Armed boundary sabotage: A case study of human malicious behaviors identification with computer vision and explainable reasoning methods

被引:0
作者
Li, Zhan [1 ]
Song, Xingyu [1 ]
Chen, Shi [1 ]
Demachi, Kazuyuki [1 ]
机构
[1] Univ Tokyo, Sch Engn, Dept Nucl Engn & Management, Tokyo, Japan
关键词
Human malicious behaviors identification; Armed boundary sabotage; Computer vision; Human-object interaction analysis; Data-based reasoning method; Language-based reasoning method; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.compeleceng.2024.109924
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the technologies in computer vision (CV) are labor-saving and convenient to identify human malicious behaviors. However, they usually fail to consider the robustness, generalization and interpretability of calculation frameworks. In this paper, a very common but sometimes difficult-to-detect case research called armed boundary sabotage is conducted, which is achieved by computer vision module (CVM) and reasoning module (RM). Among them, CVM is used for extracting the key information from raw videos, while RM is applied to obtain the final reasoning results. Considering the transient and confusing properties in such scenarios, a specific humanobject interaction analysis process with soft constraint is proposed in CVM. In addition, two reasoning methods which are data-based reasoning method and language-based reasoning methods are implemented in RM. The results show that the human-object interaction analysis process with soft constraint prove to be effective and practical, while the optimal testing accuracy achieves 0.7871. Furthermore, the two proposed reasoning methods are promising for identification of human malicious behaviors. Among them, the advanced language-based reasoning method outperforms others, with highest precision value of 0.8750 and perfect recall value of 1.0000. Besides, these proposals are also verified to be high-performance in other external intrusion scenarios of our previous work. Finally, our research also obtain state-of-the-art results by comparing with other related works.
引用
收藏
页数:17
相关论文
共 64 条
[1]   Detection of anomaly in surveillance videos using quantum convolutional neural networks [J].
Amin, Javaria ;
Anjum, Muhammad Almas ;
Ibrar, Kainat ;
Sharif, Muhammad ;
Kadry, Seifedine ;
Crespo, Ruben Gonzalez .
IMAGE AND VISION COMPUTING, 2023, 135
[2]   Cyber security and beyond: Detecting malware and concept drift in AI-based sensor data streams using statistical techniques [J].
Amin, Muhammad ;
Al-Obeidat, Feras ;
Tubaishat, Abdallah ;
Shah, Babar ;
Anwar, Sajid ;
Tanveer, Tamleek Ali .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
[3]   The Rare Word Issue in Natural Language Generation: A Character-Based Solution [J].
Bonetta, Giovanni ;
Roberti, Marco ;
Cancelliere, Rossella ;
Gallinari, Patrick .
INFORMATICS-BASEL, 2021, 8 (01)
[4]   Reference tag supported RFID tracking using robust support vector regression and Kalman filter [J].
Chai, Jian ;
Wu, Changzhi ;
Zhao, Chuanxin ;
Chi, Hung-Lin ;
Wang, Xiangyu ;
Ling, Bingo Wing-Kuen ;
Teo, Kok Lay .
ADVANCED ENGINEERING INFORMATICS, 2017, 32 :1-10
[5]   Graph-based linguistic and visual information integration for on-site occupational hazards identification [J].
Chen, Shi ;
Demachi, Kazuyuki ;
Dong, Feiyan .
AUTOMATION IN CONSTRUCTION, 2022, 137
[6]   ST-HOI: A Spatial-Temporal Baseline for Human-Object Interaction Detection in Videos [J].
Chiou, Meng-Jiun ;
Liao, Chun-Yu ;
Wang, Li-Wei ;
Zimmermann, Roger ;
Feng, Jiashi .
ICDAR '21: PROCEEDINGS OF THE 2021 WORKSHOP ON INTELLIGENT CROSS-DATA ANALYSIS AND RETRIEVAL, 2021, :9-17
[7]  
Contributors M., 2020, OpenMMLab pose estimation toolbox and benchmark
[8]  
DeRosa K., 2023, Vancouver Sun
[9]  
Diao SZ, 2024, Arxiv, DOI [arXiv:2306.12420, 10.48550/arXiv.2306.12420]
[10]  
Gao C, 2018, 2018 BRIT MACH VIS C