skip to main content
10.1007/978-3-030-62223-7_6guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

DAD: Deep Anomaly Detection for Intelligent Monitoring of Expressway Network

Published: 08 October 2020 Publication History

Abstract

In order to improve the real-time efficiency of expressway operation monitoring and management, the anomaly detection in intelligent monitoring network (IMN) of expressway based on edge computing and deep learning is studied. The video data collected by the camera equipment in the IMN structure of the expressway is transmitted to the edge processing server for screening and then sent to the convolution neural network. Then video data was preprocessed after the edge calculation to generate the training sample set, then send it to the AlexNet model for feature extraction. SVM classifier model is used to train the feature data set and input the features of the test samples into the trained SVM classifier model to realize the anomaly detection in the IMN of expressway. The experimental results showed that the method has better detection effect than the machine learning method and the small block learning method, and the detection time is greatly shortened.

References

[1]
Li Y, Wang ZW, and Xu SF Image encryption algorithm based on multiple-parameter fractional fourier and Arnold transforms J. China Acad. Electron. Inf. Technol. 2016 11 2 164-168
[2]
Zhou, Y., Nejati, H., Do, T.T., et al.: Image-based vehicle analysis using deep neural network: A systematic study. In: 2016 IEEE International Conference on Digital Signal Processing (DSP), Beijing, China, pp. 276–280. IEEE (2016)
[3]
Mansour A, Hassan A, and Hussein WM Automated vehicle detection in satellite images using deep learning IOP Conf. Ser. Mater. Sci. Eng. 2019 610 1 012-027
[4]
Jiang N, Tian F, Li J, et al. MAN: mutual attention neural networks model for aspect-level sentiment classification in SIoT IEEE Internet Things J. 2020 7 4 2901-2913
[5]
Jiang N, Chen J, Zhou RG, et al. PAN: pipeline assisted neural networks model for data-to-text generation in social internet of things Inf. Sci. 2020 530 167-179
[6]
Zhang R, Wang J, and Chen ZX wireless digital communication technology for parallel DC-DC converter J. Power Supply 2018 16 3 44-47
[7]
Yuan G and Zhong FQ On computing the edge-connectivity of an uncertain graph IEEE Trans. Fuzzy Syst. 2016 24 4 981-991
[8]
Daniel H, Jun S, and Taku K A deep learning framework for character motion synthesis and editing ACM Trans. Graph. 2016 35 4 1-11
[9]
Eric LF, Rishi R, and Stefan BW Deep learning approach to passive monitoring of the underwater acoustic environment J. Acoust. Soc. Am. 2016 140 4 3351
[10]
Ruo MY and Ling SBlind image blur estimation via deep learningIEEE Trans. Image Process.20162541910-192134722231408.94767
[11]
Nguyen T, Bui V, and Lam V Automatic phase aberration compensation for digital holographic microscopy based on deep learning background detection Opt. Express 2017 25 13 15043-15057
[12]
Ji QG, Lu ZM, and Chi R Real-time multi-feature based fire flame detection in video Image Process. IET 2016 11 1 31-37
[13]
Xu Yu, Li D, Wang Z, Guo Q, and Xiang W A deep learning method based on convolutional neural network for automatic modulation classification of wireless signals Wireless Netw. 2018 25 7 3735-3746
[14]
Jin YF and Gao Y Optimal piecewise real-time pricing strategy for smart grid Comput Simul. 2016 33 4 171-175
[15]
Jiang N, Xu D, Zhou J, et al. Toward optimal participant decisions with voting-based incentive model for crowd sensing Inf. Sci. 2020 512 1-17

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part I
Oct 2020
673 pages
ISBN:978-3-030-62222-0
DOI:10.1007/978-3-030-62223-7
  • Editors:
  • Xiaofeng Chen,
  • Hongyang Yan,
  • Qiben Yan,
  • Xiangliang Zhang

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 08 October 2020

Author Tags

  1. Edge computing
  2. Anomaly detection
  3. AlexNet network

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media