Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.

Slides:



Advertisements
Similar presentations
Loss-Sensitive Decision Rules for Intrusion Detection and Response Linda Zhao Statistics Department University of Pennsylvania Joint work with I. Lee,
Advertisements

Generative Models Thus far we have essentially considered techniques that perform classification indirectly by modeling the training data, optimizing.
CSCI 347 / CS 4206: Data Mining Module 07: Implementations Topic 03: Linear Models.
An Overview of Machine Learning
Computer vision: models, learning and inference
Modeling Human Reasoning About Meta-Information Presented By: Scott Langevin Jingsong Wang.
Watching Unlabeled Video Helps Learn New Human Actions from Very Few Labeled Snapshots Chao-Yeh Chen and Kristen Grauman University of Texas at Austin.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Hidden Markov Model based 2D Shape Classification Ninad Thakoor 1 and Jean Gao 2 1 Electrical Engineering, University of Texas at Arlington, TX-76013,
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
Page 0 of 8 Time Series Classification – phoneme recognition in reconstructed phase space Sanjay Patil Intelligent Electronics Systems Human and Systems.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Watchdog Confident Event Detection in Heterogeneous Sensor Networks Matthew Keally 1, Gang Zhou 1, Guoliang Xing 2 1 College of William and Mary, 2 Michigan.
Speaker Adaptation for Vowel Classification
Towards a Learning Incident Detection System ICML 06 Workshop on Machine Learning for Surveillance and Event Detection June 29, 2006 Tomas Singliar Joint.
1 LM Approaches to Filtering Richard Schwartz, BBN LM/IR ARDA 2002 September 11-12, 2002 UMASS.
September 2003 Fraud Formalization and Detection Bharat Bhargava, Yuhui Zhong, Yunhua Lu Center for Education and Research in Information Assurance and.
Video Mining Learning Patterns of Behaviour via an Intelligent Image Analysis System.
TelosCAM: Identifying Burglar Through Networked Sensor-Camera Mates with Privacy Protection Presented by Qixin Wang Shaojie Tang, Xiang-Yang Li, Haitao.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Real-Time Odor Classification Through Sequential Bayesian Filtering Javier G. Monroy Javier Gonzalez-Jimenez
By : Anas Assiri.  Introduction  fraud detection  Immune system  Artificial immune system (AIS)  AISFD  Clonal selection.
Classification with Hyperplanes Defines a boundary between various points of data which represent examples plotted in multidimensional space according.
Repository Method to suit different investment strategies Alma Lilia Garcia & Edward Tsang.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Intrusion Detection Jie Lin. Outline Introduction A Frame for Intrusion Detection System Intrusion Detection Techniques Ideas for Improving Intrusion.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
Masquerade Detection Mark Stamp 1Masquerade Detection.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Example Clustered Transformations MAP Adaptation Resources: ECE 7000:
Anomaly detection with Bayesian networks Website: John Sandiford.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Data mining for credit card fraud: A comparative study.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
NEURAL NETWORKS FOR DATA MINING
1 SUPPORT VECTOR MACHINES İsmail GÜNEŞ. 2 What is SVM? A new generation learning system. A new generation learning system. Based on recent advances in.
ACT: Attachment Chain Tracing Scheme for Virus Detection and Control Jintao Xiong Proceedings of the 2004 ACM workshop on Rapid malcode Presented.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Kernel Methods A B M Shawkat Ali 1 2 Data Mining ¤ DM or KDD (Knowledge Discovery in Databases) Extracting previously unknown, valid, and actionable.
One-class Training for Masquerade Detection Ke Wang, Sal Stolfo Columbia University Computer Science IDS Lab.
Experimental Results ■ Observations:  Overall detection accuracy increases as the length of observation window increases.  An observation window of 100.
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
Using Inactivity to Detect Unusual behavior Presenter : Siang Wang Advisor : Dr. Yen - Ting Chen Date : Motion and video Computing, WMVC.
Map of the Great Divide Basin, Wyoming, created using a neural network and used to find likely fossil beds See:
Christopher M. Bishop, Pattern Recognition and Machine Learning.
Evaluation of Techniques for Classifying Biological Sequences Authors: Mukund Deshpande and George Karypis Speaker: Sarah Chan CSIS DB Seminar May 31,
Learning to Navigate Through Crowded Environments Peter Henry 1, Christian Vollmer 2, Brian Ferris 1, Dieter Fox 1 Tuesday, May 4, University of.
Sequential Monte-Carlo Method -Introduction, implementation and application Fan, Xin
Consensus Extraction from Heterogeneous Detectors to Improve Performance over Network Traffic Anomaly Detection Jing Gao 1, Wei Fan 2, Deepak Turaga 2,
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
 Present by 陳群元.  Introduction  Previous work  Predicting motion patterns  Spatio-temporal transition distribution  Discerning pedestrians  Experimental.
Application of latent semantic analysis to protein remote homology detection Wu Dongyin 4/13/2015.
International Conference on Fuzzy Systems and Knowledge Discovery, p.p ,July 2011.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
NTU & MSRA Ming-Feng Tsai
Supervised Machine Learning: Classification Techniques Chaleece Sandberg Chris Bradley Kyle Walsh.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Lecture 5: Statistical Methods for Classification CAP 5415: Computer Vision Fall 2006.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Mismatch String Kernals for SVM Protein Classification Christina Leslie, Eleazar Eskin, Jason Weston, William Stafford Noble Presented by Pradeep Anand.
Incremental Reduced Support Vector Machines Yuh-Jye Lee, Hung-Yi Lo and Su-Yun Huang National Taiwan University of Science and Technology and Institute.
Flexible Speaker Adaptation using Maximum Likelihood Linear Regression Authors: C. J. Leggetter P. C. Woodland Presenter: 陳亮宇 Proc. ARPA Spoken Language.
Ch 1. Introduction Pattern Recognition and Machine Learning, C. M. Bishop, Updated by J.-H. Eom (2 nd round revision) Summarized by K.-I.
GraphiCon 2008 | 1 Trajectory classification based on Hidden Markov Models Jozef Mlích and Petr Chmelař Brno University of Technology, Faculty of Information.
Sparse Kernel Machines
Map of the Great Divide Basin, Wyoming, created using a neural network and used to find likely fossil beds See:
DDoS Attack Detection under SDN Context
A survey of network anomaly detection techniques
Presentation transcript:

Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan

Need to be able to track and monitor user activities Detect abnormal activities  Very useful in security (anti-terrorism)  Healthcare for the elderly Need to develop algorithm to track movements of individuals and determine if they are out of the norm Problem

Abnormal activities are events  Occur rarely  Have not been expected in advance Need to keep false positives/negatives down to a minimum Data is extremely scarce Abnormal Activity Detection

Several approaches to the abnormality problem  Computer vision area Using Markov models to detect out-of-norm behavior Problem: cameras are sensitive to lighting and area, plus privacy concerns  Wearable sensors Unintrusive and user can be monitored continuously Deployment and computational challenges Related Work

First approach: use easily understandable rules to describe human behavior  Provides mechanism to capture abnormal rules too (exceptional rules)  Complementary to probabilistic model based approach Second approach: use template-based plan recognition  Compile set of typical patterns using logical frameworks in AI planning and match patterns to observed actions Related Work: Activity Recognition

Other approaches:  Hidden Markov models, Dynamic Bayesian Networks Employ supervised learning to recognize normal activities Need large amount of training data  Problematic for abnormality detection Related Work: Activity Recognition

Similarity-based approach  Define pairwise distances between all data points and identify outliers by looking at distances  Advantage: no explicit distribution needed  Problem: how to define effective similarity measures when there is high uncertainty Model-based approach  Use predictive models, detect outliers as deviations from learned model  One model is one-class SVMs Related Work: Outlier Detection

More normal data than abnormal data Use cost-sensitive learning  “addresses the issue of classification in the presence of different misclassification costs”  Set false positive/negative costs differently to balance the total cost  Use receiver operating characteristic (ROC) curve to evaluate approach Related Work: Unbalanced Data

Two phase approach  First phase: build one-class SVM based on normal activities Filter out activities with a high probability of being normal Pass suspicious traces to secondary phase  Second phase: Perform Kernel Nonlinear Regression analysis to derive abnormal activity model Proposed Algorithm

Flow Diagram of Algorithm

One Class SVM

Iterative procedure to create abnormal activity models Once outlier is detected beyond threshold, KNLR performed to generate model Repeated for more outliers to generate better abnormal model Iterative Adaptation Procedure

Various adaptation techniques to generate models  Maximum likelihood linear regression (MLLR) Attempts to compute transformations to reduce mismatch between initial model and adaptation data Can only perform linear transformations  Kernel Nonlinear Regression (KNLR) Nonlinear generalization of MLLR Maps linear regression transformations to a high- dimensional feature space via nonlinear kernel map KNLR Adaptation

Attach sensor boards to various parts of the body Evaluate the performance of the algorithm by comparing it to others  OneSVM – one class SVM for abnormality detection  SVN+MLLR  SVN+KNLR (proposed method) Experimental Setup

Results: ROC ROC curve with 216 traces ROC curve with 108 traces

Area Under the Curve Table

Achieved a better tradeoff between detection rate and false alarm rate Potential problem of generating a lot of abnormal models  When abnormal activities become normal In the future  Detect abnormal activities from continuous traces Conclusion and Future Work

Questions/Comments/Discussion