The widespread use of unmanned aerial vehicles (UAVs) has brought many benefits, particularly for military and civil applications. For example, UAVs can be used in communication, ecological surveys, agriculture, and logistics to improve efficiency and reduce the required workforce. However, the malicious use of UAVs can significantly endanger public safety and pose many challenges to society. Therefore, detecting malicious UAVs is an important and urgent issue that needs to be addressed. In this study, a combined UAV detection model (CUDM) based on analyzing video abnormal behavior is proposed. CUDM uses abnormal behavior detection models to improve the traditional object detection process. The work of CUDM can be divided into two stages. I...
The primary source of information perused by Homeland Security is the images captured by surveillanc...
Visual autonomous systems capable of monitoring crowded areas and alerting the authorities in occur-...
The article of record as published may be found at http://dx.doi.org/10.1109/IROS.2016.77597332016 I...
Several events in the recent years involving hobby Unmanned Aerial Vehicles (UAVs), colloquially kno...
International audienceVisual surveillance systems have recently captured the attention of the resear...
International audienceRecent advancements in avionics and electronics systems led to the increased u...
Unmanned aerial vehicles (UAV) have been widely used in various fields, and their invasion of securi...
Aerial surveillance is very important in military and civil applications. Trespassing and illegal bo...
AbstractIn this research, the information captured by Unmanned Aerial Vehicles (UAVs) are eminently ...
Visual autonomous systems capable of monitoring crowded areas and alerting the authorities in occurr...
The number of unmanned aerial vehicles (UAVs, also known as drones) has increased dramatically in th...
Purpose: Computer vision in drones has gained a lot of attention from artificial intelligence resear...
This paper considers a model of object detection on aerial photographs and video using a neural netw...
At this time, many illegal activities are being been carried out, such as illegal mining, hunting, l...
This paper considers a model of object detection on aerial photographs and video using a neural netw...
The primary source of information perused by Homeland Security is the images captured by surveillanc...
Visual autonomous systems capable of monitoring crowded areas and alerting the authorities in occur-...
The article of record as published may be found at http://dx.doi.org/10.1109/IROS.2016.77597332016 I...
Several events in the recent years involving hobby Unmanned Aerial Vehicles (UAVs), colloquially kno...
International audienceVisual surveillance systems have recently captured the attention of the resear...
International audienceRecent advancements in avionics and electronics systems led to the increased u...
Unmanned aerial vehicles (UAV) have been widely used in various fields, and their invasion of securi...
Aerial surveillance is very important in military and civil applications. Trespassing and illegal bo...
AbstractIn this research, the information captured by Unmanned Aerial Vehicles (UAVs) are eminently ...
Visual autonomous systems capable of monitoring crowded areas and alerting the authorities in occurr...
The number of unmanned aerial vehicles (UAVs, also known as drones) has increased dramatically in th...
Purpose: Computer vision in drones has gained a lot of attention from artificial intelligence resear...
This paper considers a model of object detection on aerial photographs and video using a neural netw...
At this time, many illegal activities are being been carried out, such as illegal mining, hunting, l...
This paper considers a model of object detection on aerial photographs and video using a neural netw...
The primary source of information perused by Homeland Security is the images captured by surveillanc...
Visual autonomous systems capable of monitoring crowded areas and alerting the authorities in occur-...
The article of record as published may be found at http://dx.doi.org/10.1109/IROS.2016.77597332016 I...