Video Violence Recognition and Localization using a Semi-Supervised
Hard-Attention Model
- URL: http://arxiv.org/abs/2202.02212v1
- Date: Fri, 4 Feb 2022 16:15:26 GMT
- Title: Video Violence Recognition and Localization using a Semi-Supervised
Hard-Attention Model
- Authors: Hamid Mohammadi, Ehsan Nazerfard
- Abstract summary: Violence monitoring and surveillance systems could keep communities safe and save lives.
The current state-of-the-art deep learning approaches to video violence recognition to higher levels of accuracy and performance could enable surveillance systems to be more reliable and scalable.
The main contribution of the proposed deep reinforcement learning method is to achieve state-of-the-art accuracy on RWF, Hockey, and Movies datasets.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Empowering automated violence monitoring and surveillance systems amid the
growing social violence and extremist activities worldwide could keep
communities safe and save lives. The questionable reliability of human
monitoring personnel and the increasing number of surveillance cameras makes
automated artificial intelligence-based solutions compelling. Improving the
current state-of-the-art deep learning approaches to video violence recognition
to higher levels of accuracy and performance could enable surveillance systems
to be more reliable and scalable. The main contribution of the proposed deep
reinforcement learning method is to achieve state-of-the-art accuracy on RWF,
Hockey, and Movies datasets while removing some of the computationally
expensive processes and input features used in the previous solutions. The
implementation of hard attention using a semi-supervised learning method made
the proposed method capable of rough violence localization and added increased
agent interpretability to the violence detection system.
Related papers
- Real-Time Weapon Detection Using YOLOv8 for Enhanced Safety [0.0]
The model was trained on a comprehensive dataset containing thousands of images depicting various types of firearms and edged weapons.
We evaluated the model's performance using key metrics such as precision, recall, F1-score, and mean Average Precision (mAP) across multiple Intersection over Union (IoU) thresholds.
arXiv Detail & Related papers (2024-10-23T10:35:51Z) - CUE-Net: Violence Detection Video Analytics with Spatial Cropping, Enhanced UniformerV2 and Modified Efficient Additive Attention [21.354382437543315]
We introduce CUE-Net, a novel architecture designed for automated violence detection in video surveillance.
By focusing on both local and globaltemporal features, CUE-Net achieves state-of-the-art performance on the RWF-2000 and RLVS datasets.
arXiv Detail & Related papers (2024-04-27T20:09:40Z) - AI-Based Energy Transportation Safety: Pipeline Radial Threat Estimation
Using Intelligent Sensing System [52.93806509364342]
This paper proposes a radial threat estimation method for energy pipelines based on distributed optical fiber sensing technology.
We introduce a continuous multi-view and multi-domain feature fusion methodology to extract comprehensive signal features.
We incorporate the concept of transfer learning through a pre-trained model, enhancing both recognition accuracy and training efficiency.
arXiv Detail & Related papers (2023-12-18T12:37:35Z) - Crowd management, crime detection, work monitoring using aiml [0.0]
This research endeavors to harness the potential of existing CCTV networks for a comprehensive approach to crowd management, crime prevention, and workplace monitoring.
The primary objective is to develop and implement advanced algorithms capable of real-time analysis of video feeds.
By leveraging AI/ML, the project aims to optimize surveillance capabilities, thereby enhancing public safety measures and improving organizational productivity.
arXiv Detail & Related papers (2023-11-21T14:12:17Z) - Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A
Contemporary Survey [114.17568992164303]
Adrial attacks and defenses in machine learning and deep neural network have been gaining significant attention.
This survey provides a comprehensive overview of the recent advancements in the field of adversarial attack and defense techniques.
New avenues of attack are also explored, including search-based, decision-based, drop-based, and physical-world attacks.
arXiv Detail & Related papers (2023-03-11T04:19:31Z) - Video Vision Transformers for Violence Detection [0.0]
The proposed solution uses a novel end-to-end deep learning-based video vision transformer (ViViT) that can proficiently discern fights, hostile movements, and violent events in video sequences.
The evaluated results can be subsequently sent to local concerned authority, and the captured video can be analyzed.
arXiv Detail & Related papers (2022-09-08T04:44:01Z) - SSIVD-Net: A Novel Salient Super Image Classification & Detection
Technique for Weaponized Violence [3.651114792588495]
Detection of violence and weaponized violence in CCTV footage requires a comprehensive approach.
We introduce the emphSmart-City CCTV Violence Detection (SCVD) dataset.
We propose a novel technique called emphSSIVD-Net (textbfSalient-textbfSuper-textbfImage for textbfViolence textbfDetection)
arXiv Detail & Related papers (2022-07-26T12:31:01Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Enhanced Adversarial Strategically-Timed Attacks against Deep
Reinforcement Learning [91.13113161754022]
We introduce timing-based adversarial strategies against a DRL-based navigation system by jamming in physical noise patterns on the selected time frames.
Our experimental results show that the adversarial timing attacks can lead to a significant performance drop.
arXiv Detail & Related papers (2020-02-20T21:39:25Z) - Adversarial vs behavioural-based defensive AI with joint, continual and
active learning: automated evaluation of robustness to deception, poisoning
and concept drift [62.997667081978825]
Recent advancements in Artificial Intelligence (AI) have brought new capabilities to behavioural analysis (UEBA) for cyber-security.
In this paper, we present a solution to effectively mitigate this attack by improving the detection process and efficiently leveraging human expertise.
arXiv Detail & Related papers (2020-01-13T13:54:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.