Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation (Englisch)
- Neue Suche nach: Senst, Tobias
- Weitere Informationen zu Senst, Tobias:
- https://orcid.org/0000-0003-3461-6332
- Neue Suche nach: Eiselein, Volker
- Neue Suche nach: Kuhn, Alexander
- Neue Suche nach: Sikora, Thomas
- Neue Suche nach: Senst, Tobias
- Weitere Informationen zu Senst, Tobias:
- https://orcid.org/0000-0003-3461-6332
- Neue Suche nach: Eiselein, Volker
- Neue Suche nach: Kuhn, Alexander
- Neue Suche nach: Sikora, Thomas
In:
IEEE Transactions on Information Forensics and Security
;
12
, 12
;
2945-2956
;
2017
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level Representation
-
Beteiligte:Senst, Tobias ( Autor:in ) / Eiselein, Volker ( Autor:in ) / Kuhn, Alexander ( Autor:in ) / Sikora, Thomas ( Autor:in )
-
Erschienen in:IEEE Transactions on Information Forensics and Security ; 12, 12 ; 2945-2956
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.12.2017
-
Format / Umfang:5941869 byte
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis – Band 12, Ausgabe 12
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2825
-
Table of contents| 2017
- 2829
-
A New Multimodal Approach for Password Strength Estimation—Part I: Theory and AlgorithmsGalbally, Javier / Coisel, Iwen / Sanchez, Ignacio et al. | 2017
- 2845
-
A New Multimodal Approach for Password Strength Estimation—Part II: Experimental EvaluationGalbally, Javier / Coisel, Iwen / Sanchez, Ignacio et al. | 2017
- 2861
-
Beamforming and Power Splitting Designs for AN-Aided Secure Multi-User MIMO SWIPT SystemsZhu, Zhengyu / Chu, Zheng / Wang, Ning / Huang, Sai / Wang, Zhongyong / Lee, Inkyu et al. | 2017
- 2875
-
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid ImagesPapadopoulos, Athanasios / Nguyen, Toan / Durmus, Emre / Memon, Nasir et al. | 2017
- 2890
-
Statistical Detection of JPEG Traces in Digital Images in Uncompressed FormatsPasquini, Cecilia / Boato, Giulia / Perez-Gonzalez, Fernando et al. | 2017
- 2906
-
Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose ControlPawlick, Jeffrey / Zhu, Quanyan et al. | 2017
- 2920
-
Optimal Download Cost of Private Information Retrieval for Arbitrary Message LengthSun, Hua / Jafar, Syed Ali et al. | 2017
- 2933
-
Security of Cached Content in NDNKim, Dohyung / Bi, Jun / Vasilakos, Athanasios V. / Yeom, Ikjun et al. | 2017
- 2945
-
Crowd Violence Detection Using Global Motion-Compensated Lagrangian Features and Scale-Sensitive Video-Level RepresentationSenst, Tobias / Eiselein, Volker / Kuhn, Alexander / Sikora, Thomas et al. | 2017
- 2957
-
Jamming a TDD Point-to-Point Link Using Reciprocity-Based MIMOKarlsson, Marcus / Bjornson, Emil / Larsson, Erik G. et al. | 2017
- 2971
-
SIFT Keypoint Removal via Directed Graph Construction for Color ImagesLi, Yuanman / Zhou, Jiantao / Cheng, An et al. | 2017
- 2986
-
Enabling Central Keyword-Based Semantic Extension Search Over Encrypted Outsourced DataFu, Zhangjie / Wu, Xinle / Wang, Qian / Ren, Kui et al. | 2017
- 2998
-
OTIBAAGKA: A New Security Tool for Cryptographic Mix-Zone Establishment in Vehicular Ad Hoc NetworksZhang, Lei et al. | 2017
- 3011
-
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control SystemsWan, Ming / Shang, Wenli / Zeng, Peng et al. | 2017
- 3024
-
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage DevicesGordon, Steven / Huang, Xinyi / Miyaji, Atsuko / Su, Chunhua / Sumongkayothin, Karin / Wipusitwarakun, Komwut et al. | 2017
- 3039
-
I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title ClassificationDubin, Ran / Dvir, Amit / Pele, Ofir / Hadar, Ofer et al. | 2017
- 3050
-
Localization of Diffusion-Based Inpainting in Digital ImagesLi, Haodong / Luo, Weiqi / Huang, Jiwu et al. | 2017
- 3065
-
PRNU-Based Camera Attribution From Multiple Seam-Carved ImagesTaspinar, Samet / Mohanty, Manoranjan / Memon, Nasir et al. | 2017
- 3081
-
DPPro: Differentially Private High-Dimensional Data Release via Random ProjectionXu, Chugui / Ren, Ju / Zhang, Yaoxue / Qin, Zhan / Ren, Kui et al. | 2017
- 3094
-
A Game-Theoretic Analysis of Adversarial ClassificationDritsoula, Lemonia / Loiseau, Patrick / Musacchio, John et al. | 2017
- 3110
-
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the CloudSusilo, Willy / Jiang, Peng / Guo, Fuchun / Yang, Guomin / Yu, Yong / Mu, Yi et al. | 2017
- 3123
-
2017 List of Reviewers| 2017
- 3136
-
IEEE Transactions on Information Forensics and Security Edics| 2017
- 3137
-
IEEE Transactions on Information Forensics and Security information for authors| 2017
- 3139
-
2017 IndexIEEE Transactions on Information Forensics and SecurityVol. 12| 2017
- C1
-
Front cover| 2017
- C2
-
IEEE Transactions on Information Forensics and Security publication information| 2017
- C3
-
IEEE Signal Processing Society Information| 2017
- i
-
Farewell MessageBarni, Mauro et al. | 2017