Detection of Deviant Behavior From Agent Traces Boštjan Kaluža Department of Intelligent Systems, Jožef Stefan Institute Jozef Stefan Institute Jožef Stefan.

Slides:



Advertisements
Similar presentations
Distinctive Image Features from Scale-Invariant Keypoints
Advertisements

Application of Cluster-Based Local Outlier Factor Algorithm in Anti-Money Laundering.
DONG XU, MEMBER, IEEE, AND SHIH-FU CHANG, FELLOW, IEEE Video Event Recognition Using Kernel Methods with Multilevel Temporal Alignment.
Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 21, NO. 5,
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Smartphone-based Activity Recognition for Pervasive Healthcare - Utilizing Cloud Infrastructure for Data Modeling Bingchuan Yuan, John Herbert University.
Anomaly Detection in Data Docent Xiao-Zhi Gao
São Paulo Advanced School of Computing (SP-ASC’10). São Paulo, Brazil, July 12-17, 2010 Looking at People Using Partial Least Squares William Robson Schwartz.
Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Generic Object Recognition -- by Yatharth Saraf A Project on.
Probabilistic video stabilization using Kalman filtering and mosaicking.
Behaviors for Compliant Robots Benjamin Stephens Christopher Atkeson We are developing models and controllers for human balance, which are evaluated on.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
Learning-Based Anomaly Detection in BGP Updates Jian Zhang Jennifer Rexford Joan Feigenbaum.
Motion Map: Image-based Retrieval and Segmentation of Motion Data EG SCA ’ 04 學生 : 林家如
Feature Extraction for Outlier Detection in High- Dimensional Spaces Hoang Vu Nguyen Vivekanand Gopalkrishnan.
CS292 Computational Vision and Language Visual Features - Colour and Texture.
Robotics for Intelligent Environments
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Video Mining Learning Patterns of Behaviour via an Intelligent Image Analysis System.
05/06/2005CSIS © M. Gibbons On Evaluating Open Biometric Identification Systems Spring 2005 Michael Gibbons School of Computer Science & Information Systems.
Computer Vision. Computer vision is concerned with the theory and technology for building artificial Computer vision is concerned with the theory and.
Intelligent Agents: an Overview. 2 Definitions Rational behavior: to achieve a goal minimizing the cost and maximizing the satisfaction. Rational agent:
Overview and Mathematics Bjoern Griesbach
Facial Recognition CSE 391 Kris Lord.
1 Activity and Motion Detection in Videos Longin Jan Latecki and Roland Miezianko, Temple University Dragoljub Pokrajac, Delaware State University Dover,
A Framework for Detection of Anomalous and Suspicious Behavior from Agent’s Spatio-Temporal Traces Boštjan Kaluža Depratment of Intelligent Systems, Jožef.
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Chapter 10 Architectural Design
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Behavior analysis based on coordinates of body tags Mitja Luštrek, Boštjan Kaluža, Erik Dovgan, Bogdan Pogorelc, Matjaž Gams Jožef Stefan Institute, Department.
Mitja Luštrek Jožef Stefan Institute Department of Intelligent Systems.
Element 2: Discuss basic computational intelligence methods.
Lecture 9: Chapter 9 Architectural Design
Recognizing Activities of Daily Living from Sensor Data Henry Kautz Department of Computer Science University of Rochester.
A Framework for the Reconfiguration of Ubicomp Systems Pau Giner, Carlos Cetina, Joan Fons, Vicente Pelechano.
Network Anomography Yin Zhang – University of Texas at Austin Zihui Ge and Albert Greenberg – AT&T Labs Matthew Roughan – University of Adelaide IMC 2005.
A Two-level Pose Estimation Framework Using Majority Voting of Gabor Wavelets and Bunch Graph Analysis J. Wu, J. M. Pedersen, D. Putthividhya, D. Norgaard,
1 Context-dependent Product Line Practice for Constructing Reliable Embedded Systems Naoyasu UbayashiKyushu University, Japan Shin NakajimaNational Institute.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Kernel Properties 2012 Computer Science PhD Showcase 17 February 2012 Roberto Valerio Dr. Ricardo Vilalta Pattern Analysis Lab.
DARPA ITO/MARS Project Update Vanderbilt University A Software Architecture and Tools for Autonomous Robots that Learn on Mission K. Kawamura, M. Wilkes,
April 28, 2003 Early Fault Detection and Failure Prediction in Large Software Systems Felix Salfner and Miroslaw Malek Department of Computer Science Humboldt.
BIOMETRICS THE MAN MACHINE INTERFACE
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 19, NO
A NOVEL METHOD FOR COLOR FACE RECOGNITION USING KNN CLASSIFIER
Autonomous Robots Vision © Manfred Huber 2014.
Tokyo Research Laboratory © Copyright IBM Corporation 2005SDM 05 | 2005/04/21 | IBM Research, Tokyo Research Lab Tsuyoshi Ide Knowledge Discovery from.
Chapter 10. The Explorer System in Cognitive Systems, Christensen et al. Course: Robots Learning from Humans On, Kyoung-Woon Biointelligence Laboratory.
1 Multiagent Teamwork: Analyzing the Optimality and Complexity of Key Theories and Models David V. Pynadath and Milind Tambe Information Sciences Institute.
Using Cross-Media Correlation for Scene Detection in Travel Videos.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Detection, Tracking and Recognition in Video Sequences Supervised By: Dr. Ofer Hadar Mr. Uri Perets Project By: Sonia KanOra Gendler Ben-Gurion University.
1 Bilinear Classifiers for Visual Recognition Computational Vision Lab. University of California Irvine To be presented in NIPS 2009 Hamed Pirsiavash Deva.
SENSOR-INDEPENDENT PLATFORM FOR CIRCADIAN RHYTHM ANALYSIS Andrea Caroppo Institute for Microelectronics and Microsystems (IMM) National Research Council.
Student Gesture Recognition System in Classroom 2.0 Chiung-Yao Fang, Min-Han Kuo, Greg-C Lee, and Sei-Wang Chen Department of Computer Science and Information.
Dr. Hongqin FAN Department of Building and Real Estate
CS548 Fall 2017 Anomaly Detection
BAYESIAN APPROACH FOR INDOOR HUMAN ACTIVITY MONITORING
ABSTRACT FACE RECOGNITION RESULTS
Seunghui Cha1, Wookhyun Kim1
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Confidence: Ubiquitous Care System to Support Independent Living
Context-Aware Modeling and Recognition of Activities in Video
A survey of network anomaly detection techniques
Identifying Confusion from Eye-Tracking Data
Anomaly Detection in Crowded Scenes
My Intelligent Home (Mii-Home) Project
Presentation transcript:

Detection of Deviant Behavior From Agent Traces Boštjan Kaluža Department of Intelligent Systems, Jožef Stefan Institute Jozef Stefan Institute Jožef Stefan International Postgraduate School 1

Introduction: Agent  Agent  Autonomous intelligent entity  Capable of motion and action  Human, robot, computer program  Spatio-temporal traces  Behavior 2

Introduction: Spatio-Temporal Traces  Agent  Spatio-temporal traces  Vector time series  Position, agent’s state  Behavior 3

Introduction: Behavior  Agent  Spatio-temporal traces  Behavior  Agent’s responses to various perceptual inputs  Range of activities and mannerisms made by agent in conjunction with its environment, situation, and other agents 4 Walking Sitting down Sitting   

Deviant Behavior Anomalous and Suspicious Deviant behavior:  Occurs infrequently, consequences quite dramatic  Security risk, health problem, or abnormal behavior contingency  Anomalous behavior Cannot be matched against positive behavior patterns  Suspicious behavior Matches negative behavior patterns 5

Problem Statement  How to recognize activities?  How to represent complex, real-life behavior?  Behavior may reflect on different time scales and modalities  Single behavior evaluation might not be sufficient How to obtain behavior deviation degree from agent’s spatio-temporal traces? 6

Outline  The unified detection framework  Behavior signatures  Empirical study: ambient assisted living  Conclusion 7

Unified Detection Framework: Abstraction Levels Agent’s traces in the environment Deviant behavior detection Activity recognition Measurements Activity assessment Behavior assessment Abstraction level Behavior evaluation Deviant behavior accumulation Combining multi-view detectors Deviant behavior detectors Behavior pattern Behavior trace Recognition of complex activities / agent-agent interaction Spurious activity removal Atomic activity recognition Activity feature vector Noise removal Observations Sensors 8

Agent’s traces in the environment Activity trace Activity recognition pipeline Behavior trace construction Accumulating deviant behavior over time Combining multi-view detectors Deviant behavior detection … Start End Degree of deviation Deviant behavior detection Behavior trace Behavior signature View 1 transform View 2 transform View n transform … Behavior signature … Unified Detection Framework: Processing Flow Chart 9

Outline  The unified detection framework  Behavior signatures  Motivation  Spatio-activity matrix  Visualization  Feature extraction and anomaly detection  Empirical study  Conclusion 10 Agent’s traces in the environment Activity trace Activity recognition pipeline Behavior trace construction Accumulating deviant behavior over time Combining multi-view detectors Deviant behavior detection … Start End Degree of deviation Deviant behavior detection Behavior trace Behavior signature View 1 transform View 2 transform View n transform … Behavior signature …

Behavior Signatures: Motivation  Goal:  Analyze agent’s spatial-activity patterns  Discover anomalies  Example: An elderly person at home  Analyze person’s daily-living patterns  Detect physical or mental degradation 11

Behavior Signatures: Spatio-Activity Matrix Input Spatio-activity vectors Matrix construction Matrix normalization 12

Activity: Standing Sitting Lying Room: Kitchen Bedroom Behavior Signatures: Spatio-Activity Matrix 13

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 14

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 15

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 16

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 17

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 18

Behavior Signatures: Spatio-Activity Matrix Activity: Standing Sitting Lying Room: Kitchen Bedroom 19

Behavior Signatures: Spatio-Activity Matrix  Normalize matrix by region

Behavior Signatures: Visualization 21  An example of normalized matrix

Behavior Signatures: Feature Extraction and Anomaly Detection Anomaly degree for each b i Compute spatio-activity matrix and principal components Detect outliers with density- based k-NN (Local Outlier Factor) 22

Empirical Studies – AAL Domain: Introduction  User lives at home alone  We observe 3D coordinates of the body  Task: detect anomalous changes in behavior that indicate health problem B. Kaluža and M. Gams. Analysis of Daily-Living Dynamics. Journal of Ambient Intelligence and Smart Environments, M. Luštrek and B. Kaluža. Fall Detection and Activity Recognition with Machine Learning. Informatica,

Person’s coordinates in the apartment Activity trace Activity recognition: ARPipe Behavior trace: activity trace + landmark Behavior signature Spatial-activity matrix: Full day Deviant behavior detection: PCA + LOF No combination of multi-view detectors No accumulation of deviant behavior over time End Start Degree of deviation Deviant behavior detection Behavior trace Empirical Studies – AAL Domain: Instantiated Unified Framework 24

Empirical Studies – AAL Domain : Results B. Kaluža, M. Gams. An Approach to Analysis of Daily Living Dynamics International Conference on Machine Learning and Data Analysis 2010, San Francisco, USA, October, 2010  Two users in the office, one month of data  Spatio-activity successfully discriminates anomalous days 25

26 Empirical Studies – AAL Domain : Results: Visualization

Empirical Studies – AAL Domain : Results: Principal Components 27

Conclusion: Summary  Framework for deviant behavior detection  Activity recognition  Multiple time spans and modalities  Behavior signatures  Behavior dynamics in spatio-activity space  Accumulation over time  Empirical study on AAL domain 28