{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:31:03Z","timestamp":1763346663681,"version":"3.45.0"},"reference-count":42,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T00:00:00Z","timestamp":1761436800000},"content-version":"vor","delay-in-days":298,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.067589","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T14:31:34Z","timestamp":1759933894000},"page":"5747-5763","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Leveraging Federated Learning for Efficient Privacy-Enhancing Violent Activity Recognition from Videos"],"prefix":"10.32604","volume":"85","author":[{"given":"Moshiur Rahman","family":"Tonmoy","sequence":"first","affiliation":[]},{"given":"Md. Mithun","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Mejdl","family":"Safran","sequence":"additional","affiliation":[]},{"given":"Sultan","family":"Alfarhood","sequence":"additional","affiliation":[]},{"given":"Dunren","family":"Che","sequence":"additional","affiliation":[]},{"given":"M. F.","family":"Mridha","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1080\/21681163.2021.1986859","article-title":"Video based human crowd analysis using machine learning: a survey","volume":"10","author":"Chaudhary","year":"2022","journal-title":"Comput Methods Biomech Biomedical Eng Imag Visual"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"753","DOI":"10.1007\/s00371-018-1499-5","article-title":"Convolutional neural networks for crowd behaviour analysis: a survey","volume":"35","author":"Tripathi","year":"2019","journal-title":"Vis Comput"},{"key":"ref3","unstructured":"MarketsandMarkets. Video surveillance industry worth $88.71 billion by 2030; 2025 [Internet]. [cited 2025 Jul 22]. Available from: https:\/\/www.marketsandmarkets.com\/PressReleases\/global-video-surveillance-market.asp."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"80543","DOI":"10.1109\/ACCESS.2023.3300658","article-title":"Opportunities, applications, and challenges of edge-ai enabled video analytics in smart cities: a systematic review","volume":"11","author":"Badidi","year":"2023","journal-title":"IEEE Access"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"Liu Y, Liu S, Zhu X, Li J, Yang H, Teng L, et al. Privacy-preserving video anomaly detection: a survey. arXiv:2411.14565. 2025.","DOI":"10.1109\/TNNLS.2025.3600252"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"ElBaih M. The role of privacy regulations in AI development (A discussion of the ways in which privacy regulations can shape the development of AI). 2023. [cited 2025 Jul 22]. Available from: http:\/\/dx.doi.org\/10.2139\/ssrn.4589207.","DOI":"10.2139\/ssrn.4589207"},{"key":"ref7","first-page":"126","article-title":"Safeguarding digital privacy with ai-driven solutions","volume":"2","author":"Gupta","year":"2024","journal-title":"ESP Int J Adv Comput Technol (ESP-IJACT)"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"8089","DOI":"10.3390\/app15148089","article-title":"A survey on video big data analytics: architecture, technologies, and open research challenges","volume":"15","author":"Do","year":"2025","journal-title":"Appl Sci"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/3298981","article-title":"Federated machine learning: concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans Intell Syst Technol"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"94863","DOI":"10.1109\/ACCESS.2023.3310400","article-title":"Federated learning in computer vision","volume":"11","author":"Shenaj","year":"2023","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"22787","DOI":"10.1007\/s11042-017-4488-1","article-title":"A security framework for cloud-based video surveillance system","volume":"76","author":"Alsmirat","year":"2017","journal-title":"Multimedia Tools Appl"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.3390\/s19051228","article-title":"Lightweight cipher for H.264 videos in the Internet of multimedia things with encryption space ratio diagnostics","volume":"19","author":"Shifa","year":"2019","journal-title":"Sensors"},{"key":"ref13","article-title":"Differential privacy has disparate impact on model accuracy","volume":"32","author":"Bagdasaryan","year":"2019","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/OJCS.2024.3378709","article-title":"A lightweight visual font style recognition with quantized convolutional autoencoder","volume":"5","author":"Tonmoy","year":"2024","journal-title":"IEEE Open J Comput Soc"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3561971","article-title":"A comprehensive review on vision-based violence detection in surveillance videos","volume":"55","author":"Ullah","year":"2023","journal-title":"ACM Comput Surv"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"10968","DOI":"10.1002\/int.23029","article-title":"Human-centered attention-aware networks for action recognition","volume":"37","author":"Liu","year":"2022","journal-title":"Int J Intell Syst"},{"key":"ref17","series-title":"2024 IEEE Region 10 Symposium (TENSYMP); 2024 Sep 27\u201329; New Delhi, India","first-page":"1","article-title":"CNN and BiLSTM based framework for real life violence detection from CCTV videos","author":"Aggarwal"},{"article-title":"Integrated violence and weapon detection using deep learning","series-title":"2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT); 2024 Aug 2\u20134; Delhi, India","author":"Yadav","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"37096","DOI":"10.1109\/ACCESS.2023.3267409","article-title":"Violence detection enhancement by involving convolutional block attention modules into various deep learning architectures: comprehensive case study for UBI-fights dataset","volume":"11","author":"Abbass","year":"2023","journal-title":"IEEE Access"},{"key":"ref20","series-title":"2023 4th International Conference for Emerging Technology (INCET); 2023 May 26\u201328; Belgaum, India","first-page":"1","article-title":"Indoor violence detection using lightweight transformer model","author":"Kumar"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"118791","DOI":"10.1016\/j.eswa.2022.118791","article-title":"Video violence recognition and localization using a semi-supervised hard attention model","volume":"212","author":"Mohammadi","year":"2023","journal-title":"Expert Syst Appl"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"2216","DOI":"10.3390\/s22062216","article-title":"Efficient violence detection in surveillance","volume":"22","author":"Vijeikis","year":"2022","journal-title":"Sensors"},{"key":"ref23","series-title":"2024 9th International Conference on Smart and Sustainable Technologies (SpliTech); 2024 Jun 25\u201328; Bol and Split, Croatia","first-page":"1","article-title":"Secrets in motion: privacy-preserving video classification with built-in access control","author":"Frimpong"},{"key":"ref24","series-title":"IEEE INFOCOM 2024-IEEE Conference on Computer Communications; 2024 May 20\u201323; Vancouver, BC, Canada","first-page":"1","article-title":"X-stream: a flexible, adaptive video transformer for privacy-preserving video stream analytics","author":"Feng"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"103749","DOI":"10.1016\/j.cviu.2023.103749","article-title":"Real-time distributed video analytics for privacy-aware person search","volume":"234","author":"Gaikwad","year":"2023","journal-title":"Comput Vis Image Underst"},{"key":"ref26","series-title":"International Conference on Medical Image Computing and Computer-Assisted Intervention","first-page":"210","article-title":"Privacy-preserving early detection of epileptic seizures in videos","author":"Mehta","year":"2023"},{"key":"ref27","unstructured":"Singh S, Dewangan S, Krishna GS, Tyagi V, Reddy S, Medi PR. Video vision transformers for violence detection. arXiv:2209.03561. 2022."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1029","DOI":"10.1007\/s11390-024-3702-7","article-title":"Balancing accuracy and training time in federated learning for violence detection in surveillance videos: a study of neural network architectures","volume":"39","author":"Pajon","year":"2024","journal-title":"J Comput Sci Technol"},{"key":"ref29","series-title":"2022 International Joint Conference on Neural Networks (IJCNN); 2022 Jul 18\u201323; Padua, Italy","first-page":"1","article-title":"Federated learning for physical violence detection in videos","author":"Victor"},{"key":"ref30","first-page":"1273","volume":"54","author":"McMahan","year":"2017","journal-title":"Proceedings of the 20th international conference on artificial intelligence and statistics"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"110424","DOI":"10.1016\/j.patcog.2024.110424","article-title":"Federated learning for medical image analysis: a survey","volume":"151","author":"Guan","year":"2024","journal-title":"Pattern Recognit"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1007\/978-981-99-8937-9_64","author":"Mistry","year":"2024","journal-title":"Proceedings of the 2nd International Conference on\n\nBig Data, IoT and Machine Learning"},{"key":"ref33","series-title":"Proceedings of Machine Learning and Systems; 2020 Mar 2\u20134; Austin, TX, USA","first-page":"429","article-title":"Federated optimization in heterogeneous networks","author":"Li"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"106988","DOI":"10.1016\/j.bspc.2024.106988","article-title":"X-Brain: explainable recognition of brain tumors using robust deep attention CNN","volume":"100","author":"Tonmoy","year":"2025","journal-title":"Biomed Signal Process Control"},{"key":"ref35","unstructured":"Hendrycks D, Gimpel K. Gaussian error linear units (GELUs). arXiv:1606.08415. 2023."},{"key":"ref36","article-title":"Separable self-attention for mobile vision transformers","author":"Mehta","year":"2023","journal-title":"Trans Mach Learn Res"},{"key":"ref37","first-page":"332","author":"Bermejo Nievas","year":"2011","journal-title":"Computer analysis of images and patterns"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"110448","DOI":"10.1016\/j.dib.2024.110448","article-title":"Weapon violence dataset 2.0: a synthetic dataset for violence detection","volume":"54","author":"Nadeem","year":"2024","journal-title":"Data Brief"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"110030","DOI":"10.1016\/j.dib.2024.110030","article-title":"Firearm-related action recognition and object detection dataset for video surveillance systems","volume":"52","author":"Ruiz-Santaquiteria","year":"2024","journal-title":"Data Brief"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"125","DOI":"10.3390\/info11020125","article-title":"Albumentations: fast and flexible image augmentations","volume":"11","author":"Buslaev","year":"2020","journal-title":"Information"},{"key":"ref41","series-title":"Proceedings of the 2021 IEEE\/CVF International Conference on Computer Vision (ICCV); 2021 Oct 10\u201317; Montreal, QC, Canada","first-page":"6836","article-title":"ViViT: a video vision transformer","author":"Arnab"},{"key":"ref42","first-page":"813","volume":"139","author":"Bertasius","year":"2021","journal-title":"Proceedings of the 38th international conference on machine learning"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-3\/TSP_CMC_67589\/TSP_CMC_67589.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:28:12Z","timestamp":1763346492000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n3\/64150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":42,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.067589","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-05-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-10","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-23","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}