SmokePose: End-to-End Smoke Keypoint Detection

被引:6
|
作者
Jing, Tao [1 ]
Zeng, Ming [1 ]
Meng, Qing-Hao [1 ]
机构
[1] Tianjin Univ, Inst Robot & Autonomous Syst, Sch Elect & Informat Engn, Tianjin Key Lab Proc Measurement & Control, Tianjin 300072, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Feature extraction; Semantics; Dispersion; Transformers; Task analysis; Heating systems; Visualization; Smoke keypoint detection; urban smoke scene; transformer; attention map; NETWORK;
D O I
10.1109/TCSVT.2023.3258527
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Smoke detection has been a research focus due to its application value in fire and toxic gas leakage alarms. Here we formulate a novel research paradigm for in-depth smoke analysis: modeling the smoke plume in an image with two semantic keypoints, i.e., the start-point (where the smoke comes from) and the end-point (where the smoke spreads), and localizing the keypoints through a heatmap-based detection method. A specialized dataset is developed for smoke keypoint detection, collecting images online and manually annotating the keypoints. Based on the dataset, we propose a Transformer-based model called SmokePose that employs a hierarchical Transformer encoder and a pure Transformer decoder to detect smoke keypoints in an end-to-end manner. We demonstrated the performance of the proposed SmokePose with comparative experiments and ablation studies. A further discussion on the visualization of the attention maps helps to understand the mechanism of SmokePose and to reveal essential image clues for smoke keypoint detection.
引用
收藏
页码:5778 / 5789
页数:12
相关论文
共 50 条
  • [21] Intrinsic Explainability for End-to-End Object Detection
    Fernandes, Luis
    Fernandes, Joao N. D.
    Calado, Mariana
    Pinto, Joao Ribeiro
    Cerqueira, Ricardo
    Cardoso, Jaime S.
    IEEE ACCESS, 2024, 12 : 2623 - 2634
  • [22] An End-to-End Model for Android Malware Detection
    Liang, Hongliang
    Song, Yan
    Xiao, Da
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 140 - 142
  • [23] An End-to-End Approach for the Detection of Phishing Attacks
    Hammi, Badis
    Bilot, Tristan
    Bazain, Danyil
    Binand, Nicolas
    Jaen, Maxime
    Mitta, Chems
    El Madhoun, Nour
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 314 - 325
  • [24] End-to-end lane detection with convolution and transformer
    Ge, Zekun
    Ma, Chao
    Fu, Zhumu
    Song, Shuzhong
    Si, Pengju
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (19) : 29607 - 29627
  • [25] Toward End-to-End Deception Detection in Videos
    Karimi, Hamid
    Tang, Jiliang
    Li, Yanen
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1278 - 1283
  • [26] End-to-End Entity Detection with Proposer and Regressor
    Wen, Xueru
    Zhou, Changjiang
    Tang, Haotian
    Liang, Luguang
    Qi, Hong
    Jiang, Yu
    NEURAL PROCESSING LETTERS, 2023, 55 (07) : 9269 - 9294
  • [27] Develop End-to-End Anomaly Detection System
    Mengoli, Emanuele
    Yao, Zhiyuan
    Wei, Wutao
    Clausen, Thomas
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1370 - 1379
  • [28] End-to-End Temporal Action Detection With Transformer
    Liu, Xiaolong
    Wang, Qimeng
    Hu, Yao
    Tang, Xu
    Zhang, Shiwei
    Bai, Song
    Bai, Xiang
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 31 : 5427 - 5441
  • [29] GravityNet for end-to-end small lesion detection
    Russo, Ciro
    Bria, Alessandro
    Marrocco, Claudio
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2024, 150
  • [30] A Small-Target Forest Fire Smoke Detection Model Based on Deformable Transformer for End-to-End Object Detection
    Huang, Jingwen
    Zhou, Jiashun
    Yang, Huizhou
    Liu, Yunfei
    Liu, Han
    FORESTS, 2023, 14 (01):