Video anomaly detection using deep incremental slow feature analysis network

X Hu, S Hu, Y Huang, H Zhang, H Wu - IET Computer Vision, 2016 - Wiley Online Library
Existing anomaly detection (AD) approaches rely on various hand‐crafted representations to
represent video data and can be costly. The choice or designing of hand‐crafted …

Behavioral characteristics and statistics-based imaging techniques in the assessment and optimization of tilapia feeding in a recirculating aquaculture system

Z Ye, J Zhao, Z Han, S Zhu, J Li, H Lu… - Transactions of the …, 2016 - elibrary.asabe.org
Optimization of feeding control for fish welfare is emphasized in aquaculture. To improve the
feeding quality of tilapia in recirculating aquaculture systems (RAS), a novel method based …

Detecting rare events using Kullback–Leibler divergence: A weakly supervised approach

J Xu, S Denman, C Fookes, S Sridharan - Expert Systems with Applications, 2016 - Elsevier
Video surveillance infrastructure has been widely installed in public places for security
purposes. However, live video feeds are typically monitored by human staff, making the …

Anomaly detection techniques in surveillance videos

X Li, Z Cai - 2016 9th International congress on image and …, 2016 - ieeexplore.ieee.org
In recent years, a dramatically increasing number of surveillance cameras have been
installed to monitor private and public spaces and areas. Video surveillance is seen as an …

A thermodynamics-inspired feature for anomaly detection on crowd motions in surveillance videos

X Zhang, S Yang, YY Tang, W Zhang - Multimedia Tools and Applications, 2016 - Springer
Identification of abnormal behaviors in surveillance videos of crowds plays an important role
in public security monitoring. However, detecting abnormal crowd behaviors is challenging …

User abnormal behavior analysis based on neural network clustering

Z Ruijuan, C Jing, Z Mingchuan, Z Junlong… - The Journal of China …, 2016 - Elsevier
It is the premise of accessing and controlling cloud environment to establish the mutual trust
relationship between users and clouds. How to identify the credible degree of the user …

基于智能监控的中小人群异常行为检测

何传阳, 王平, 张晓华, 宋丹妮 - 计算机应用, 2016 - joca.cn
针对人群异常行为检测实时性较差, 分类算法识别率不高, 特征量较少的问题,
提出一种基于智能监控的中小人群异常行为检测算法. 首先, 利用快速群体密度检测算法 …

Small scale crowd behavior classification by Euclidean distance variation-weighted network

X Zhang, M Ouyang, X Zhang - Multimedia tools and applications, 2016 - Springer
Crowd behavior analysis is a key research topic in the field of computer vision. The
traditional method of crowd behavior analysis can be divided into two categories. One is the …

Abnormal event detection based on social force model combined with crowd violent flow

Y Wen, J Du, JM Lee - 2016 4th International Conference on …, 2016 - ieeexplore.ieee.org
In this study, we use the social force model (SFM) combined with the violent flows descriptor
(vif) to detect abnormal events. Our method extracts the local density to calculate the …

Detecção de comportamento anormal em vídeos de multidão

CJ Gregoratto - 2016 - tede.ufam.edu.br
Sistemas de segurança produzem uma quantidade massiva de material de vıdeo que pode
ser utilizada para reconhecer comportamento anormal ou atividades que ofereçam riscosa …