GROUP BEHAVIOUR PROFILING FOR DETECTION OF ANOMALY IN CROWD

被引:5
作者
Palanisamy, Geetha [1 ]
Manikandan, T. T. [1 ]
机构
[1] Anna Univ, Dept Comp Sci & Engn, Coll Engn, Chennai, Tamil Nadu, India
来源
2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC) | 2017年
关键词
Crowd; Group behavior; trajectories; clustering; abnormal events;
D O I
10.1109/ICTACC.2017.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Groups are the main entities that form the crowd. So understanding group level properties is vital and practically useful in a wide range of applications, especially for crowd abnormality detection. This paper aims to address the problem of modeling different behaviors captured in surveillance videos for the applications of normal behavior and abnormal behavior detection. A novel framework is developed for automatic behavior profiling and anomaly detection based on the clustering based group analysis. These behaviors can be effectively applied to public scenes with variety of crowd densities and distributions and are potentially important in many applications like crowd dynamic monitoring, crowd video classification and abnormal event detection in security surveillance.
引用
收藏
页码:11 / 15
页数:5
相关论文
共 50 条
[41]   Real-Time Recognition of Calling Pattern and Behaviour of Mobile Phone Users through Anomaly Detection and Dynamically-Evolving Clustering [J].
Antonio Iglesias, Jose ;
Ledezma, Agapito ;
Sanchis, Araceli ;
Angelov, Plamen .
APPLIED SCIENCES-BASEL, 2017, 7 (08)
[42]   Data Anomaly Detection with Parallelizing CDP Algorithm [J].
Wang, Yuan ;
Ng, Vincent .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :858-863
[43]   Anomaly Detection using Convolutional Spatiotemporal Autoencoder [J].
Dhole, Hemant ;
Sutaone, Mukul ;
Vyas, Vibha .
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
[44]   A survey of anomaly detection techniques in financial domain [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Islam, Md. Rafiqul .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :278-288
[45]   Anomaly Detection with HMM Gauge Likelihood Analysis [J].
Lorbeer, Boris ;
Deutsch, Tanja ;
Ruppel, Peter ;
Kuepper, Axel .
2019 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2019), 2019, :1-8
[46]   Mithra: Anomaly Detection as an Oracle for Cyberphysical Systems [J].
Afzal, Afsoon ;
Le Goues, Claire ;
Timperley, Christopher Steven .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (11) :4535-4552
[47]   CADeSH: Collaborative Anomaly Detection for Smart Homes [J].
Meidan, Yair ;
Avraham, Dan ;
Libhaber, Hanan ;
Shabtai, Asaf .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (10) :8514-8532
[48]   Big Data Analytics for Anomaly Detection in Blockchain [J].
Ozbilen, Mahmut Lutfullah ;
Ozcan, Elif ;
Keles, Mustafa Berk ;
Zeybel, Merve ;
Dervisoglu, Havanur ;
Dogan, Aslinur ;
Haklidir, Mehmet .
2023 31ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, SIU, 2023,
[49]   Incremental Stream Clustering for Anomaly Detection and Classification [J].
Holst, Anders ;
Ekman, Jan .
ELEVENTH SCANDINAVIAN CONFERENCE ON ARTIFICIAL INTELLIGENCE (SCAI 2011), 2011, 227 :100-107
[50]   An overview of flow-based anomaly detection [J].
Sharma, Rohini ;
Guleria, Ajay ;
Singla, R. K. .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (02) :220-240