{"id":"https://openalex.org/W4392905244","doi":"https://doi.org/10.1109/acit58888.2023.10453685","title":"Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models","display_name":"Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4392905244","doi":"https://doi.org/10.1109/acit58888.2023.10453685"},"language":"en","primary_location":{"id":"doi:10.1109/acit58888.2023.10453685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58888.2023.10453685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025676537","display_name":"Anum Ilyas","orcid":"https://orcid.org/0000-0002-3783-3140"},"institutions":[{"id":"https://openalex.org/I18718515","display_name":"Jinnah University for Women","ror":"https://ror.org/056zv5g90","country_code":"PK","type":"education","lineage":["https://openalex.org/I18718515"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Anum Ilyas","raw_affiliation_strings":["Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","institution_ids":["https://openalex.org/I18718515"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan","institution_ids":["https://openalex.org/I18718515"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063446242","display_name":"Surayya Obaid","orcid":"https://orcid.org/0000-0002-3169-467X"},"institutions":[{"id":"https://openalex.org/I18718515","display_name":"Jinnah University for Women","ror":"https://ror.org/056zv5g90","country_code":"PK","type":"education","lineage":["https://openalex.org/I18718515"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Surayya Obaid","raw_affiliation_strings":["Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","institution_ids":["https://openalex.org/I18718515"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan","institution_ids":["https://openalex.org/I18718515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010712855","display_name":"Narmeen Zakaria Bawany","orcid":"https://orcid.org/0000-0003-2975-6824"},"institutions":[{"id":"https://openalex.org/I18718515","display_name":"Jinnah University for Women","ror":"https://ror.org/056zv5g90","country_code":"PK","type":"education","lineage":["https://openalex.org/I18718515"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Narmeen Zakaria Bawany","raw_affiliation_strings":["Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan"],"affiliations":[{"raw_affiliation_string":"Center for Computing Research, Jinah University for Women,Department of Computer Science and Software Engineering,Karachi,Pakistan","institution_ids":["https://openalex.org/I18718515"]},{"raw_affiliation_string":"Department of Computer Science and Software Engineering, Center for Computing Research, Jinah University for Women, Karachi, Pakistan","institution_ids":["https://openalex.org/I18718515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5025676537"],"corresponding_institution_ids":["https://openalex.org/I18718515"],"apc_list":null,"apc_paid":null,"fwci":0.5245,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.73444179,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transfer-of-learning","display_name":"Transfer of learning","score":0.806749165058136},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6668356657028198},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.515286922454834},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4839499294757843},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.44901299476623535}],"concepts":[{"id":"https://openalex.org/C150899416","wikidata":"https://www.wikidata.org/wiki/Q1820378","display_name":"Transfer of learning","level":2,"score":0.806749165058136},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6668356657028198},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.515286922454834},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4839499294757843},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.44901299476623535}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit58888.2023.10453685","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit58888.2023.10453685","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 24th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Gender equality","id":"https://metadata.un.org/sdg/5","score":0.75}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1952703253","https://openalex.org/W1967456674","https://openalex.org/W2068362282","https://openalex.org/W2153125595","https://openalex.org/W2256811964","https://openalex.org/W2531409750","https://openalex.org/W2792023526","https://openalex.org/W2855670634","https://openalex.org/W2947177749","https://openalex.org/W2963446712","https://openalex.org/W2970919392","https://openalex.org/W2978020967","https://openalex.org/W2979306089","https://openalex.org/W2985778816","https://openalex.org/W2996503289","https://openalex.org/W3012303644","https://openalex.org/W3106108873","https://openalex.org/W3131747512","https://openalex.org/W3170637310","https://openalex.org/W4287076290","https://openalex.org/W4297775537"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W4321369474","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4206357785","https://openalex.org/W4281381188","https://openalex.org/W3192840557"],"abstract_inverted_index":{"In":[0,151],"recent":[1],"years,":[2],"the":[3,25,96,127,134,141,145,154,180,188,192,196,208],"use":[4],"of":[5,27,98,138,149,184,198,212],"CCTV":[6],"footage":[7],"for":[8,33,54,85,112],"proactive":[9],"crime":[10],"prevention":[11],"has":[12,191],"surged,":[13],"particularly":[14],"in":[15,90,202],"public":[16,203],"places":[17],"like":[18],"airports,":[19],"train":[20],"stations,":[21],"and":[22,74,88,107,159,177,182,200,210],"malls.":[23],"However,":[24],"efficacy":[26],"these":[28],"surveillance":[29],"systems":[30],"becomes":[31],"questionable":[32],"their":[34],"substantial":[35],"reliance":[36],"on":[37,121],"human":[38],"resources":[39],"which":[40,57],"may":[41],"lead":[42],"to":[43,61,153,194],"erroneous":[44],"or":[45],"delayed":[46],"responses.":[47],"This":[48],"research":[49,114],"takes":[50],"a":[51],"comprehensive":[52],"approach":[53,190],"violence":[55,66,86],"detection":[56,87,181],"was":[58],"previously":[59],"limited":[60],"binary":[62],"classification,":[63],"by":[64,219],"categorizing":[65],"into":[67],"four":[68,99],"distinct":[69],"classes:":[70],"abuse,":[71],"arson,":[72],"assault,":[73],"fight.":[75],"It":[76,205],"employs":[77],"transfer":[78],"learning":[79,167],"combined":[80],"with":[81,168],"computer":[82],"vision":[83],"techniques":[84],"classification":[89],"video":[91],"footages.":[92],"The":[93,109,123],"study":[94],"compares":[95],"performance":[97,164],"pre-trained":[100],"neural":[101,170],"networks,":[102],"namely":[103],"DenseNet121,":[104],"VGG16,":[105],"MobileNet,":[106],"Xception.":[108],"dataset":[110],"created":[111],"this":[113],"is":[115],"compiled":[116],"from":[117],"three":[118],"datasets":[119],"available":[120],"Kaggle.":[122],"results":[124],"reveal":[125],"that":[126],"Xception":[128],"model":[129,143],"performed":[130],"comparatively":[131],"better":[132],"achieving":[133],"highest":[135],"AUC":[136,147,155],"score":[137,148],"98.39%,":[139],"while":[140],"VGG16":[142],"attained":[144],"lowest":[146],"96%.":[150],"addition":[152],"score,":[156],"precision,":[157],"recall,":[158],"fl-score":[160],"are":[161],"employed":[162,189],"as":[163],"metrics.":[165],"Transfer":[166],"convolutional":[169],"networks":[171],"(CNN)":[172],"significantly":[173],"reduced":[174],"computational":[175],"requirements":[176],"time.":[178],"Automating":[179],"categorization":[183],"violent":[185],"behavior":[186],"through":[187],"potential":[193],"reduce":[195],"risk":[197],"fatalities":[199],"injuries":[201],"areas.":[204],"also":[206],"improves":[207],"speed":[209],"accuracy":[211],"threat":[213],"detection,":[214],"enabling":[215],"swift":[216],"preventive":[217],"actions":[218],"authorities.":[220]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
