abnormal behavior detection
Recently Published Documents


TOTAL DOCUMENTS

176
(FIVE YEARS 83)

H-INDEX

12
(FIVE YEARS 3)

Author(s):  
Jun Jiang ◽  
XinYue Wang ◽  
Mingliang Gao ◽  
Jinfeng Pan ◽  
Chengyuan Zhao ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8501
Author(s):  
Abid Mehmood

The continuous development of intelligent video surveillance systems has increased the demand for enhanced vision-based methods of automated detection of anomalies within various behaviors found in video scenes. Several methods have appeared in the literature that detect different anomalies by using the details of motion features associated with different actions. To enable the efficient detection of anomalies, alongside characterizing the specificities involved in features related to each behavior, the model complexity leading to computational expense must be reduced. This paper provides a lightweight framework (LightAnomalyNet) comprising a convolutional neural network (CNN) that is trained using input frames obtained by a computationally cost-effective method. The proposed framework effectively represents and differentiates between normal and abnormal events. In particular, this work defines human falls, some kinds of suspicious behavior, and violent acts as abnormal activities, and discriminates them from other (normal) activities in surveillance videos. Experiments on public datasets show that LightAnomalyNet yields better performance comparative to the existing methods in terms of classification accuracy and input frames generation.


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3081
Author(s):  
Niloufar Shoeibi ◽  
Nastaran Shoeibi ◽  
Guillermo Hernández ◽  
Pablo Chamoso ◽  
Juan M. Corchado

Maintaining a healthy cyber society is a great challenge due to the users’ freedom of expression and behavior. This can be solved by monitoring and analyzing the users’ behavior and taking proper actions. This research aims to present a platform that monitors the public content on Twitter by extracting tweet data. After maintaining the data, the users’ interactions are analyzed using graph analysis methods. Then, the users’ behavioral patterns are analyzed by applying metadata analysis, in which the timeline of each profile is obtained; also, the time-series behavioral features of users are investigated. Then, in the abnormal behavior detection and filtering component, the interesting profiles are selected for further examinations. Finally, in the contextual analysis component, the contents are analyzed using natural language processing techniques; a binary text classification model (SVM (Support Vector Machine) + TF-IDF (Term Frequency—Inverse Document Frequency) with 88.89% accuracy) is used to detect if a tweet is related to crime or not. Then, a sentiment analysis method is applied to the crime-related tweets to perform aspect-based sentiment analysis (DistilBERT + FFNN (Feed-Forward Neural Network) with 80% accuracy), because sharing positive opinions about a crime-related topic can threaten society. This platform aims to provide the end-user (the police) with suggestions to control hate speech or terrorist propaganda.


2021 ◽  
pp. 113-125
Author(s):  
Roa’a M. Alairaji ◽  
Ibtisam A. Aljazaery ◽  
Haider TH. Salim ALRikabi

2021 ◽  
Vol 2108 (1) ◽  
pp. 012014
Author(s):  
Yong Tang ◽  
Linghao Zhang ◽  
Juling Zhang ◽  
Siyu Xiang ◽  
He Cai

Abstract In view of the current lack of unified security authentication and control for the power Internet of Things terminal equipment, at the perception level of the power Internet of Things, the perception layer terminal access control, front-end authentication technology realization and terminal equipment abnormal behavior detection methods are proposed. This method enhances the communication security between power equipment and edge nodes, and ensures the safe and stable operation of the power Internet of Things.


Author(s):  
Niloufar Shoeibi ◽  
Nastaran Shoeibi ◽  
Guillermo Hernández ◽  
Pablo Chamoso ◽  
Juan Manuel Corchado

Maintaining a healthy cyber society is a big challenge due to the users’ freedom of expression and behaving. It can be solved by monitoring and analyzing the users’ behavior and taking proper actions towards them. This research aims to present a platform that monitors the public content on Twitter by extracting tweet data. After maintaining the data, the users’ interactions are analyzed using Graph Analysis methods. Then the users’ behavioral patterns are analyzed by applying Metadata Analysis, in which the timeline of each profile is obtained; also, the time-series behavioral features of users are investigated. Then in the Abnormal Behavior Detection Filtering component, the interesting profiles are selected for further examinations. Finally, in the Contextual Analysis component, the contents will be analyzed using natural language processing techniques; A binary text classification model (SVM + TF-IDF with 88.89% accuracy) for detecting if the tweet is related to crime or not. Then, a sentiment analysis method is applied to the crime-related tweets to perform aspect-based sentiment analysis (DistilBERT + FFNN with 80% accuracy); because sharing positive opinions about a crime-related topic can threaten society. This platform aims to provide the end-user (Police) suggestions to control hate speech or terrorist propaganda.


2021 ◽  
Author(s):  
Gustavo de P. Avelar ◽  
Guilherme O. Campos ◽  
Wagner Meira Jr.

Anomaly Detection (AD) has grown in importance in recent years, as a result of an increasing digitalization of services and data storage, and abnormal behavior detection has become a key task. However, discovering abnormal data that is mixed with the huge amount of data available is a daunting problem and the efficacy of the current methods depends on a wide range of assumptions. One effective strategy for detecting anomalies is to combine multiple models, which are called "ensembles", but the factors that determine their performance are often hard to determine, making their calibration and improvement a challenging task. In this paper we address these problems by employing a four-step method for the characterization and understanding of ensemble-based anomaly-detection task. We start by characterizing several datasets and analyzing the factors that make it hard to detect their anomalies. We then evaluate to what extent existing algorithms are able to detect anomalies in the same datasets. On the basis of both analyses, we propose a stacking-based ensemble that outperformed a state-of-the-art baseline, Isolation Forest. Finally, we examine the benefits and drawbacks of our proposal.


2021 ◽  
Vol 50 (3) ◽  
pp. 522-545
Author(s):  
Huiyu Mu ◽  
Ruizhi Sun ◽  
Gang Yuan ◽  
Yun Wang

Modeling human behavior patterns for detecting the abnormal event has become an important domain in recentyears. A lot of efforts have been made for building smart video surveillance systems with the purpose ofscene analysis and making correct semantic inference from the video moving target. Current approaches havetransferred from rule-based to statistical-based methods with the need of efficient recognition of high-levelactivities. This paper presented not only an update expanding previous related researches, but also a study coveredthe behavior representation and the event modeling. Especially, we provided a new perspective for eventmodeling which divided the methods into the following subcategories: modeling normal event, predictionmodel, query model and deep hybrid model. Finally, we exhibited the available datasets and popular evaluationschemes used for abnormal behavior detection in intelligent video surveillance. More researches will promotethe development of abnormal human behavior detection, e.g. deep generative network, weakly-supervised. It isobviously encouraged and dictated by applications of supervising and monitoring in private and public space.The main purpose of this paper is to widely recognize recent available methods and represent the literature ina way of that brings key challenges into notice.


2021 ◽  
Author(s):  
Tunc Alkanat ◽  
Herman G.J. Groot ◽  
Matthijs Zwemer ◽  
Egor Bondarev ◽  
Peter H.N. de

Sign in / Sign up

Export Citation Format

Share Document