2019
DOI: 10.1007/s41870-019-00364-0
|View full text |Cite
|
Sign up to set email alerts
|

A review of supervised and unsupervised machine learning techniques for suspicious behavior recognition in intelligent surveillance system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 50 publications
(18 citation statements)
references
References 60 publications
0
18
0
Order By: Relevance
“…But the FPR was not sufficient. A supervised and unsupervised ML methodology was introduced in [24] for SB detection. However, the accuracy of suspicious detection was not enhanced.…”
Section: Related Workmentioning
confidence: 99%
“…But the FPR was not sufficient. A supervised and unsupervised ML methodology was introduced in [24] for SB detection. However, the accuracy of suspicious detection was not enhanced.…”
Section: Related Workmentioning
confidence: 99%
“…Clustering: it is a machine learning scheme used to split power consumption data into various clusters and hence helps in classifying them into normal or abnormal in unlabelled datasets (even with many dimensions). This anomaly detection strategy has attracted a lot of interest in different research topics for its simplicity, such as intrusion detection in networks [23], Internet of things (IoT) [24], sensor networks [25], suspicious behavior detection in video surveillance [26], anomalous transaction detection in banking systems [27] and suspicious account detection in online social networks [28]. In addition clustering has the capability for learning and detecting anomalies from the power consumption time-series without explicit descriptions [29].…”
Section: Unsupervised Detection (U)mentioning
confidence: 99%
“…Particle swarm is a comprehensive nature call based optimization policy that works on concept of swarms in search of adaptation. PSO is very simple approach to solve NP complete problems; here variables adjust their values closer to closest member to any target at any particular moment [27]. In search of hidden food source circling a flock of swarm, one will chips food that is closest to it and other flocks swing nearby.…”
Section: Problem Formulationmentioning
confidence: 99%