sensors-logo

Journal Browser

Journal Browser

Unusual Behavior Detection Based on Machine Learning

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Physical Sensors".

Deadline for manuscript submissions: closed (20 September 2023) | Viewed by 29710

Special Issue Editors


E-Mail Website
Guest Editor
1. Department of Computer Science, University of Málaga, 29016 Málaga, Spain
2. Biomedic Research Institute of Málaga (IBIMA), 29016 Málaga, Spain
Interests: artificial intelligence; neural networks; deep learning; pattern recognition; machine learning; computer vision
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. Department of Computer Science, University of Málaga, 29016 Málaga, Spain
2. Biomedic Research Institute of Málaga (IBIMA), 29016 Málaga, Spain
Interests: video surveillance; object detection; deep learning; machine learning; computer vision

Special Issue Information

Dear Colleagues,

Recent advances in pattern recognition and machine learning are leading many fields of Artificial Intelligence. Anomaly detection techniques are used to identify unusual events or abnormal patterns which are often referred to as anomalies or outliers. Detecting unusual behavior using machine learning is also of great use in security, where these abnormal behaviors represent a potential attack. In addition, the vast amount of information that exists today requires an automatic analysis that allows us to discern whether these data follow normal behavior or are altered for some reason.

This Special Issue addresses all types of sensor-based techniques designed for detecting unusual behavior using machine learning. Topics include, but are not limited to:

  • Pattern recognition
  • Unusual behavior
  • Machine learning
  • Supervised learning
  • Unsupervised learning
  • Anomaly detection
  • Abnormal behavior detection

Prof. Dr. Enrique Domínguez
Prof. Dr. Rafael M. Luque-Baena
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

20 pages, 56216 KiB  
Article
Small-Scale Urban Object Anomaly Detection Using Convolutional Neural Networks with Probability Estimation
by Iván García-Aguilar, Rafael Marcos Luque-Baena, Enrique Domínguez and Ezequiel López-Rubio
Sensors 2023, 23(16), 7185; https://0-doi-org.brum.beds.ac.uk/10.3390/s23167185 - 15 Aug 2023
Cited by 1 | Viewed by 1021
Abstract
Anomaly detection in sequences is a complex problem in security and surveillance. With the exponential growth of surveillance cameras in urban roads, automating them to analyze the data and automatically identify anomalous events efficiently is essential. This paper presents a methodology to detect [...] Read more.
Anomaly detection in sequences is a complex problem in security and surveillance. With the exponential growth of surveillance cameras in urban roads, automating them to analyze the data and automatically identify anomalous events efficiently is essential. This paper presents a methodology to detect anomalous events in urban sequences using pre-trained convolutional neural networks (CNN) and super-resolution (SR) models. The proposal is composed of two parts. In the offline stage, the pre-trained CNN model evaluated a large dataset of urban sequences to detect and establish the common locations of the elements of interest. Analyzing the offline sequences, a density matrix is calculated to learn the spatial patterns and identify the most frequent locations of these elements. Based on probabilities previously calculated from the offline analysis, the pre-trained CNN, now in an online stage, assesses the probability of anomalies appearing in the real-time sequence using the density matrix. Experimental results demonstrate the effectiveness of the presented approach in detecting several anomalies, such as unusual pedestrian routes. This research contributes to urban surveillance by providing a practical and reliable method to improve public safety in urban environments. The proposed methodology can assist city management authorities in proactively detecting anomalies, thus enabling timely reaction and improving urban safety. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

21 pages, 840 KiB  
Article
Site Agnostic Approach to Early Detection of Cyberbullying on Social Media Networks
by Manuel López-Vizcaíno, Francisco J. Nóvoa, Thierry Artieres and Fidel Cacheda
Sensors 2023, 23(10), 4788; https://0-doi-org.brum.beds.ac.uk/10.3390/s23104788 - 16 May 2023
Cited by 1 | Viewed by 1441
Abstract
The rise in the use of social media networks has increased the prevalence of cyberbullying, and time is paramount to reduce the negative effects that derive from those behaviours on any social media platform. This paper aims to study the early detection problem [...] Read more.
The rise in the use of social media networks has increased the prevalence of cyberbullying, and time is paramount to reduce the negative effects that derive from those behaviours on any social media platform. This paper aims to study the early detection problem from a general perspective by carrying out experiments over two independent datasets (Instagram and Vine), exclusively using users’ comments. We used textual information from comments over baseline early detection models (fixed, threshold, and dual models) to apply three different methods of improving early detection. First, we evaluated the performance of Doc2Vec features. Finally, we also presented multiple instance learning (MIL) on early detection models and we assessed its performance. We applied timeawareprecision (TaP) as an early detection metric to asses the performance of the presented methods. We conclude that the inclusion of Doc2Vec features improves the performance of baseline early detection models by up to 79.6%. Moreover, multiple instance learning shows an important positive effect for the Vine dataset, where smaller post sizes and less use of the English language are present, with a further improvement of up to 13%, but no significant enhancement is shown for the Instagram dataset. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

22 pages, 1430 KiB  
Article
Power Disturbance Monitoring through Techniques for Novelty Detection on Wind Power and Photovoltaic Generation
by Artvin Darien Gonzalez-Abreu, Roque Alfredo Osornio-Rios, David Alejandro Elvira-Ortiz, Arturo Yosimar Jaen-Cuellar, Miguel Delgado-Prieto and Jose Alfonso Antonino-Daviu
Sensors 2023, 23(6), 2908; https://0-doi-org.brum.beds.ac.uk/10.3390/s23062908 - 07 Mar 2023
Cited by 1 | Viewed by 1321
Abstract
Novelty detection is a statistical method that verifies new or unknown data, determines whether these data are inliers (within the norm) or outliers (outside the norm), and can be used, for example, in developing classification strategies in machine learning systems for industrial applications. [...] Read more.
Novelty detection is a statistical method that verifies new or unknown data, determines whether these data are inliers (within the norm) or outliers (outside the norm), and can be used, for example, in developing classification strategies in machine learning systems for industrial applications. To this end, two types of energy that have evolved over time are solar photovoltaic and wind power generation. Some organizations around the world have developed energy quality standards to avoid known electric disturbances; however, their detection is still a challenge. In this work, several techniques for novelty detection are implemented to detect different electric anomalies (disturbances), which are k-nearest neighbors, Gaussian mixture models, one-class support vector machines, self-organizing maps, stacked autoencoders, and isolation forests. These techniques are applied to signals from real power quality environments of renewable energy systems such as solar photovoltaic and wind power generation. The power disturbances that will be analyzed are considered in the standard IEEE-1159, such as sag, oscillatory transient, flicker, and a condition outside the standard attributed to meteorological conditions. The contribution of the work consists of the development of a methodology based on six techniques for novelty detection of power disturbances, under known and unknown conditions, over real signals in the power quality assessment. The merit of the methodology is a set of techniques that allow to obtain the best performance of each one under different conditions, which constitutes an important contribution to the renewable energy systems. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

23 pages, 1487 KiB  
Article
Fight Fire with Fire: Detecting Forest Fires with Embedded Machine Learning Models Dealing with Audio and Images on Low Power IoT Devices
by Giacomo Peruzzi, Alessandro Pozzebon and Mattia Van Der Meer
Sensors 2023, 23(2), 783; https://0-doi-org.brum.beds.ac.uk/10.3390/s23020783 - 10 Jan 2023
Cited by 19 | Viewed by 3583
Abstract
Forest fires are the main cause of desertification, and they have a disastrous impact on agricultural and forest ecosystems. Modern fire detection and warning systems rely on several techniques: satellite monitoring, sensor networks, image processing, data fusion, etc. Recently, Artificial Intelligence (AI) algorithms [...] Read more.
Forest fires are the main cause of desertification, and they have a disastrous impact on agricultural and forest ecosystems. Modern fire detection and warning systems rely on several techniques: satellite monitoring, sensor networks, image processing, data fusion, etc. Recently, Artificial Intelligence (AI) algorithms have been applied to fire recognition systems, enhancing their efficiency and reliability. However, these devices usually need constant data transmission along with a proper amount of computing power, entailing high costs and energy consumption. This paper presents the prototype of a Video Surveillance Unit (VSU) for recognising and signalling the presence of forest fires by exploiting two embedded Machine Learning (ML) algorithms running on a low power device. The ML models take audio samples and images as their respective inputs, allowing for timely fire detection. The main result is that while the performances of the two models are comparable when they work independently, their joint usage according to the proposed methodology provides a higher accuracy, precision, recall and F1 score (96.15%, 92.30%, 100.00%, and 96.00%, respectively). Eventually, each event is remotely signalled by making use of the Long Range Wide Area Network (LoRaWAN) protocol to ensure that the personnel in charge are able to operate promptly. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

18 pages, 17210 KiB  
Article
Fast and Efficient Image Novelty Detection Based on Mean-Shifts
by Matthias Hermann, Georg Umlauf, Bastian Goldlücke and Matthias O. Franz
Sensors 2022, 22(19), 7674; https://0-doi-org.brum.beds.ac.uk/10.3390/s22197674 - 10 Oct 2022
Cited by 4 | Viewed by 1898
Abstract
Image novelty detection is a repeating task in computer vision and describes the detection of anomalous images based on a training dataset consisting solely of normal reference data. It has been found that, in particular, neural networks are well-suited for the task. Our [...] Read more.
Image novelty detection is a repeating task in computer vision and describes the detection of anomalous images based on a training dataset consisting solely of normal reference data. It has been found that, in particular, neural networks are well-suited for the task. Our approach first transforms the training and test images into ensembles of patches, which enables the assessment of mean-shifts between normal data and outliers. As mean-shifts are only detectable when the outlier ensemble and inlier distribution are spatially separate from each other, a rich feature space, such as a pre-trained neural network, needs to be chosen to represent the extracted patches. For mean-shift estimation, the Hotelling T2 test is used. The size of the patches turned out to be a crucial hyperparameter that needs additional domain knowledge about the spatial size of the expected anomalies (local vs. global). This also affects model selection and the chosen feature space, as commonly used Convolutional Neural Networks or Vision Image Transformers have very different receptive field sizes. To showcase the state-of-the-art capabilities of our approach, we compare results with classical and deep learning methods on the popular dataset CIFAR-10, and demonstrate its real-world applicability in a large-scale industrial inspection scenario using the MVTec dataset. Because of the inexpensive design, our method can be implemented by a single additional 2D-convolution and pooling layer and allows particularly fast prediction times while being very data-efficient. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

21 pages, 3043 KiB  
Article
DL-Based Physical Tamper Attack Detection in OFDM Systems with Multiple Receiver Antennas: A Performance–Complexity Trade-Off
by Eshagh Dehmollaian, Bernhard Etzlinger, Núria Ballber Torres and Andreas Springer
Sensors 2022, 22(17), 6547; https://0-doi-org.brum.beds.ac.uk/10.3390/s22176547 - 30 Aug 2022
Viewed by 1723
Abstract
This paper proposes two deep-learning (DL)-based approaches to a physical tamper attack detection problem in orthogonal frequency division multiplexing (OFDM) systems with multiple receiver antennas based on channel state information (CSI) estimates. The physical tamper attack is considered as the unwanted change of [...] Read more.
This paper proposes two deep-learning (DL)-based approaches to a physical tamper attack detection problem in orthogonal frequency division multiplexing (OFDM) systems with multiple receiver antennas based on channel state information (CSI) estimates. The physical tamper attack is considered as the unwanted change of antenna orientation at the transmitter or receiver. Approaching the tamper attack scenario as a semi-supervised anomaly detection problem, the algorithms are trained solely based on tamper-attack-free measurements, while operating in general scenarios that may include physical tamper attacks. Two major challenges in the algorithm design are environmental changes, e.g., moving persons, that are not due to an attack and evaluating the trade-off between detection performance and complexity. Our experimental results from two different environments, comprising an office and a hall, show the proper detection performances of the proposed methods with different complexity levels. The optimal proposed method achieves a 93.32% true positive rate and a 10% false positive rate with a suitable level of complexity. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

20 pages, 14713 KiB  
Article
ResNet-AE for Radar Signal Anomaly Detection
by Donghang Cheng, Youchen Fan, Shengliang Fang, Mengtao Wang and Han Liu
Sensors 2022, 22(16), 6249; https://0-doi-org.brum.beds.ac.uk/10.3390/s22166249 - 19 Aug 2022
Cited by 4 | Viewed by 2644
Abstract
Radar signal anomaly detection is an effective method to detect potential threat targets. Given the low Accuracy of the traditional AE model and the complex network of GAN, an anomaly detection method based on ResNet-AE is proposed. In this method, CNN is used [...] Read more.
Radar signal anomaly detection is an effective method to detect potential threat targets. Given the low Accuracy of the traditional AE model and the complex network of GAN, an anomaly detection method based on ResNet-AE is proposed. In this method, CNN is used to extract features and learn the potential distribution law of data. LSTM is used to discover the time dependence of data. ResNet is used to alleviate the problem of gradient loss and improve the efficiency of the deep network. Firstly, the signal subsequence is extracted according to the pulse’s rising edge and falling edge. Then, the normal radar signal data are used for model training, and the mean square error distance is used to calculate the error between the reconstructed data and the original data. Finally, the adaptive threshold is used to determine the anomaly. Experimental results show that the recognition Accuracy of this method can reach more than 85%. Compared with AE, CNN-AE, LSTM-AE, LSTM-GAN, LSTM-based VAE-GAN, and other models, Accuracy is increased by more than 4%, and it is improved in Precision, Recall, F1-score, and AUC. Moreover, the model has a simple structure, strong stability, and certain universality. It has good performance under different SNRs. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

25 pages, 14816 KiB  
Article
Increasing the Generalization of Supervised Fabric Anomaly Detection Methods to Unseen Fabrics
by Oliver Rippel, Corinna Zwinge and Dorit Merhof
Sensors 2022, 22(13), 4750; https://0-doi-org.brum.beds.ac.uk/10.3390/s22134750 - 23 Jun 2022
Cited by 3 | Viewed by 2110
Abstract
Fabric anomaly detection (AD) tries to detect anomalies (i.e., defects) in fabrics, and fabric AD approaches are continuously improved with respect to their AD performance. However, developed solutions are known to generalize poorly to previously unseen fabrics, posing a crucial limitation to their [...] Read more.
Fabric anomaly detection (AD) tries to detect anomalies (i.e., defects) in fabrics, and fabric AD approaches are continuously improved with respect to their AD performance. However, developed solutions are known to generalize poorly to previously unseen fabrics, posing a crucial limitation to their applicability. Moreover, current research focuses on adapting converged models to previously unseen fabrics in a post hoc manner, rather than training models that generalize better in the first place. In our work, we explore this potential for the first time. Specifically, we propose that previously unseen fabrics can be regarded as shifts in the underlying data distribution. We therefore argue that factors which reportedly improve a model’s resistance to distribution shifts should also improve the performance of supervised fabric AD methods on unseen fabrics. Hence, we assess the potential benefits of: (I) vicinal risk minimization (VRM) techniques adapted to the fabric AD use-case, (II) different loss functions, (III) ImageNet pre-training, (IV) dataset diversity, and (V) model architecture as well as model complexity. The subsequently performed large-scale analysis reveals that (I) only the VRM technique, AugMix, consistently improves performance on unseen fabrics; (II) hypersphere classifier outperforms other loss functions when combined with AugMix and (III) ImageNet pre-training, which is already beneficial on its own; (IV) increasing dataset diversity improves performance on unseen fabrics; and (V) architectures with better ImageNet performance also perform better on unseen fabrics, yet the same does not hold for more complex models. Notably, the results show that not all factors and techniques which reportedly improve a model’s resistance to distribution shifts in natural images also improve the generalization of supervised fabric AD methods to unseen fabrics, demonstrating the necessity of our work. Additionally, we also assess whether the performance gains of models which generalize better propagate to post hoc adaptation methods and show this to be the case. Since no suitable fabric dataset was publicly available at the time of this work, we acquired our own fabric dataset, called OLP, as the basis for the above experiments. OLP consists of 38 complex, patterned fabrics, more than 6400 images in total, and is made publicly available. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

39 pages, 11279 KiB  
Article
Recent Advances in Video Analytics for Rail Network Surveillance for Security, Trespass and Suicide Prevention—A Survey
by Tianhao Zhang, Waqas Aftab, Lyudmila Mihaylova, Christian Langran-Wheeler, Samuel Rigby, David Fletcher, Steve Maddock and Garry Bosworth
Sensors 2022, 22(12), 4324; https://0-doi-org.brum.beds.ac.uk/10.3390/s22124324 - 07 Jun 2022
Cited by 12 | Viewed by 5307
Abstract
Railway networks systems are by design open and accessible to people, but this presents challenges in the prevention of events such as terrorism, trespass, and suicide fatalities. With the rapid advancement of machine learning, numerous computer vision methods have been developed in closed-circuit [...] Read more.
Railway networks systems are by design open and accessible to people, but this presents challenges in the prevention of events such as terrorism, trespass, and suicide fatalities. With the rapid advancement of machine learning, numerous computer vision methods have been developed in closed-circuit television (CCTV) surveillance systems for the purposes of managing public spaces. These methods are built based on multiple types of sensors and are designed to automatically detect static objects and unexpected events, monitor people, and prevent potential dangers. This survey focuses on recently developed CCTV surveillance methods for rail networks, discusses the challenges they face, their advantages and disadvantages and a vision for future railway surveillance systems. State-of-the-art methods for object detection and behaviour recognition applied to rail network surveillance systems are introduced, and the ethics of handling personal data and the use of automated systems are also considered. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

Review

Jump to: Research

28 pages, 2270 KiB  
Review
Perimeter Intrusion Detection by Video Surveillance: A Survey
by Devashish Lohani, Carlos Crispim-Junior, Quentin Barthélemy, Sarah Bertrand, Lionel Robinault and Laure Tougne Rodet
Sensors 2022, 22(9), 3601; https://0-doi-org.brum.beds.ac.uk/10.3390/s22093601 - 09 May 2022
Cited by 8 | Viewed by 5267
Abstract
In recent times, we have seen a massive rise in vision-based applications, such as video anomaly detection, motion detection, object tracking, people counting, etc. Most of these tasks are well defined, with a clear idea of the goal, along with proper datasets and [...] Read more.
In recent times, we have seen a massive rise in vision-based applications, such as video anomaly detection, motion detection, object tracking, people counting, etc. Most of these tasks are well defined, with a clear idea of the goal, along with proper datasets and evaluation procedures. However, perimeter intrusion detection (PID), which is one of the major tasks in visual surveillance, still needs to be formally defined. A perimeter intrusion detection system (PIDS) aims to detect the presence of an unauthorized object in a protected outdoor site during a certain time. Existing works vaguely define a PIDS, and this has a direct impact on the evaluation of methods. In this paper, we mathematically define it. We review the existing methods, datasets and evaluation protocols based on this definition. Furthermore, we provide a suitable evaluation protocol for real-life application. Finally, we evaluate the existing systems on available datasets using different evaluation schemes and metrics. Full article
(This article belongs to the Special Issue Unusual Behavior Detection Based on Machine Learning)
Show Figures

Figure 1

Back to TopTop