Design Guidelines on Deep Learning-based Pedestrian Detection Methods for Supporting Autonomous Vehicles

被引:7
作者
Boukerche, Azzedine [1 ]
Sha, Mingzhi [1 ]
机构
[1] Univ Ottawa, Sch Elect Engn & Comp Sci, 800 King Edward Ave, Ottawa, ON K1N 6N5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Pedestrian detection; autonomous vehicles; intelligent transportation systems; object detection; computer vision; deep learning; convolutional neural network; WEATHER CONDITIONS; OCCLUSION; MODEL; RECOGNITION; INFORMATION; PERCEPTION; ALGORITHM; NETWORKS; TRACKING; FEATURES;
D O I
10.1145/3460770
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Intelligent transportation systems (ITS) enable transportation participants to communicate with each other by sending and receiving messages, so that they can be aware of their surroundings and facilitate efficient transportation through better decision making. As an important part of ITS, autonomous vehicles can bring massive benefits by reducing traffic accidents. Correspondingly, much effort has been paid to the task of pedestrian detection, which is a fundamental task for supporting autonomous vehicles. With the progress of computational power in recent years, adopting deep learning based methods has become a trend for improving the performance of pedestrian detection. In this article, we present design guidelines on deep learning-based pedestrian detection methods for supporting autonomous vehicles. First, we will introduce classic backbone models and frameworks, and we will analyze the inherent attributes of pedestrian detection. Then, we will illustrate and analyze representative pedestrian detectors from occlusion handling, multi-scale feature extraction, multi-perspective data utilization, and hard negatives handling these four aspects. Last, we will discuss the developments and trends in this area, followed by some open challenges.
引用
收藏
页数:36
相关论文
共 154 条
[1]   Face description with local binary patterns:: Application to face recognition [J].
Ahonen, Timo ;
Hadid, Abdenour ;
Pietikainen, Matti .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (12) :2037-2041
[2]  
Alemneh E, 2017, GLOB INFORM INFRAS, P9, DOI 10.1109/GIIS.2017.8169804
[3]  
AneliaAngelova Alex Krizhevsky, 2015, P BMVC
[4]  
[Anonymous], 2020, INT T OPER RES, DOI DOI 10.1111/itor.12653
[5]  
[Anonymous], 2020, IEEE Spectrum
[6]  
[Anonymous], 2018, SAE MOBILUS
[7]  
[Anonymous], 2020, IEEE INNOVATION WORK
[8]  
[Anonymous], 2009, BMVC, DOI DOI 10.5244/C.23.91
[9]   The Attack Generator: A Systematic Approach Towards Constructing Adversarial Attacks [J].
Assion, Felix ;
Schlicht, Peter ;
Gressner, Florens ;
Gunther, Wiebke ;
Huger, Fabian ;
Schmidt, Nico ;
Rasheed, Umair .
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019), 2019, :1370-1379
[10]  
Baidya S., 2020, ACM/IEEE Design Automation Conference (DAC), P1