{"id":"https://openalex.org/W7125502296","doi":"https://doi.org/10.1186/s42400-025-00429-7","title":"Detecting photo-taking actions in surveillance videos based on CPU-only devices","display_name":"Detecting photo-taking actions in surveillance videos based on CPU-only devices","publication_year":2026,"publication_date":"2026-01-23","ids":{"openalex":"https://openalex.org/W7125502296","doi":"https://doi.org/10.1186/s42400-025-00429-7"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00429-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00429-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00429-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00429-7.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061341525","display_name":"Zixiang Liu","orcid":"https://orcid.org/0000-0001-7487-450X"},"institutions":[{"id":"https://openalex.org/I4210137199","display_name":"Aerospace Information Research Institute","ror":"https://ror.org/0419fj215","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210137199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixiang Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210137199"]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123722819","display_name":"Peisong Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137199","display_name":"Aerospace Information Research Institute","ror":"https://ror.org/0419fj215","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210137199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peisong Shen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210137199"]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137199","display_name":"Aerospace Information Research Institute","ror":"https://ror.org/0419fj215","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210137199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210137199"]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123659275","display_name":"Shuguang Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137199","display_name":"Aerospace Information Research Institute","ror":"https://ror.org/0419fj215","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210137199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuguang Yuan","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210137199"]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103096351","display_name":"Xiaojie Zhu","orcid":"https://orcid.org/0000-0002-2954-7267"},"institutions":[{"id":"https://openalex.org/I71920554","display_name":"King Abdullah University of Science and Technology","ror":"https://ror.org/01q3tbs38","country_code":"SA","type":"education","lineage":["https://openalex.org/I71920554"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Xiaojie Zhu","raw_affiliation_strings":["King Abdullah University of Science and Technology, Jeddah, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Abdullah University of Science and Technology, Jeddah, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I71920554"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113357601","display_name":"Houzhe Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210137199","display_name":"Aerospace Information Research Institute","ror":"https://ror.org/0419fj215","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210137199"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Houzhe Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100084, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210137199"]},{"raw_affiliation_string":"School of CyberSecurity, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]},{"raw_affiliation_string":"State Key Laboratory of Cyberspace Security Defense, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5123722819"],"corresponding_institution_ids":["https://openalex.org/I4210137199","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15929237,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.7016000151634216,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10812","display_name":"Human Pose and Action Recognition","score":0.7016000151634216,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.08470000326633453,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11714","display_name":"Multimodal Machine Learning Applications","score":0.053599998354911804,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/action-recognition","display_name":"Action recognition","score":0.5631999969482422},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5134000182151794},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.44830000400543213},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4309999942779541},{"id":"https://openalex.org/keywords/object-detection","display_name":"Object detection","score":0.4253000020980835},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.40380001068115234},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.3817000091075897},{"id":"https://openalex.org/keywords/precision-and-recall","display_name":"Precision and recall","score":0.37869998812675476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7836999893188477},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.6305999755859375},{"id":"https://openalex.org/C2987834672","wikidata":"https://www.wikidata.org/wiki/Q4677630","display_name":"Action recognition","level":3,"score":0.5631999969482422},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.5374000072479248},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5134000182151794},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.44830000400543213},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4309999942779541},{"id":"https://openalex.org/C2776151529","wikidata":"https://www.wikidata.org/wiki/Q3045304","display_name":"Object detection","level":3,"score":0.4253000020980835},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C81669768","wikidata":"https://www.wikidata.org/wiki/Q2359161","display_name":"Precision and recall","level":2,"score":0.37869998812675476},{"id":"https://openalex.org/C2779119184","wikidata":"https://www.wikidata.org/wiki/Q294350","display_name":"ALARM","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3675000071525574},{"id":"https://openalex.org/C64876066","wikidata":"https://www.wikidata.org/wiki/Q5141226","display_name":"Cognitive neuroscience of visual object recognition","level":3,"score":0.3474000096321106},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3222000002861023},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.321399986743927},{"id":"https://openalex.org/C2989486834","wikidata":"https://www.wikidata.org/wiki/Q3808900","display_name":"True positive rate","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.3179999887943268},{"id":"https://openalex.org/C121687571","wikidata":"https://www.wikidata.org/wiki/Q4677630","display_name":"Activity recognition","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2863999903202057},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.2825999855995178},{"id":"https://openalex.org/C2987098735","wikidata":"https://www.wikidata.org/wiki/Q3808900","display_name":"Recall rate","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C119657128","wikidata":"https://www.wikidata.org/wiki/Q11633","display_name":"Photography","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2612999975681305}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00429-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00429-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00429-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:631cb34d982f474f92d5120abc280779","is_oa":true,"landing_page_url":"https://doaj.org/article/631cb34d982f474f92d5120abc280779","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-12 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00429-7","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00429-7","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00429-7.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5925268530845642,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4039563609","display_name":null,"funder_award_id":"XDB06","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G7699199402","display_name":null,"funder_award_id":"XDB0690303","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7125502296.pdf","grobid_xml":"https://content.openalex.org/works/W7125502296.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1522734439","https://openalex.org/W1936750108","https://openalex.org/W2113325037","https://openalex.org/W2172156083","https://openalex.org/W2183182206","https://openalex.org/W2193145675","https://openalex.org/W2590001609","https://openalex.org/W2804944551","https://openalex.org/W2916798096","https://openalex.org/W2922306854","https://openalex.org/W2962858109","https://openalex.org/W2963265461","https://openalex.org/W2963524571","https://openalex.org/W2980439114","https://openalex.org/W2990503944","https://openalex.org/W3108849448","https://openalex.org/W4206542717","https://openalex.org/W4221138734","https://openalex.org/W4280538748","https://openalex.org/W4281559344","https://openalex.org/W4313174670","https://openalex.org/W4321458511","https://openalex.org/W4364323147","https://openalex.org/W4379985979"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Taking":[1],"photos":[2],"of":[3,30,71,104,154,188,202],"sensitive":[4,7,15],"facilities":[5],"and":[6,52,84,177],"information":[8,16,35],"in":[9,21,45,49,146,179],"no":[10],"photography":[11,31],"area":[12],"may":[13],"cause":[14],"leakage":[17],"if":[18],"not":[19],"discovered":[20],"time.":[22],"Employing":[23],"action":[24,38,169],"recognition":[25,39,103,170],"models":[26,40],"to":[27,67,79,89,118,137,163],"detect":[28],"instances":[29],"can":[32],"effectively":[33],"prevent":[34],"leakage.":[36],"Current":[37],"have":[41],"shown":[42],"unsatisfactory":[43],"performance":[44],"detecting":[46],"photo-taking":[47,72,105,126],"actions":[48],"surveillance":[50],"videos,":[51],"their":[53,59],"reliance":[54],"on":[55,120,190,209],"GPU":[56],"devices":[57],"hinder":[58],"practicality.":[60],"This":[61],"paper":[62],"presents":[63],"a":[64,109,131,138,161,200],"novel":[65,110],"approach":[66],"address":[68],"the":[69,99,116,121,151,158],"detection":[70,78],"actions.":[73,106,127,165],"The":[74],"method":[75,100,173],"utilizes":[76],"object":[77],"filter":[80],"out":[81],"background":[82],"data":[83],"incorporates":[85],"human":[86,91],"pose":[87],"estimation":[88],"extract":[90],"skeleton":[92],"data.":[93],"By":[94],"combining":[95],"these":[96],"AI":[97],"techniques,":[98],"enables":[101,115],"accurate":[102],"We":[107],"introduce":[108,130],"technique":[111],"called":[112],"self-annotation":[113],"that":[114,135,196],"model":[117,185,198],"focus":[119],"crucial":[122],"elements":[123],"associated":[124],"with":[125,167],"Additionally,":[128],"we":[129],"new":[132],"alarm":[133],"mechanism":[134],"leads":[136],"69":[139],"$$\\%$$":[140,204],"<mml:math":[141,205],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[142,206],"<mml:mo>%</mml:mo>":[143,207],"</mml:math>":[144,208],"reduction":[145],"false":[147],"positives":[148],"while":[149],"maintaining":[150],"same":[152],"level":[153],"recall":[155],"by":[156],"integrating":[157],"labels":[159],"over":[160],"period":[162],"recognize":[164],"Compared":[166],"traditional":[168],"approaches,":[171],"our":[172,184,197,210],"is":[174,186],"more":[175],"flexible":[176],"lightweight":[178],"actual":[180],"engineering":[181],"applications.":[182],"Moreover,":[183],"capable":[187],"running":[189],"CPU-only":[191],"devices.":[192],"Experimental":[193],"results":[194],"show":[195],"achieves":[199],"precision":[201],"91":[203],"dataset.":[211]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-01-24T00:00:00"}
