":"2017","author":"Khan M.J.","unstructured":"Khan, M.J.; Yousef, A.; Javed, N.; Nadeem, S.; Khurshid, K. Automatic Target Detection in Satellite Images using Deep Learning. J. Space Techno.2017, 7, 44\u201349. [","journal-title":"J. Space Techno"},{"key":"e_1_3_2_1_11_1","first-page":"3","article-title":"Object recognition in aerial images using convolutional neural networks","volume":"2017","author":"Radovic M.","unstructured":"Radovic, M.; Adarkwa, O.; Wang, Q. Object recognition in aerial images using convolutional neural networks. J. Imaging 2017, 3, 21.","journal-title":"J. Imaging"},{"issue":"7","key":"e_1_3_2_1_12_1","first-page":"3523","volume":"44","author":"Minaee Y.","year":"2022","unstructured":"S. Minaee, Y. Boykov, F. Porikli, A. Plaza, N. Kehtarnavaz and D. Terzopoulos. Image Segmentation Using Deep Learning: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 7, pp. 3523-3542, July 2022 (PDF) [IF(2021)=24.314].","journal-title":"Image Segmentation Using Deep Learning: A Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSP.2016.7877823"},{"key":"e_1_3_2_1_14_1","unstructured":"Broek A.C. van den Hoogeboom P. Persie M. van; 1997 Multi-sensor remote sensing for military cartography;AGARD spanje okt. 1997"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.C032453"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342230"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:21:45Z","timestamp":1758216105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":16,"alternative-id":["10.1145\/3647444.3647884","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647884","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}