{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:30:57Z","timestamp":1763346657228,"version":"3.45.0"},"reference-count":24,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067394","type":"journal-article","created":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T08:19:23Z","timestamp":1757924363000},"page":"5489-5507","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Implementing Convolutional Neural Networks to Detect Dangerous Objects in Video Surveillance Systems"],"prefix":"10.32604","volume":"85","author":[{"given":"Carlos","family":"Rojas","sequence":"first","affiliation":[]},{"given":"Cristian","family":"Bravo","sequence":"additional","affiliation":[]},{"given":"Carlos Enrique","family":"Montenegro-Mar\u00edn","sequence":"additional","affiliation":[]},{"given":"Rub\u00e9n","family":"Gonz\u00e1lez-Crespo","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"34366","DOI":"10.1109\/ACCESS.2021.3059170","article-title":"Weapon detection in real-time CCTV videos using deep learning","volume":"9","author":"Bhatti","year":"2021","journal-title":"IEEE Access"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"2438","DOI":"10.1016\/j.procs.2023.01.219","article-title":"Real-time deep learning approach for pedestrian detection and suspicious activity recognition","volume":"218","author":"Gawande","year":"2023","journal-title":"Procedia Comput Sci"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1002\/gdj3.162","article-title":"A novel deep learning-based single shot multibox detector model for object detection in optical remote sensing images","volume":"11","author":"Wang","year":"2024","journal-title":"Geosci Data J"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"6085","DOI":"10.3390\/app11136085","article-title":"Automatic handgun detection with deep learning in video surveillance images","volume":"11","author":"Salido","year":"2021","journal-title":"Appl Sci"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Tan M, Pang R, Le QV. EfficientDet: scalable and efficient object detection. arXiv:1911.09070. 2019.","DOI":"10.1109\/CVPR42600.2020.01079"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"Ramachandra R, Venkatesh S, Damer N, Vetrekar N, Gad R. Multispectral imaging for differential face morphing attack detection: a preliminary study. arXiv:2304.03510. 2023.","DOI":"10.1109\/WACV57701.2024.00607"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TPAMI.2019.2922181","article-title":"Object detection from scratch with deep supervision","volume":"42","author":"Shen","year":"2020","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref8","first-page":"26","article-title":"A hybrid multi-person fall detection scheme based on optimized YOLO and ST-GCN","volume":"9","author":"Liu","year":"2025","journal-title":"Int J Interact Multimed Artif Intell"},{"key":"ref9","unstructured":"Redmon J, Divvala S, Girshick R, Farhadi A. You only look once: unified, real-time object detection [Internet]. [cited 2025 Aug 26]. Available from: http:\/\/pjreddie.com\/yolo\/."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/978-3-031-59057-3_7","author":"Mu\u00f1oz","year":"2024","journal-title":"Robotics, computer vision and intelligent systems"},{"key":"ref11","series-title":"2019 IEEE International Conference on Smart Instrumentation, Measurement and Application (ICSIMA); 2019 Aug 27\u201329; Kuala Lumpur, Malaysia","first-page":"1","article-title":"Gun detection system using Yolov3","author":"Warsi"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1186\/s42492-021-00075-z","article-title":"Crime forecasting: a machine learning and computer vision approach to crime prediction and prevention","volume":"4","author":"Shah","year":"2021","journal-title":"Vis Comput Ind Biomed Art"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2812","DOI":"10.30534\/ijatcse\/2020\/51932020","article-title":"Suspicious activity detection and tracking through unmanned aerial vehicle using deep learning techniques","volume":"9","author":"Gayathri","year":"2020","journal-title":"Int J Adv Trends Comput Sci Eng"},{"key":"ref14","unstructured":"Welcome to AWS documentation [Internet]. [cited 2025 Aug 26]. Available from: https:\/\/docs.aws.amazon.com\/."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TPAMI.2016.2612187","article-title":"Video object discovery and co-segmentation with extremely weak supervision","volume":"39","author":"Wang","year":"2017","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"ref16","series-title":"2018 International Conference on Artificial Intelligence and Data Processing (IDAP); 2018 Sep 28\u201330; Malatya, Turkey","first-page":"1","article-title":"Profile face recognition using local binary patterns with artificial neural network","author":"Salyut"},{"key":"ref17","series-title":"2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM); 2020 Jan 3\u20135; Taichung, Taiwan","first-page":"1","article-title":"Automatic handgun and knife detection algorithms: a review","author":"Warsi"},{"key":"ref18","first-page":"981","article-title":"Viabilidad de las redes neuronales en la detecci\u00f3n de objetos","volume":"E28","author":"Santiago","year":"2020","journal-title":"Iber J Inf Syst Technol"},{"key":"ref19","first-page":"385","article-title":"Proceso de reconocimiento de objetos, asistido por computador (visi\u00f3n artificial), aplicando gases neuronales y t\u00e9cnicas de miner\u00eda de datos","volume":"1","author":"Munoz","year":"2006","journal-title":"Sci Technica"},{"key":"ref20","first-page":"6418420","article-title":"Memory-augmented insider threat detection with temporal-spatial fusion","volume":"2022","author":"Li","year":"2022","journal-title":"Secur Commun Netw"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"72","DOI":"10.3390\/jimaging11030072","article-title":"Concealed weapon detection using thermal cameras","volume":"11","author":"Mu\u00f1oz","year":"2025","journal-title":"J Imaging"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"18662","DOI":"10.1109\/JSEN.2024.3502539","article-title":"Edge deployment of deep networks for visual detection: a review","volume":"25","author":"Zhai","year":"2025","journal-title":"IEEE Sens J"},{"key":"ref23","unstructured":"Memory A, Goldberg HG, Senator TE. Context-aware insider threat detection; 2013 [Internet]. [cited 2025 Aug 26]. Available from: www.aaai.org."},{"key":"ref24","unstructured":"Lin T. Label studio [Internet]. [cited 2025 Aug 26]. Available from: https:\/\/github.com\/HumanSignal\/labelImg."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67394\/TSP_CMC_67394.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:27:50Z","timestamp":1763346470000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":24,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067394","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}