2023
DOI: 10.3390/s23042358
|View full text |Cite
|
Sign up to set email alerts
|

An IoT Enable Anomaly Detection System for Smart City Surveillance

Abstract: Since the advent of visual sensors, smart cities have generated massive surveillance video data, which can be intelligently inspected to detect anomalies. Computer vision-based automated anomaly detection techniques replace human intervention to secure video surveillance applications in place from traditional video surveillance systems that rely on human involvement for anomaly detection, which is tedious and inaccurate. Due to the diverse nature of anomalous events and their complexity, it is however, very ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
1

Year Published

2023
2023
2025
2025

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 18 publications
(17 citation statements)
references
References 75 publications
1
15
1
Order By: Relevance
“…One major conclusion of this research is that their ML methods depend on device or network traffic data [106,116]. In manuscript [137,138], a novel method is proposed to investigate as well as identify the anomalous behavior of attacks in IIoT technology, called the transformer-based method. This method has good performance compared to conventional ML methods as well as deep learning approaches based on accuracy, precision, and recall.…”
Section: Discussionmentioning
confidence: 99%
“…One major conclusion of this research is that their ML methods depend on device or network traffic data [106,116]. In manuscript [137,138], a novel method is proposed to investigate as well as identify the anomalous behavior of attacks in IIoT technology, called the transformer-based method. This method has good performance compared to conventional ML methods as well as deep learning approaches based on accuracy, precision, and recall.…”
Section: Discussionmentioning
confidence: 99%
“…LSTMs can capture longterm dependencies in data and, in combination with recently proposed attention mechanisms, have demonstrated promising results in some studies [349], and can build effective models usable in PON Systems. Research has also produced compact ML models which can deployed without consuming much resources [350]. Additionally, an ensemble of models can increase estimation accuracy while being more robust to noisy data [351].…”
Section: A Ai Powered Optimal Operation Supporting Sleep Modementioning
confidence: 99%
“…Algorithms are carefully chosen based on their ability to address the specific challenges of anomaly detection in IoT data. Among the algorithms considered, the Isolation Forest algorithm is considered due to its ability to efficiently detect anomalies in large data sets, such as those collected in a smart city [31]. This algorithm uses the idea that anomalies are outlier points that are easier to isolate in a decision tree.…”
Section: Algorithm Selectionmentioning
confidence: 99%