Have a personal or library account? Click to login
Graph based anomaly detection in human action video sequence Cover

Graph based anomaly detection in human action video sequence

Open Access
|Nov 2022

References

  1. [1] L. Akoglu, H. Tong and D. Koutra, Data MKnowl Disc, vol. 29, 626-688, 2015, https://doi.org/10.1007/s10618-014-0365-y.
  2. [2] C. Schüldt, I. Laptev and B. Caputo, “Recognizing human actions: a local SVM approach”, Proceedings of the 17th International Conference on Pattern Recognition, vol. 3, 32-36, 2004, doi: 10.1109/ICPR.2004.1334462.
  3. [3] L. Gorelick, M. Blank, E. Shechtman, M. Irani, and R. Basri, “Actions as Space-Time Shapes”, Transactions on Pattern Analysis and Machine Intelligence, www.wisdom.weizmann.ac.il/~vision/SpaceTimeActions.html.
  4. [4] M. Blank, L. Gorelick, E. Shechtman, M. Irani, and R. Basri, “Actions as Space-Time Shapes”, 10th IEEE International Conference on Computer Vision, 1395-1402, 2005, www.wisdom.weizmann.ac.il/~vision/SpaceTimeActions.html.10.1109/ICCV.2005.28
  5. [5] A. Abdulmunem, L. Y-Kun, A. Hassan, and S. Xianfang, “Human action recognition using graph matching”, 7th International Conference on Applied Science and Technology, Proc. 2144. 050003-1-050003-10, 2019, https://doi.org/10.1063/1.5123119.
  6. [6] B. Yang, C. Jinmeng, N. Rongrong, and L. Zou, “Anomaly Detection in Noving Crowds through Spatiotemporal Autoencoding and Additional Attention”, Advances Multimedia, https://doi/org/10.1155/2018/2087574.
  7. [7] H. Vu, T. D. Nguyen, T. Le, W. Luo, and D. Phung, “Robust anomaly detection in videos using multilevel representations”, Proceedings of AAAI19-Thirty-Third AAAI conference on Artificial Intelligence, 5216-5223, 2019, https://doi.org/10.1609/aaai.v33i01.33015216.
  8. [8] H. Jingtao, E. Zhu, S. Wang, X. Liu, X. Guo and J. Jin, “An E cient and Robust Unsupervised Anomaly Detection Method Using Ensemble Random Projection in Surveillance Videos”, Sensors, 4145, 2019, https://doi.org/10.3390/s19194145.680624331554333
  9. [9] R. Kapoor O. Mishra and M. Tripathi, “Anomaly detection in group activities based on fuzzy lattices using Schrdinger equation”, Iran Journal of Computer Science, https://doi.org/10.1007/s42044-019-00045-y.
  10. [10] L. Shi, Y. Zhang, J. Cheng, and H. Lu “Skeleton-Based Action Recognition With Directed Graph Neural Networks”, Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, doi: 10.1109/CVPR.2019.00810.
  11. [11] W. Hao, R. Zhang, S. Li, J. Li, F. Zhao, and Z. Zhang, “Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model”, Security and Communication Networks, 2020, Article ID 8876056, 2020, https://doi.org/10.1155/2020/8876056.
  12. [12] D. Singh and K. Mohan, “Graph formulation of video activities for abnormal activity recognition”, Pattern Recognition, 65, 265-272, 2017, https://doi.org/10.1016/j.patcog.2017.01.001.
  13. [13] W. Eberle and L. Holder “Discovering Structural Anomalies in Graph-Based Data”, Proceedings - IEEE International Conference on Data Mining, 393-398, 2007, 10.1109/ICDMW.2007.91.10.1109/ICDMW.2007.91
  14. [14] T. Pourhabibi, K. L. Ong, B. H. Kam, and Y. L. Boo, “Fraud detection: A systematic literature review of graph-based anomaly detection approaches”, Decision Support Systems, vol. 133,2020, https://doi.org/10.1016/j.dss.2020.113303.
  15. [15] L. Davis, W. Liu, P. Miller, and G. Redpath, “Detecting anomalies in graphs with numeric labels”, Proceedings of the 20th ACM international conference on Information and knowledge management, Association for Computing Machinery, New York, NY, USA, 1197–1202, 2011, doi:https://doi.org/10.1145/2063576.2063749.
  16. [16] C. Noble and D. Cook, “Graph-based anomaly detection”, Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining, https://doi.org/10.1145/956750.956831.
  17. [17] D. Cook and L. Holder, “Graph-Based Data Mining”, IEEE Intelligent Systems.
  18. [18] I. Laptev, “On Space-Time Interest Points”, Int J Comput Vision, 107–123, 2005, https://doi.org/10.1007/s11263-005-1838-7.
  19. [19] I. Laptev and T. Lindberg, “Space-time interest points”, International Journal of Computer Vision - IJCV, vol. 1, (2003), https://doi.org/10.1109/ICCV.2003.1238378.
  20. [20] R. Kapoor, O Mishra, and M. Tripathi, “Human action recognition using descriptor based on selective finite element analysis”, Journal of Electrical Engineering, 443-453, 2019, https://doi.org/10.2478/jee-2019-0077.
  21. [21] O. Mishra, R. Kapoor, and M.Tripathi, “Human Action Recognition Using Modified Bag of Visual Word based on Spectral Perception”, International Journal of Image, Graphics and Signal Processing, 11, 34-43, 2019, https://doi.org/10.5815/ijigsp.2019.09.04.
  22. [22] I. Bellamine and H. Tairi, “Motion Detection using the space-time interest points”, Journal of Computer Science, 828-839, 2014, https://doi.org/10.3822/jcssp.2014.828.839.
  23. [23] P. Dollar, V. Rabaut, G. Cottrell, and S. Belongie, “Behavior recognition via sparse spatio-temporal features”, Proceedings of the 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance, 15-16, IEEE Xplore Press, 65-72, 2005, doi: 10.1109/VSPETS.2005.1570899.
  24. [24] G. Willems, T. Tuytelaars, and L. V. Gool, “An efficient dense and scale-invariant spatio-temporal interest point detector”, Proceedings 10th European Conference on Computer Vision, 12-18, Springer Berlin Heidelberg, Marseille, France. 650-663 (2008). doi: 10.1007/978-3-540-88688-4 48.
  25. [25] Q. Xiao, J. Liu, Q. Wang, Z. Jiang, X. Wang, and Y. Yao, “Towards Network Anomaly Detection Using Graph Embedding”, In: Krzhizhanovskaya V.V. et al (eds) Computational Science, vol. 12140, Springer, 2020, https://doi.org/10.1007/978-3-030-5023-612.
DOI: https://doi.org/10.2478/jee-2022-0042 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 318 - 324
Submitted on: Aug 15, 2022
|
Published on: Nov 15, 2022
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2022 Pranoti Shrikant Kavimandan, Rajiv Kapoor, Kalpana Yadav, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.