Anomaly detection framework for unmanned vending machines*

被引:4
作者
Da, Zongyang [1 ]
Dun, Yujie [1 ]
Liu, Chengxu [1 ]
Liang, Yuanzhi [2 ]
Xue, Yao [1 ]
Qian, Xueming [1 ,3 ,4 ]
机构
[1] Xi An Jiao Tong Univ, Sch Informat & Commun Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Software Engn, Xian 710049, Peoples R China
[3] Xi An Jiao Tong Univ, Key Lab Intelligent Networks & Network Secur, Minist Educ, Xian 710049, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, SMILES Lab, Xian 710049, Peoples R China
关键词
Unmanned retail; Anomaly detection; Classification; Loss function; Dataset;
D O I
10.1016/j.knosys.2023.110251
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unmanned vending machines (UVMs) based on computer vision have shown huge commercial potential in unmanned retail. Anomaly detection is the problem of recognizing the falling-over and occlusion anomalies in UVMs. However, considering various anomaly features with different feature complexities, the existing methods are not sufficiently effective. In this paper, we propose an unmanned retail anomaly detection method based on deep convolutional neural networks (CNNs) called the complexity-classification anomaly detection (ClassAD) framework. The ClassAD method consists of two modules: a complexity rating module and a classification module. These two modules jointly input images of different feature complexity into different-capacity networks, which makes full use of the feature extraction ability of CNNs. ClassAD includes a decomposition feature enhancement approach to enhance inference speed. Furthermore, we introduce complexity-class loss and multi-instance loss in ClassAD for accuracy and learning stability. Experiments show that ClassAD yields promising results compared with state-of-the-art methods in both effectiveness and efficiency. In addition, we propose a UVM-Anomaly dataset for anomaly detection in UVMs.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:11
相关论文
共 46 条
[1]   GANomaly: Semi-supervised Anomaly Detection via Adversarial Training [J].
Akcay, Samet ;
Atapour-Abarghouei, Amir ;
Breckon, Toby P. .
COMPUTER VISION - ACCV 2018, PT III, 2019, 11363 :622-637
[2]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[3]  
Cai YQ, 2020, Arxiv, DOI arXiv:2003.08230
[4]  
Chalapathy R, 2019, Arxiv, DOI arXiv:1901.03407
[5]  
Cho, 2015, SPECIAL LECT IE, V2, P1, DOI DOI 10.1007/BF00758335
[6]  
Cui Q., 2019, arXiv
[7]  
Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
[8]   Image Super-Resolution Using Deep Convolutional Networks [J].
Dong, Chao ;
Loy, Chen Change ;
He, Kaiming ;
Tang, Xiaoou .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2016, 38 (02) :295-307
[9]  
Ekanayake Pubudu, 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019 International Workshops. Proceedings: Lecture Notes in Computer Science (LNCS 11637), P218, DOI 10.1007/978-3-030-24900-7_18
[10]   Deep Learning for Medical Anomaly Detection - A Survey [J].
Fernando, Tharindu ;
Gammulle, Harshala ;
Denman, Simon ;
Sridharan, Sridha ;
Fookes, Clinton .
ACM COMPUTING SURVEYS, 2021, 54 (07)