AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges, and future perspectives

GK Walia, M Kumar, SS Gill - IEEE Communications Surveys & …, 2023 - ieeexplore.ieee.org
The proliferation of ubiquitous Internet of Things (IoT) sensors and smart devices in several
domains embracing healthcare, Industry 4.0, transportation and agriculture are giving rise to …

Exploring contactless techniques in multimodal emotion recognition: insights into diverse applications, challenges, solutions, and prospects

UA Khan, Q Xu, Y Liu, A Lagstedt, A Alamäki… - Multimedia …, 2024 - Springer
In recent years, emotion recognition has received significant attention, presenting a plethora
of opportunities for application in diverse fields such as human–computer interaction …

Video Surveillance Anomaly Detection: A Review on Deep Learning Benchmarks

KU Duja, IA Khan, M Alsuhaibani - IEEE Access, 2024 - ieeexplore.ieee.org
Many surveillance cameras are mounted in sparse and crowded indoor and outdoor areas
to monitor and detect various patterns of human behaviors and anomalies in the public and …

A cloud-based deep learning framework for early detection of pushing at crowded event entrances

A Alia, M Maree, M Chraibi, A Toma, A Seyfried - IEEE access, 2023 - ieeexplore.ieee.org
Crowding at the entrances of large events may lead to critical and life-threatening situations,
particularly when people start pushing each other to reach the event faster. Automatic and …

[HTML][HTML] Detecting abnormal behaviors in dementia patients using lifelog data: A machine learning approach

K Kim, J Jang, H Park, J Jeong, D Shin, D Shin - Information, 2023 - mdpi.com
In this paper, a proof-of-concept method for detecting abnormal behavior in dementia
patients based on a single case study is proposed. This method incorporates the collection …

Customized CNN with Adam and Nadam optimizers for emotion recognition using facial expressions

P Kuppusamy, P Harshitha… - 2023 International …, 2023 - ieeexplore.ieee.org
People communicate using one of the communication types of facial expressions to express
their emotions. Human feelings are detected through facial expressions to interpret their …

Armed boundary sabotage: A case study of human malicious behaviors identification with computer vision and explainable reasoning methods

Z Li, X Song, S Chen, K Demachi - Computers and Electrical Engineering, 2025 - Elsevier
Nowadays, the technologies in computer vision (CV) are labor-saving and convenient to
identify human malicious behaviors. However, they usually fail to consider the robustness …

[HTML][HTML] Analyzing Crowd Behavior in Highly Dense Crowd Videos Using 3D ConvNet and Multi-SVM

M Elmezain, AS Maklad, M Alwateer, M Farsi… - Electronics, 2024 - mdpi.com
Crowd behavior presents significant challenges due to intricate interactions. This research
proposes an approach that combines the power of 3D Convolutional Neural Networks …

Federated Learning and Differential Privacy in AI-Based Surveillance Systems Model

J Adiwijaya, VR Tanaya… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Surveillance systems, particularly AI-based ones, play a crucial role in enhancing public
security. However, they have also raised significant concerns about privacy due to the …

Adaptive loitering anomaly detection based on motion states

H Li, X Huang - Multimedia Tools and Applications, 2024 - Springer
In the field of video surveillance security in public places, loitering anomaly detection is a
very critical part. Currently, the detection targets often face difficulties in loitering anomaly …