Graph Embedded Pose Clustering for Anomaly Detection

被引:110
|
作者
Markovitz, Amir [1 ]
Sharir, Gilad [2 ]
Friedman, Itamar [2 ]
Zelnik-Manor, Lihi [2 ]
Avidan, Shai [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Alibaba Grp, Hangzhou, Peoples R China
关键词
D O I
10.1109/CVPR42600.2020.01055
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a new method for anomaly detection of human actions. Our method works directly on human pose graphs that can be computed from an input video sequence. This makes the analysis independent of nuisance parameters such as viewpoint or illumination. We map these graphs to a latent space and cluster them. Each action is then represented by its soft-assignment to each of the clusters. This gives a kind of "bag of words" representation to the data, where every action is represented by its similarity to a group of base action-words. Then, we use a Dirichlet process based mixture, that is useful for handling proportional data such as our soft-assignment vectors, to determine if an action is normal or not. We evaluate our method on two types of data sets. The first is a fine-grained anomaly detection data set (e.g. ShanghaiTech) where we wish to detect unusual variations of some action. The second is a coarse-grained anomaly detection data set (e.g., a Kinetics-based data set) where few actions are considered normal, and every other action should be considered abnormal. Extensive experiments on the benchmarks show that our method1performs considerably better than other state of the art methods.
引用
收藏
页码:10536 / 10544
页数:9
相关论文
共 50 条
  • [1] A Spatio-Temporal Enhanced Graph-Transformer AutoEncoder embedded pose for anomaly detection
    Zhu, Honglei
    Wei, Pengjuan
    Xu, Zhigang
    IET COMPUTER VISION, 2024, 18 (03) : 405 - 419
  • [2] A Graph-based Clustering Algorithm for Anomaly Intrusion Detection
    Zhou Mingqiang
    Huang Hui
    Wang Qian
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1311 - 1314
  • [3] Graph clustering and anomaly detection of access control log for forensic purposes
    Studiawan, Hudan
    Payne, Christian
    Sohel, Ferdous
    DIGITAL INVESTIGATION, 2017, 21 : 76 - 87
  • [4] Collusion Set Detection within the Stock Market using Graph Clustering & Anomaly Detection
    Madurawe, Ranika N.
    Jayaweera, B. K. D. Irosh
    Jayawickrama, Thamindu D.
    Perera, Indika
    Withanawasam, Rasika
    MORATUWA ENGINEERING RESEARCH CONFERENCE (MERCON 2021) / 7TH INTERNATIONAL MULTIDISCIPLINARY ENGINEERING RESEARCH CONFERENCE, 2021, : 450 - 455
  • [5] Graph embedded analysis for head pose estimation
    Fu, Yun
    Huang, Thomas S.
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION - PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE, 2006, : 3 - +
  • [6] Semi-supervised Deep Embedded Clustering with Anomaly Detection for Semantic Frame Induction
    Yong, Zheng-Xin
    Torrent, Tiago Timponi
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON LANGUAGE RESOURCES AND EVALUATION (LREC 2020), 2020, : 3509 - 3519
  • [7] Anomaly detection in embedded systems
    Maxion, RA
    Tan, KMC
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (02) : 108 - 120
  • [9] Graph Anomaly Detection with Graph Convolutional Networks
    Mir, Aabid A.
    Zuhairi, Megat F.
    Musa, Shahrulniza
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 601 - 613
  • [10] Clustering ellipses for anomaly detection
    Moshtaghi, Masud
    Havens, Timothy C.
    Bezdek, James C.
    Park, Laurence
    Leckie, Christopher
    Rajasegarar, Sutharshan
    Keller, James M.
    Palaniswami, Marimuthu
    PATTERN RECOGNITION, 2011, 44 (01) : 55 - 69