2013 18th International Conference on Digital Signal Processing (DSP) 2013
DOI: 10.1109/icdsp.2013.6622765
|View full text |Cite
|
Sign up to set email alerts
|

A decentralized privacy-sensitive video surveillance framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…e back-end network is composed of three branches; each branch contains the dilation convolution with different expansion factors, and the expansion factors are 1, 2, and 4. e branch with expansion factor of 1 is used to capture the features of small-scale objects, while the other branches expand the perception range to capture the features of large-scale objects. As mentioned in literature [17], it is difficult for independent branches to learn the characteristics of different patterns, which leads to parameter redundancy. erefore, in this paper, the feature maps of each branch network are concatenated in each layer, and 1 × 1 convolution is used for cross-channel feature aggregation to strengthen the information interaction between each branch, so as to make full use of the complementarity of each branch extraction feature to make the output feature map has more expressive power and scale diversity.…”
Section: Generation Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…e back-end network is composed of three branches; each branch contains the dilation convolution with different expansion factors, and the expansion factors are 1, 2, and 4. e branch with expansion factor of 1 is used to capture the features of small-scale objects, while the other branches expand the perception range to capture the features of large-scale objects. As mentioned in literature [17], it is difficult for independent branches to learn the characteristics of different patterns, which leads to parameter redundancy. erefore, in this paper, the feature maps of each branch network are concatenated in each layer, and 1 × 1 convolution is used for cross-channel feature aggregation to strengthen the information interaction between each branch, so as to make full use of the complementarity of each branch extraction feature to make the output feature map has more expressive power and scale diversity.…”
Section: Generation Networkmentioning
confidence: 99%
“…In addition, for the ShanghaiTech and UCF_CC_50 datasets, this experiment uses the original image size for training, sets the batch size to 1, and performs data through random horizontal flips. Since the UCF-QNRF dataset is all high-resolution images (such as 9000 × 6000), this paper follows the training method proposed in [17] and crops the original image into 16 nonoverlapping subimages with a size of 224 × 224, and the batch size is 16 for training.…”
Section: Parameter Settingmentioning
confidence: 99%
See 1 more Smart Citation
“…Senst et al [26] have developed architecture for providing security and privacy to support video operators which works in surveillance system. The advantage of proposed system is that it uses automated calibrated cameras it display detected events and object extraction in 3D view.…”
Section: Introductionmentioning
confidence: 99%