{"id":"https://openalex.org/W1978970411","doi":"https://doi.org/10.1109/icdim.2012.6360128","title":"Anomaly detection in structured/unstructured crowd scenes","display_name":"Anomaly detection in structured/unstructured crowd scenes","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W1978970411","doi":"https://doi.org/10.1109/icdim.2012.6360128","mag":"1978970411"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2012.6360128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2012.6360128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Seventh International Conference on Digital Information Management (ICDIM 2012)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004387914","display_name":"Maryam M. Najafabadi","orcid":"https://orcid.org/0000-0001-6715-0909"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Maryam Mousaarab Najafabadi","raw_affiliation_strings":["Computer Engineering and Information Technology Department, Amirkabir University of Technology\uc2a0, Tehran, Iran","[Computer Engineering and Information Technology Department, AmirKabir University of Technology, Tehran, Iran]"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Technology Department, Amirkabir University of Technology\uc2a0, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]},{"raw_affiliation_string":"[Computer Engineering and Information Technology Department, AmirKabir University of Technology, Tehran, Iran]","institution_ids":["https://openalex.org/I158248296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015923030","display_name":"Mohammad Rahmati","orcid":"https://orcid.org/0000-0002-0591-6910"},"institutions":[{"id":"https://openalex.org/I158248296","display_name":"Amirkabir University of Technology","ror":"https://ror.org/04gzbav43","country_code":"IR","type":"education","lineage":["https://openalex.org/I158248296"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Mohammad Rahmati","raw_affiliation_strings":["Computer Engineering and Information Technology Department, Amirkabir University of Technology\uc2a0, Tehran, Iran","[Computer Engineering and Information Technology Department, AmirKabir University of Technology, Tehran, Iran]"],"affiliations":[{"raw_affiliation_string":"Computer Engineering and Information Technology Department, Amirkabir University of Technology\uc2a0, Tehran, Iran","institution_ids":["https://openalex.org/I158248296"]},{"raw_affiliation_string":"[Computer Engineering and Information Technology Department, AmirKabir University of Technology, Tehran, Iran]","institution_ids":["https://openalex.org/I158248296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004387914"],"corresponding_institution_ids":["https://openalex.org/I158248296"],"apc_list":null,"apc_paid":null,"fwci":0.4281,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70061259,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"28","issue":null,"first_page":"79","last_page":"83"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowds","display_name":"Crowds","score":0.9771829843521118},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.783617377281189},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7059369087219238},{"id":"https://openalex.org/keywords/public-security","display_name":"Public security","score":0.6146108508110046},{"id":"https://openalex.org/keywords/crowd-psychology","display_name":"Crowd psychology","score":0.6144947409629822},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.45292508602142334},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40563520789146423},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.3606979548931122},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32580268383026123}],"concepts":[{"id":"https://openalex.org/C2777852691","wikidata":"https://www.wikidata.org/wiki/Q13430821","display_name":"Crowds","level":2,"score":0.9771829843521118},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.783617377281189},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7059369087219238},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.6146108508110046},{"id":"https://openalex.org/C44042526","wikidata":"https://www.wikidata.org/wiki/Q1355183","display_name":"Crowd psychology","level":2,"score":0.6144947409629822},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.45292508602142334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40563520789146423},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3606979548931122},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32580268383026123},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C3116431","wikidata":"https://www.wikidata.org/wiki/Q31728","display_name":"Public administration","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2012.6360128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2012.6360128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Seventh International Conference on Digital Information Management (ICDIM 2012)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1482815597","https://openalex.org/W2065994824","https://openalex.org/W2082869876","https://openalex.org/W2095640719","https://openalex.org/W2096229530","https://openalex.org/W2102625004","https://openalex.org/W2108404684","https://openalex.org/W2109389234","https://openalex.org/W2115415549","https://openalex.org/W2117734404","https://openalex.org/W2122075562","https://openalex.org/W2123741204","https://openalex.org/W2125105611","https://openalex.org/W2137981002","https://openalex.org/W2138092272","https://openalex.org/W2142412278","https://openalex.org/W2143646243","https://openalex.org/W2149832394","https://openalex.org/W2164261375","https://openalex.org/W2164489414","https://openalex.org/W3150797255","https://openalex.org/W4247760752","https://openalex.org/W6628681060","https://openalex.org/W6674952594","https://openalex.org/W6677106985","https://openalex.org/W6678098462","https://openalex.org/W6680470121","https://openalex.org/W6680847167"],"related_works":["https://openalex.org/W2520489243","https://openalex.org/W4313010244","https://openalex.org/W2189920449","https://openalex.org/W2606245705","https://openalex.org/W3096912411","https://openalex.org/W2552689626","https://openalex.org/W302286416","https://openalex.org/W4309855366","https://openalex.org/W1539594340","https://openalex.org/W1973573786"],"abstract_inverted_index":{"Nowadays":[0],"providing":[1],"people's":[2],"safety":[3],"in":[4,18,36,54,62,81,139,164],"public":[5],"places":[6],"is":[7,21,88,105,116,128],"an":[8,71,122],"important":[9],"issue":[10],"for":[11,74,133,148],"governments":[12],"and":[13,44,77,97,136],"security":[14],"organizations.":[15],"Anomaly":[16],"detection":[17,35],"surveillance":[19,63],"videos":[20,64],"one":[22],"of":[23,50,59,93,180],"the":[24,178],"applications":[25],"which":[26,107],"helps":[27],"to":[28,52,130,141],"manage":[29],"these":[30,110],"issues":[31],"automatically.":[32],"Particularly,":[33],"anomaly":[34],"crowded":[37,66,83,86,119],"scenes":[38,61,176],"such":[39],"as":[40,57],"airports,":[41],"rail":[42],"stations":[43],"etc":[45],"has":[46],"attracted":[47],"a":[48,82,95,98,117],"lot":[49],"researchers":[51],"work":[53],"this":[55],"area,":[56],"most":[58],"real":[60],"are":[65,145],"ones.":[67],"This":[68],"paper":[69],"proposes":[70],"online":[72],"approach":[73,157],"automatically":[75],"detecting":[76],"localizing":[78],"abnormal":[79],"behaviors":[80],"scene.":[84],"The":[85],"scene":[87,120],"modeled":[89],"from":[90],"two":[91],"points":[92],"view,":[94],"local":[96,102,170],"global":[99],"one.":[100,124],"A":[101],"confidence":[103],"factor":[104],"introduced":[106],"balances":[108],"between":[109],"models":[111],"based":[112],"on":[113,169,173],"whether":[114],"it":[115],"structured":[118,135,149],"or":[121,151],"unstructured":[123,137,152],"Hence,":[125],"our":[126,156,181],"algorithm":[127],"able":[129],"be":[131],"used":[132,147],"both":[134],"crowds":[138,150],"contrast":[140],"other":[142],"algorithms":[143],"that":[144,166],"only":[146,168],"crowds.":[153],"In":[154],"addition":[155],"deals":[158],"with":[159],"primary":[160],"high":[161],"false":[162],"alarms":[163],"approaches":[165],"rely":[167],"models.":[171],"Experiments":[172],"real-world":[174],"crowd":[175],"demonstrate":[177],"effectiveness":[179],"approach.":[182]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
