2019 IEEE International Conference on Image Processing (ICIP) 2019
DOI: 10.1109/icip.2019.8803051
|View full text |Cite
|
Sign up to set email alerts
|

Loss Switching Fusion with Similarity Search for Video Classification

Abstract: From video streaming to security and surveillance applications, video data play an important role in our daily living today. However, managing a large amount of video data and retrieving the most useful information for the user remain a challenging task. In this paper, we propose a novel video classification system that would benefit the scene understanding task. We define our classification problem as classifying background and foreground motions using the same feature representation for outdoor scenes. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…A significant number of research works and studies have been conducted to identify and classify human activities by analyzing the motion from video captured through closed-circuit television (CCTV) or other types of camera systems. Machine learning and deep learning models were widely used in many works to identify anomalies in activities [31,32] along with classification [33][34][35]. Since placing surveillance cameras to observe the residents presents data privacy issues/concerns, sensor-based observation has become popular.…”
Section: Machine Learning-based Human Activity Anomaly Detectionmentioning
confidence: 99%
“…A significant number of research works and studies have been conducted to identify and classify human activities by analyzing the motion from video captured through closed-circuit television (CCTV) or other types of camera systems. Machine learning and deep learning models were widely used in many works to identify anomalies in activities [31,32] along with classification [33][34][35]. Since placing surveillance cameras to observe the residents presents data privacy issues/concerns, sensor-based observation has become popular.…”
Section: Machine Learning-based Human Activity Anomaly Detectionmentioning
confidence: 99%
“…To tackle these issues, typical feature-based methods use RNNs to encode sequences and measure the distance between corresponding features [34]. Other existing methods [43,45,20] either encode each sequence into features that are invariant to temporal variations [1,26] or adopt alignment for temporal correspondence calibration [38]. However, none of these methods is modeling the aleatoric uncertainty.…”
Section: Related Workmentioning
confidence: 99%
“…It consists of (i) clustering with k-means for a collection of descriptor vectors from the training set to build so-called visual vocabulary, (ii) assigning each descriptor to its nearest cluster center from the visual dictionary, and (iii) aggregating the one-hot assignment vectors via average pooling. Similar models such as Soft Assignment (SA) [62,33] and Localized Soft Assignment (LcSA) [45,38] use the Component Membership Probability (CMP) of GMM to assign each descriptor with some probability to visual words followed by average or non-linear pooling [38,70].…”
Section: Related Workmentioning
confidence: 99%