{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:34:59Z","timestamp":1742805299795,"version":"3.37.3"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T00:00:00Z","timestamp":1617148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004386","name":"Universiti Malaya","doi-asserted-by":"publisher","award":["GPF018D-2019"],"award-info":[{"award-number":["GPF018D-2019"]}],"id":[{"id":"10.13039\/501100004386","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10838-8","type":"journal-article","created":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T01:02:35Z","timestamp":1617152555000},"page":"24121-24145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A survey on video content rating: taxonomy, challenges and open issues"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8569-0837","authenticated-orcid":false,"given":"Amin","family":"Khaksar Pour","sequence":"first","affiliation":[]},{"given":"Woo","family":"Chaw Seng","sequence":"additional","affiliation":[]},{"given":"Shivakumara","family":"Palaiahnakote","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Tahaei","sequence":"additional","affiliation":[]},{"given":"Nor Badrul","family":"Anuar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,31]]},"reference":[{"issue":"4","key":"10838_CR1","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1097\/00004583-200104000-00007","volume":"40","author":"S Villani","year":"2001","unstructured":"Villani S (2001) Impact of media on children and adolescents: a 10-year review of the research. J Am Acad Child Adolesc Psychiatry 40(4):392\u2013401","journal-title":"J Am Acad Child Adolesc Psychiatry"},{"issue":"1","key":"10838_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1089\/cyber.2010.0477","volume":"15","author":"MB Short","year":"2012","unstructured":"Short MB, Black L, Smith AH, Wetterneck CT, Wells DE (2012) A review of internet pornography use research: methodology and content from the past 10 years. Cyberpsychol Behav Soc Netw 15(1):13\u201323","journal-title":"Cyberpsychol Behav Soc Netw"},{"key":"10838_CR3","unstructured":"Ofcom (2018) Children and parents: Media use and attitudes report 2018."},{"key":"10838_CR4","doi-asserted-by":"crossref","unstructured":"Akram W, Kumar R (2018) A study on positive and negative effects of social media on society. INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING, 5(10)","DOI":"10.26438\/ijcse\/v5i10.351354"},{"key":"10838_CR5","unstructured":"Lenhart A (2015) Teens, Social Media & Technology Overview. APRIL 9, 2015]; Available from: http:\/\/www.pewinternet.org\/2015\/04\/09\/teens-social-media-technology-2015\/"},{"key":"10838_CR6","unstructured":"YouTube (2018) YouTube content rating. [cited 2019; Available from: https:\/\/support.google.com\/youtube\/answer\/146399"},{"issue":"2","key":"10838_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.drugpo.2013.09.004","volume":"25","author":"JF Thrasher","year":"2014","unstructured":"Thrasher JF, Sargent JD, Vargas R, Braun S, Barrientos-Gutierrez T, Sevigny EL, Billings DL, Arillo-Santillan E, Navarro A, Hardin J (2014) Are movies with tobacco, alcohol, drugs, sex, and violence rated for youth? A comparison of rating systems in Argentina, Brazil, Mexico, and the United States. Int J Drug Policy 25(2):267\u2013275","journal-title":"Int J Drug Policy"},{"key":"10838_CR8","doi-asserted-by":"crossref","unstructured":"Ali A, Senan N (2017) A Review on Violence Video Classification Using Convolutional Neural Networks, in Recent Advances on Soft Computing and Data Mining. p. 130-140","DOI":"10.1007\/978-3-319-51281-5_14"},{"key":"10838_CR9","doi-asserted-by":"crossref","unstructured":"Gangwar A, Fidalgo E, Alegre E, Gonz\u00e1lez-Castro V (2017) Pornography and Child Sexual Abuse Detection in Image and Video: A Comparative Evaluation, in 8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017): Madrid, Spain","DOI":"10.1049\/ic.2017.0046"},{"key":"10838_CR10","doi-asserted-by":"crossref","unstructured":"Zhang H-B, Zhang Y-X, Zhong B, Lei Q, Yang L, Du J-X, Chen D-S (2019) A comprehensive survey of vision-based human action recognition methods. Sensors (Basel), 19(5)","DOI":"10.3390\/s19051005"},{"key":"10838_CR11","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1016\/j.asoc.2018.05.023","volume":"70","author":"M Kaushal","year":"2018","unstructured":"Kaushal M, Khehra BS, Sharma A (2018) Soft computing based object detection and tracking approaches: state-of-the-art survey. Appl Soft Comput 70:423\u2013464","journal-title":"Appl Soft Comput"},{"key":"10838_CR12","doi-asserted-by":"crossref","unstructured":"Subetha T, Chitrakala S (2016) A survey on human activity recognition from videos, in 2016 International Conference on Information Communication and Embedded Systems (ICICES). p. 1-7","DOI":"10.1109\/ICICES.2016.7518920"},{"key":"10838_CR13","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.neucom.2018.03.037","volume":"304","author":"H Yu","year":"2018","unstructured":"Yu H, Yang Z, Tan L, Wang Y, Sun W, Sun M, Tang Y (2018) Methods and datasets on semantic segmentation: a review. Neurocomputing 304:82\u2013103","journal-title":"Neurocomputing"},{"key":"10838_CR14","doi-asserted-by":"crossref","unstructured":"Karamizadeh S, Arabsorkhi A (2018) Methods of Pornography Detection, in Proceedings of the 10th International Conference on Computer Modeling and Simulation - ICCMS 2018. p. 33-38","DOI":"10.1145\/3177457.3177484"},{"key":"10838_CR15","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.neucom.2019.02.003","volume":"338","author":"F Lateef","year":"2019","unstructured":"Lateef F, Ruichek Y (2019) Survey on semantic segmentation using deep learning techniques. Neurocomputing 338:321\u2013348","journal-title":"Neurocomputing"},{"key":"10838_CR16","unstructured":"MPAA, NATO (2010) Classification and rating rules."},{"key":"10838_CR17","unstructured":"TV Parental Guidelines Monitoring Board (2018) TV Parental Guidelines. 03.02.2019 [cited 2019 03 Feb]; Available from: http:\/\/www.tvguidelines.org"},{"key":"10838_CR18","unstructured":"The British Board of Film Classification (2016) The BBFC's Classification Guidelines"},{"key":"10838_CR19","unstructured":"Amazon (2020) Internet Movie Database (IMDB). [cited 2020; IMDb (Internet Movie Database) is an online database of information related to films, television programs, home videos, video games, and streaming content online \u2013 including cast, production crew and personal biographies, plot summaries, trivia, ratings, and fan and critical reviews.]. Available from: https:\/\/www.imdb.com\/"},{"key":"10838_CR20","unstructured":"Teeni-Harari T, Yadin S (2019) Regulatory Literacy: Rethinking Television Rating in the New Media Age 88(2)"},{"key":"10838_CR21","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.patcog.2018.01.020","volume":"79","author":"Z Tu","year":"2018","unstructured":"Tu Z, Xie W, Qin Q, Poppe R, Veltkamp RC, Li B, Yuan J (2018) Multi-stream CNN: learning representations based on human-related regions for action recognition. Pattern Recogn 79:32\u201343","journal-title":"Pattern Recogn"},{"key":"10838_CR22","doi-asserted-by":"crossref","unstructured":"Caetano C, Avila S, Schwartz W R, Guimar\u00e3es S J F, Ara\u00fajo A d A (2016) A mid-level video representation based on binary descriptors: a case study for pornography detection. Neurocomputing, 213: p. 102\u2013114.","DOI":"10.1016\/j.neucom.2016.03.099"},{"key":"10838_CR23","doi-asserted-by":"crossref","unstructured":"Nurhadiyatn A, Cahyadi S, Damatraseta F, Rianto Y (2017) Adult Content Classification Through Deep Convolution Neural Network. International conference on computer, control, informatics and its applications","DOI":"10.1109\/IC3INA.2017.8251749"},{"key":"10838_CR24","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.neucom.2017.07.012","volume":"272","author":"J Wehrmann","year":"2018","unstructured":"Wehrmann J, Sim\u00f5es GS, Barros RC, Cavalcante VF (2018) Adult content detection in videos with convolutional and recurrent neural networks. Neurocomputing 272:432\u2013438","journal-title":"Neurocomputing"},{"key":"10838_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.forsciint.2016.09.010","volume":"268","author":"D Moreira","year":"2016","unstructured":"Moreira D, Avila S, Perez M, Moraes D, Testoni V, Valle E, Goldenstein S, Rocha A (2016) Pornography classification: the hidden clues in video space-time. Forensic Sci Int 268:46\u201361","journal-title":"Forensic Sci Int"},{"key":"10838_CR26","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1016\/j.neucom.2016.12.017","volume":"230","author":"M Perez","year":"2017","unstructured":"Perez M, Avila S, Moreira D, Moraes D, Testoni V, Valle E, Goldenstein S, Rocha A (2017) Video pornography detection through deep learning techniques and motion information. Neurocomputing 230:279\u2013293","journal-title":"Neurocomputing"},{"key":"10838_CR27","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.jvcir.2017.12.005","volume":"50","author":"P Vitorino","year":"2018","unstructured":"Vitorino P, Avila S, Perez M, Rocha A (2018) Leveraging deep neural networks to fight child pornography in the age of social media. J Vis Commun Image Represent 50:303\u2013313","journal-title":"J Vis Commun Image Represent"},{"key":"10838_CR28","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.cviu.2015.11.001","volume":"144","author":"PC Ribeiro","year":"2016","unstructured":"Ribeiro PC, Audigier R, Pham QC (2016) RIMOC, a feature to discriminate unstructured motions: application to violence detection for video-surveillance. Comput Vis Image Underst 144:121\u2013143","journal-title":"Comput Vis Image Underst"},{"key":"10838_CR29","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.patrec.2017.08.021","volume":"107","author":"T Zhang","year":"2018","unstructured":"Zhang T, Jia W, Gong C, Sun J, Song X (2018) Semi-supervised dictionary learning via local sparse constraints for violence detection. Pattern Recogn Lett 107:98\u2013104","journal-title":"Pattern Recogn Lett"},{"key":"10838_CR30","doi-asserted-by":"crossref","unstructured":"Walsh J, Mahony N, Campbell S, Carvalho A (2019) Deep Learning vs. Traditional Computer Vision, in Computer Vision Conference (CVC): Las Vegas, Nevada, United States","DOI":"10.1007\/978-3-030-17795-9_10"},{"key":"10838_CR31","doi-asserted-by":"publisher","first-page":"102526","DOI":"10.1016\/j.jnca.2019.102526","volume":"153","author":"D Gibert","year":"2020","unstructured":"Gibert D, Mateu C, Planes J (2020) The rise of machine learning for detection and classification of malware: research developments, trends and challenges. J Netw Comput Appl 153:102526","journal-title":"J Netw Comput Appl"},{"key":"10838_CR32","doi-asserted-by":"publisher","first-page":"102538","DOI":"10.1016\/j.jnca.2020.102538","volume":"154","author":"H Tahaei","year":"2020","unstructured":"Tahaei H, Afifia F, Asemia A, Zaki F, Anuar NB (2020) The rise of traffic classification in IoT networks: a survey. J Netw Comput Appl 154:102538","journal-title":"J Netw Comput Appl"},{"key":"10838_CR33","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.jnca.2016.10.006","volume":"76","author":"L Nie","year":"2016","unstructured":"Nie L, Jiang D, Guo L, Yu S (2016) Traffic matrix prediction and estimation based on deep learning in large-scale IP backbone networks. J Netw Comput Appl 76:16\u201322","journal-title":"J Netw Comput Appl"},{"key":"10838_CR34","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jnca.2017.09.001","volume":"103","author":"W Zhang","year":"2018","unstructured":"Zhang W, Wulan G, Zhai J, Xu L, Zhao D, Liu X, Yang S, Zhoud J (2018) An intelligent power distribution service architecture using cloud computing and deep learning techniques. J Netw Comput Appl 103:239\u2013248","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"10838_CR35","doi-asserted-by":"publisher","first-page":"4673","DOI":"10.1007\/s11042-018-6601-5","volume":"78","author":"F Chen","year":"2019","unstructured":"Chen F, Fu Z, Zhen L (2019) Thermal power generation fault diagnosis and prediction model based on deep learning and multimedia systems. Multimed Tools Appl 78(4):4673\u20134692","journal-title":"Multimed Tools Appl"},{"key":"10838_CR36","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.compeleceng.2019.08.001","volume":"78","author":"RM Prates","year":"2019","unstructured":"Prates RM, Cruz R, Marotta AP, Ramos RP, Filho EFS, Cardoso JS (2019) Insulator visual non-conformity detection in overhead power distribution lines using deep learning. Computers & Electrical Engineering 78:343\u2013355","journal-title":"Computers & Electrical Engineering"},{"key":"10838_CR37","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1016\/j.jacr.2019.12.026","volume":"17","author":"V Sorin","year":"2020","unstructured":"Sorin V, Barash Y, Konen E, Klang E (2020) Deep learning for natural language processing in radiology\u2014fundamentals and a systematic review. J Am Coll Radiol 17:639\u2013648","journal-title":"J Am Coll Radiol"},{"key":"10838_CR38","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.procs.2019.09.212","volume":"159","author":"A Ayadi","year":"2019","unstructured":"Ayadi A, Samet A, FDB d B, Zanni-Merk C (2019) Ontology population with deep learning-based NLP: a case study on the biomolecular network ontology. Procedia Computer Science 159:572\u2013581","journal-title":"Procedia Computer Science"},{"issue":"13","key":"10838_CR39","doi-asserted-by":"publisher","first-page":"9161","DOI":"10.1007\/s11042-020-08733-9","volume":"79","author":"T Hu","year":"2020","unstructured":"Hu T, Liu L, Si W (2020) Special issue on deep learning in biomedical signal and medical image processing [1128 T]. Multimed Tools Appl 79(13):9161\u20139161","journal-title":"Multimed Tools Appl"},{"key":"10838_CR40","unstructured":"(2020) Deep learning algorithms for medical image processing. Multimedia Tools and Applications."},{"key":"10838_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.003","volume":"116","author":"O Gupt","year":"2018","unstructured":"Gupt O, Raskar R (2018) Distributed learning of deep neural network over multiple agents. J Netw Comput Appl 116:1\u20138","journal-title":"J Netw Comput Appl"},{"key":"10838_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.12.012","volume":"129","author":"Q Zhang","year":"2019","unstructured":"Zhang Q, Bai C, Chen Z, Li P, Wang S, Gao H (2019) Smart Chinese medicine for hypertension treatment with a deep learning model. J Netw Comput Appl 129:1\u20138","journal-title":"J Netw Comput Appl"},{"key":"10838_CR43","unstructured":"Zhang X, Han Y, Wei X, Wang Q (2019) HOBA: a novel feature engineering methodology for credit card fraud detection with a deep learning architecture. Inf Sci"},{"key":"10838_CR44","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.eswa.2019.03.042","volume":"128","author":"E Kim","year":"2019","unstructured":"Kim E, Lee J, Shin H, Yang H, Cho S, S-k N, Song Y, J-a Y, J-i K (2019) Champion-challenger analysis for credit card fraud detection: hybrid ensemble and deep learning. Expert Syst Appl 128:214\u2013224","journal-title":"Expert Syst Appl"},{"key":"10838_CR45","doi-asserted-by":"crossref","unstructured":"Li B, Zhao J, Fu H (2020) DLT-net: deep learning transmittance network for single image haze removal. Signal, Image and Video Processing","DOI":"10.1007\/s11760-020-01665-9"},{"key":"10838_CR46","doi-asserted-by":"publisher","first-page":"13403","DOI":"10.1007\/s11042-020-08616-z","volume":"79","author":"AD Algarni","year":"2020","unstructured":"Algarni AD (2020) Efficient object detection and classification of heat emitting objects from infrared images based on deep learning. Multimed Tools Appl 79:13403\u201313426","journal-title":"Multimed Tools Appl"},{"issue":"16","key":"10838_CR47","doi-asserted-by":"publisher","first-page":"20415","DOI":"10.1007\/s11042-017-5438-7","volume":"77","author":"Q Abbas","year":"2018","unstructured":"Abbas Q, Ibrahim MEA, Jaffar MA (2018) Video scene analysis: an overview and challenges on deep learning algorithms. Multimed Tools Appl 77(16):20415\u201320453","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10838_CR48","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11760-018-1335-4","volume":"13","author":"FC Soon","year":"2019","unstructured":"Soon FC, Khaw HY, Chuah JH, Kanesan J (2019) Vehicle logo recognition using whitening transformation and deep learning. SIViP 13(1):111\u2013119","journal-title":"SIViP"},{"key":"10838_CR49","unstructured":"Moustafa MN (2015) Applying deep learning to classify pornographic images and videos. arXiv:1511.08899v1 [cs.CV]."},{"issue":"5","key":"10838_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3057733","volume":"8","author":"X Ou","year":"2017","unstructured":"Ou X, Ling H, Yu H, Li P, Zou F, Liu S (2017) Adult image and video recognition by a deep multicontext network and fine-to-coarse strategy. ACM Trans Intell Syst Technol 8(5):1\u201325","journal-title":"ACM Trans Intell Syst Technol"},{"key":"10838_CR51","unstructured":"Sernani P, Falcionelli N, Mekuria D N, Dragoni A F (2020) Violence detection in videos by combining 3D convolutional neural networks and support vector machines. Appl Artif Intell"},{"key":"10838_CR52","doi-asserted-by":"crossref","unstructured":"Ullah F U M, Ullah A, Muhammad K, Haq I U, Baik S W (2019) Violence detection using spatiotemporal features with 3D convolutional neural network. Sensors (Basel), 19(11).","DOI":"10.3390\/s19112472"},{"issue":"8","key":"10838_CR53","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"10838_CR54","doi-asserted-by":"crossref","unstructured":"Davis S B, Mermelstein P (1980) Comparison of Parametric Representations for Monosyllabic Word Recognition in Continuously Spoken Sentences 28(4): p. 357\u2013366.","DOI":"10.1109\/TASSP.1980.1163420"},{"key":"10838_CR55","doi-asserted-by":"crossref","unstructured":"Xu M, Duan L-Y, Cai J, Chia L-T, Xu C, Tian Q (2004) HMM-Based Audio Keyword Generation, in Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim: Tokyo, Japan","DOI":"10.1007\/978-3-540-30543-9_71"},{"key":"10838_CR56","doi-asserted-by":"crossref","unstructured":"Wang H, Kl\u00e4ser A, Schmid C, Liu C-L (2013) Dense Trajectories and Motion Boundary Descriptors for Action Recognition. International Journal of computer vision, 103","DOI":"10.1007\/s11263-012-0594-8"},{"key":"10838_CR57","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.neucom.2018.02.028","volume":"297","author":"Y Sun","year":"2018","unstructured":"Sun Y, Wu X, Yu W, Yu F (2018) Action recognition with motion map 3D network. Neurocomputing 297:33\u201339","journal-title":"Neurocomputing"},{"key":"10838_CR58","unstructured":"Caetano C, Avila S, Guimar S, de a Ara'ujo a (2014) Pornography Detection using BossaNova Video Descriptor. 22nd European Signal Processing Conference (EUSIPCO)"},{"key":"10838_CR59","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.future.2012.08.012","volume":"31","author":"Y Liu","year":"2014","unstructured":"Liu Y, Yang Y, Xie H, Tang S (2014) Fusing audio vocabulary with visual features for pornographic video detection. Futur Gener Comput Syst 31:69\u201376","journal-title":"Futur Gener Comput Syst"},{"key":"10838_CR60","doi-asserted-by":"crossref","unstructured":"Liu Y Z, Ouyang J L, Liu J X (2017) Bimodal Codebooks Based Adult Video Detection. 2017 Ieee global conference on signal and information processing (Globalsip 2017): p. 1397-1400","DOI":"10.1109\/GlobalSIP.2017.8309191"},{"key":"10838_CR61","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.inffus.2018.03.001","volume":"45","author":"D Moreira","year":"2019","unstructured":"Moreira D, Avila S, Perez M, Moraes D, Testoni V, Valle E, Goldenstein S, Rocha A (2019) Multimodal data fusion for sensitive scene localization. Information Fusion 45:307\u2013323","journal-title":"Information Fusion"},{"key":"10838_CR62","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.imavis.2016.01.006","volume":"48-49","author":"Y Gao","year":"2016","unstructured":"Gao Y, Liu H, Sun X, Wang C, Liu Y (2016) Violence detection using oriented VIolent flows. Image Vis Comput 48-49:37\u201341","journal-title":"Image Vis Comput"},{"key":"10838_CR63","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.patrec.2017.04.015","volume":"92","author":"A Ben Mabrouk","year":"2017","unstructured":"Ben Mabrouk A, Zagrouba E (2017) Spatio-temporal feature using optical flow based distribution for violence detection. Pattern Recogn Lett 92:62\u201367","journal-title":"Pattern Recogn Lett"},{"key":"10838_CR64","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.eswa.2019.02.032","volume":"127","author":"J Mahmoodi","year":"2019","unstructured":"Mahmoodi J, Salajeghe A (2019) A classification method based on optical flow for violence detection. Expert Syst Appl 127:121\u2013127","journal-title":"Expert Syst Appl"},{"key":"10838_CR65","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/j.neucom.2016.05.050","volume":"208","author":"E Acar","year":"2016","unstructured":"Acar E, Hopfgartner F, Albayrak S (2016) Breaking down violence detection: combining divide-et-impera and coarse-to-fine strategies. Neurocomputing 208:225\u2013237","journal-title":"Neurocomputing"},{"issue":"5","key":"10838_CR66","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.cviu.2012.09.007","volume":"117","author":"S Avila","year":"2013","unstructured":"Avila S, Thome N, Cord M, Valle E, de A Ara\u00fajo A (2013) Pooling in image representation: the visual codeword point of view. Comput Vis Image Underst 117(5):453\u2013465","journal-title":"Comput Vis Image Underst"},{"key":"10838_CR67","unstructured":"Nievas EBAS, Deniz O, Garcia GB, Sukthankar R (2011) Hockey fight detection dataset. Computer Analysis of Images and Patterns: p:332\u2013339"},{"key":"10838_CR68","doi-asserted-by":"crossref","unstructured":"Hassner T, Itcher Y, Kliper-Gross O (2012) Violent Flows: Real-Time Detection of Violent Crowd Behavior, in 3rd IEEE International Workshop on Socially Intelligent Surveillance and Monitoring (SISM) at the IEEE Conf. on Computer Vision and Pattern Recognition (CVPR): Rhode Island","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"10838_CR69","doi-asserted-by":"crossref","unstructured":"Demarty C-H, Penet C, Soleymani M, Gravier G (2014) VSD, a public dataset for the detection of violent scenes in movies: design, annotation, analysis and evaluation. Multimed Tools Appl, 74.","DOI":"10.1007\/s11042-014-1984-4"},{"key":"10838_CR70","doi-asserted-by":"crossref","unstructured":"Demarty C, Ionescu B, Jiang Y, Quang V L, Schedl M, Penet C (Year) Benchmarking Violent Scenes Detection in movies. in 2014 12th International Workshop on Content-Based Multimedia Indexing (CBMI). of Conference.","DOI":"10.1109\/CBMI.2014.6849827"},{"key":"10838_CR71","unstructured":"Sj\u00f6berg M, Ionescu B, Jiang Y-G, Quang V L, Schedl M, Demarty C-H ( 2014) The MediaEval 2014 Affect Task: Violent Scenes Detection, in In Working Notes Proceedings of the MediaEval 2014 Workshop: Barcelona, Spain"},{"key":"10838_CR72","doi-asserted-by":"crossref","unstructured":"Demarty C-H, Penet C, Gravier G, Soleymani M (year) A Benchmarking Campaign for the Multimodal Detection of Violent Scenes in Movies. In Computer Vision \u2013 ECCV 2012. Workshops and Demonstrations. Of conference. Berlin, Heidelberg: springer Berlin Heidelberg","DOI":"10.1007\/978-3-642-33885-4_42"},{"key":"10838_CR73","volume-title":"Local Trinary Patterns for human action recognition, in 2009 IEEE 12th International Conference on Computer Vision","author":"L Yeffet","year":"2009","unstructured":"Yeffet L, Wolf L (2009) Local Trinary Patterns for human action recognition, in 2009 IEEE 12th International Conference on Computer Vision. Kyoto, IEEE"},{"key":"10838_CR74","doi-asserted-by":"crossref","unstructured":"Hassner T, Itcher Y, Kliper-Gross O (2012) Violent flows: Real-time detection of violent crowd behavior, in 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. IEEE: Providence, RI, USA.","DOI":"10.1109\/CVPRW.2012.6239348"},{"key":"10838_CR75","unstructured":"Keslassy E (2016) Conservative Group, Filmmakers at Odds Over Movie Ratings in France. MARCH 25, 2016]; Available from: https:\/\/variety.com\/2016\/film\/global\/france-movie-ratings-1201737635\/."},{"key":"10838_CR76","unstructured":"Steven (2014) Movie ratings in Germany. 17 Feb 2014; Available from: https:\/\/stevenglassman.com\/2014\/02\/17\/movie-ratings-in-germany\/"},{"key":"10838_CR77","doi-asserted-by":"crossref","unstructured":"Kuehne H, Jhuang H, Garrote E, Poggio T, Serre T (2011) A Large Video Database for Human Motion Recognition, in Proceedings of the International Conference on Computer Vision (ICCV)","DOI":"10.1109\/ICCV.2011.6126543"},{"key":"10838_CR78","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1016\/j.sigpro.2015.01.001","volume":"120","author":"Y Liu","year":"2016","unstructured":"Liu Y, Feng X, Zhou Z (2016) Multimodal video classification with stacked contractive autoencoders. Signal Process 120:761\u2013766","journal-title":"Signal Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10838-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10838-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10838-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:09:08Z","timestamp":1625458148000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10838-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,31]]},"references-count":78,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10838"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10838-8","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2021,3,31]]},"assertion":[{"value":"9 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}