Computer Science ›› 2021, Vol. 48 ›› Issue (5): 163-169.doi: 10.11896/jsjkx.200800214
• Computer Graphics & Multimedia • Previous Articles Next Articles
GUAN Wen-hua, LIN Chun-yu, YANG Shang-rong, LIU Mei-qin, ZHAO Yao
CLC Number:
[1]ZHAO Y,LIU D,WANG J X.Study on the impact of pedes-trians crossing streets using mobile phones on traffic safety[J].Journal of Chinese People's Public Security University:Science and Technology,2015,21(2):58-62. [2]ZHOU Y.Research of pedestrian abnormal behavior detectionmethod and implementation of the detection system [D].Nanjing:Southeast University,2016. [3]HU H,JIANG S,LI Z,et al.Abnormal Pedestrian Crossing Detection Based on Video Processing[M]//ICCTP 2011:Towards Sustainable Transportation Systems.2011:1391-1400. [4]WU X,OU Y,QIAN H,et al.A detection system for human abnormal behavior[C]//2005 IEEE/RSJ International Conference on Intelligent Robots and Systems.IEEE,2005:1204-1208. [5]LI Y,XU C,LIU J,et al.Detecting irregularity in videos using kernel estimation and kd trees[C]//Proceedings of the 14th ACM international conference on Multimedia.2006:639-642. [6]SULTANI W,CHEN C,SHAH M.Real-world anomaly detection in surveillance videos[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2018:6479-6488. [7]PARK S,PARK J,AL-MASNI M,et al.A depth camera-based human activity recognition via deep learning recurrent neural network for health and social care services[J].Procedia Computer Science,2016,100(100):78-84. [8]LI J J,LIU C L,ZHU M.Fast Abnormal Pedestrians Detection Based on Multi-Task CNN in Surveillance Video[J].Computer Systems & Applications,2018,27(11):78-83. [9]DONG Y R.Unconscious behavior detection for pedestrian safety [D].Beijing:Beijing Jiaotong University,2019. [10]WEI S E,RAMAKRISHNA V,KANADE T,et al.Convolu-tional pose machines[C]//Proceedings of the IEEE conference on Computer Vision and Pattern Recognition.2016:4724-4732. [11]NEWELL A,YANG K,DENG J.Stacked hourglass networksfor human pose estimation[C]//European Conference on Computer Vision.Springer,Cham,2016:483-499. [12]FANG H S,XIE S,TAI Y W,et al.Rmpe:Regional multiperson pose estimation[C]//Proceedings of the IEEE International Conference on Computer Vision.2017:2334-2343. [13]CAO Z,SIMON T,WEI S E,et al.Realtime multi-person 2dpose estimation using part affinity fields[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:7291-7299. [14]NEWELL A,HUANG Z,DENG J.Associative embedding:End-to-end learning for joint detection and grouping[C]//Advances in Neural Information Processing Systems.2017:2277-2287. [15]LIU Z,LUO P,QIU S,et al.Deepfashion:Powering robust clothes recognition and retrieval with rich annotations[C]//Pro-ceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2016:1096-1104. [16]DALAL N,TRIGGS B.Histograms of oriented gradients forhuman detection[C]//2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).IEEE,2005,1:886-893. [17]ZHANG S,XIE Y,WAN J,et al.WiderPerson:A diverse dataset for dense pedestrian detection in the wild[J].IEEE Transactions on Multimedia,2020,22(2):380-393. [18]DOLLÁR P,WOJEK C,SCHIELE B,et al.Pedestrian detec-tion:A benchmark[C]//2009 IEEE Conference on Computer Vision and Pattern Recognition.IEEE,2009:304-311. [19]CHEN X,MA H,WAN J,et al.Multi-view 3d object detection network for autonomous driving[C]//Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition.2017:1907-1915. |
[1] | LI Hai-wei,ZHANG Da-fang,LIU Jun,YANG Xiao-bo. Active Detecting Method against SYN Flooding Attacks [J]. Computer Science, 2010, 37(3): 117-120. |
[2] | LIANG Li XIAO, Fei GAO Song (School of Computer Science and Information Technology, Yunnan Normal University, Kunming 650092). [J]. Computer Science, 2007, 34(6): 294-294. |
|