734
Views
8
CrossRef citations to date
0
Altmetric
Article

Proposal of an insider sabotage detection method for nuclear security using deep learning

&
Pages 599-607 | Received 23 Nov 2018, Accepted 22 Apr 2019, Published online: 03 May 2019

Figures & data

Figure 1. Stacked autoencoder architecture.

Figure 1. Stacked autoencoder architecture.

Figure 2. Potential sabotage motions.

Figure 2. Potential sabotage motions.

Figure 3. Real-time hand tracking results.

Figure 3. Real-time hand tracking results.

Figure 4. Conversion of captured hand motion data to a time-series format training set.

Figure 4. Conversion of captured hand motion data to a time-series format training set.

Figure 5. Proposed SAE model architecture.

Figure 5. Proposed SAE model architecture.

Table 1. Four proposed network architectures

Figure 6. Motion recognition output. Different colored lines represent the probability of different motions (red line: probability of pushing motion; blue line: probability of grasping motion; green line: probability of cutting motion; yellow line: probability of patting motion; pink line: probability of turning motion).

Figure 6. Motion recognition output. Different colored lines represent the probability of different motions (red line: probability of pushing motion; blue line: probability of grasping motion; green line: probability of cutting motion; yellow line: probability of patting motion; pink line: probability of turning motion).

Table 2. Motion recognition accuracy

Figure 7. Verification dataset generated for nonconsecutive frame loss.

Figure 7. Verification dataset generated for nonconsecutive frame loss.

Figure 8. Verification dataset generated for consecutive frame loss.

Figure 8. Verification dataset generated for consecutive frame loss.

Table 3. Verification results for nonconsecutive frame loss

Table 4. Verification results for consecutive frame loss

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.