Keyhole Adversarial Plan Recognition for Recognition of Suspicious and Anomalous Behavior
暂无分享,去创建一个
[1] Xavier Boyen,et al. Tractable Inference for Complex Stochastic Processes , 1998, UAI.
[2] Stacy Marsella,et al. PsychSim: Modeling Theory of Mind with Decision-Theoretic Agents , 2005, IJCAI.
[3] Qiang Yang,et al. CIGAR: Concurrent and Interleaving Goal and Activity Recognition , 2008 .
[4] Manuela M. Veloso,et al. Conditional random fields for activity recognition , 2007, AAMAS '07.
[5] Milind Tambe,et al. Detection of suspicious behavior from a sparse set of multiagent interactions , 2012, AAMAS.
[6] Chris L. Baker,et al. Modeling Human Plan Recognition Using Bayesian Theory of Mind , 2014 .
[7] Eric Horvitz,et al. Layered representations for human activity recognition , 2002, Proceedings. Fourth IEEE International Conference on Multimodal Interfaces.
[8] Junji Yamato,et al. Recognizing human action in time-sequential images using hidden Markov model , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[9] Nipun Kwatra,et al. A Framework for Activity Recognition and Detection of Unusual Activities , 2004, ICVGIP.
[10] Alex Pentland,et al. Real-time American Sign Language recognition from video using hidden Markov models , 1995 .
[11] Michael P. Wellman,et al. Probabilistic State-Dependent Grammars for Plan Recognition , 2000, UAI.
[12] Svetha Venkatesh,et al. Activity recognition and abnormality detection with the switching hidden semi-Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[13] Edward Y. Chang,et al. Multi-camera spatio-temporal fusion and biased sequence-data learning for security surveillance , 2003, MULTIMEDIA '03.
[14] Branislav Bosanský,et al. Game-theoretic Approach to Adversarial Plan Recognition , 2012, ECAI.
[15] Christopher W. Geib,et al. Assessing the Complexity of Plan Recognition , 2004, AAAI.
[16] Henry A. Kautz,et al. Learning and inferring transportation routines , 2004, Artif. Intell..
[17] Wei Niu,et al. Human activity detection and recognition for video surveillance , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[18] Svetha Venkatesh,et al. The Hidden Permutation Model and Location-Based Activity Recognition , 2008, AAAI.
[19] Gita Reese Sukthankar,et al. A cost minimization approach to human behavior recognition , 2005, AAMAS '05.
[20] Robert Suzic,et al. A generic model of tactical plan recognition for threat assessment , 2005, SPIE Defense + Commercial Sensing.
[21] Christopher W. Geib,et al. Empirical Analysis of a Probabilistic Task Tracking Algorithm , 2004 .
[22] Stacy Marsella,et al. Minimal Mental Models , 2007, AAAI.
[23] Milind Tambe,et al. Robust Agent Teams via Socially-Attentive Monitoring , 2000, J. Artif. Intell. Res..
[24] Yoram Singer,et al. The Hierarchical Hidden Markov Model: Analysis and Applications , 1998, Machine Learning.
[25] Alex Pentland,et al. Coupled hidden Markov models for complex action recognition , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[26] Milind Tambe,et al. Monitoring Teams by Overhearing: A Multi-Agent Plan-Recognition Approach , 2002, J. Artif. Intell. Res..
[27] Gal A. Kaminka,et al. Incorporating Observer Biases in Keyhole Plan Recognition (Efficiently!) , 2007, AAAI.
[28] Michael P. Wellman,et al. Generalized Queries on Probabilistic Context-Free Grammars , 1996, AAAI/IAAI, Vol. 2.
[29] Robert P. Goldman,et al. Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[30] Qiang Yang,et al. Sensor-Based Abnormal Human-Activity Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.
[31] Nate Blaylock,et al. Fast Hierarchical Goal Schema Recognition , 2006, AAAI.
[32] Hila Zarosim,et al. Fast and Complete Symbolic Plan Recognition: Allowing for Duration, Interleaved Execution, and Lossy Observations , 2005 .
[33] H. Buxton,et al. Advanced visual surveillance using Bayesian networks , 1997 .
[34] Hung Hai Bui,et al. A General Model for Online Probabilistic Plan Recognition , 2003, IJCAI.
[35] Shaogang Gong,et al. Video Behavior Profiling for Anomaly Detection , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Ramakant Nevatia,et al. Bayesian framework for video surveillance application , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[37] Richard J. Doyle,et al. Determining the Loci of Anomalies Using Minimal Causal Models , 1995, IJCAI.
[38] Michael I. Jordan,et al. Factorial Hidden Markov Models , 1995, Machine Learning.
[39] M.M. Trivedi,et al. Performance evaluation of a vision based lane tracker designed for driver assistance systems , 2005, IEEE Proceedings. Intelligent Vehicles Symposium, 2005..
[40] Gal A. Kaminka,et al. The use of hidden semi-Markov models in clinical diagnosis maze tasks , 2009, Intelligent Data Analysis.
[41] Christopher W. Geib,et al. Delaying Commitment in Plan Recognition Using Combinatory Categorial Grammars , 2009, IJCAI.
[42] Gal A. Kaminka,et al. Detecting disagreements in large-scale multi-agent teams , 2009, Autonomous Agents and Multi-Agent Systems.
[43] Uffe Kjaerulff,et al. A computational scheme for Reasoning in Dynamic Probabilistic Networks , 2013, 1303.5407.
[44] Wenji Mao,et al. A Utility-Based Approach to Intention Recognition , 2004, AAMAS 2004.
[45] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[46] Svetha Venkatesh,et al. Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[47] Meir Kalech,et al. Online anomaly detection in unmanned vehicles , 2011, AAMAS.
[48] Julie A. Adams,et al. Human Management of a Hierarchical System for the Control of Multiple Mobile Robots ( Dissertation Proposal ) MS-CIS-95-17 GRASP Lab 392 , 1994 .
[49] Svetha Venkatesh,et al. Policy Recognition in the Abstract Hidden Markov Model , 2002, J. Artif. Intell. Res..
[50] Gal A. Kaminka,et al. Fast and Complete Symbolic Plan Recognition , 2005, IJCAI.
[51] Karen L. Myers,et al. Identifying Terrorist Activity with AI Plan Recognition Technology , 2005, AI Mag..
[52] Robert P. Goldman,et al. Recognizing Plans with Loops Represented in a Lexicalized Grammar , 2011, AAAI.
[53] Wenji Mao,et al. Decision-Theoretic Approach to Plan Recognition , 2004 .
[54] Gregory F. Cooper,et al. The Computational Complexity of Probabilistic Inference Using Bayesian Belief Networks , 1990, Artif. Intell..
[55] M. Thonnat,et al. Video understanding for metro surveillance , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[56] Mark Steedman,et al. On Natural Language Processing and Plan Recognition , 2007, IJCAI.