Computer Science ›› 2022, Vol. 49 ›› Issue (4): 233-238.doi: 10.11896/jsjkx.210300251
• Computer Graphics & Multimedia • Previous Articles Next Articles
ZHANG Hong-min1, LI Ping-ping1, FANG Xiao-bing1, LIU Hong2
CLC Number:
[1] LENTZAS A,VRAKAS D.Non-intrusive human activity recognition and abnormal behavior detection on elderly people:a review[J].Artificial Intelligence Review,2020,53(3):1975-2021. [2] XU T,TIAN C Y,LIU C H.Deep Learning for AbnormalCrowd Behavior Detection:A Review[J].Computer Science,2021,48(9):125-134. [3] FAN Z,YIN J,SONG Y,et al.Real-time and accurate abnormal behavior detection in videos[J].Machine Vision and Applications,2020,31(7):1-13. [4] WANG Y N,LUO J J,WANG D W.An abnormal behavior detection algorithm based on key frame and amplitude histogram entropy[J].Computer and Digital Engineering,2019,47(9):2281-2285. [5] SATYBALDINA D Z,GLAZYRINA N S,KALYMOVA K A,et al.Development of an algorithm for abnormal human behavior detection in intelligent video surveillance system[J].IOP Conference Series:Materials Science and Engineering,2021,1069(1):12046-12054. [6] WU C F,CHENG Z X,JIANG Y Z.A Novel Detection Framework for Detecting Abnormal Human Behavior[J].Mathema-tical Problems in Engineering,2020,2020(1):1-9. [7] ZHENG H,LIU J F,LIAO M Y.Detection and recognition of abnormal human behavior based on hybrid algorithm under indoor video surveillance[J].Computer Applications and Software,2019,36(7):224-230,241. [8] LI X Q,SUN S L.Research on abnormal behavior detection based YOLO network[J].Electronic Design Engineering,2018,26(20):160-164,170. [9] LUO F B,WANG P,LIANG S Y,et al.Recognition of abnormal crowd behavior based on deep learning and sparse optical flow[J].Computer Engineering,2020,46(4):287-293,300. [10] MA Y D,LUO Z J,NI Z F,et al.Improved SSD algorithm for multi-target detection[J].Computer Engineering and Applications,2020,966(23):29-36. [11] HE K M,ZHANG X Y,REN S Q,et al.Deep Residual Learning for Image Recognition[C]//2016 IEEE Conference on Compu-ter Vision and Pattern Recognition (CVPR).Las Vegas,USA:IEEE Xplore,2016:770-778. [12] HU J,SHEN L,ALBANIE S,et al.Squeeze and Excitation Networks[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2020,42(8):2011-2023. [13] KANG Y,CUI G R,LI H,et al.Software requirement clustering algorithm integrating self-attention mechanism and multi-pyramid convolution[J].Computer Science,2020,47(3):48-53. [14] WANG S Y,WANG J J.Research on real time detection method of high density crowd target based on improved yolov3 algorithm[J].Safety and Environmental Engineering,2019,26(5):194-200. [15] REDMON J,FARHADI A.YOLOv3:An Incremental Improvement[C]//2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).Salt Lake City,USA:IEEE Xplore,2018:1086-1091. [16] ZOU Z W,QIN C.Method of dynamically constructing spatial topic R-tree based on k-means++[J].Journal of Computer Applications,2021,41(3):733-737. [17] ZHANG F K,YANG F,LI C.Fastvehicle detection methodbased on improved YOLOv3[J].Computer Engineering and Application,2019,55(2):12-20. |
[1] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[2] | DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145. |
[3] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
[4] | XIONG Li-qin, CAO Lei, LAI Jun, CHEN Xi-liang. Overview of Multi-agent Deep Reinforcement Learning Based on Value Factorization [J]. Computer Science, 2022, 49(9): 172-182. |
[5] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[6] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[7] | WANG Ming, PENG Jian, HUANG Fei-hu. Multi-time Scale Spatial-Temporal Graph Neural Network for Traffic Flow Prediction [J]. Computer Science, 2022, 49(8): 40-48. |
[8] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[9] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[10] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[11] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[12] | YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236. |
[13] | JIN Fang-yan, WANG Xiu-li. Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM [J]. Computer Science, 2022, 49(7): 179-186. |
[14] | XIONG Luo-geng, ZHENG Shang, ZOU Hai-tao, YU Hua-long, GAO Shang. Software Self-admitted Technical Debt Identification with Bidirectional Gate Recurrent Unit and Attention Mechanism [J]. Computer Science, 2022, 49(7): 212-219. |
[15] | PENG Shuang, WU Jiang-jiang, CHEN Hao, DU Chun, LI Jun. Satellite Onboard Observation Task Planning Based on Attention Neural Network [J]. Computer Science, 2022, 49(7): 242-247. |
|