Armed boundary sabotage: A case study of human malicious behaviors identification with computer vision and explainable reasoning methods

被引:0
作者
Li, Zhan [1 ]
Song, Xingyu [1 ]
Chen, Shi [1 ]
Demachi, Kazuyuki [1 ]
机构
[1] Univ Tokyo, Sch Engn, Dept Nucl Engn & Management, Tokyo, Japan
关键词
Human malicious behaviors identification; Armed boundary sabotage; Computer vision; Human-object interaction analysis; Data-based reasoning method; Language-based reasoning method; KNOWLEDGE; SYSTEM;
D O I
10.1016/j.compeleceng.2024.109924
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the technologies in computer vision (CV) are labor-saving and convenient to identify human malicious behaviors. However, they usually fail to consider the robustness, generalization and interpretability of calculation frameworks. In this paper, a very common but sometimes difficult-to-detect case research called armed boundary sabotage is conducted, which is achieved by computer vision module (CVM) and reasoning module (RM). Among them, CVM is used for extracting the key information from raw videos, while RM is applied to obtain the final reasoning results. Considering the transient and confusing properties in such scenarios, a specific humanobject interaction analysis process with soft constraint is proposed in CVM. In addition, two reasoning methods which are data-based reasoning method and language-based reasoning methods are implemented in RM. The results show that the human-object interaction analysis process with soft constraint prove to be effective and practical, while the optimal testing accuracy achieves 0.7871. Furthermore, the two proposed reasoning methods are promising for identification of human malicious behaviors. Among them, the advanced language-based reasoning method outperforms others, with highest precision value of 0.8750 and perfect recall value of 1.0000. Besides, these proposals are also verified to be high-performance in other external intrusion scenarios of our previous work. Finally, our research also obtain state-of-the-art results by comparing with other related works.
引用
收藏
页数:17
相关论文
共 64 条
[11]   A novel algorithm for mask detection and recognizing actions of human [J].
Gupta, Puja ;
Sharma, Varsha ;
Varma, Sunita .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 198
[12]   A weakly supervised framework for abnormal behavior detection and localization in crowded scenes [J].
Hu, Xing ;
Dai, Jian ;
Huang, Yingping ;
Yang, Haima ;
Zhang, Liang ;
Chen, Wenming ;
Yang, Genke ;
Zhang, Dawei .
NEUROCOMPUTING, 2020, 383 :270-281
[13]   A detection method of individual fare evasion behaviours on metros based on skeleton sequence and time series [J].
Huang, Shize ;
Liu, Xiaowen ;
Chen, Wei ;
Song, Guanqun ;
Zhang, Zhaoxin ;
Yang, Lingyu ;
Zhang, Bingjie .
INFORMATION SCIENCES, 2022, 589 :62-79
[14]   A review of video action recognition based on 3D convolution [J].
Huang, Xiankai ;
Cai, Zhibin .
COMPUTERS & ELECTRICAL ENGINEERING, 2023, 108
[15]   An object detection algorithm combining semantic and geometric information of the 3D cloud [J].
Huang, Zhe ;
Wang, Yongcai ;
Wen, Jie ;
Wang, Peng ;
Cai, Xudong .
ADVANCED ENGINEERING INFORMATICS, 2023, 56
[16]   Advancing multimodal diagnostics: Integrating industrial textual data and domain knowledge with large language models [J].
Jose, Sagar ;
Nguyen, Khanh T. P. ;
Medjaher, Kamal ;
Zemouri, Ryad ;
Levesque, Melanie ;
Tahan, Antoine .
EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255
[17]   Application of one-stage instance segmentation with weather conditions in surveillance cameras at construction sites [J].
Kang, Kyung-Su ;
Cho, Young-Woon ;
Jin, Kyo-Hoon ;
Kim, Young-Bin ;
Ryu, Han-Guk .
AUTOMATION IN CONSTRUCTION, 2022, 133
[18]   Risks of abuse of large language models, like ChatGPT, in scientific publishing: Authorship, predatory publishing, and paper mills [J].
Kendall, Graham ;
da Silva, Jaime A. Teixeira .
LEARNED PUBLISHING, 2024, 37 (01) :55-62
[19]   A semi-supervised deep learning based video anomaly detection framework using RGB-D for surveillance of real-world critical environments [J].
Khaire, Pushpajit ;
Kumar, Praveen .
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2022, 40
[20]   Intelligent intrusion detection system featuring a virtual fence, active intruder detection, classification, tracking, and action recognition [J].
Kim, Seung Hyun ;
Lim, Su Chang ;
Kim, Do Yeon .
ANNALS OF NUCLEAR ENERGY, 2018, 112 :845-855