{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T11:52:48Z","timestamp":1720180368764},"reference-count":77,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004410","name":"Scientific and Technological Research Council of Turkey","doi-asserted-by":"publisher","award":["122E610"],"id":[{"id":"10.13039\/501100004410","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1016\/j.asoc.2024.111730","type":"journal-article","created":{"date-parts":[[2024,5,9]],"date-time":"2024-05-09T15:36:16Z","timestamp":1715268976000},"page":"111730","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Image-based security techniques for water critical infrastructure surveillance"],"prefix":"10.1016","volume":"161","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5523-2605","authenticated-orcid":false,"given":"Seda","family":"Balta Ka\u00e7","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9488-908X","authenticated-orcid":false,"given":"S\u00fcleyman","family":"Eken","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9104-1868","authenticated-orcid":false,"given":"Deniz","family":"Dural Balta","sequence":"additional","affiliation":[]},{"given":"Musa","family":"Balta","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8210-5070","authenticated-orcid":false,"given":"Murat","family":"\u0130skefiyeli","sequence":"additional","affiliation":[]},{"given":"\u0130brahim","family":"\u00d6z\u00e7elik","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2024.111730_b1","series-title":"2010 International Conference on Measuring Technology and Mechatronics Automation","first-page":"342","article-title":"A simulation environment for SCADA security analysis and assessment","volume":"Vol. 1","author":"Wang","year":"2010"},{"key":"10.1016\/j.asoc.2024.111730_b2","series-title":"2009 Symposium on Bio-Inspired Learning and Intelligent Systems for Security","first-page":"97","article-title":"Research on critical infrastructures and critical information infrastructures","author":"Yusufovna","year":"2009"},{"key":"10.1016\/j.asoc.2024.111730_b3","series-title":"Emerging Theory, Methods, and Applications","first-page":"102","article-title":"Analyzing the vulnerability of critical infrastructure to attack and planning defenses","author":"Brown","year":"2005"},{"issue":"5","key":"10.1016\/j.asoc.2024.111730_b4","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1177\/0967010610382687","article-title":"Security that matters: Critical infrastructure and objects of protection","volume":"41","author":"Aradau","year":"2010","journal-title":"Secur. Dialogue"},{"key":"10.1016\/j.asoc.2024.111730_b5","series-title":"2017 IEEE International Conference on Identity, Security and Behavior Analysis","first-page":"1","article-title":"A discriminative spatio-temporal mapping of face for liveness detection","author":"Lakshminarayana","year":"2017"},{"issue":"4","key":"10.1016\/j.asoc.2024.111730_b6","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1109\/TPAMI.2018.2818162","article-title":"Automated latent fingerprint recognition","volume":"41","author":"Cao","year":"2018","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"8","key":"10.1016\/j.asoc.2024.111730_b7","doi-asserted-by":"crossref","first-page":"2601","DOI":"10.3390\/s18082601","article-title":"Deep learning-based enhanced presentation attack detection for iris recognition by combining features from local and global regions based on NIR camera sensor","volume":"18","author":"Nguyen","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2024.111730_b8","doi-asserted-by":"crossref","first-page":"15922","DOI":"10.1109\/ACCESS.2019.2894393","article-title":"Design of low-cost personal identification system that uses combined palm vein and palmprint biometric features","volume":"7","author":"Chen","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.asoc.2024.111730_b9","series-title":"2019 13th International Conference on Open Source Systems and Technologies","first-page":"1","article-title":"Implementation and analysis of fusion in multibiometrics","author":"Khan","year":"2019"},{"issue":"3","key":"10.1016\/j.asoc.2024.111730_b10","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1080\/19479832.2018.1423644","article-title":"Human age-estimation system based on double-level feature fusion of face and gait images","volume":"9","author":"Punyani","year":"2018","journal-title":"Int. J. Image Data Fusion"},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b11","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/j.aej.2018.12.008","article-title":"Entropy based local binary pattern (ELBP) feature extraction technique of multimodal biometrics as defence mechanism for cloud storage","volume":"58","author":"Vidya","year":"2019","journal-title":"Alex. Eng. J."},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b12","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1049\/iet-bmt.2018.5030","article-title":"Analysis of results of large-scale multimodal biometric identity verification experiment","volume":"8","author":"Czy\u017cewski","year":"2019","journal-title":"IET Biometr."},{"key":"10.1016\/j.asoc.2024.111730_b13","doi-asserted-by":"crossref","first-page":"924","DOI":"10.1016\/j.procs.2020.04.100","article-title":"Visual speech recognition using fusion of motion and geometric features","volume":"171","author":"Radha","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.asoc.2024.111730_b14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00138-020-01146-6","article-title":"Optimal feature level fusion for secured human authentication in multimodal biometric system","volume":"32","author":"Purohit","year":"2021","journal-title":"Mach. Vis. Appl."},{"issue":"3","key":"10.1016\/j.asoc.2024.111730_b15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/IJAEC.2020070102","article-title":"Score-level multimodal biometric authentication of humans using retina, fingerprint, and fingervein","volume":"11","author":"Srivastava","year":"2020","journal-title":"Int. J. Appl. Evol. Comput. (IJAEC)"},{"key":"10.1016\/j.asoc.2024.111730_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.imavis.2020.104024","article-title":"Fusion of iris and sclera using phase intensive rubbersheet mutual exclusion for periocular recognition","volume":"103","author":"Jain","year":"2020","journal-title":"Image Vis. Comput."},{"key":"10.1016\/j.asoc.2024.111730_b17","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.inffus.2018.07.005","article-title":"Confidence factor weighted Gaussian function induced parallel fuzzy rank-level fusion for inference and its application to face recognition","volume":"47","author":"Sing","year":"2019","journal-title":"Inf. Fusion"},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b18","doi-asserted-by":"crossref","DOI":"10.1111\/exsy.12523","article-title":"Selection of optimized features for fusion of palm print and finger knuckle-based person authentication","volume":"38","author":"Jaswal","year":"2021","journal-title":"Expert Syst."},{"key":"10.1016\/j.asoc.2024.111730_b19","series-title":"2020 IEEE International Conference on Electronics, Computing and Communication Technologies","first-page":"1","article-title":"Decision level fusion schemes for a multimodal biometric system using local and global wavelet features","author":"Devi","year":"2020"},{"key":"10.1016\/j.asoc.2024.111730_b20","doi-asserted-by":"crossref","first-page":"29021","DOI":"10.1007\/s11042-020-08914-6","article-title":"A hybrid fusion model of iris, palm vein and finger vein for multi-biometric recognition system","volume":"79","author":"Zhou","year":"2020","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.asoc.2024.111730_b21","series-title":"2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)","first-page":"1","article-title":"Face recognition with smart security system","author":"Rakhra","year":"2022"},{"key":"10.1016\/j.asoc.2024.111730_b22","series-title":"Investigating and Preventing Crime in the Digital Era: New Safeguards, New Rights","first-page":"67","article-title":"Facial recognition for preventive purposes: The human rights implications of detecting emotions in public spaces","author":"Neroni Rezende","year":"2022"},{"key":"10.1016\/j.asoc.2024.111730_b23","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1016\/j.procs.2020.04.177","article-title":"Design and evaluation of a real-time face recognition system using convolutional neural networks","volume":"171","author":"Pranav","year":"2020","journal-title":"Procedia Comput. Sci."},{"key":"10.1016\/j.asoc.2024.111730_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.116743","article-title":"Gabor filter bank with deep autoencoder based face recognition system","volume":"197","author":"Hammouche","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"10.1016\/j.asoc.2024.111730_b25","article-title":"LBPH-based enhanced real-time face recognition","volume":"10","author":"Deeba","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b26","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/0031-3203(95)00067-4","article-title":"A comparative study of texture measures with classification based on featured distributions","volume":"29","author":"Ojala","year":"1996","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.asoc.2024.111730_b27","doi-asserted-by":"crossref","DOI":"10.1155\/2022\/3276704","article-title":"A real-time framework for human face detection and recognition in cctv images","volume":"2022","author":"Ullah","year":"2022","journal-title":"Math. Probl. Eng."},{"issue":"3","key":"10.1016\/j.asoc.2024.111730_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.neuri.2021.100035","article-title":"Face mask recognition system using CNN model","volume":"2","author":"Kaur","year":"2022","journal-title":"Neurosci. Inform."},{"key":"10.1016\/j.asoc.2024.111730_b29","series-title":"2020 IEEE International IOT, Electronics and Mechatronics Conference","first-page":"1","article-title":"An automated system to limit COVID-19 using facial mask detection in smart city network","author":"Rahman","year":"2020"},{"issue":"14","key":"10.1016\/j.asoc.2024.111730_b30","doi-asserted-by":"crossref","first-page":"2250","DOI":"10.3390\/electronics11142250","article-title":"Real-time facemask detection for preventing COVID-19 spread using transfer learning based deep neural network","volume":"11","author":"Ai","year":"2022","journal-title":"Electronics"},{"key":"10.1016\/j.asoc.2024.111730_b31","article-title":"Mafa dataset","year":"2023","journal-title":"Kaggle"},{"key":"10.1016\/j.asoc.2024.111730_b32","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1002\/9781119834175.ch6","article-title":"Critical infrastructure security using computer vision technologies","author":"Zhang","year":"2022","journal-title":"Secur. Technol. Soc. Implicat."},{"key":"10.1016\/j.asoc.2024.111730_b33","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1016\/j.patrec.2020.11.004","article-title":"Reconfigurable cyber-physical system for critical infrastructure protection in smart cities via smart video-surveillance","volume":"140","author":"Isern","year":"2020","journal-title":"Pattern Recognit. Lett."},{"key":"10.1016\/j.asoc.2024.111730_b34","series-title":"Access control in critical infrastructure control rooms using continuous authentication and face recognition","author":"Dragerengen","year":"2018"},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b35","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1049\/iet-bmt.2017.0089","article-title":"Face recognition under spoofing attacks: countermeasures and research directions","volume":"7","author":"Li","year":"2018","journal-title":"Iet Biometr."},{"key":"10.1016\/j.asoc.2024.111730_b36","series-title":"A novel deep learning-based method for real-time face spoof detection","author":"Malik","year":"2023"},{"key":"10.1016\/j.asoc.2024.111730_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2022.109147","article-title":"Face anti-spoofing using feature distilling and global attention learning","volume":"135","author":"Huang","year":"2023","journal-title":"Pattern Recognit."},{"issue":"16","key":"10.1016\/j.asoc.2024.111730_b38","doi-asserted-by":"crossref","first-page":"10024","DOI":"10.3390\/su141610024","article-title":"A patch-based CNN built on the VGG-16 architecture for real-time facial liveness detection","volume":"14","author":"Muhtasim","year":"2022","journal-title":"Sustainability"},{"key":"10.1016\/j.asoc.2024.111730_b39","series-title":"2023 3rd International Conference on Innovative Research in Applied Science, Engineering and Technology","first-page":"1","article-title":"A comparative study of anti-spoofing detection based on deep learning","author":"Abdelouahed","year":"2023"},{"key":"10.1016\/j.asoc.2024.111730_b40","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s00530-020-00719-9","article-title":"Face spoofing detection based on chromatic ED-LBP texture feature","volume":"27","author":"Shu","year":"2021","journal-title":"Multimedia Syst."},{"key":"10.1016\/j.asoc.2024.111730_b41","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.jvcir.2017.12.004","article-title":"Motion-based countermeasure against photo and video spoofing attacks in face recognition","volume":"50","author":"Edmunds","year":"2018","journal-title":"J. Vis. Commun. Image Represent."},{"issue":"19","key":"10.1016\/j.asoc.2024.111730_b42","doi-asserted-by":"crossref","first-page":"26873","DOI":"10.1007\/s11042-021-11578-5","article-title":"Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network","volume":"81","author":"Garg","year":"2022","journal-title":"Multimedia Tools Appl."},{"key":"10.1016\/j.asoc.2024.111730_b43","series-title":"2022 6th International Conference on Intelligent Computing and Control Systems","first-page":"1756","article-title":"A real-time approach to facial anti-spoofing using liveness detection on CPU bound devices","author":"Jindal","year":"2022"},{"issue":"14","key":"10.1016\/j.asoc.2024.111730_b44","doi-asserted-by":"crossref","first-page":"5160","DOI":"10.3390\/s22145160","article-title":"Face spoofing, age, gender and facial expression recognition using advance neural network architecture-based biometric system","volume":"22","author":"Kumar","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2024.111730_b45","series-title":"CIBDA 2022; 3rd International Conference on Computer Information and Big Data Applications","first-page":"1","article-title":"Multi-classification for yoga pose based on deep learning","author":"Wang","year":"2022"},{"key":"10.1016\/j.asoc.2024.111730_b46","article-title":"AI human pose estimation: Yoga pose detection and correction","author":"Gajbhiye","year":"2022","journal-title":"Int. J. Innov. Sci. Res. Technol."},{"key":"10.1016\/j.asoc.2024.111730_b47","doi-asserted-by":"crossref","unstructured":"T. Kitamura, H. Teshima, D. Thomas, H. Kawasaki, Refining OpenPose with a new sports dataset for robust 2D pose estimation, in: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision, 2022, pp. 672\u2013681.","DOI":"10.1109\/WACVW54805.2022.00074"},{"issue":"14","key":"10.1016\/j.asoc.2024.111730_b48","doi-asserted-by":"crossref","first-page":"13776","DOI":"10.1109\/JSEN.2022.3183502","article-title":"BabyPose: real-time decoding of baby\u2019s non-verbal communication using 2D video-based pose estimation","volume":"22","author":"Yurtsever","year":"2022","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.asoc.2024.111730_b49","doi-asserted-by":"crossref","unstructured":"A. Marusic, S.M. Nguyen, A. Tapus, Evaluating Kinect, OpenPose and BlazePose for Human Body Movement Analysis on a Low Back Pain Physical Rehabilitation Dataset, in: Companion of the 2023 ACM\/IEEE International Conference on Human-Robot Interaction, 2023, pp. 587\u2013591.","DOI":"10.1145\/3568294.3580153"},{"issue":"12","key":"10.1016\/j.asoc.2024.111730_b50","doi-asserted-by":"crossref","first-page":"330","DOI":"10.3390\/jimaging8120330","article-title":"Effects of image quality on the accuracy human pose estimation and detection of eye lid opening\/closing using openpose and dlib","volume":"8","author":"Ye","year":"2022","journal-title":"J. Imaging"},{"key":"10.1016\/j.asoc.2024.111730_b51","series-title":"2022 China Automation Congress","first-page":"2937","article-title":"Human pose estimation based on lightweight convolutional neural networks","author":"Li","year":"2022"},{"issue":"12","key":"10.1016\/j.asoc.2024.111730_b52","doi-asserted-by":"crossref","first-page":"380","DOI":"10.3390\/fi14120380","article-title":"Comparative analysis of skeleton-based human pose estimation","volume":"14","author":"Chung","year":"2022","journal-title":"Future Int."},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b53","doi-asserted-by":"crossref","first-page":"119","DOI":"10.18280\/ts.390111","article-title":"Comparative analysis of OpenPose, PoseNet, and MoveNet models for pose estimation in mobile devices","volume":"39","author":"Jo","year":"2022","journal-title":"Traitement du Signal"},{"issue":"2","key":"10.1016\/j.asoc.2024.111730_b54","doi-asserted-by":"crossref","DOI":"10.1061\/(ASCE)IS.1943-555X.0000477","article-title":"Deep learning for critical infrastructure resilience","volume":"25","author":"Dick","year":"2019","journal-title":"J. Infrastruct. Syst."},{"key":"10.1016\/j.asoc.2024.111730_b55","series-title":"International Conference on Computer Vision Systems","first-page":"713","article-title":"Critical infrastructure security against drone attacks using visual analytics","author":"Zhang","year":"2019"},{"key":"10.1016\/j.asoc.2024.111730_b56","series-title":"Infrared Technology and Applications XXXII","first-page":"1006","article-title":"Critical infrastructure security confidence through automated thermal imaging","volume":"Vol. 6206","author":"Francisco","year":"2006"},{"key":"10.1016\/j.asoc.2024.111730_b57","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1016\/j.psep.2016.05.001","article-title":"A novel probabilistically timed dynamic model for physical security attack scenarios on critical infrastructures","volume":"102","author":"Khalil","year":"2016","journal-title":"Process Saf. Environ. Protect."},{"key":"10.1016\/j.asoc.2024.111730_b58","doi-asserted-by":"crossref","unstructured":"F. Schroff, D. Kalenichenko, J. Philbin, Facenet: A unified embedding for face recognition and clustering, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 815\u2013823.","DOI":"10.1109\/CVPR.2015.7298682"},{"key":"10.1016\/j.asoc.2024.111730_b59","series-title":"2019 International Conference on Biometrics","first-page":"1","article-title":"Deep pixel-wise binary supervision for face presentation attack detection","author":"George","year":"2019"},{"key":"10.1016\/j.asoc.2024.111730_b60","doi-asserted-by":"crossref","unstructured":"Y. Feng, F. Wu, X. Shao, Y. Wang, X. Zhou, Joint 3d face reconstruction and dense alignment with position map regression network, in: Proceedings of the European Conference on Computer Vision, ECCV, 2018, pp. 534\u2013551.","DOI":"10.1007\/978-3-030-01264-9_33"},{"key":"10.1016\/j.asoc.2024.111730_b61","series-title":"2018 IEEE International Workshop on Information Forensics and Security","first-page":"1","article-title":"Mesonet: a compact facial video forgery detection network","author":"Afchar","year":"2018"},{"key":"10.1016\/j.asoc.2024.111730_b62","series-title":"2017 10th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","first-page":"1","article-title":"Real-time human gesture grading based on OpenPose","author":"Qiao","year":"2017"},{"issue":"2","key":"10.1016\/j.asoc.2024.111730_b63","doi-asserted-by":"crossref","first-page":"1143","DOI":"10.1007\/s13369-022-06684-x","article-title":"A novel vision-based fall detection scheme using keypoints of human skeleton with long short-term memory network","volume":"48","author":"Inturi","year":"2023","journal-title":"Arab. J. Sci. Eng."},{"issue":"1","key":"10.1016\/j.asoc.2024.111730_b64","doi-asserted-by":"crossref","first-page":"78","DOI":"10.3390\/s23010078","article-title":"Estimating ground reaction forces from two-dimensional pose data: A biomechanics-based comparison of AlphaPose, BlazePose, and OpenPose","volume":"23","author":"Mundt","year":"2022","journal-title":"Sensors"},{"key":"10.1016\/j.asoc.2024.111730_b65","series-title":"European Conference on Computer Vision","first-page":"37","article-title":"Rethinking keypoint representations: Modeling keypoints and poses as objects for multi-person human pose estimation","author":"McNally","year":"2022"},{"key":"10.1016\/j.asoc.2024.111730_b66","series-title":"YOLO by ultralytics","author":"Jocher","year":"2023"},{"issue":"4","key":"10.1016\/j.asoc.2024.111730_b67","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.3390\/make5040083","article-title":"A comprehensive review of yolo architectures in computer vision: From yolov1 to yolov8 and yolo-nas","volume":"5","author":"Terven","year":"2023","journal-title":"Mach. Learn. Knowl. Extract."},{"key":"10.1016\/j.asoc.2024.111730_b68","article-title":"NTU RGB-D dataset","year":"2023","journal-title":"Rapid-rich Object Search Lab"},{"key":"10.1016\/j.asoc.2024.111730_b69","series-title":"UCF101 - action recognition data set","year":"2012"},{"key":"10.1016\/j.asoc.2024.111730_b70","series-title":"ChaLearn","year":"2016"},{"key":"10.1016\/j.asoc.2024.111730_b71","series-title":"HMDB: a large human motion database","year":"2011"},{"key":"10.1016\/j.asoc.2024.111730_b72","unstructured":"Kinetics 400, URL https:\/\/paperswithcode.com\/dataset\/kinetics-400-1."},{"key":"10.1016\/j.asoc.2024.111730_b73","series-title":"The breakfast actions dataset","year":"2014"},{"issue":"2","key":"10.1016\/j.asoc.2024.111730_b74","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1109\/TBIOM.2020.2973001","article-title":"Casia-surf: A large-scale multi-modal benchmark for face anti-spoofing","volume":"2","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Biometr. Behav. Identity Sci."},{"key":"10.1016\/j.asoc.2024.111730_b75","series-title":"2012 5th IAPR International Conference on Biometrics","first-page":"26","article-title":"A face antispoofing database with diverse attacks","author":"Zhang","year":"2012"},{"key":"10.1016\/j.asoc.2024.111730_b76","series-title":"Cyber-Physical Threat Intelligence for Critical Infrastructures Security","first-page":"327","article-title":"High level reference architecture an approach to critical infrastructure protection and resilience","author":"Crimaldi","year":"2021"},{"key":"10.1016\/j.asoc.2024.111730_b77","series-title":"7th International Conference on Automatic Face and Gesture Recognition (FGR06)","first-page":"341","article-title":"Morph: A longitudinal image database of normal adult age-progression","author":"Ricanek","year":"2006"}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494624005040?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494624005040?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T06:59:02Z","timestamp":1718261942000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494624005040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":77,"alternative-id":["S1568494624005040"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2024.111730","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Image-based security techniques for water critical infrastructure surveillance","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2024.111730","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"111730"}}