|
[1] Y. Wang, X. Zhang, M. Li, P. Jiang, and F. Wang, “A GM-HMM based abnormal pedestrian behavior detection method,” in Proceedings of the IEEE International Conference on Signal Processing, Communications and Computing, Ningbo, China, pp. 1-6, Sep 2015. [2] H. Rajabi and M. Nahvi, “An intelligent video surveillance system for fall and anesthesia detection for elderly and patients,” in Proceedings of the International Conference on Pattern Recognition and Image Analysis, Rasht, Iran, pp. 1-6, Mar 2015. [3] J. C. SanMiguel, J. M. Martínez, and L. Caro-Campos, “Object-size invariant anomaly detection in video-surveillance,” in Proceedings of the International Carnahan Conference on Security Technology, Madrid, Spain, pp. 1-6, Oct 2017. [4] K. V. Beeck, K. V. Engeland, J. Vennekens, and T. Goedemé, “Abnormal behavior detection in LWIR surveillance of railway platforms,” in Proceedings of the IEEE International Conference on Advanced Video and Signal Based Surveillance, Lecce, Italy, pp. 1-6, Sep 2017. [5] D. V. Ngo, N. T. Do, and L. A. T. Nguyen, “Anomaly detection in video surveillance: A novel approach based on sub-trajectory,” in Proceedings of the International Conference on Electronics, Information, and Communications, Da Nang, Vietnam, pp. 1-4, Jan 2016. [6] H. Mousavi, M. Nabi, H. Kiani, A. Perina, and V. Murino, “Crowd motion monitoring using tracklet-based commotion measure,” in Proceedings of the IEEE International Conference on Image Processing, Quebec City, QC, Canada, pp. 2354-2358, Sep 2015. [7] T. Zhang, S. Liu, C. Xu, and H. Lu, “Mining semantic context information for intelligent video surveillance of traffic scenes,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 149-160, Feb 2013. [8] M. Afonso and J. Nascimento, “Predictive multiple motion fields for trajectory completion: Application to surveillance systems,” in Proceedings of the IEEE International Conference on Image Processing, Quebec City, QC, Canada, pp. 2547-2551, Sep 2015. [9] C. Shen, R. Xie, and L. Zhang, "Temporal recursive pedestrian trajectory identification for multi-camera surveillance system," in Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK, pp. 1158-1163, Oct 2015. [10] C. W. Chang, M. H. Yang, C. C. Li, and K. T. Chuang, “Toward mining anomalous behavior from big moving trajectories in surveillance video,” in Proceedings of the IEEE International Conference on Automation Science and Engineering, Taipei, Taiwan, pp. 1121-1126, Aug 2014. [11] X. Zang, G. Li, Z. Li, N. Li, and W. Wang, “An object-aware anomaly detection and localization in surveillance videos,” in Proceedings of the IEEE Second International Conference on Multimedia Big Data, Taipei, Taiwan, pp. 113-116, Apr 2016. [12] M. Y. Choong, R. K. Y. Chin, K. B. Yeo, and K. T. K. Teo, “Trajectory clustering for behavioral pattern learning in transportation surveillance,” in Proceedings of the International Conference on Artificial Intelligence with Applications in Engineering and Technology, Kota Kinabalu, Malaysia, pp. 199-203, Dec 2014. [13] R. Ranjith, J. Joshan Athanesious, and V. Vaidehi, “Anomaly detection using DBSCAN clustering technique for traffic video surveillance,” in Proceedings of the Advanced Computing, Chennai, India, pp. 1-6, Dec 2015. [14] B. Cancela, A. Iglesias, M. Ortega, and M.G. Penedo, “Unsupervised trajectory modelling using temporal information via minimal paths,” in Proceedings of the Computer Vision and Pattern Recognition, Columbus, Ohio, pp. 2553-2560, Jun 2014. [15] H. Tan, Y. Zhai, Y. Liu, and M. Zhang, “Fast anomaly detection in traffic surveillance video based on robust sparse optical flow,” in Proceedings of the Acoustics, Speech and Signal Processing, Shanghai, China, pp. 1976-1980, Mar 2016. [16] C. Wang, X. Wu, N. Li, and Y. L. Chen, “Abnormal detection based on gait analysis,” in Proceedings of the 10th Intelligent Control and Automation, Beijing, China, pp. 4859-4864, Jul 2012. [17] S. Coşar, G. Donatiello, V. Bogorny, C. Garate, L. O. Alvares, and F. Brémond, “Toward abnormal trajectory and event detection in video surveillance,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 27, no. 3, pp. 683-695, Mar 2017. [18] W. Li, V. Mahadevan, and N. Vasconcelos, “Anomaly detection and localization in crowded scenes,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 36, no. 1, pp. 18-32, Jun 2013. [19] Y. Cai, H. Wang, X. Chen, and H. Jiang, “Trajectory-based anomalous behavior detection for intelligent traffic surveillance,” IET Intelligent Transport Systems, vol. 9, no. 8, pp. 810-816, Sep 2015. [20] C. L. Chou, C. H. Lin, T. H. Chiang, H. T. Chen, and S. Y. Lee, “Coherent event-based surveillance video synopsis using trajectory clustering,” in Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, Turin, Italy, pp. 1-6, Jul 2015. [21] W. C. Wang, P. C. Chung, C. R. Huang, and W. Y. Huang, “Event based surveillance video synopsis using trajectory kinematics descriptors,” in Proceedings of the Fifteenth IAPR International Conference on Machine Vision Applications, Nagoya, Japan, pp. 250-253, May 2017. [22] W. Liao, Z. Tu, S. Wang, Y. Li, R. Zhong, and H. Zhong, “Compressed-domain Video Synopsis via 3D Graph Cut and Blank Frame Deletion,” in Proceedings of the on Thematic Workshops of ACM Multimedia, Mountain View, California, pp. 253-261, Oct 2017. [23] C. Stauffer and W.E.L. Grimson, “Adaptive background mixture models for real-time tracking,” in Proceedings of the Computer Vision and Pattern Recognition, Fort Collins, Colorado, pp. 246-252, Jun 1999. [24] S. Suzuki and K. Abe “Topological structural analysis of digitized binary images by border following,” Computer Vision, Graphics, and Image Processing, vol. 30, no. 1, pp. 32-46, Apr 1985. [25] J. F. Henriques, R. Caseiro, P. Martins, and J. Batista, “High-Speed Tracking with Kernelized Correlation Filters,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 37, no. 3, pp. 583-596, Aug 2014.
|