1 |
R. Hamid, A. Johnson, S. Batta, A. Bobick, C. Isbell, and G. Coleman, "Detection and Explanation of Anomalous Activities: Representing Activities as Bags of Event N-Grams," Proceeding of Computer Vision and Pattern Recognition, IEEE Computer Society Conference, Vol. 1, pp. 1031-1038, 2005.
|
2 |
C.W. Jung, D.J. Kang, "A Recognition Algorithm of Suspicious Human Behaviors using Hidden Markov Models in an Intelligent Surveilance System." Journal of Korea Multimedia Society Vol. 11, No. 11, pp. 1491-1500, 2008.
|
3 |
G. Farneback, "Two-Frame Motion Estimation Based on Polynomial Expansion," Proceeding of Scandinavian Conference on Image Analysis, pp. 363-370, 2003.
|
4 |
M.J. Roshtkhari and M.D. Levine, "Online Dominant and Anomalous Behavior Detection in Videos," Proceeding of IEEE Conference on Computer Vision and Pattern Recognition, pp. 2611-2618, 2013.
|
5 |
T.H. Yu and Y.S. Moon, "Unsupervised Abnormal Behavior Detection for Real-Time Surveillance Using Observed History," Machine Vision Applications, Vol. 2, No. 8, pp. 76-80, 2009.
|
6 |
O. Boiman and M. Irani, "Detecting Irregularities in Images and in Video," International Journal of Computer Vision, Vol. 74, No. 1, pp. 17-31, 2007.
DOI
|
7 |
H. Zhong, J. Shi, and M. Visontai, "Detecting Unusual Activity in Video," Proceedings of the 2004 IEEE Computer Society Conference Computer Vision and Pattern Recognition, pp. 816-829, 2004.
|