{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T23:04:41Z","timestamp":1744326281137,"version":"3.37.3"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"Basic Science Research Program through the National Research Foundation","doi-asserted-by":"publisher","award":["2021R1F1A1063634"],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science and Information & Communications Technology (MSIT), Republic of Korea"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3293537","type":"journal-article","created":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T19:29:04Z","timestamp":1689017344000},"page":"75884-75898","source":"Crossref","is-referenced-by-count":13,"title":["Context Aware Crowd Tracking and Anomaly Detection via Deep Learning and Social Force Model"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9812-3743","authenticated-orcid":false,"given":"Faisal","family":"Abdullah","sequence":"first","affiliation":[{"name":"Department of Computer Science, Air University, Islamabad, Pakistan"}]},{"given":"Maha","family":"Abdelhaq","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2350-5661","authenticated-orcid":false,"given":"Raed","family":"Alsaqour","sequence":"additional","affiliation":[{"name":"Department of Information Technology, College of Computing and Informatics, Saudi Electronic University, Riyadh, Saudi Arabia"}]},{"given":"Mohammed Hamad","family":"Alatiyyah","sequence":"additional","affiliation":[{"name":"Department of Computer and Information, Prince Sultan University, Riyadh, Saudi Arabia"}]},{"given":"Khaled","family":"Alnowaiser","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj, Saudi Arabia"}]},{"given":"Saud S.","family":"Alotaibi","sequence":"additional","affiliation":[{"name":"Information Systems Department, Umm Al-Qura University, Makkah, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8027-0876","authenticated-orcid":false,"given":"Jeongmin","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Tech University of Korea, Siheung-si, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3416921.3416940"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-020-00650-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICACS55311.2023.10089663"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.02.003"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ComTech52583.2021.9616681"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2019.2905081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-019-01647-0"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/s42835-019-00278-8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.3390\/s22176519"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2021.06.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-021-01586-5"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST47879.2020.9044576"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST51254.2021.9393268"},{"key":"ref54","article-title":"A survey of semantic segmentation","author":"thoma","year":"2016","journal-title":"arXiv 1602 06541"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3122463"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3417989"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3434183"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667145"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08463-7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1201\/9780429441134"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3059519"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2018.08.004"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.019"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5244-2"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2900907"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2019.8833188"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08840-7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2938527"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03439-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3058986"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08527-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89131-2_15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST.2019.8667183"},{"key":"ref3","first-page":"2322","article-title":"Crowd behavior monitoring and analysis in surveillance applications: A survey","volume":"12","author":"kumar","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0739-4_75"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21608\/ijicis.2021.84588.1112"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAI54018.2021.9651452"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2019.2956051"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5220\/0006618402790286"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEM.2019.8853756"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s22166080"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.315"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC53490.2021.9692946"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2018.2866838"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982906"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10687-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC53490.2021.9692924"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09774-w"},{"key":"ref30","first-page":"6340","article-title":"Multiple human tracking using retinanet features, Siamese neural network, and Hungarian algorithm","volume":"10","author":"chahyati","year":"2020","journal-title":"International Journal of Mechanical Engineering & Technology (IJMET)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8851750"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3044219"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2846411"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IBCAST51254.2021.9393171"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2017.8019325"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"19457","DOI":"10.1109\/ACCESS.2021.3054040","article-title":"Anomaly detection with particle filtering for online video surveillance","volume":"9","author":"tariq","year":"2021","journal-title":"IEEE Access"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-022-07758-5"},{"key":"ref39","article-title":"Anomaly detection in crowds by fusion of novel feature descriptors","volume":"11","author":"alzahrani","year":"2020","journal-title":"Int Trans J Eng Manag Appl Sci Technol"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1105"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/PARC49193.2020.236572"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01302"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.338"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70738"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12643-2_1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01223"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00561"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00051"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970497"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2016.04.011"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/sym12111928"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISAECT53699.2021.9668517"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.media.2015.06.003"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/su122410324"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.002"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/e22080817"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.12785\/ijcds\/110181"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.01.016"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2834916"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00632"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GTSD50082.2020.9303117"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2020.3047126"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.irbm.2019.04.005"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2018.00026"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10177157.pdf?arnumber=10177157","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T18:02:11Z","timestamp":1693245731000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10177157\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":82,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3293537","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}