24
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Anomaly Recognition Algorithm for Human Multipose Motion Behavior Using Generative Adversarial Network

      1 , 2 , 1 , 1 , 1
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Human multipose motion behavior is similar; there are many actions. However, it is difficult to recognize abnormal behavior. The existing human motion behavior anomaly recognition methods have the problems of low accuracy and being time-consuming. Therefore, an anomaly recognition method of human multipose motion behavior using Generative Adversarial Network (GAN) is proposed. The Gauss model is used to segment the human multipose motion behavior image, and the image foreground of the segmentation result is the human motion target detection result. The Shi-Tomasi algorithm is selected to extract contour feature points from human motion object detection results. The extracted contour features are set as hidden space random variables and input into the GAN. The GAN uses the generator and discriminator to recognize the multipose human motion behavior and determine whether the multipose human motion behavior is abnormal. The results show that the proposed algorithm can accurately recognize abnormal human multipose motion behavior, the recognition accuracy is higher than 99%, and the average recognition time is less than 200 ms. The shadow removal effect of the foreground image obtained by the proposed algorithm can realize the accurate recognition of human multipose motion behavior abnormalities and provide a reliable basis for research in related fields.

          Related collections

          Most cited references24

          • Record: found
          • Abstract: not found
          • Article: not found

          Adversarial attacks on medical machine learning

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            View-invariant Deep Architecture for Human Action Recognition using Two-stream Motion and Shape Temporal Dynamics

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found
              Is Open Access

              Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review

                Bookmark

                Author and article information

                Contributors
                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8677
                1530-8669
                January 17 2022
                January 17 2022
                : 2022
                : 1-9
                Affiliations
                [1 ]Physical Education Department, Beijing University of Technology, Beijing 100124, China
                [2 ]College of Physical Education and Training, Harbin Sport University, Harbin, 150008 Heilongjiang, China
                Article
                10.1155/2022/2656001
                a129fe09-6f9c-4e09-88ab-bafb171dcd64
                © 2022

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article