4.6 Review

Technological Innovations for Tackling Domestic Violence

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Weakly Supervised Audio-Visual Violence Detection

Peng Wu et al.

Summary: Violence detection in videos has great potential in practical applications. Previous works have treated it as a simple video classification task, but this approach has limitations. To address this, we propose a new approach that uses large-scale audio-visual violence data and introduces two complementary tasks, namely coarse-grained violent frame detection and fine-grained violent event detection. Our approach outperforms state-of-the-art methods on public datasets, and the use of audio-visual input and relationship modeling has a positive effect.

IEEE TRANSACTIONS ON MULTIMEDIA (2023)

Article Computer Science, Artificial Intelligence

Deepfakes generation and detection: state-of-the-art, open challenges, countermeasures, and way forward

Momina Masood et al.

Summary: Easy access to audio-visual content on social media and the availability of modern tools and open-source models have led to the emergence of deepfakes, which can be used for deception, spreading disinformation, revenge porn, financial frauds, and disruption of government functioning. This paper provides a comprehensive review of existing tools and machine learning approaches for deepfake generation and detection, discussing manipulation approaches, datasets, performance evaluation standards, and future directions.

APPLIED INTELLIGENCE (2023)

Article Women's Studies

Technology-Based Responses to Technology-Facilitated Domestic and Family Violence: An Overview of the Limits and Possibilities of Tech-Based Solutions

Diarmaid Harkin et al.

Summary: This article points out that technology-based responses are necessary but not sufficient in addressing TFA, and they have persistent limitations. Therefore, there is a need for continued development of human resources, especially professional domestic violence support workers, to provide support and assistance to those experiencing TFA.

VIOLENCE AGAINST WOMEN (2023)

Article Computer Science, Artificial Intelligence

A General Survey on Attention Mechanisms in Deep Learning

Gianni Brauwers et al.

Summary: Attention is a vital mechanism in various domains and tasks of deep learning. This survey offers an overview of the important attention mechanisms proposed in literature. The mechanisms are explained using a framework comprising a general attention model, uniform notation, and a comprehensive taxonomy. Additionally, it reviews evaluation measures and methods to characterize the structure of attention models based on the framework. Future work in the field of attention models is also considered.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Review Psychology, Multidisciplinary

Virtual reality for the rehabilitation and prevention of intimate partner violence - From brain to behavior: A narrative review

Tania Johnston et al.

Summary: Virtual embodiment has been shown to have a significant impact on reducing intimate partner violence (IPV) by enhancing emotional recognition and decreasing violent behaviors, through the integration of neuroscience-inspired and validated state-of-the-art technology.

FRONTIERS IN PSYCHOLOGY (2023)

Article Computer Science, Artificial Intelligence

Multimodal Learning With Transformers: A Survey

Peng Xu et al.

Summary: This paper presents a comprehensive survey of Transformer techniques in multimodal learning, covering different variants of Transformers, applications in multimodal pretraining and specific tasks, common challenges and designs, as well as future research directions.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

Article Computer Science, Software Engineering

A multi-stream CNN for deep violence detection in video sequences using handcrafted features

Seyed Mehdi Mohtavipour et al.

Summary: This paper proposes a novel deep violence detection framework based on specific features derived from handcrafted methods, covering different aspects of violent behavior. A convolutional neural network (CNN) is trained to learn environment patterns, motion patterns, and representative violent actions, achieving better performance in accuracy and processing time compared to state-of-the-art works.

VISUAL COMPUTER (2022)

Article Chemistry, Analytical

Efficient Violence Detection in Surveillance

Romas Vijeikis et al.

Summary: This paper presents a novel architecture for violence detection from video surveillance cameras. The proposed model utilizes a spatial feature extracting U-Net-like network with MobileNet V2 as an encoder, followed by LSTM for temporal feature extraction and classification. The computational light model achieves good results, with an average accuracy of 0.82 +/- 2% and average precision of 0.81 +/- 3% on a complex real-world security camera footage dataset based on RWF-2000.

SENSORS (2022)

Article Psychology, Multidisciplinary

On the Practical Use of Immersive Virtual Reality for Rehabilitation of Intimate Partner Violence Perpetrators in Prison

Nicolas Barnes et al.

Summary: Virtual reality (VR) is a technology that immerses users in different environments through virtual experiences, and can be used to improve empathy skills and train non-violent responses for intimate partner violence (IPV) perpetrators. This article discusses the practical aspects of using virtual reality for rehabilitation in a prison environment.

FRONTIERS IN PSYCHOLOGY (2022)

Article Automation & Control Systems

AI-Assisted Edge Vision for Violence Detection in IoT-Based Industrial Surveillance Networks

Fath U. Min Ullah et al.

Summary: This article proposes an AI-enabled IIoT-based framework called VD-Net to intelligently detect and analyze violent scenes, improving the accuracy of surveillance systems.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Artificial Intelligence

Visual attention-based deepfake video forgery detection

Shreyan Ganguly et al.

Summary: The prime goal of creating synthetic digital data is to generate something very closer to real ones when the original data are scarce. However, the trustworthiness of such digital content is dipping potentially in society owing to malicious users. In order to verify the originality of face images/videos generated by deepfake methods, a model enhanced with visual attention technique is proposed and evaluated on publicly available datasets. The proposed model outperforms state-of-the-art methods on these datasets.

PATTERN ANALYSIS AND APPLICATIONS (2022)

Article Criminology & Penology

Deepfakes and Domestic Violence: Perpetrating Intimate Partner Abuse Using Video Technology

Kweilin T. Lucas

Summary: Technology-facilitated abuse, especially through the use of deepfake technology, is becoming increasingly prevalent in cases of domestic violence. Deepfake technology allows for the creation of realistic and manipulated videos and audios, which can be used to threaten, blackmail, and abuse victims. Further research is needed to understand the intersection of deepfake technology and domestic abuse, aiming to guide future policy and address issues of privacy, legal action, and prevention.

VICTIMS & OFFENDERS (2022)

Article Computer Science, Information Systems

Bindi: Affective Internet of Things to Combat Gender-Based Violence

Jose A. Miranda et al.

Summary: This article explores the problem of gender-based violence and the use of technology to achieve gender equality. It proposes an autonomous multimodal system called Bindi that utilizes artificial intelligence to automatically identify violent situations and trigger a protection protocol. The solution integrates modern technologies such as the Internet of Bodies, affective computing, and cyber-physical systems. The research evaluates the solution using a newly collected dataset and provides an analysis of multimodal fusion strategies and audio data processing.

IEEE INTERNET OF THINGS JOURNAL (2022)

Proceedings Paper Computer Science, Information Systems

AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices

Alexander Heinrich et al.

Summary: Finder networks, especially Apple's Find My network, can pose serious threats to users' privacy and health if abused for stalking. The release of Apple's AirTag has amplified this issue. While Apple provides stalking detection within its ecosystem, Android users are left without similar protection. Researchers reverse-engineered Apple's tracking protection in iOS, developed AirGuard as an Android app to protect against abuse by Apple tracking devices, and conducted a comparative study with Apple's solution.

PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Federated Learning for Physical Violence Detection in Videos

Victor E. de S. Silva et al.

Summary: This paper proposes a federated learning approach for violence detection in videos. Various pretrained convolutional neural network architectures were evaluated, and the MobileNet architecture showed the best performance in terms of accuracy.

2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Violence Detection and Recognition from Diverse Video Sources

Maria Gadelkarim et al.

Summary: This paper proposes a framework for detecting and classifying violent events from video streams. It uses 3D Convolutional Neural Networks for violence detection and Inception-v3 model for feature extraction and temporal processing. The paper also discusses the training of models on different data sources and the application of transfer learning.

2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN) (2022)

Article Computer Science, Artificial Intelligence

DeepFake Detection Based on Discrepancies Between Faces and Their Context

Yuval Nirkin et al.

Summary: The proposed method utilizes two networks to detect face swapping and other identity manipulations in single images, achieving state of the art results in detection accuracy.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2022)

Proceedings Paper Computer Science, Information Systems

BLE-Doubt: Smartphone-Based Detection of Malicious Bluetooth Trackers

Jimmy Briggs et al.

Summary: This article presents a general method and open-source Android application for detecting maliciously deployed BLE trackers. Through a small validation study, it demonstrates high precision and recall for most trackers, despite the challenges posed by AirTags.

2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022) (2022)

Article Computer Science, Information Systems

Detection of Violent Behavior Using Neural Networks and Pose Estimation

Kevin B. Kwan-Loo et al.

Summary: Regarding safety and security, the paper discusses the problem of felonies and violent crimes and proposes the use of Artificial Intelligence to detect and predict violent behavior. The authors develop an innovative solution model that focuses on pedestrian detection, tracking, pose estimation, and neural networks. They also create a new database for training and testing the model, and achieve a high accuracy rate on this database. The proposed solution model can be extended to classify other types of behavior as well.

IEEE ACCESS (2022)

Article Social Sciences, Mathematical Methods

Identification of intimate partner violence from free text descriptions in social media

Phan Trinh Ha et al.

Summary: This study develops a machine learning tool called DETECTIPV, using data from questionnaires on intimate partner violence (IPV), to predict IPV from free text. The results demonstrate that DETECTIPV can identify different types of violence and establish its reliability in detecting IPV in various applications.

JOURNAL OF COMPUTATIONAL SOCIAL SCIENCE (2022)

Article Computer Science, Artificial Intelligence

Affect in Multimedia: Benchmarking Violent Scenes Detection

Mihai Gabriel Constantin et al.

Summary: This article reports on the creation of a publicly available evaluation framework for Violent Scenes Detection (VSD) in Hollywood and YouTube videos. The comprehensive VSD96 dataset is proposed and the crucial components of VSD algorithms are analyzed. The possibility of going beyond state-of-the-art performance through ad-hoc late fusion approach is discussed.

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING (2022)

Article Chemistry, Analytical

Fear Recognition for Women Using a Reduced Set of Physiological Signals

Jose A. Miranda et al.

Summary: Emotion recognition technology is advancing to protect vulnerable populations in dangerous situations such as personal assaults, child or elder abuse, and gender violence. A specialized fear recognition system based on physiological signals has been proposed, utilizing sensors and AI to detect fear emotion and ensure the safety of women.

SENSORS (2021)

Article Computer Science, Artificial Intelligence

A Survey of the Usages of Deep Learning for Natural Language Processing

Daniel W. Otter et al.

Summary: This article provides a brief introduction to the recent developments in natural language processing driven by deep learning models, discusses their applications and research findings, and offers recommendations for future research directions.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2021)

Article Computer Science, Information Systems

Biometric User Identification Based on Human Activity Recognition Using Wearable Sensors: An Experiment Using Deep Learning Models

Sakorn Mekruksavanich et al.

Summary: Currently, there is significant interest in research on Human Activity Recognition (HAR) for practical applications like biometric user identification, elderly health monitoring, and surveillance. Deep learning is the most commonly used approach in HAR systems. A novel framework for multi-class wearable user identification based on deep learning models has been proposed and validated with sensory data from wearable devices. The accuracy of 91.77% and 92.43% for basic models CNN and LSTM, respectively, shows promising results for biometric user identification.

ELECTRONICS (2021)

Article Social Issues

New technology proposals for tackling intimate partner violence: Challenges and opportunities

Magdalena Diaz Gorfinkiel et al.

Summary: Intimate partner violence remains a critical social issue, and technology is seen as an innovative tool to address it. This article explores the potential of technology, particularly a new device, in protecting female victims through qualitative analysis of expert testimonies.

TECHNOLOGY IN SOCIETY (2021)

Article Mathematics

Deep Neural Network for Gender-Based Violence Detection on Twitter Messages

Carlos M. Castorena et al.

Summary: The issue of gender-based violence in Mexico has significantly increased, and efforts have been made to tackle this issue through the use of deep learning neural networks to identify such violence on Twitter. The results of this study show the effectiveness of this approach in detecting gender violence messages on Twitter, with minimal pre-processing of the data set.

MATHEMATICS (2021)

Article Computer Science, Hardware & Architecture

A Survey on Wearable Technology: History, State-of-the-Art and Current Challenges

Aleksandr Ometov et al.

Summary: This paper provides an overview of the history and current state of the wearable device market, including a diverse classification and discussion on technologies, architectures, data processing, and market status. It also highlights existing and future solutions to critical challenges in wearable technology.

COMPUTER NETWORKS (2021)

Article Computer Science, Artificial Intelligence

Optical Flow based CNN for detection of unlearnt deepfake manipulations

Roberto Caldelli et al.

Summary: Deepfakes pose a serious threat in video manipulation, utilizing AI-based technologies to create realistic videos. A new forensic technique based on optical flow fields is proposed to detect fake and original video sequences, showing comparable performance with state-of-the-art methods and superior robustness in more realistic scenarios. The proposed technique can also be combined with frame-based approaches to enhance overall effectiveness.

PATTERN RECOGNITION LETTERS (2021)

Article Computer Science, Information Systems

Prediction on Domestic Violence in Bangladesh during the COVID-19 Outbreak Using Machine Learning Methods

Md. Murad Hossain et al.

Summary: The COVID-19 outbreak in Bangladesh during the summer of 2020 led to preventative measures and restrictions, resulting in increased social problems such as domestic violence. Machine learning algorithms were utilized to predict family violence, with findings indicating a close relationship between family violence and family income level and education level of family members.

APPLIED SYSTEM INNOVATION (2021)

Review Computer Science, Information Systems

A Systematic Review of Computer Science Solutions for Addressing Violence Against Women and Children

Dalia Andrea Rodriguez et al.

Summary: Violence against women and children is a global public health issue, with computer science and related technologies being leveraged to develop solutions. Research shows that as the Internet and social media become more prevalent, forms of violence are evolving and require new prevention measures.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Efficient Spatio-Temporal Modeling Methods for Real-Time Violence Recognition

Min-Seok Kang et al.

Summary: This paper proposes a novel violence detection pipeline that combines 2D convolutional neural networks with frame grouping to learn spatio-temporal representations in videos, and introduces spatial and temporal attention modules to enhance violence recognition performance. The proposed pipeline outperforms existing methods in both performance and computational complexity, achieving state-of-the-art results on multiple violence datasets.

IEEE ACCESS (2021)

Article Computer Science, Artificial Intelligence

Violence Detection in Videos by Combining 3D Convolutional Neural Networks and Support Vector Machines

Simone Accattoli et al.

APPLIED ARTIFICIAL INTELLIGENCE (2020)

Article Computer Science, Information Systems

On Detecting Hidden Wireless Cameras: A Traffic Pattern-based Approach

Yushi Cheng et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2020)

Review Public, Environmental & Occupational Health

Effectiveness of ICT-based intimate partner violence interventions: a systematic review

Christo El Morr et al.

BMC PUBLIC HEALTH (2020)

Article Instruments & Instrumentation

Human activity detection using machine learning methods from wearable sensors

Princy Randhawa et al.

SENSOR REVIEW (2020)

Proceedings Paper Acoustics

MULTIMODAL VIOLENCE DETECTION IN VIDEOS

Bruno Peixoto et al.

2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (2020)

Proceedings Paper Computer Science, Artificial Intelligence

A School Violence Detection Algorithm Based on a Single MEMS Sensor

Jifu Shi et al.

COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS (2020)

Article Computer Science, Information Systems

Misogyny Detection in Twitter: a Multilingual and Cross-Domain Study

Endang Wahyu Pamungkas et al.

INFORMATION PROCESSING & MANAGEMENT (2020)

Article Computer Science, Information Systems

BioCNN: A Hardware Inference Engine for EEG-Based Emotion Detection

Hector A. Gonzalez et al.

IEEE ACCESS (2020)

Article Chemistry, Analytical

Violence Detection Using Spatiotemporal Features with 3D Convolutional Neural Network

Fath U. Min Ullah et al.

SENSORS (2019)

Proceedings Paper Computer Science, Theory & Methods

Stalker Retrieval on Surveillance Videos using Spatio-Temporal Coappearance

Jianquan Liu et al.

2019 2ND IEEE CONFERENCE ON MULTIMEDIA INFORMATION PROCESSING AND RETRIEVAL (MIPR 2019) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

A Novel Approach of Unprivileged Keylogger Detection

Ahsan Wajahat et al.

2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET) (2019)

Review Computer Science, Information Systems

Text Classification Algorithms: A Survey

Kamran Kowsari et al.

INFORMATION (2019)

Article Computer Science, Information Systems

Deep Learning for Multi-Class Identification From Domestic Violence Online Posts

Sudha Subramani et al.

IEEE ACCESS (2019)

Article Computer Science, Artificial Intelligence

Fight Recognition in Video Using Hough Forests and 2D Convolutional Neural Network

Ismael I. Serrano et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2018)

Article Engineering, Electrical & Electronic

Action Detection and Recognition in Continuous Action Streams by Deep Learning-Based Sensing Fusion

Neha Dawar et al.

IEEE SENSORS JOURNAL (2018)

Article Multidisciplinary Sciences

Violence detection in surveillance video using low-level features

Peipei Zhou et al.

PLOS ONE (2018)

Article Computer Science, Information Systems

Domestic Violence Crisis Identification From Facebook Posts Based on Deep Learning

Sudha Subramani et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Theory & Methods

Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures

Sudha Subramani et al.

DATABASES THEORY AND APPLICATIONS, ADC 2018 (2018)