2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2018
DOI: 10.1109/icassp.2018.8462485
|View full text |Cite
|
Sign up to set email alerts
|

Exploitation of Semantic Keywords for Malicious Event Classification

Abstract: Learning an event classifier is challenging when the scenes are semantically different but visually similar. However, as humans, we typically handle such tasks painlessly by adding our background semantic knowledge. Motivated by this observation, we aim to provide an empirical study about how additional information such as semantic keywords can boost up the discrimination of such events. To demonstrate the validity of this study, we first construct a novel Malicious Crowd Dataset containing crowd images with t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
9
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2

Relationship

4
1

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…In addition to the label of the event class, bounding box annotations of three rigid objects (police, helmet, car) and two non-rigid objects (fire, smoke) are provided. [12] provides details on how these objects are selected.…”
Section: Datasetmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the label of the event class, bounding box annotations of three rigid objects (police, helmet, car) and two non-rigid objects (fire, smoke) are provided. [12] provides details on how these objects are selected.…”
Section: Datasetmentioning
confidence: 99%
“…Malicious Crowd Dataset [12,22] is selected as it provides the appropriate components to evaluate the effects of using object information for event recognition. It contains 1133 images and is equally divided into malicious classes and benign classes.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…There are two approaches to exploit the object detection |Rn|=5 first approach is to make use of a separately constructed object detection module and its output for boosting the event recognition. In this approach, the object detection results can either be directly fed into the event recognition module [1,2,3] or be integrated with the event recognition output via a late fusion [4,5,6,7,8,9,10,11]. The second approach is to transfer the object information by sharing the network weights between the object detection and event recognition and co-learning them in a unified architecture.…”
Section: Introductionmentioning
confidence: 99%
“…We evaluated the proposed approach on the Malicious Crowd Dataset [11]. The experiments demonstrate that utilizing the object detection information in both direct (injecting the feature maps) and indirect (transferring the information via shared weights) ways are effective in enhancing malicious event recognition performance.…”
Section: Introductionmentioning
confidence: 99%