1. Ahmad F, Najam A, Ahmed Z (2013) Image-based face detection and recognition. JCSI Int J Comput Sci Issues 9(6):29–32
2. Ben-Musa A, Singh S, Agrawal P (2014) Suspicious human activity recognition for video surveillance system. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 214–218
3. Lee D, Suk H, Park S, Lee S (2015) Motion influence map for unusual human activity detection and localization in crowded scenes. IEEE Trans Circuits Syst Video Technol 25(10):1612–1623
4. Wang G, Fu H, Liu Y (2016) Real time abnormal crowd behavior detection based on adjacent flow location estimation. In: 4th international conference on cloud computing and intelligence systems (CCIS), Beijing, China, pp 476–479
5. Salem G, Ibrahim F, Hassanpour R, Ahmed A, Douma A (2021) Detection of suspicious activities of human from surveillance videos. In: IEEE 1st international maghreb meeting of the conference on sciences and techniques of automatic control and computer engineering MI-STA, pp 794–801