Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X 2011
DOI: 10.1117/12.883535
|View full text |Cite
|
Sign up to set email alerts
|

A comparative evaluation of anomaly detection algorithms for maritime video surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(17 citation statements)
references
References 16 publications
0
15
0
2
Order By: Relevance
“…Next, we eliminate the clusters with fewer samples, based on the assumption that these smaller clusters contain mostly outlier samples. We note that the same assumption also sits at the basis of the method proposed in [5]. Nonetheless, we motivate the assumption through the following toy example.…”
Section: Two-stage Outlier Detectionmentioning
confidence: 79%
See 2 more Smart Citations
“…Next, we eliminate the clusters with fewer samples, based on the assumption that these smaller clusters contain mostly outlier samples. We note that the same assumption also sits at the basis of the method proposed in [5]. Nonetheless, we motivate the assumption through the following toy example.…”
Section: Two-stage Outlier Detectionmentioning
confidence: 79%
“…Moreover, their approach does not allow to set an abnormality threshold, and thus, it cannot be optimized for better precision or recall. More closely to our approach, Auslander et al [5] defined three possible assumptions (see Section 4.1 in [5]) for using clustering to detect anomalies. Interestingly, our approach is based on similar assumptions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The traffic was investigated, and trajectories of detected vessels were further processed to maintain knowledge and conceive the representation of the normal course of movements. Auslander et al [17] supposed that different kinds of maritime traffic were characterized by different levels of complexity and presented two global and two local anomaly detection algorithms, whose performance varied depending on the maritime traffic type. Vespe et al [18] proposed a waypoint density algorithm to compress a large volume of AIS data into a list of adequate waypoints and ultimately delineate sea lanes and subsequently routes through a set of lines connecting waypoints.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Before further progressing on the description of the internal algorithms of the ETA, it should be remarked that several possible algorithms exist and can be compared through benchmarks [24], [25], [31]. It is outside the scope of this paper to build a novel algorithm or compare existing ones to identify the most efficient.…”
Section: The Event Trust Analysis (Eta)mentioning
confidence: 99%