{"id":"https://openalex.org/W4400810945","doi":"https://doi.org/10.1109/isie54533.2024.10595782","title":"XAI-Driven Lightweight Multiscale ConvLSTM Architecture for Video Violence Detection","display_name":"XAI-Driven Lightweight Multiscale ConvLSTM Architecture for Video Violence Detection","publication_year":2024,"publication_date":"2024-06-18","ids":{"openalex":"https://openalex.org/W4400810945","doi":"https://doi.org/10.1109/isie54533.2024.10595782"},"language":"en","primary_location":{"id":"doi:10.1109/isie54533.2024.10595782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isie54533.2024.10595782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 33rd International Symposium on Industrial Electronics (ISIE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092780333","display_name":"Md. Al-Mamun Provath","orcid":"https://orcid.org/0000-0002-1203-3331"},"institutions":[{"id":"https://openalex.org/I102782458","display_name":"Chittagong University of Engineering & Technology","ror":"https://ror.org/052qsay17","country_code":"BD","type":"education","lineage":["https://openalex.org/I102782458"]}],"countries":["BD"],"is_corresponding":true,"raw_author_name":"Md. Al-Mamun Provath","raw_affiliation_strings":["Chittagong University of Engineering &#x0026; Technology (CUET),Department of CSE,Chattogram,Bangladesh,4349"],"affiliations":[{"raw_affiliation_string":"Chittagong University of Engineering &#x0026; Technology (CUET),Department of CSE,Chattogram,Bangladesh,4349","institution_ids":["https://openalex.org/I102782458"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086809571","display_name":"Kaushik Deb","orcid":"https://orcid.org/0000-0002-7345-0999"},"institutions":[{"id":"https://openalex.org/I102782458","display_name":"Chittagong University of Engineering & Technology","ror":"https://ror.org/052qsay17","country_code":"BD","type":"education","lineage":["https://openalex.org/I102782458"]}],"countries":["BD"],"is_corresponding":false,"raw_author_name":"Kaushik Deb","raw_affiliation_strings":["Chittagong University of Engineering &#x0026; Technology (CUET),Department of CSE,Chattogram,Bangladesh,4349"],"affiliations":[{"raw_affiliation_string":"Chittagong University of Engineering &#x0026; Technology (CUET),Department of CSE,Chattogram,Bangladesh,4349","institution_ids":["https://openalex.org/I102782458"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044448641","display_name":"Kang-Hyun Jo","orcid":"https://orcid.org/0000-0002-4937-7082"},"institutions":[{"id":"https://openalex.org/I40542001","display_name":"University of Ulsan","ror":"https://ror.org/02c2f8975","country_code":"KR","type":"education","lineage":["https://openalex.org/I40542001"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kang Hyun Jo","raw_affiliation_strings":["University of Ulsan,Department of EECE,Ulsan,South Korea,44610"],"affiliations":[{"raw_affiliation_string":"University of Ulsan,Department of EECE,Ulsan,South Korea,44610","institution_ids":["https://openalex.org/I40542001"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5092780333"],"corresponding_institution_ids":["https://openalex.org/I102782458"],"apc_list":null,"apc_paid":null,"fwci":0.7471,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68089094,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6851235628128052},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.608641505241394},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4645419418811798},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.42622923851013184},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.10695481300354004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6851235628128052},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.608641505241394},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4645419418811798},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.42622923851013184},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.10695481300354004},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isie54533.2024.10595782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isie54533.2024.10595782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 33rd International Symposium on Industrial Electronics (ISIE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W195979635","https://openalex.org/W1485009520","https://openalex.org/W1952703253","https://openalex.org/W2080240554","https://openalex.org/W2765793020","https://openalex.org/W2962834855","https://openalex.org/W2975495759","https://openalex.org/W3015661699","https://openalex.org/W3160587007","https://openalex.org/W3164831349","https://openalex.org/W3182051941","https://openalex.org/W4220663058","https://openalex.org/W4320712956","https://openalex.org/W4378470204","https://openalex.org/W4385414349","https://openalex.org/W6628877408","https://openalex.org/W6775837273"],"related_works":["https://openalex.org/W2058170566","https://openalex.org/W2755342338","https://openalex.org/W2772917594","https://openalex.org/W2775347418","https://openalex.org/W2166024367","https://openalex.org/W3116076068","https://openalex.org/W2229312674","https://openalex.org/W2951359407","https://openalex.org/W2079911747","https://openalex.org/W1969923398"],"abstract_inverted_index":{"In":[0],"the":[1,7,26,73,121,134,141,152],"contemporary":[2],"landscape":[3],"of":[4,9,28,50,56,83,90,123],"pervasive":[5],"surveillance,":[6],"significance":[8],"video-modal-based":[10,163],"violence":[11,40,69,126,164],"detection":[12,41],"in":[13,39,133,159,162],"crime":[14],"prevention":[15],"and":[16,36,93,101,157],"public":[17],"safety":[18],"is":[19],"paramount.":[20],"This":[21,59],"research":[22,44],"endeavors":[23],"to":[24,103,110,144],"rectify":[25],"limitations":[27],"previous":[29],"studies":[30],"that":[31],"grappled":[32],"with":[33,85],"balancing":[34],"accuracy":[35,82],"computational":[37],"efficiency":[38],"models.":[42,112],"Prior":[43],"predominantly":[45],"focused":[46],"on":[47,147],"human-centric":[48],"forms":[49],"violence,":[51],"neglecting":[52],"a":[53,62,86],"comprehensive":[54],"exploration":[55],"diverse":[57],"manifestations.":[58],"study":[60],"introduces":[61],"novel":[63],"deep":[64],"neural":[65],"network":[66],"architecture":[67,79],"for":[68,125],"video":[70,87],"classification,":[71],"utilizing":[72],"custom":[74],"Violent-500":[75,114],"dataset.":[76],"The":[77,96,113],"proposed":[78,153],"achieves":[80],"an":[81],"92.40%,":[84],"processing":[88],"time":[89],"5":[91],"milliseconds":[92],"0.57":[94],"GFLOPs.":[95],"model":[97],"incorporates":[98],"multiscale":[99],"ConvLSTM":[100],"EvoNorm-S0":[102],"optimize":[104],"performance":[105],"while":[106],"reducing":[107],"parameters":[108],"compared":[109],"existing":[111],"dataset,":[115],"comprising":[116],"500":[117],"labeled":[118],"videos,":[119],"enriches":[120],"diversity":[122],"data":[124],"detection.":[127,165],"Furthermore,":[128],"Grad-CAM":[129],"visualization":[130],"enhances":[131],"interpretability":[132,158],"model\u2019s":[135],"decision-making":[136],"process.":[137],"Evaluation":[138],"extends":[139],"beyond":[140],"Violent500":[142],"dataset":[143],"include":[145],"assessments":[146],"two":[148],"additional":[149],"datasets,":[150],"affirming":[151],"architecture\u2019s":[154],"efficacy,":[155],"efficiency,":[156],"addressing":[160],"challenges":[161]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
