1 |
B. Ionescu, M. Ghenescu, F. Rastoceanu, R. Roman and M. Buric, "Artificial Intelligence Fights Crime and Terrorism at a New Level," IEEE MultiMedia, vol. 27, no. 2, pp. 55-61, 1 April-June 2020.
DOI
|
2 |
Szegedy C, Liu W, Jia Y, et al, "Going Deeper with Convolutions," in Proc. of 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
|
3 |
Z. G. Qu, H. R. Sun and M. Zheng, "An efficient quantum image steganography protocol based on improved EMD algorithm," Quantum Information Processing, vol. 20, no. 53, pp. 1-29, 2021.
DOI
|
4 |
M. Chen, "Automatic identification of violent images based on transfer learning," Journal of Beijing University of Aeronautics and Astronautics, 46(09), 1677-1681, 2020.
|
5 |
S. Sun, J. Zhou, J. Wen, Y. Wei and X. Wang, "A dqn-based cache strategy for mobile edge networks," Computers, Materials & Continua, vol. 71, no.2, pp. 3277-3291, 2022.
DOI
|
6 |
He, K., Zhang, X., Ren, S., & Sun, J, "Deep Residual Learning for Image Recognition," in Proc. of 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016.
|
7 |
T. Xia and Y. Gu, "Building Terrorist Knowledge Graph from Global Terrorism Database and Wikipedia," in Proc. of 2019 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 194-196, 2019.
|
8 |
Krizhevsky, A., Sutskever, I., & Hinton, G. E., "ImageNet classification with deep convolutional neural networks," Communications of the ACM, 60(6), 84-90, 2017.
DOI
|
9 |
Simonyan, Karen, and Andrew Zisserman, "Very deep convolutional networks for large-scale image recognition," arXiv preprint arXiv:1409.1556, 2014.
|
10 |
Z. G. Qu, Y. M. Huang and M. Zheng, "A novel coherence-based quantum steganalysis protocol," Quantum Information Processing, vol.19, no. 362, pp. 1-19, 2020.
DOI
|
11 |
L.Yan, "Automatic labeling method for violent images based on integrated classification," Journal of Terahertz Science and Electronic Information Technology, 18(02), 306-312, 2020.
|
12 |
Hu Xinxu, Zhou Xin, He Xiaohai, Xiong Shuhua, Wang Zhengyong, "The Moby Audio Discrimination Method based on Transfer learning," Computer System Applications, 28 (11), 147-152, 2019.
|
13 |
Meng Caixia., "Terror Detection Simulation based on Fusion Two-Channel Video," Computer Simulation, 32(02), 428-431, 2015.
|
14 |
A. Kaur and L. Kaur, "Concealed weapon detection from images using SIFT and SURF," in Proc. of 2016 Online International Conference on Green Engineering and Technologies (IC-GET), pp. 1-8, 2016.
|
15 |
C. Dhiman and D. K. Vishwakarma, "A review of state-of-the-art techniques for abnormal human activity recognition," Eng. Appl. Artif. Intell., vol. 77, no. August 2018, pp. 21-45, 2019.
DOI
|
16 |
R. U. Khan, W. S. Wong, I. Ullah, F. Algarni, M. Inam et al., "Evaluating the efficiency of cbamResNet using malaysian sign language," Computers, Materials & Continua, vol. 71, no.2, pp. 2755-2772, 2022.
DOI
|
17 |
Liu, Y., et al., "Abnormal Behavior Recognition Based on Key Points of Human Skeleton," IFACPapersOnLine, 53(5), 441-445, 2020.
|
18 |
Karthikeswaran D, Sengottaiyan N, Anbukaruppusamy S, "Video surveillance system against antiterrorism by Using Adaptive Linear Activity Classification (ALAC) Technique," Journal of Medical Systems, 43(8), 256, 2019.
DOI
|
19 |
S. Sudhakaran and O. Lanz, "Learning to detect violent videos using convolutional long shortterm memory," in Proc. of 2017 14th IEEE Int. Conf. Adv. Video Signal Based Surveillance AVSS, 2017.
|
20 |
S. Chaudhary M. A. Khan and C. Bhatnagar, "Multiple anomalous activity detection in videos," Procedia Comput. Sci., vol. 125, pp. 336-345, Jan. 2018.
DOI
|
21 |
J. Hu, Z. Zhang, Y. Zhao, "Identification of bamboo chip defects based on transfer learning," Journal of Northwestern Forest College, vol. 36(5), pp. 190-196, 2021.
|
22 |
N. J. Hussein and F. Hu, "An alternative method to discover concealed weapon detection using critical fusion image of color image and infrared image," in Proc. of 2016 First IEEE International Conference on Computer Communication and the Internet (ICCCI), pp. 378-383, 2016.
|
23 |
M. Al-Nawashi O. M. Al-Hazaimeh and M. Saraee, "A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments," Neural Comput. Appl., vol. 28, no. 1, pp. 565-572, Dec. 2017.
|
24 |
Huang Chao, Yi Ping, "Research and implementation of content detection systems for videophobias," Communication technology, 51(01), 75-81, 2018.
|
25 |
Z. Guo F. Wu H. Chen J. Yuan and C. Cai, "Pedestrian violence detection based on optical flow energy characteristics," in Proc. of 2017 4th Int. Conf. Syst. Informatics ICSAI 2017, pp. 1261-1265, 2017.
|
26 |
M. Ahmed, M. Ramzan, H. U. Khan, S. Iqbal, M. A. Khan et al., "Real-time violent action recognition using key frames extraction and deep learning," Computers, Materials & Continua, vol. 69, no. 2, pp. 2217-2230, 2021.
DOI
|
27 |
P. Yun J. Jiao and M. L. B, "Trajectory-Pooled Deep Convolutional Networks for Violence Detection in Videos," in Proc. of ICVS 2017 Computer Vision Systems, pp 437-447, 2017.
|
28 |
F. U. M. Ullah A. Ullah K. Muhammad I. U. Haq and S. W. Baik, "Violence detection using spatiotemporal features with 3D convolutional neural network," Sensors, vol. 19, no. 11, pp. 1-15, 2019.
DOI
|
29 |
A. B. Mabrouk and E. Zagrouba, "Abnormal behavior recognition for intelligent video surveillance systems: A review," Expert Syst. Appl., vol. 91, pp. 480-491, Jan. 2018.
DOI
|
30 |
E. Y. Fu M. X. Huang H. Va Leong and G. Ngai, "Cross-species learning: A low-cost approach to learning human fight from animal fight," in Proc. of 26th ACM Int. Conf. Multimedia, pp. 320-327, Oct. 2018.
|
31 |
Y. Zhang, L. Zhu, Yu, "Overview of attention mechanisms in convolutional neural networks," Computer Engineering and Applications, pp. 64-72, 2021.
|
32 |
P. Siva and N. Nandhagopal, "Classification similarity network model for image fusion using ResNet50 and googlenet," Intelligent Automation & Soft Computing, vol. 31, no. 3, pp. 1331-1344, 2022.
DOI
|
33 |
L. Sun, Y.L. Wang, Z.G. Qu, N.N. Xiong, "BeatClass: A Sustainable ECG Classification System in IoT-based eHealth," IEEE Internet of Things Journal, vol. 9, no. 10, pp. 7178-7195, 2022.
DOI
|
34 |
Yifei Wei, F. Richard Yu, Mei Song, Zhu Han, "User Scheduling and Resource Allocation in HetNets with Hybrid Energy Supply: An Actor-Critic Reinforcement Learning Approach," IEEE Transactions on Wireless communications, vol. 17, no. 1, pp. 680-692, Jan. 2018.
DOI
|