2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS) 2019
DOI: 10.1109/avss.2019.8909844
|View full text |Cite
|
Sign up to set email alerts
|

Automated Real-time Anomaly Detection in Human Trajectories using Sequence to Sequence Networks

Abstract: Detection of anomalous trajectories is an important problem with potential applications to various domains, such as video surveillance, risk assessment, vessel monitoring and high-energy physics. Modeling the distribution of trajectories with statistical approaches has been a challenging task due to the fact that such time series are usually non stationary and highly dimensional. However, modern machine learning techniques provide robust approaches for data-driven modeling and critical information extraction. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…The latter group uses historical data to learn the implicit detection rules. Since no representative groundtruth data are available for maritime anomaly detection, learningbased anomaly detection schemes cannot apply supervised methods like in [5]- [7]. Unsupervised learning methods are then preferred [9]- [11], [16], [22], [23], [27].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The latter group uses historical data to learn the implicit detection rules. Since no representative groundtruth data are available for maritime anomaly detection, learningbased anomaly detection schemes cannot apply supervised methods like in [5]- [7]. Unsupervised learning methods are then preferred [9]- [11], [16], [22], [23], [27].…”
Section: Related Workmentioning
confidence: 99%
“…For these reasons, anomaly detection methods used in other domains such as network traffic analysis or cybersecurity [3], [4] do not apply. We may also emphasise there are no representative groundtruth datasets for this task, hence, supervised learning strategies for anomaly detection as in [5]- [7] do not apply either.…”
Section: Introductionmentioning
confidence: 99%
“…In the work presented in [9,10], those two issues were addressed as follows. To develop a privacy and GDPR compliant tracking method, we assumed that passengers are tracked using overhead cameras that identify passengers as point targets from their top-down footprints (silhouettes); the footprints are reduced to a point for each passenger and are tracked across the entire airport area or BCP.…”
Section: Anomaly Detection From Passenger Trajectoriesmentioning
confidence: 99%
“…To develop a privacy and GDPR compliant tracking method, we assumed that passengers are tracked using overhead cameras that identify passengers as point targets from their top-down footprints (silhouettes); the footprints are reduced to a point for each passenger and are tracked across the entire airport area or BCP. In the initial phase of the study in [9,10], it was assumed that passengers tracking was perfect, i.e. that all passengers' traces as they moved around the airport or BCP area are (anonymously) identifiable and traceable.…”
Section: Anomaly Detection From Passenger Trajectoriesmentioning
confidence: 99%
See 1 more Smart Citation