{"id":"https://openalex.org/W4415539447","doi":"https://doi.org/10.1145/3746027.3755104","title":"SPAN: Continuous Modeling of Suspicion Progression for Temporal Intention Localization","display_name":"SPAN: Continuous Modeling of Suspicion Progression for Temporal Intention Localization","publication_year":2025,"publication_date":"2025-10-25","ids":{"openalex":"https://openalex.org/W4415539447","doi":"https://doi.org/10.1145/3746027.3755104"},"language":null,"primary_location":{"id":"doi:10.1145/3746027.3755104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2510.20189","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041358508","display_name":"Xinyi Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xinyi Hu","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051301508","display_name":"Yuran Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuran Wang","raw_affiliation_strings":["School of Mathematical Sciences, Peking University, Beijing, China, National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China, and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematical Sciences, Peking University, Beijing, China, National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China, and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007476961","display_name":"Ruixu Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I91125648","display_name":"Wuhan Institute of Technology","ror":"https://ror.org/04jcykh16","country_code":"CN","type":"education","lineage":["https://openalex.org/I91125648"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruixu Zhang","raw_affiliation_strings":["Computer Science and Technology, Tsinghua University, Shenzhen, Guangdong, China, National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China, and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Tsinghua University, Shenzhen, Guangdong, China, National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China, and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China","institution_ids":["https://openalex.org/I91125648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043423960","display_name":"Y.P. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Li","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101564555","display_name":"Wenxuan Liu","orcid":"https://orcid.org/0000-0002-4417-6628"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenxuan Liu","raw_affiliation_strings":["School of Computer Science, Peking University, Beijing, China and State Key Laboratory for Multimedia Information Processing, Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Peking University, Beijing, China and State Key Laboratory for Multimedia Information Processing, Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100401164","display_name":"Zheng Wang","orcid":"https://orcid.org/0000-0003-3846-9157"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Wang","raw_affiliation_strings":["National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Multimedia Software, Institute of Artificial Intelligence, School of Computer Science, Wuhan University, Wuhan, China and Hubei Key Laboratory of Multimedia and Network Communication Engineering, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5041358508"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.3169,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91441613,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"315","last_page":"323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12205","display_name":"Time Series Analysis and Forecasting","score":0.9883000254631042,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.536300003528595},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.4187999963760376},{"id":"https://openalex.org/keywords/limiting","display_name":"Limiting","score":0.40470001101493835},{"id":"https://openalex.org/keywords/regression","display_name":"Regression","score":0.3637000024318695},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.36059999465942383},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3458999991416931},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.31869998574256897},{"id":"https://openalex.org/keywords/decision-process","display_name":"Decision process","score":0.305400013923645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6071000099182129},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5641999840736389},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.536300003528595},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4377000033855438},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.4187999963760376},{"id":"https://openalex.org/C188198153","wikidata":"https://www.wikidata.org/wiki/Q1613840","display_name":"Limiting","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C83546350","wikidata":"https://www.wikidata.org/wiki/Q1139051","display_name":"Regression","level":2,"score":0.3637000024318695},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.36059999465942383},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3458999991416931},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3431999981403351},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.31869998574256897},{"id":"https://openalex.org/C2984634286","wikidata":"https://www.wikidata.org/wiki/Q1331926","display_name":"Decision process","level":2,"score":0.305400013923645},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.2944999933242798},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C2778753569","wikidata":"https://www.wikidata.org/wiki/Q1960395","display_name":"Span (engineering)","level":2,"score":0.27649998664855957},{"id":"https://openalex.org/C2779466056","wikidata":"https://www.wikidata.org/wiki/Q107630651","display_name":"Time point","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C88871306","wikidata":"https://www.wikidata.org/wiki/Q7208287","display_name":"Point process","level":2,"score":0.26759999990463257},{"id":"https://openalex.org/C2776902269","wikidata":"https://www.wikidata.org/wiki/Q5165493","display_name":"Continuous monitoring","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.25589999556541443}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3746027.3755104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3746027.3755104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd ACM International Conference on Multimedia","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2510.20189","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.20189","pdf_url":"https://arxiv.org/pdf/2510.20189","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2510.20189","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2510.20189","pdf_url":"https://arxiv.org/pdf/2510.20189","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2069849731","https://openalex.org/W2122646361","https://openalex.org/W2471143248","https://openalex.org/W2597958930","https://openalex.org/W2805042136","https://openalex.org/W2904417297","https://openalex.org/W2914034186","https://openalex.org/W2949377321","https://openalex.org/W2963247196","https://openalex.org/W2997706915","https://openalex.org/W3008700642","https://openalex.org/W3163217719","https://openalex.org/W3173459793","https://openalex.org/W4312508181","https://openalex.org/W4386057769","https://openalex.org/W4386076085","https://openalex.org/W4388187926","https://openalex.org/W4391454525"],"related_works":[],"abstract_inverted_index":{"Temporal":[0,102],"Intention":[1],"Localization":[2],"(TIL)":[3],"is":[4],"crucial":[5],"for":[6,123],"video":[7],"surveillance,":[8],"focusing":[9],"on":[10,108,177],"identifying":[11],"varying":[12],"levels":[13],"of":[14,32,69,80,142,164],"suspicious":[15,33,143,156],"intention":[16,46,160],"to":[17,27,53,98,132,152,216],"enhance":[18],"security":[19,241],"monitoring.":[20],"However,":[21],"existing":[22,186],"discrete":[23,51,217],"classification":[24,52,218],"methods":[25],"fail":[26],"capture":[28,64],"the":[29,65,77,99,178],"continuous":[30,54,119,221],"progression":[31,68,79],"intentions,":[34],"limiting":[35],"early":[36],"intervention":[37],"and":[38,56,67,89,158,192,228,237],"explainability.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43,82,111,146],"reconceptualize":[44],"hidden":[45,70],"modeling":[47,223],"by":[48,190,196],"shifting":[49],"from":[50],"regression":[55],"propose":[57,128],"Suspicion":[58,129],"Progression":[59],"Analysis":[60],"Network":[61],"(SPAN),":[62],"which":[63],"fluctuations":[66],"intentions":[71],"over":[72],"time.":[73],"Specifically,":[74],"when":[75],"analyzing":[76],"temporal":[78,124],"suspicion,":[81],"discover":[83],"that":[84,117,182],"suspicion":[85,114,134,222],"exhibits":[86],"long-term":[87],"dependency":[88],"cumulative":[90],"effects":[91,141],"across":[92],"extended":[93],"sequences,":[94],"characteristics":[95],"significantly":[96,184],"similar":[97],"settings":[100],"in":[101,205,211,240],"Point":[103],"Process":[104],"(TPP)":[105],"theory.":[106],"Based":[107],"these":[109],"insights,":[110],"formalize":[112],"a":[113,148,201],"score":[115],"formula":[116],"models":[118],"changes":[120],"while":[121],"accounting":[122],"characteristics.":[125],"We":[126],"also":[127,170],"Coefficient":[130],"Modulation":[131],"adjust":[133],"coefficients":[135],"using":[136],"multimodal":[137],"information,":[138],"reflecting":[139],"different":[140],"actions.":[144],"Notably,":[145,198],"introduce":[147],"Concept-Anchored":[149],"Mapping":[150],"method":[151,224],"quantify":[153],"associations":[154],"between":[155],"actions":[157,167],"predefined":[159],"concepts,":[161],"enabling":[162],"understanding":[163],"not":[165],"just":[166],"occurring":[168],"but":[169],"their":[171],"potential":[172],"underlying":[173],"intentions.":[174],"Extensive":[175],"experiments":[176],"HAI":[179],"dataset":[180],"show":[181],"SPAN":[183,199],"outperforms":[185],"methods,":[187],"reducing":[188],"MSE":[189],"19.8%":[191],"improving":[193],"average":[194],"mAP":[195,203],"1.78%,.":[197],"achieves":[200],"2.74%":[202],"gain":[204],"low-frequency":[206],"cases,":[207],"indicating":[208],"superior":[209],"capability":[210],"capturing":[212],"subtle":[213],"behavioral":[214],"changes.Compared":[215],"systems,":[219],"out":[220],"enables":[225],"earlier":[226],"detection":[227],"more":[229],"proactive":[230],"interventions,":[231],"substantially":[232],"enhancing":[233],"both":[234],"system":[235],"explainability":[236],"practical":[238],"utility":[239],"applications.":[242]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-25T00:00:00"}
