|
|
|
Mahmud Hossain, Golam Kayas, Ragib Hasan, Anthony Skjellum, Shahid Noor and S. M. Riazul Islam
Driven by the rapid escalation of its utilization, as well as ramping commercialization, Internet of Things (IoT) devices increasingly face security threats. Apart from denial of service, privacy, and safety concerns, compromised devices can be used as e...
ver más
|
|
|
|
|
|
|
Christos Kyriakos and Manolis Vavalis
Several cities have been greatly affected by economic crisis, unregulated gentrification, and the pandemic, resulting in increased vacancy rates. Abandoned buildings have various negative implications on their neighborhoods, including an increased chance...
ver más
|
|
|
|
|
|
|
Paria Sarzaeim, Qusay H. Mahmoud, Akramul Azim, Gary Bauer and Ian Bowles
Smart policing refers to the use of advanced technologies such as artificial intelligence to enhance policing activities in terms of crime prevention or crime reduction. Artificial intelligence tools, including machine learning and natural language proce...
ver más
|
|
|
|
|
|
|
Dorra Mahouachi and Moulay A. Akhloufi
Besides the many advances made in the facial detection and recognition fields, face recognition applied to visual images (VIS-FR) has received increasing interest in recent years, especially in the field of communication, identity authentication, public ...
ver más
|
|
|
|
|
|
|
Eugenio Cesario, Paolo Lindia and Andrea Vinci
Leveraged by a large-scale diffusion of sensing networks and scanning devices in modern cities, huge volumes of geo-referenced urban data are collected every day. Such an amount of information is analyzed to discover data-driven models, which can be expl...
ver más
|
|
|
|
|
|
|
Junyi Cheng, Xianfeng Zhang, Xiao Chen, Miao Ren, Jie Huang and Peng Luo
Early detection of people?s suspicious behaviors can aid in the prevention of crimes and make the community safer. Existing methods that are focused on identifying abnormal behaviors from video surveillance that are based on computer vision, which are mo...
ver más
|
|
|
|
|
|
|
Shikha Dubey, Abhijeet Boragule, Jeonghwan Gwak and Moongu Jeon
Given the scarcity of annotated datasets, learning the context-dependency of anomalous events as well as mitigating false alarms represent challenges in the task of anomalous activity detection. We propose a framework, Deep-network with Multiple Ranking ...
ver más
|
|
|
|
|
|
|
Ricardo Resende de Mendonça, Daniel Felix de Brito, Ferrucio de Franco Rosa, Júlio Cesar dos Reis and Rodrigo Bonacin
Criminals use online social networks for various activities by including communication, planning, and execution of criminal acts. They often employ ciphered posts using slang expressions, which are restricted to specific groups. Although literature shows...
ver más
|
|
|
|
|
|
|
Zengli Wang and Hong Zhang
Empirical studies have focused on investigating the interactive relationships between crime pairs. However, many other types of crime patterns have not been extensively investigated. In this paper, we introduce three basic crime patterns in four combinat...
ver más
|
|
|
|
|
|
|
Tomasz Granosik,Elzbieta Lewanska
Pág. 12 - 22
County lines are a new type of criminal activity in the UK in which young people are being forced to participate in drug dealing. This article presents an application of an unsupervised machine learning technique to detect such cases among a bank?s clien...
ver más
|
|
|
|