4.7 Article

Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data

Related references

Note: Only part of the references are listed.
Review Computer Science, Theory & Methods

Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions

Khan Muhammad et al.

Summary: Continuous surveillance by CCTV cameras generates large amounts of data known as Big Video Data (BVD). However, the usage of this data is hindered by the limited capabilities, high computational complexity, and strict installation requirements of existing methods. This article focuses on the usage of fuzzy logic as a complementary approach to overcome these challenges in surveillance applications based on BVD. A comprehensive literature survey is conducted to study different methods for video analysis that incorporate fuzzy logic concepts. The advantages, downsides, and challenges of these methods are discussed, along with an outlook on future research directions.

ACM COMPUTING SURVEYS (2022)

Article Computer Science, Information Systems

CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks

Waseem Ullah et al.

Summary: The study introduces an efficient deep learning-based intelligent anomaly detection framework that operates effectively in surveillance networks, extract deep features, and accurately classify anomalous/normal events.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Automation & Control Systems

An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model

Mohammad Mehedi Hassan et al.

Summary: The rapid development of IoT platforms in the industrial domain has brought critical solutions, but also exposed industrial systems to cyber risks. An adaptive trust boundary protection approach for IIoT networks, utilizing deep learning and feature extraction, has been proposed and shown to significantly improve attack identification.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

A Robust Deep-Learning-Enabled Trust-Boundary Protection for Adversarial Industrial IoT Environment

Mohammad Mehedi Hassan et al.

Summary: The article addresses the challenging problem of trust-boundary protection in Industrial Internet of Things environments and proposes a cooperative data generator based on a downsampler-encoder to better capture the distribution of attack models. Experimental results demonstrate that this approach outperforms conventional deep learning and other ML techniques in terms of robustness against adversarial/noisy examples in the IIoT environment.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Multiview Summarization and Activity Recognition Meet Edge Computing in IoT Environments

Tanveer Hussain et al.

Summary: This paper proposes an edge intelligence-based framework for multiview video summarization and activity recognition, combining artificial intelligence and IoT devices to achieve efficient summary generation and activity recognition in resource-constrained environments. Experimental results show improvements on different datasets.

IEEE INTERNET OF THINGS JOURNAL (2021)

Proceedings Paper Computer Science, Artificial Intelligence

RWF-2000: An Open Large Scale Video Database for Violence Detection

Ming Cheng et al.

Summary: The widespread use of surveillance cameras in public places has contributed to a significant reduction in crime rates, but they are rarely used to prevent criminal activities in real-time. Recognizing violent behaviors automatically has become crucial, leading to the proposal of a new violence detection database comprising 2,000 videos.

2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR) (2021)

Proceedings Paper Computer Science, Information Systems

Long-term recurrent convolutional network violent Behaviour recognition with attention mechanism

Qiming Liang et al.

Summary: A long-term recurrent convolutional network with attention mechanism is proposed in this paper to improve traditional violent behavior recognition algorithms by suppressing background interference and increasing accuracy. The algorithm shows performance improvements compared to existing methods on different datasets.

2020 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE COMMUNICATION AND NETWORK SECURITY (CSCNS2020) (2021)

Article Computer Science, Theory & Methods

A decentralised approach to privacy preserving trajectory mining

Romana Talat et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

A hybrid deep learning model for efficient intrusion detection in big data environment

Mohammad Mehedi Hassan et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI

Alejandro Barredo Arrieta et al.

INFORMATION FUSION (2020)

Article Computer Science, Theory & Methods

Action recognition using optimized deep autoencoder and CNN for surveillance data streams of non-stationary environments

Amin Ullah et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

A neuro-heuristic approach for recognition of lung diseases from X-ray images

Qiao Ke et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

A regional adaptive variational PDE model for computed tomography image reconstruction

Wei Wei et al.

PATTERN RECOGNITION (2019)

Article Chemistry, Multidisciplinary

Cover the Violence: A Novel Deep-Learning-Based Approach Towards Violence-Detection in Movies

Samee Ullah Khan et al.

APPLIED SCIENCES-BASEL (2019)

Article Automation & Control Systems

Activity Recognition Using Temporal Optical Flow Convolutional Features and Multilayer LSTM

Amin Ullah et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2019)

Article Computer Science, Information Systems

An anomaly-introduced learning method for abnormal event detection

Chengkun He et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Building edge intelligence for online activity recognition in service-oriented IoT systems

Zhenqiu Huang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A Survey of Multi-Objective Optimization in Wireless Sensor Networks: Metrics, Algorithms, and Open Problems

Zesong Fei et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Histograms of Optical Flow Orientation and Magnitude and Entropy to Detect Anomalous Events in Videos

Rensso Victor Hugo Mora Colque et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2017)

Article Computer Science, Artificial Intelligence

Graph formulation of video activities for abnormal activity recognition

Dinesh Singh et al.

PATTERN RECOGNITION (2017)

Proceedings Paper Computer Science, Artificial Intelligence

FlowNet 2.0: Evolution of Optical Flow Estimation with Deep Networks

Eddy Ilg et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Tube Convolutional Neural Network (T-CNN) for Action Detection in Videos

Rui Hou et al.

2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Quo Vadis, Action Recognition? A New Model and the Kinetics Dataset

Joao Carreira et al.

30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) (2017)

Article Computer Science, Theory & Methods

A survey of anomaly detection techniques in financial domain

Mohiuddin Ahmed et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Artificial Intelligence

Accelerating Very Deep Convolutional Networks for Classification and Detection

Xiangyu Zhang et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2016)

Article Computer Science, Artificial Intelligence

Combining motion and appearance cues for anomaly detection

Ying Zhang et al.

PATTERN RECOGNITION (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Realtime Anomaly Detection using Trajectory-level Crowd Behavior Learning

Aniket Bera et al.

PROCEEDINGS OF 29TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, (CVPRW 2016) (2016)

Article Computer Science, Artificial Intelligence

Swarm Intelligence for Detecting Interesting Events in Crowded Environments

Vagia Kaltsa et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Artificial Intelligence

Gaussian Process Regression-Based Video Anomaly Detection and Localization With Hierarchical Feature Representation

Kai-Wen Cheng et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Learning Spatiotemporal Features with 3D Convolutional Networks

Du Tran et al.

2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV) (2015)

Article Computer Science, Artificial Intelligence

Traffic event classification at intersections based on the severity of abnormality

Omer Akoz et al.

MACHINE VISION AND APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

Multiple Target Tracking by Learning-Based Hierarchical Association of Detection Responses

Chang Huang et al.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2013)