Computer Science ›› 2020, Vol. 47 ›› Issue (4): 119-124.doi: 10.11896/jsjkx.190300392
• Computer Graphics & Multimedia • Previous Articles Next Articles
WANG Kun-lun, LIU Wen-can, HE Xiao-hai, QING Lin-bo, WU Xiao-hong
CLC Number:
[1]SODEMANN A A,ROSS M P,BORGHETTI B J.A review of anomaly detection in automated surveillance[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C (Applications and Reviews),2012,42(6):1257-1272. [2]ILG E,MAYER N,SAIKIA T,et al.Flownet 2.0:Evolution of optical flow estimation with deep networks[C]//IEEEConfe-rence on Computer Vision and Pattern Recognition.IEEE,2017:6. [3]YANG Y,SOATTO S.Conditional Prior Networks for OpticalFlow[C]// European Conference on Computer Vision.Sprin-ger,2018:282-298. [4]KLASER A,MARSZALEK M,SCHMID C.A spatio-temporaldescriptor based on 3d-gradients[C]//19th British Machine Vision Conference.British Machine Vision Association,2008:275:1-10. [5]NISHINO K,KRATZ L.Anomaly detection in extremelycrowded scenes using spatio-temporal motion pattern models[C]//2009 IEEE Conference on Computer Vision and Pattern Recognition.Miami,IEEE,2009:1446-1453. [6]LAPTEV I,MARSZALEK M,SCHMID C,et al.Learning realistic human actions from movies[C]//Computer Vision and Pattern Recognition.IEEE,2008:1-8. [7]CONG Y,YUAN J,LIU J.Sparse reconstruction cost for abnormal event detection[C]//Computer Vision and Pattern Recognition.IEEE,2011:3449-3456. [8]LI A,MIAO Z,CEN Y,et al.Abnormal event detection based on sparse reconstruction in crowded scenes[C]//Acoustics,Speech and Signal Processing (ICASSP).IEEE,2016:1786-1790. [9]NALLAIVAROTHAYAN H,FOOKES C,DENMAN S,et al.An MRF based abnormal event detection approach using motion and appearance features[C]//Advanced Video and Signal Based Surveillance (AVSS).IEEE,2014:343-348. [10]DIREKOGLU C,SAH M,O’CONNOR N E.Abnormal crowd behavior detection using novel optical flow-based features[C]//2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).IEEE,2017:1-6. [11]EDISON A,JIJI C V.Optical Acceleration for Motion Description in Videos[C]//Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).Honolulu,2017:21-26. [12]HINTON G E,SALAKHUTDINOV R R.Reducing the dimensionality of data with neural networks[J].Science,2006,313(5786):504-507. [13]VU H,NGUYEN T D,TRAVERS A,et al.Energy-based localized anomaly detection in video surveillance[C]//Pacific-Asia Conference on Knowledge Discovery and Data Mining.Springer.Cham,2017:641-653. [14]ACKLEY D H,HINTON G E,SEJNOWSKI T J.A learning algorithm for Boltzmann machines[J].Cognitive Science,1985,9(1):147-169. [15]MEHRAN R,OYAMA A,SHAH M.Abnormal crowd behavior detection using social force model[C]//Computer Vision and Pattern Recognition.IEEE,2009:935-942. [16]WANG T,QIAO M,DENG Y,et al.Abnormal event detection based on analysis of movement information of video sequence[J].Optik-International Journal for Light and Electron Optics,2018,152:50-60. [17]SHI Y,GAO Y,WANG R.Real-time abnormal event detection in complicated scenes[C]//Pattern Recognition (ICPR).IEEE,2010:3653-3656. [18]WANG T,SNOUSSI H.Detection of abnormal visual events via global optical flow orientation histogram[J].IEEE Transactions on Information Forensics and Security,2014,9(6):988-998. [19]ZHU X,LIU J,WANG J,et al.Sparse representation for robust abnormality detection in crowded scenes[J].Pattern Recognition,2014,47(5):1791-1799. [20]ZHU X,LIU J,WANG J,et al.Weighted interaction force estimation for abnormality detection in crowd scenes[C]//Asian Conference on Computer Vision.Springer,Berlin,Heidelberg,2012:507-518. [21]CHEN H,GAI J,ZHANG S,et al.Abnormal event detection based on cosparse reconstruction[J].The Journal of Enginee-ring,2018,2018(5):254-256. |
[1] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[2] | ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112. |
[3] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[4] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[5] | GAO Yuan-hao, LUO Xiao-qing, ZHANG Zhan-cheng. Infrared and Visible Image Fusion Based on Feature Separation [J]. Computer Science, 2022, 49(5): 58-63. |
[6] | ZHANG Hong-min, LI Ping-ping, FANG Xiao-bing, LIU Hong. Human Abnormal Behavior Detection Method Based on Improved YOLOv3 Network Model [J]. Computer Science, 2022, 49(4): 233-238. |
[7] | ZUO Jie-ge, LIU Xiao-ming, CAI Bing. Outdoor Image Weather Recognition Based on Image Blocks and Feature Fusion [J]. Computer Science, 2022, 49(3): 197-203. |
[8] | REN Shou-peng, LI Jin, WANG Jing-ru, YUE Kun. Ensemble Regression Decision Trees-based lncRNA-disease Association Prediction [J]. Computer Science, 2022, 49(2): 265-271. |
[9] | ZHANG Shi-peng, LI Yong-zhong. Intrusion Detection Method Based on Denoising Autoencoder and Three-way Decisions [J]. Computer Science, 2021, 48(9): 345-351. |
[10] | XU Tao, TIAN Chong-yang, LIU Cai-hua. Deep Learning for Abnormal Crowd Behavior Detection:A Review [J]. Computer Science, 2021, 48(9): 125-134. |
[11] | FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23. |
[12] | ZHANG Li-qian, LI Meng-hang, GAO Shan-shan, ZHANG Cai-ming. Summary of Computer-assisted Tongue Diagnosis Solutions for Key Problems [J]. Computer Science, 2021, 48(7): 256-269. |
[13] | BAO Yu-xuan, LU Tian-liang, DU Yan-hui, SHI Da. Deepfake Videos Detection Method Based on i_ResNet34 Model and Data Augmentation [J]. Computer Science, 2021, 48(7): 77-85. |
[14] | CHEN Yang, WANG Jin-liang, XIA Wei, YANG Hao, ZHU Run, XI Xue-feng. Footprint Image Clustering Method Based on Automatic Feature Extraction [J]. Computer Science, 2021, 48(6A): 255-259. |
[15] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
|