[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ICRA48506.2021.9562043guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Context-Dependent Anomaly Detection for Low Altitude Traffic Surveillance

Published: 30 May 2021 Publication History

Abstract

The detection of contextual anomalies is a challenging task for surveillance since an observation can be considered anomalous or normal in a specific environmental context. An unmanned aerial vehicle (UAV) can utilize its aerial monitoring capability and employ multiple sensors to gather contextual information about the environment and perform contextual anomaly detection. In this work, we introduce a deep neural network-based method (CADNet) to find point anomalies (i.e., single instance anomalous data) and contextual anomalies (i.e., context-specific abnormality) in an environment using a UAV. The method is based on a variational autoencoder (VAE) with a context sub-network. The context sub-network extracts contextual information regarding the environment using GPS and time data, then feeds it to the VAE to predict anomalies conditioned on the context. To the best of our knowledge, our method is the first contextual anomaly detection method for UAV-assisted aerial surveillance. We evaluate our method on the AU-AIR dataset in a traffic surveillance scenario. Quantitative comparisons against several baselines demonstrate the superiority of our approach in the anomaly detection tasks. The codes and data will be available at https://bozcani.github.io/cadnet.

References

[1]
V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM computing surveys (CSUR), vol. 41, no. 3, pp. 1–58, 2009.
[2]
I. Bozcan and E. Kayacan, “Au-air: A multi-modal unmanned aerial vehicle dataset for low altitude traffic surveillance,” arXiv preprint arXiv:2001.11737, 2020.
[3]
J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look once: Unified, real-time object detection,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 779–788.
[4]
J. Redmon and A. Farhadi, “Yolov3: An incremental improvement,” arXiv preprint arXiv:1804.02767, 2018.
[5]
M. Hasan, J. Choi, J. Neumann, A. K. Roy-Chowdhury, and L. S. Davis, “Learning temporal regularity in video sequences,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 733–742.
[6]
W. Sultani, C. Chen, and M. Shah, “Real-world anomaly detection in surveillance videos,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2018, pp. 6479–6488.
[7]
D. Xu, E. Ricci, Y. Yan, J. Song, and N. Sebe, “Learning deep representations of appearance and motion for anomalous event detection,” arXiv preprint arXiv:1510.01553, 2015.
[8]
Y. Gao, H. Liu, X. Sun, C. Wang, and Y. Liu, “Violence detection using oriented violent flows,” Image and vision computing, vol. 48, pp. 37–41, 2016.
[9]
J. F. Kooij, M. Liem, J. D. Krijnders, T. C. Andringa, and D. M. Gavrila, “Multi-modal human aggression detection,” Computer Vision and Image Understanding, vol. 144, pp. 106–120, 2016.
[10]
J. Benito-Picazo, E. Domínguez, E. J. Palomo, E. López-Rubio, and J. M. Ortiz-de Lazcano-Lobato, “Deep learning-based anomalous object detection system powered by microcontroller for ptz cameras,” in 2018 International Joint Conference on Neural Networks (IJCNN). IEEE, 2018, pp. 1–7.
[11]
G. H. de Carvalho, L. A. Thomaz, A. F. da Silva, E. A. da Silva, and S. L. Netto, “Anomaly detection with a moving camera using multiscale video analysis,” Multidimensional Systems and Signal Processing, vol. 30, no. 1, pp. 311–342, 2019.
[12]
M. T. Nakahata, L. A. Thomaz, A. F. da Silva, E. A. da Silva, and S. L. Netto, “Anomaly detection with a moving camera using spatio-temporal codebooks,” Multidimensional Systems and Signal Processing, vol. 29, no. 3, pp. 1025–1054, 2018.
[13]
J. Henrio and T. Nakashima, “Anomaly detection in videos recorded by drones in a surveillance context,” in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2018, pp. 2503–2508.
[14]
A. Singh, D. Patil, and S. Omkar, “Eye in the sky: Real-time drone surveillance system (dss) for violent individuals identification using scatternet hybrid deep learning network,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018, pp. 1629–1637.
[15]
I. Bozcan and E. Kayacan, “Uav-adnet: Unsupervised anomaly detection using deep neural networks for aerial surveillance,” in 2020 The IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2020, p. Accepted.
[16]
C. Zhou and R. C. Paffenroth, “Anomaly detection with robust deep autoencoders,” in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017, pp. 665–674.
[17]
N. Tuluptceva, B. Bakker, I. Fedulova, H. Schulz, and D. V. Dylov, “Anomaly detection with deep perceptual autoencoders,” arXiv preprint arXiv:2006.13265, 2020.
[18]
R. Chalapathy, A. K. Menon, and S. Chawla, “Anomaly detection using one-class neural networks,” arXiv preprint arXiv:1802.06360, 2018.
[19]
L. Ruff, R. Vandermeulen, N. Goernitz, L. Deecke, S. A. Siddiqui, A. Binder, E. Müller, and M. Kloft, “Deep one-class classification,” in International conference on machine learning, 2018, pp. 4393–4402.
[20]
T. Schlegl, P. Seeböck, S. M. Waldstein, U. Schmidt-Erfurth, and G. Langs, “Unsupervised anomaly detection with generative adversarial networks to guide marker discovery,” in International conference on information processing in medical imaging. Springer, 2017, pp. 146–157.
[21]
N. Dong, Y. Hatae, M. F. Fadjrimiratno, T. Matsukawa, and E. Suzuki, “Experimental evaluation of gan-based one-class anomaly detection on office monitoring,” in International Symposium on Methodologies for Intelligent Systems. Springer, 2020, pp. 214–224.
[22]
S. Kullback and R. A. Leibler, “On information and sufficiency,” The annals of mathematical statistics, vol. 22, no. 1, pp. 79–86, 1951.
[23]
T. Tieleman and G. Hinton, “Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude,” COURSERA: Neural networks for machine learning, vol. 4, no. 2, pp. 26–31, 2012.
[24]
T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick, “Microsoft coco: Common objects in context,” in European conference on computer vision. Springer, 2014, pp. 740–755.
[25]
“Undervisning, radgivning˚ og kampagner.” [Online]. Available: https://www.sikkertrafik.dk/

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
2021 IEEE International Conference on Robotics and Automation (ICRA)
May 2021
9777 pages

Publisher

IEEE Press

Publication History

Published: 30 May 2021

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media