Detecting Suspicious Behavior: How to Deal with Visual Similarity
through Neural Networks
- URL: http://arxiv.org/abs/2007.15235v1
- Date: Thu, 30 Jul 2020 05:13:52 GMT
- Title: Detecting Suspicious Behavior: How to Deal with Visual Similarity
through Neural Networks
- Authors: Guillermo A. Mart\'inez-Mascorro, Jos\'e C. Ortiz-Bayliss, Hugo
Terashima-Mar\'in
- Abstract summary: Pre-Crime Behavior method removes information related to a crime commission to focus on suspicious behavior before the crime happens.
The resulting samples from different types of crime have a high-visual similarity with normal-behavior samples.
We implement 3D Convolutional Neural Networks and trained them under different approaches.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Suspicious behavior is likely to threaten security, assets, life, or freedom.
This behavior has no particular pattern, which complicates the tasks to detect
it and define it. Even for human observers, it is complex to spot suspicious
behavior in surveillance videos. Some proposals to tackle abnormal and
suspicious behavior-related problems are available in the literature. However,
they usually suffer from high false-positive rates due to different classes
with high visual similarity. The Pre-Crime Behavior method removes information
related to a crime commission to focus on suspicious behavior before the crime
happens. The resulting samples from different types of crime have a high-visual
similarity with normal-behavior samples. To address this problem, we
implemented 3D Convolutional Neural Networks and trained them under different
approaches. Also, we tested different values in the number-of-filter parameter
to optimize computational resources. Finally, the comparison between the
performance using different training approaches shows the best option to
improve the suspicious behavior detection on surveillance videos.
Related papers
- PARIS: A Practical, Adaptive Trace-Fetching and Real-Time Malicious Behavior Detection System [6.068607290592521]
We propose adaptive trace fetching, lightweight, real-time malicious behavior detection system.
Specifically, we monitor malicious behavior with Event Tracing for Windows (ETW) and learn to selectively collect maliciousness-related APIs or call stacks.
As a result, we can monitor a wider range of APIs and detect more intricate attack behavior.
arXiv Detail & Related papers (2024-11-02T14:52:04Z) - Bidirectional Decoding: Improving Action Chunking via Closed-Loop Resampling [51.38330727868982]
Bidirectional Decoding (BID) is a test-time inference algorithm that bridges action chunking with closed-loop operations.
We show that BID boosts the performance of two state-of-the-art generative policies across seven simulation benchmarks and two real-world tasks.
arXiv Detail & Related papers (2024-08-30T15:39:34Z) - AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning [93.77763753231338]
Adversarial Contrastive Prompt Tuning (ACPT) is proposed to fine-tune the CLIP image encoder to extract similar embeddings for any two intermediate adversarial queries.
We show that ACPT can detect 7 state-of-the-art query-based attacks with $>99%$ detection rate within 5 shots.
We also show that ACPT is robust to 3 types of adaptive attacks.
arXiv Detail & Related papers (2024-08-04T09:53:50Z) - Learning Expressive And Generalizable Motion Features For Face Forgery
Detection [52.54404879581527]
We propose an effective sequence-based forgery detection framework based on an existing video classification method.
To make the motion features more expressive for manipulation detection, we propose an alternative motion consistency block.
We make a general video classification network achieve promising results on three popular face forgery datasets.
arXiv Detail & Related papers (2024-03-08T09:25:48Z) - Transaction Fraud Detection via an Adaptive Graph Neural Network [64.9428588496749]
We propose an Adaptive Sampling and Aggregation-based Graph Neural Network (ASA-GNN) that learns discriminative representations to improve the performance of transaction fraud detection.
A neighbor sampling strategy is performed to filter noisy nodes and supplement information for fraudulent nodes.
Experiments on three real financial datasets demonstrate that the proposed method ASA-GNN outperforms state-of-the-art ones.
arXiv Detail & Related papers (2023-07-11T07:48:39Z) - Spatial-Frequency Discriminability for Revealing Adversarial Perturbations [53.279716307171604]
Vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community.
Current algorithms typically detect adversarial patterns through discriminative decomposition for natural and adversarial data.
We propose a discriminative detector relying on a spatial-frequency Krawtchouk decomposition.
arXiv Detail & Related papers (2023-05-18T10:18:59Z) - Detecting Adversarial Perturbations in Multi-Task Perception [32.9951531295576]
We propose a novel adversarial perturbation detection scheme based on multi-task perception of complex vision tasks.
adversarial perturbations are detected by inconsistencies between extracted edges of the input image, the depth output, and the segmentation output.
We show that under an assumption of a 5% false positive rate up to 100% of images are correctly detected as adversarially perturbed, depending on the strength of the perturbation.
arXiv Detail & Related papers (2022-03-02T15:25:17Z) - student dangerous behavior detection in school [27.02391566687007]
We focus on detecting dangerous behaviors of students automatically, which faces numerous challenges.
We propose a novel end-to-end dangerous behavior detection method, named DangerDet, that combines multi-scale body features and keypoints-based pose features.
On our dataset, DangerDet achieves 71.0% mAP with about 11 FPS.
arXiv Detail & Related papers (2022-02-19T08:23:36Z) - Using a Neural Network to Detect Anomalies given an N-gram Profile [0.0]
Anomaly detection is designed to profile the normal runtime behavior of computer programs.
Normal but unobserved behavior can trigger false positives.
This paper presents our study on how to explain the presence of anomalies using a neural network.
arXiv Detail & Related papers (2021-04-12T15:40:43Z) - Anomaly Recognition from surveillance videos using 3D Convolutional
Neural Networks [0.0]
Anomalous activity recognition deals with identifying the patterns and events that vary from the normal stream.
This study provides a simple, yet effective approach for learning features using deep 3-dimensional convolutional networks (3D ConvNets) trained on the University of Central Florida (UCF) Crime video dataset.
arXiv Detail & Related papers (2021-01-04T16:32:48Z) - Anomaly Detection-Based Unknown Face Presentation Attack Detection [74.4918294453537]
Anomaly detection-based spoof attack detection is a recent development in face Presentation Attack Detection.
In this paper, we present a deep-learning solution for anomaly detection-based spoof attack detection.
The proposed approach benefits from the representation learning power of the CNNs and learns better features for fPAD task.
arXiv Detail & Related papers (2020-07-11T21:20:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.