{"id":"https://openalex.org/W4416011309","doi":"https://doi.org/10.1109/tifs.2025.3630347","title":"Low-Latency Video Anonymization for Crowd Anomaly Detection: Privacy Versus Performance","display_name":"Low-Latency Video Anonymization for Crowd Anomaly Detection: Privacy Versus Performance","publication_year":2025,"publication_date":"2025-11-07","ids":{"openalex":"https://openalex.org/W4416011309","doi":"https://doi.org/10.1109/tifs.2025.3630347"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3630347","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3630347","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tifs.2025.3630347","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011279173","display_name":"Mulugeta Weldezgina Asres","orcid":"https://orcid.org/0000-0003-2985-108X"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Mulugeta Weldezgina Asres","raw_affiliation_strings":["Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","University of Agder, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]},{"raw_affiliation_string":"University of Agder, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088563530","display_name":"Lei Jiao","orcid":"https://orcid.org/0000-0002-7115-6489"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Lei Jiao","raw_affiliation_strings":["Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","University of Agder, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]},{"raw_affiliation_string":"University of Agder, Norway","institution_ids":["https://openalex.org/I200650556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030608087","display_name":"Christian W. Omlin","orcid":"https://orcid.org/0000-0003-0299-171X"},"institutions":[{"id":"https://openalex.org/I200650556","display_name":"University of Agder","ror":"https://ror.org/03x297z98","country_code":"NO","type":"education","lineage":["https://openalex.org/I200650556"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Christian Walter Omlin","raw_affiliation_strings":["Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","University of Agder, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Technology (ICT), University of Agder, Grimstad, Norway","institution_ids":["https://openalex.org/I200650556"]},{"raw_affiliation_string":"University of Agder, Norway","institution_ids":["https://openalex.org/I200650556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5011279173"],"corresponding_institution_ids":["https://openalex.org/I200650556"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17504698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1","last_page":"16"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7735000252723694,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.7735000252723694,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.026799999177455902,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7653999924659729},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7293999791145325},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5620999932289124},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5389999747276306},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4799000024795532},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4325999915599823},{"id":"https://openalex.org/keywords/strengths-and-weaknesses","display_name":"Strengths and weaknesses","score":0.4239000082015991}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8919000029563904},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7653999924659729},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7293999791145325},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5389999747276306},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4828999936580658},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4799000024795532},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4325999915599823},{"id":"https://openalex.org/C63882131","wikidata":"https://www.wikidata.org/wiki/Q17122954","display_name":"Strengths and weaknesses","level":2,"score":0.4239000082015991},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3921999931335449},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.385699987411499},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35740000009536743},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.34950000047683716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3319999873638153},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.26750001311302185},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.26190000772476196}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3630347","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3630347","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tifs.2025.3630347","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3630347","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1677182931","https://openalex.org/W1895408303","https://openalex.org/W1983364832","https://openalex.org/W2145023731","https://openalex.org/W2194775991","https://openalex.org/W2204750386","https://openalex.org/W2561529111","https://openalex.org/W2741333573","https://openalex.org/W2884985453","https://openalex.org/W2953354017","https://openalex.org/W2962712356","https://openalex.org/W2963037989","https://openalex.org/W2963091558","https://openalex.org/W2963524571","https://openalex.org/W2963795951","https://openalex.org/W2963876278","https://openalex.org/W2982340830","https://openalex.org/W2985922506","https://openalex.org/W3027552584","https://openalex.org/W3089682612","https://openalex.org/W3092401175","https://openalex.org/W3133702157","https://openalex.org/W3136038792","https://openalex.org/W3136793533","https://openalex.org/W3170630188","https://openalex.org/W3179610792","https://openalex.org/W3207137622","https://openalex.org/W4304099369","https://openalex.org/W4311167039","https://openalex.org/W4312396403","https://openalex.org/W4313008682","https://openalex.org/W4313066449","https://openalex.org/W4319300095","https://openalex.org/W4319300743","https://openalex.org/W4360614118","https://openalex.org/W4382461973","https://openalex.org/W4385496637","https://openalex.org/W4386076206","https://openalex.org/W4386496618","https://openalex.org/W4386597062","https://openalex.org/W4390691711","https://openalex.org/W4390873805","https://openalex.org/W4393149723","https://openalex.org/W4393150168","https://openalex.org/W4394805462","https://openalex.org/W4402265131","https://openalex.org/W4405451022","https://openalex.org/W4407799411","https://openalex.org/W4408358033","https://openalex.org/W4413967215","https://openalex.org/W4414197629","https://openalex.org/W4414447489"],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advancements":[1],"in":[2,28,36,139],"artificial":[3],"intelligence":[4],"hold":[5],"ample":[6],"potential":[7],"for":[8,59,69,85],"monitoring":[9],"applications":[10],"using":[11,107],"surveillance":[12],"cameras.":[13],"However,":[14],"concerns":[15],"about":[16],"privacy":[17,70,95,100,140],"and":[18,72,102,116,122,149],"model":[19],"bias":[20],"have":[21,33,98],"made":[22],"it":[23],"challenging":[24],"to":[25,40,92,112],"utilize":[26],"them":[27,50],"public.":[29],"Although":[30],"de-identification":[31],"approaches":[32],"been":[34],"proposed":[35],"the":[37,114,124,134],"literature,":[38],"aiming":[39],"achieve":[41],"a":[42,81],"certain":[43],"level":[44],"of":[45,49,118,127],"anonymization":[46],"(AN),":[47],"most":[48],"employ":[51],"deep":[52,150],"learning":[53,151],"models":[54],"that":[55,88,133],"are":[56],"computationally":[57],"demanding":[58],"real-time":[60,73],"edge":[61],"deployment.":[62],"This":[63],"study":[64],"revisits":[65],"conventional":[66,148],"AN":[67,84,120,141],"solutions":[68],"protection":[71,101],"video":[74],"anomaly":[75],"detection":[76],"(VAD)":[77],"applications.":[78],"We":[79,97],"propose":[80],"lightweight":[82],"adaptive":[83],"VAD":[86,103,145],"(LA3D)":[87],"employs":[89],"dynamic":[90],"adjustment":[91],"enhance":[93],"full-body":[94],"protection.":[96],"evaluated":[99],"utility":[104],"retention":[105],"efficacy":[106],"several":[108],"publicly":[109],"available":[110],"datasets":[111],"examine":[113],"strengths":[115],"weaknesses":[117],"different":[119],"methods":[121],"highlight":[123],"promising":[125],"leverage":[126],"our":[128],"approach.":[129],"Our":[130],"experiment":[131],"demonstrates":[132],"LA3D":[135],"enables":[136],"substantial":[137],"improvement":[138],"without":[142],"severely":[143],"degrading":[144],"efficacy,":[146],"outperforming":[147],"approaches.":[152],"Code:":[153],"https://github.com/muleina/LA3D.":[154]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-07T00:00:00"}
