{"id":"https://openalex.org/W4416874170","doi":"https://doi.org/10.1109/ispa66905.2025.11259455","title":"ShielDir: AI-Powered Real-Time Threat Detection System to Reduce Crime Response Time","display_name":"ShielDir: AI-Powered Real-Time Threat Detection System to Reduce Crime Response Time","publication_year":2025,"publication_date":"2025-10-29","ids":{"openalex":"https://openalex.org/W4416874170","doi":"https://doi.org/10.1109/ispa66905.2025.11259455"},"language":null,"primary_location":{"id":"doi:10.1109/ispa66905.2025.11259455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa66905.2025.11259455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120489799","display_name":"Berkay Arda","orcid":null},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Berkay Arda","raw_affiliation_strings":["Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye","institution_ids":["https://openalex.org/I15059493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120489800","display_name":"Ahmet Alp Samur","orcid":null},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Ahmet Alp Samur","raw_affiliation_strings":["Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye","institution_ids":["https://openalex.org/I15059493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120575531","display_name":"Furkan Marifoglu","orcid":null},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Furkan Marifoglu","raw_affiliation_strings":["Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Izmir University of Economics,Computer Engineering Department,Izmir,T&#x00FC;rkiye","institution_ids":["https://openalex.org/I15059493"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120531974","display_name":"Fikri Barca Bulut","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142780","display_name":"Turin Polytechnic University","ror":"https://ror.org/042xrxv40","country_code":"UZ","type":"education","lineage":["https://openalex.org/I4210142780"]}],"countries":["UZ"],"is_corresponding":false,"raw_author_name":"Fikri Barca Bulut","raw_affiliation_strings":["Polytechnic University of Turin,Control and Computer Engineering Department,Turin,Italy"],"affiliations":[{"raw_affiliation_string":"Polytechnic University of Turin,Control and Computer Engineering Department,Turin,Italy","institution_ids":["https://openalex.org/I4210142780"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007960745","display_name":"Serhat Uzunbayir","orcid":"https://orcid.org/0000-0002-5139-5247"},"institutions":[{"id":"https://openalex.org/I15059493","display_name":"\u0130zmir University of Economics","ror":"https://ror.org/04hjr4202","country_code":"TR","type":"education","lineage":["https://openalex.org/I15059493"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Serhat Uzunbayir","raw_affiliation_strings":["Izmir University of Economics,Software Engineering Department,Izmir,T&#x00FC;rkiye"],"affiliations":[{"raw_affiliation_string":"Izmir University of Economics,Software Engineering Department,Izmir,T&#x00FC;rkiye","institution_ids":["https://openalex.org/I15059493"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5120489799"],"corresponding_institution_ids":["https://openalex.org/I15059493"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41136469,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"175","last_page":"180"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.21060000360012054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.21060000360012054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.10180000215768814,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12740","display_name":"Gait Recognition and Analysis","score":0.0869000032544136,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/human-intelligence","display_name":"Human intelligence","score":0.3573000133037567},{"id":"https://openalex.org/keywords/human-trafficking","display_name":"Human trafficking","score":0.32260000705718994},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.3199000060558319},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.2996000051498413},{"id":"https://openalex.org/keywords/crime-analysis","display_name":"Crime analysis","score":0.2833999991416931},{"id":"https://openalex.org/keywords/poison-control","display_name":"Poison control","score":0.28029999136924744}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6675000190734863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.545799970626831},{"id":"https://openalex.org/C105409693","wikidata":"https://www.wikidata.org/wiki/Q5937824","display_name":"Human intelligence","level":2,"score":0.3573000133037567},{"id":"https://openalex.org/C2984309518","wikidata":"https://www.wikidata.org/wiki/Q181784","display_name":"Human trafficking","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.30250000953674316},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C3017944768","wikidata":"https://www.wikidata.org/wiki/Q1450463","display_name":"Poison control","level":2,"score":0.28029999136924744},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.2639000117778778},{"id":"https://openalex.org/C117035363","wikidata":"https://www.wikidata.org/wiki/Q3769299","display_name":"Human behavior","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C3019207227","wikidata":"https://www.wikidata.org/wiki/Q10883614","display_name":"Human life","level":3,"score":0.26089999079704285},{"id":"https://openalex.org/C2776348852","wikidata":"https://www.wikidata.org/wiki/Q855848","display_name":"Crime prevention","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ispa66905.2025.11259455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ispa66905.2025.11259455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 14th International Symposium on Image and Signal Processing and Analysis (ISPA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2777466438","https://openalex.org/W3152647699","https://openalex.org/W4225575586","https://openalex.org/W4313015712","https://openalex.org/W4385801084","https://openalex.org/W4386141924","https://openalex.org/W4390638513","https://openalex.org/W4399045945","https://openalex.org/W4399698946","https://openalex.org/W4400200568","https://openalex.org/W4408761705"],"related_works":[],"abstract_inverted_index":{"The":[0,117],"rapid":[1],"growth":[2],"of":[3,99,114],"urban":[4],"populations":[5],"and":[6,50,66,102,127,143,165],"increasing":[7],"social":[8],"inequalities":[9],"have":[10],"contributed":[11],"to":[12,32,43,122,159],"a":[13,56,86,145,152],"rise":[14],"in":[15,18,73,131],"violent":[16,51],"crimes":[17,59],"public":[19,129],"spaces.":[20],"Traditional":[21],"surveillance":[22],"systems,":[23],"relying":[24],"mainly":[25],"on":[26],"passive":[27],"CCTV":[28],"cameras,":[29],"often":[30],"fail":[31],"support":[33],"timely":[34],"interventions.":[35],"Although":[36],"these":[37],"systems":[38],"record":[39],"incidents,":[40],"their":[41,53],"inability":[42],"interpret":[44],"real-time":[45,97,162],"behaviors-such":[46],"as":[47],"weapon":[48,103,141],"use":[49],"acts-limits":[52],"effectiveness.":[54],"As":[55],"result,":[57],"critical":[58],"like":[60],"armed":[61],"robbery,":[62],"assault,":[63],"arson,":[64],"vandalism,":[65],"domestic":[67],"violence":[68],"frequently":[69],"go":[70],"unnoticed,":[71],"especially":[72],"areas":[74],"without":[75],"active":[76],"human":[77,100],"monitoring.":[78],"To":[79],"address":[80],"this":[81],"challenge,":[82],"we":[83],"propose":[84],"ShielDir,":[85],"threat":[87],"detection":[88,142],"system":[89,118],"powered":[90],"by":[91,157],"artificial":[92],"intelligence":[93],"(AI)":[94],"that":[95],"performs":[96],"analysis":[98],"behaviors":[101],"presence":[104],"using":[105],"deep":[106],"learning":[107],"models,":[108],"identifying":[109],"threats":[110],"across":[111],"14":[112],"categories":[113],"criminal":[115],"activity.":[116],"provides":[119],"instant":[120],"alerts":[121],"authorities,":[123],"reducing":[124],"response":[125],"times":[126],"enhancing":[128],"safety":[130],"live":[132],"or":[133],"recorded":[134],"video":[135],"streams.":[136],"ShielDir":[137],"integrates":[138],"YOLOv11":[139],"for":[140,148],"OPear,":[144],"VideoMAE-based":[146],"model":[147],"behavior":[149],"analysis,":[150],"within":[151],"containerized":[153],"microservice":[154],"architecture":[155],"supported":[156],"Kafka":[158],"enable":[160],"seamless,":[161],"data":[163],"streaming":[164],"processing.":[166]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-01T00:00:00"}
