[1]Singh A, Patil D, Omkar S N, et al. Eye in the sky: Realtime drone surveillance system (DSS) for violent individuals identification using scatternet hybrid deep learning network[C] Proc of the Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2018: 16291637[2]Wu P, Liu J, Shi Y, et al. Not only look, but also listen: Learning multimodal violence detection under weak supervision[C] Proc of the European Conf on Computer Vision. Berlin: Springer, 2020: 322339[3]Tony M, Sitou A, David S, et al. Violence detection in railway environment with modern deep learning approaches and small dataset[J]. Transportation Research Procedia, 2023, 72: 8792[4]Gao H. A Yolobased violence detection method in IoT surveillance systems[J]. International Journal of Advanced Computer Science and Applications, 2023, 14(8): 12[5]Simonyan K, Zisserman A. Twostream convolutional networks for action recognition in videos[C] Proc of the Conf on Neural Information Processing Systems. Red Hook, NY: Curran Associates, 2014: 568576[6]Roshan S, Srivathsan G, Deepak K, et al. Violence detection in automated video surveillance: Recent trends and comparative studies[JOL]. The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems, 2020 [20240719]. https:www.sciencedirect.comsciencearticleabspiiB978 0128163856000118[7]Ullah F U M, Ullah A, Muhammad K, et al. Violence detection using spatiotemporal features with 3D convolutional neural network[J]. Sensors, 2019, 19(11): 2472[8]徐欣欣. 结合残差网络和TSM的暴力行为检测方法[J]. 福建电脑, 2024, 40(4): 3539[9]Feichtenhofer C, Pinz A, Zisserman A. Convolutional twostream network fusion for video action recognition[C] Proc of the IEEE Conf on Computer Vision and Pattern Recognition. Piscataway, NJ: IEEE, 2016: 19331941[10]李根. 基于深度学习的暴力行为检测算法研究[D]. 北京: 北京邮电大学, 2023[11]高治军, 顾巧瑜, 陈平, 等. 基于CNNLSTM双流融合网络的危险行为识别[J]. 数据采集与处理, 2023, 38(1): 132140[12]刘莉, 王刚, 翟登辉. kmeans聚类算法在负荷曲线分类中的应用[J]. 电力系统保护与控制, 2011, 39(23): 6568, 73[13]王红, 史金钏, 张志伟. 基于注意力机制的LSTM的语义关系抽取[J]. 计算机应用研究, 2018, 35(5): 14171420, 1440[14]李正欣, 张凤鸣, 李克武, 等. 一种支持DTW距离的多元时间序列索引结构[J]. 软件学报, 2014, 25(3): 560575[15]Huang W, Peng Y, Ge Y, et al. A new Kmeans clustering model and its generalization achieved by joint spectral embedding and rotation[JOL]. PeerJ Computer Science, 2021 [20240719]. https:peerj.comarticlescs450[16]何红艳, 黄国言, 张炳, 等. 基于多种特征选择策略的入侵检测模型研究[J]. 信息安全研究, 2021, 7(3): 225232[17]Wang H, Li Y, Minh D L, et al. An efficient attention module for instance segmentation network inpest monitoring[J]. Computers and Electronics in Agriculture, 2022, 195(1): 1012[18]陶雪杰, 徐金明, 王树成, 等. 使用长短期记忆人工神经网络进行花岗岩变形破坏阶段的判别[J]. 水文地质工程地质, 2021, 48(3): 126134[19]温求遒, 黄文宇, 卢宝钢. 基于LSTM的落速控制最优制导策略研究[J]. 北京理工大学学报: 自然版, 2022, 42(5): 511522[20]钟家豪, 张新有, 冯力, 等. 基于卷积注意力机制的恶意软件样本增强方案[J]. 信息安全研究, 2024, 10(5): 431439 |