{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:02:47Z","timestamp":1776092567477,"version":"3.50.1"},"reference-count":50,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":71,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/100015539","name":"Australian Government","doi-asserted-by":"publisher","award":["IC190100020"],"award-info":[{"award-number":["IC190100020"]}],"id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001793","name":"Queensland University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001793","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:p>Anomaly detection in videos is challenging due to the complexity, noise, and diverse nature of activities such as violence, shoplifting, and vandalism. While deep learning (DL) has shown excellent performance in this area, existing approaches have struggled to apply DL models across different anomaly tasks without extensive retraining. This repeated retraining is time\u2010consuming, computationally intensive, and unfair. To address this limitation, a new DL framework is introduced in this study, consisting of three key components: transfer learning to enhance feature generalization, model fusion to improve feature representation, and multitask classification to generalize the classifier across multiple tasks without training from scratch when a new task is introduced. The framework\u2019s main advantage is its ability to generalize without requiring retraining from scratch for each new task. Empirical evaluations demonstrate the framework\u2019s effectiveness, achieving an accuracy of 97.99% on the RLVS (violence detection), 83.59% on the UCF dataset (shoplifting detection), and 88.37% across both datasets using a single classifier without retraining. Additionally, when tested on an unseen dataset, the framework achieved an accuracy of 87.25% and 79.39% on violence and shoplifting datasets, respectively. The study also utilises two explainability tools to identify potential biases, ensuring robustness and fairness. This research represents the first successful resolution of the generalization issue in anomaly detection, marking a significant advancement in the field.<\/jats:p>","DOI":"10.1155\/int\/1947582","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T03:33:46Z","timestamp":1741836826000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A Scalable and Generalised Deep Learning Framework for Anomaly Detection in Surveillance Videos"],"prefix":"10.1155","volume":"2025","author":[{"given":"Sabah Abdulazeez","family":"Jebur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7296-5413","authenticated-orcid":false,"given":"Laith","family":"Alzubaidi","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Saihood","sequence":"additional","affiliation":[]},{"given":"Khalid A.","family":"Hussein","sequence":"additional","affiliation":[]},{"given":"Haider Kadhim","family":"Hoomod","sequence":"additional","affiliation":[]},{"given":"YuanTong","family":"Gu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2020.104078"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/J.ISWA.2024.200355"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010029"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10878-0"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-024-02820-9"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.059"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v18i15.35761"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107627"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2025.01.034"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2025.102953"},{"key":"e_1_2_10_11_2","doi-asserted-by":"crossref","unstructured":"Traor\u00e9A.andAkhloufiM. A. Violence Detection in Videos Using Deep Recurrent and Convolutional Neural Networks Proceedings of the 2020 IEEE International Conference on Systems Man and Cybernetics (SMC) April 2020 154\u2013159 https:\/\/doi.org\/10.1109\/smc42975.2020.9282971.","DOI":"10.1109\/SMC42975.2020.9282971"},{"key":"e_1_2_10_12_2","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-MascorroG. A. Abreu-PederziniJ. R. Ortiz-BaylissJ. C. andTerashima-Mar\u00ednH. Suspicious Behavior Detection on Shoplifting Cases for Crime Prevention by Using 3D Convolutional Neural Networks 2020 https:\/\/arxiv.org\/abs\/2005.02142.","DOI":"10.3390\/computation9020024"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3001159"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2982906"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20082359"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.3390\/computation9020024"},{"key":"e_1_2_10_17_2","doi-asserted-by":"crossref","unstructured":"AnsariM. A.andSinghD. K. An Expert Eye for Identifying Shoplifters in Mega Stores Proceedings of the International Conference on Innovative Computing and Communications: Proceedings of ICICC 2021 Volume 3 May 2021 107\u2013115 https:\/\/doi.org\/10.1007\/978-981-16-3071-2_10.","DOI":"10.1007\/978-981-16-3071-2_10"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-021-02266-4"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s23010311"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/computation10110199"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/app12168014"},{"key":"e_1_2_10_22_2","doi-asserted-by":"crossref","unstructured":"ChexiaZ. TanZ. WuD. NingJ. andZhangB. A Generalized Model for Crowd Violence Detection Focusing on Human Contour and Dynamic Features Proceedings of the 2022 22nd IEEE International Symposium on Cluster Cloud and Internet Computing (CCGrid) March 2022 327\u2013335 https:\/\/doi.org\/10.1109\/ccgrid54584.2022.00042.","DOI":"10.1109\/CCGrid54584.2022.00042"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108213"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11781-4"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13158584"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120599"},{"key":"e_1_2_10_27_2","first-page":"210","article-title":"Abnormal Behavior Detection in Video Surveillance Using Inception-V3 Transfer Learning Approaches","volume":"23","author":"Jebur S. A.","year":"2023","journal-title":"Iraqi Journal of Computer, Communication, Control and System Engineering"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/app13148341"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.121691"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118791"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.3390\/computers12090175"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118523"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.3390\/ai5010014"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.3390\/s24061844"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2024.104163"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100455"},{"key":"e_1_2_10_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-19388-1"},{"key":"e_1_2_10_38_2","doi-asserted-by":"crossref","unstructured":"SultaniW. ChenC. andShahM. Real-world Anomaly Detection in Surveillance Videos Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition June 2018 6479\u20136488.","DOI":"10.1109\/CVPR.2018.00678"},{"key":"e_1_2_10_39_2","doi-asserted-by":"crossref","unstructured":"SolimanM. M. KamalM. H. NashedM. A. E.-M. MostafaY. M. ChawkyB. S. andKhattabD. Violence Recognition From Videos Using Deep Learning Techniques Proceedings of the 2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS) September 2019 80\u201385.","DOI":"10.1109\/ICICIS46948.2019.9014714"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106646"},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"SzegedyC. VanhouckeV. IoffeS. ShlensJ. andWojnaZ. Rethinking the Inception Architecture for Computer Vision Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition January 2016 2818\u20132826 https:\/\/doi.org\/10.1109\/cvpr.2016.308 2-s2.0-84986296808.","DOI":"10.1109\/CVPR.2016.308"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.022"},{"key":"e_1_2_10_43_2","doi-asserted-by":"crossref","unstructured":"CholletF. Xception: Deep Learning With Depthwise Separable Convolutions Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition August 2017 1251\u20131258.","DOI":"10.1109\/CVPR.2017.195"},{"key":"e_1_2_10_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2023.03.008"},{"key":"e_1_2_10_45_2","doi-asserted-by":"crossref","unstructured":"SelvarajuR. R. CogswellM. DasA. VedantamR. ParikhD. andBatraD. Grad-cam: Visual Explanations From Deep Networks via Gradient-Based Localization Proceedings of the IEEE International Conference on Computer Vision July 2017 618\u2013626 https:\/\/doi.org\/10.1109\/iccv.2017.74 2-s2.0-85041910265.","DOI":"10.1109\/ICCV.2017.74"},{"key":"e_1_2_10_46_2","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-025-02889-w"},{"key":"e_1_2_10_47_2","doi-asserted-by":"crossref","unstructured":"Dur\u00e3esD. SantosF. MarcondesF. S. LangeS. andMachadoJ. Comparison of Transfer Learning Behaviour in Violence Detection with Different Public Datasets 20 Proceedings of the Progress in Artificial Intelligence: 20th EPIA Conference on Artificial Intelligence EPIA 2021 Virtual Event August 2021 290\u2013298 https:\/\/doi.org\/10.1007\/978-3-030-86230-5_23.","DOI":"10.1007\/978-3-030-86230-5_23"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23678-5_39"},{"key":"e_1_2_10_49_2","unstructured":"Shoplifting-Dataset 2024 https:\/\/www.kaggle.com\/datasets\/jashwantsinghyadav\/shoplifting-dataset."},{"key":"e_1_2_10_50_2","unstructured":"JeburS. A. HusseinK. A. HoomodH. K. AlzubaidiL. SaihoodA. A. andGuY. A Scalable and Generalized Deep Learning Framework for Anomaly Detection in Surveillance Videos 2024 https:\/\/arxiv.org\/abs\/2408.00792."}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/1947582","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/int\/1947582","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/1947582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T18:03:27Z","timestamp":1772993007000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/1947582"}},"subtitle":[],"editor":[{"given":"Mohamadreza (Mohammad)","family":"Khosravi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1155\/int\/1947582"],"URL":"https:\/\/doi.org\/10.1155\/int\/1947582","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2024-05-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1947582"}}