1 |
K. Simonyan and A. Zisserman, "Very Deep Convolutional Networks for Large-Scale Image Recognition," arXiv preprint arXiv:1409.1556, Sep. 2014.
|
2 |
B. McFee, J. Salamon, and J. P. Bello, "Adaptive Pooling Operators for Weakly Labeled Sound Event Detection," IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 26, no. 11, pp. 2180-2193, Aug. 2018.
DOI
|
3 |
Z. Chen, C. K. Yeo, B. S. Lee, and C. T. Lau, "Autoencoder-Based Network Anomaly Detection," in Proc. of 2018 Wireless Telecommunications Symposium (WTS), pp. 1-5, Apr. 2018.
|
4 |
L. Wyse, "Audio Spectrogram Representations for Processing with Convolutional Neural Networks," arXiv preprint arXiv:1706.09559, 2017.
|
5 |
A. Krizhevsky, I. Sutskever, and G. E. Hinton "ImageNet Classification with Deep Convolutional Neural Networks," Communications of the ACM, vol. 60, no. 6, pp. 84-90, Jun. 2017.
DOI
|
6 |
M. Ahmed, A. N. Mahmood, and J. Hu, "A Survey of Network Anomaly Detection Techniques," Journal of Network and Computer Applications, vol. 60, pp. 19-31, Jan. 2016.
DOI
|
7 |
K. He, X. Zhang, S. Ren, and J. Sun, "Deep Residual Learning for Image Recognition," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 770-778, 2016.
|
8 |
H. J. Kwon, D. H Shin, and K. Chung, "PGGAN-Based Anomaly Classification on Chest X-Ray Using Weighted Multi-Scale Similarity," IEEE Access, vol. 9, no. 1, pp. 113315-113325, Aug. 2017.
|
9 |
D. H. Shin, R. C. Park, and K. Chung, "Decision Boundary-Based Anomaly Detection Model using Improved AnoGAN from ECG Data," IEEE Access, vol. 8, no. 1, pp. 108664-108674, Jun. 2020.
DOI
|
10 |
C. L. Li, K. Sohn, J. Yoon, and T. Pfister, "Cutpaste: Self-Supervised Learning for Anomaly Detection and Localization," in Proc. of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9664-9674, 2021.
|
11 |
AI Hub, Last modified on: Nov 18. 2021. [Online]. Available: Apr 13. 2022, https://aihub.or.kr.
|
12 |
J. W. Baek and K. Chung, "Pothole Classification Model Using Edge Detection in Road Image," Applied Sciences, vol. 10 no. 19, pp. 6662-6680, Sep. 2020.
DOI
|
13 |
S. Akcay, A. Atapour-Abarghouei, and T. P. Breckon, "Ganomaly: Semi-Supervised Anomaly Detection via Adversarial Training," in Proc. of Asian Conference on Computer Vision, pp. 622-637, May. 2019.
|
14 |
S. Saqaeeyan and H. Amirkhani, "Anomaly Detection in Smart Homes using Bayesian Networks," KSII Transactions on Internet and Information Systems (TIIS), vol. 14, no. 4, pp. 1796-1816, Apr. 2020.
DOI
|
15 |
L. Van Zoonen, "Privacy Concerns in Smart Cities," Government Information Quarterly, vol. 33, no. 3, pp. 472-480, Jul. 2016.
DOI
|
16 |
M. A. Mohammed, K. H. Abdulkareem, S. A. Mostafa, M. K. A. Ghani, M. S. Maashi, B. GarciaZapirain, I. Oleagordia, H. Alhakami, and F. T. Al-Dhief, "Voice Pathology Detection and Classification using Convolutional Neural Network Model," Applied Sciences, vol. 10, no. 11, p. 3723, May. 2020.
|
17 |
E. Principi, S. Squartini, R. Bonfigli, G. Ferroni, and F. Piazza, "An Integrated System for Voice Command Recognition and Emergency Detection Based on audio signals," Expert Systems with Applications, vol. 42, no. 13, pp. 5668-5683, August. 2015.
DOI
|
18 |
C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna, "Rethinking the Inception Architecture for Computer Vision," in Proc. of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2818-2826, 2016.
|
19 |
H. J. Kwon, M. J. Kim, J. W. Baek, and K. Chung, "Voice Frequency Synthesis using VAW-GAN based Amplitude Scaling for Emotion Transformation," KSII Transactions on Internet and Information Systems (TIIS), vol. 16, no. 2, pp. 713-725, Mar. 2022.
|
20 |
S. Hershey, S. Chaudhuri, D. P. Ellis, J. F. Gemmeke, A. Jansen, R. C. Moore, and K. Wilson, "CNN Architectures for Large-Scale Audio Classification," in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (icassp), pp. 131-135, 2017.
|
21 |
X. Shi, Q. Kang, M. Zhou, A. Abusorrah, and J. An, "Soft Sensing of Nonlinear and Multimode Processes Based on Semi-Supervised Weighted Gaussian Regression," IEEE Sensors Journal, vol. 20, no. 21 pp. 12950-12960, 2020.
DOI
|
22 |
Emergency Voice/Sound, AI hub, Last modified on: Nov 18. 2021. [Online]. Available: Mar 15. 2022, https://aihub.or.kr/node/30742.
|
23 |
H. Yoo, R. C. Park, K. Chung, "IoT-based Health Big-data Process Technologies: A Survey," KSII Transactions on Internet and Information Systems (TIIS), vol. 15, no. 3, pp. 974-992, Mar. 2021.
|
24 |
S. Naseer and Y. Saleem, "Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks," KSII Transactions on Internet and Information Systems (TIIS), vol. 12, no. 10, pp. 5159-5178, Oct. 2018.
DOI
|
25 |
Y. L. Wu, Y. H. Tao, and C. J. Chang, "A Comparative Review on Privacy Concerns and Safety Demands of Closed-Circuit Television among Taiwan, Japan, and the United Kingdom," Journal of Information and Optimization Sciences, vol. 38, no. 1, pp. 173-196, Feb. 2017.
DOI
|
26 |
H. Yoo, K. Chung, "Classification of Multi-Frame Human Motion Using CNN-based Skeleton Extraction," Intelligent Automation & Soft Computing, vol. 34, no. 1, pp. 1-13, Apr. 2022.
DOI
|
27 |
H. Ghayvat, S. Mukhopadhyay, B. Shenjie, A. Chouhan, and W. Chen, "Smart Home Based Ambient Assisted Living: Recognition of Anomaly in the Activity of Daily Living for an Elderly Living Alone," in Proc. of 2018 IEEE International Instrumentation and Measurement Technology Conference (I2MTC), pp. 1-5, May. 2018.
|
28 |
E. L. Piza, B. C. Welsh, D. P. Farrington, and A. L. Thomas, "CCTV Surveillance for Crime Prevention: A 40-year Systematic Review with Meta-analysis," Criminology & Public Policy, vol. 18, no. 1, pp. 135-159, Mar. 2019.
DOI
|
29 |
W. B. Kim and I. Y. Lee, "Secure and Efficient Storage of Video Data in a CCTV Environment," KSII Transactions on Internet and Information Systems (TIIS), vol. 13, no. 6, pp. 3238-3257, Jun. 2019.
DOI
|