Skip to main content
Top

23-05-2024

A Survey of Artificial Intelligence for Industrial Detection

Authors: Jun Li, YiFei Hai, SongJia Yin

Published in: Annals of Data Science

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the past decade, deep learning has greatly increased the complexity of industrial production intelligence by virtue of its powerful learning capability. At the same time, it has also brought security challenges to the field of industrial production information networks, mainly in two aspects: production safety and network information security. The former is mainly focused on ensuring the safety of personnel behavior in the production environment, including two different categories: detection of dangerous targets and identification of dangerous behaviors. The latter focuses on the safety of industrial information systems, especially networks. In recent years, deep learning-based detection techniques have made great strides in addressing these dual problems. Therefore, this paper presents an exhaustive study on the development of deep learning-based detection methods for industrial production safety analysis and information network security problem detection. The paper presents a comprehensive taxonomy for classifying production environments and production network information, classifying and clustering prevalent industrial security challenges, with a special emphasis on the role of deep learning in insecure behavior identification and information security risk detection.We provides an in-depth analysis of the advantages, limitations, and suitable application scenarios of these two approaches. In addition, the paper provides insights into contemporary challenges and future trends in this field and concludes with a discussion of prospects for future research.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Shi Y (2022) Advances in Big Data Analytics: theory, Algorithm and Practice. Springer, SingaporeCrossRef Shi Y (2022) Advances in Big Data Analytics: theory, Algorithm and Practice. Springer, SingaporeCrossRef
2.
go back to reference Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin, New York Olson DL, Shi Y (2007) Introduction to business data mining. McGraw-Hill/Irwin, New York
3.
go back to reference Shi Y, Tian YJ, Kou G, Peng Y, Li JP (2011) Optimization based data mining: theory and applications. Springer, BerlinCrossRef Shi Y, Tian YJ, Kou G, Peng Y, Li JP (2011) Optimization based data mining: theory and applications. Springer, BerlinCrossRef
4.
go back to reference Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4(2):149–178CrossRef Tien JM (2017) Internet of things, real-time decision making, and artificial intelligence. Ann Data Sci 4(2):149–178CrossRef
5.
go back to reference Zhao, J P, Wang Y (2020) Unsafe Behavior Recognition Based on Image Recognition Technology. Safety and Environmental Engineering, 27(1): 158–165 Zhao, J P, Wang Y (2020) Unsafe Behavior Recognition Based on Image Recognition Technology. Safety and Environmental Engineering, 27(1): 158–165
7.
go back to reference Wang R, Liu DM, Zhang J, Wear, -YOLO Research on Detection Methods for Safety Equipment of Substation Power Personnel . Computer Engineering and Applications: 1–13 Wang R, Liu DM, Zhang J, Wear, -YOLO Research on Detection Methods for Safety Equipment of Substation Power Personnel . Computer Engineering and Applications: 1–13
8.
go back to reference Yin HP, Chen B, Chai Y et al (2016) Review of Visual Based Object Detection and Tracking . Journal of Automation, 42 (10): 1466–1489 Yin HP, Chen B, Chai Y et al (2016) Review of Visual Based Object Detection and Tracking . Journal of Automation, 42 (10): 1466–1489
9.
go back to reference Liu JM, Meng WH (2017) A review of single-stage object detection algorithms based on deep learning . Aviation Weapons, 27 (03): 44–53 Liu JM, Meng WH (2017) A review of single-stage object detection algorithms based on deep learning . Aviation Weapons, 27 (03): 44–53
10.
go back to reference Xu DG, Wang L, Li F (2021) Review of Typical Object Detection Algorithms in Deep Learning. Computer Engineering and Applications, 57 (08): 10–25 Xu DG, Wang L, Li F (2021) Review of Typical Object Detection Algorithms in Deep Learning. Computer Engineering and Applications, 57 (08): 10–25
11.
go back to reference Zhou FY, Jin LP, Dong J (2017) Research Review of Convolutional Neural Networks. Journal of Computer Science, 40 (06): 1229–1251 Zhou FY, Jin LP, Dong J (2017) Research Review of Convolutional Neural Networks. Journal of Computer Science, 40 (06): 1229–1251
12.
go back to reference Yang L, Wu YQ, Wang JL et al (2018) Review of Recurrent Neural Network Research. Computer Applications, 38 (S2): 1–6 + 26 Yang L, Wu YQ, Wang JL et al (2018) Review of Recurrent Neural Network Research. Computer Applications, 38 (S2): 1–6 + 26
13.
go back to reference Gao Y (2018) Research on Fighting Behavior Recognition in Surveillance Videos Based on Dual Stream Convolutional Neural Networks [D]. Xi’an University of Technology, 2018 Gao Y (2018) Research on Fighting Behavior Recognition in Surveillance Videos Based on Dual Stream Convolutional Neural Networks [D]. Xi’an University of Technology, 2018
25.
go back to reference Ren S, He K, Girshick R et al (2015) Faster r-cnn: Towards real-time object detection with region proposal networks Advances in neural information processing systems, 28 Ren S, He K, Girshick R et al (2015) Faster r-cnn: Towards real-time object detection with region proposal networks Advances in neural information processing systems, 28
26.
go back to reference Hu WC, Guo YY, Zhang Q et al Lightweight traffic monitoring object detection Algorithm based on Improved YOLOX [J/OL]. Comput Eng Appl, 1–10 Hu WC, Guo YY, Zhang Q et al Lightweight traffic monitoring object detection Algorithm based on Improved YOLOX [J/OL]. Comput Eng Appl, 1–10
27.
go back to reference Li L, Lu SB, Ren H et al A method for identifying and locating mulberry tree trunks in complex environments based on improved YOLO v5 [J/OL]. J Agricultural Mach, 1–9 Li L, Lu SB, Ren H et al A method for identifying and locating mulberry tree trunks in complex environments based on improved YOLO v5 [J/OL]. J Agricultural Mach, 1–9
28.
go back to reference Li XB, Chen L (2021) Natural scene face detection based on improved Faster RCNN. Computer Engineering, 47 (01): 210–216 Li XB, Chen L (2021) Natural scene face detection based on improved Faster RCNN. Computer Engineering, 47 (01): 210–216
29.
go back to reference He YB (2022) Research on Pedestrian Detection and AEB-P System Based on DETR . Chang’an University, He YB (2022) Research on Pedestrian Detection and AEB-P System Based on DETR . Chang’an University,
30.
go back to reference Zhao L Y (2022) Research on lightweight faster-rcnn algorithm based on knowledge distillation[D].HUAINAN:Anhui University of Science and Technology Zhao L Y (2022) Research on lightweight faster-rcnn algorithm based on knowledge distillation[D].HUAINAN:Anhui University of Science and Technology
31.
go back to reference Hu Y B,Tian S Z,Lan, G L (2022) Pedestrian detection based on improved faster-rcnn algorithm. Automobile Appl Technol47(5):34–37 Hu Y B,Tian S Z,Lan, G L (2022) Pedestrian detection based on improved faster-rcnn algorithm. Automobile Appl Technol47(5):34–37
32.
go back to reference Wang X Y (2022) Research on pedestrian detection algorithm based on improved faster-rcnn. HARBIN: Harbin University of Science and Technology Wang X Y (2022) Research on pedestrian detection algorithm based on improved faster-rcnn. HARBIN: Harbin University of Science and Technology
33.
go back to reference Guo M T (2022) Research and application of target detection model based on improved yolov3. NANJING:Nanjing University of Posts and Telecommunications Guo M T (2022) Research and application of target detection model based on improved yolov3. NANJING:Nanjing University of Posts and Telecommunications
34.
go back to reference Yan T W (2022) Research on small object detection algorithmbased on deep learning. Nanjing: Nanjing University of Posts and Telecommunications Yan T W (2022) Research on small object detection algorithmbased on deep learning. Nanjing: Nanjing University of Posts and Telecommunications
35.
go back to reference Cao Z M (2022) Multi-scene small object detection via yolov4. NANJING:Nanjing University of Posts and Telecommunications Cao Z M (2022) Multi-scene small object detection via yolov4. NANJING:Nanjing University of Posts and Telecommunications
36.
go back to reference Yu H K (2023) Research on object detection network lightweight method with constrained resources. Xi’an:Xi’an Technological University Yu H K (2023) Research on object detection network lightweight method with constrained resources. Xi’an:Xi’an Technological University
37.
go back to reference Vadis, Q,Carreira, J,Zisserman A.Action recognition? a new model and the kinetics dataset. Joao Carreira, Andrew Zisserman Vadis, Q,Carreira, J,Zisserman A.Action recognition? a new model and the kinetics dataset. Joao Carreira, Andrew Zisserman
43.
go back to reference JIN L (2022) Research on human action recognition with multiscale attention mechanism[D].Xi’an: Xidian University,2022 JIN L (2022) Research on human action recognition with multiscale attention mechanism[D].Xi’an: Xidian University,2022
44.
go back to reference Shen, J Y (2022) Recognition of human dynamic abnormal behaviorbased on 3d convolution[D]. BAOTOU:Inner Mongolia University of Science and Technology Shen, J Y (2022) Recognition of human dynamic abnormal behaviorbased on 3d convolution[D]. BAOTOU:Inner Mongolia University of Science and Technology
45.
go back to reference Yu J S,Lu, X L (2022) Human action recognition algorithm of feature fusion cnn-bi-lstm based. J Electron Meas Instrum 36(2):89–95 Yu J S,Lu, X L (2022) Human action recognition algorithm of feature fusion cnn-bi-lstm based. J Electron Meas Instrum 36(2):89–95
46.
go back to reference WU S P (2022) Research on video human behavior recognition by fusing time series and spatial features. Guiyang:Guizhou University,2022 WU S P (2022) Research on video human behavior recognition by fusing time series and spatial features. Guiyang:Guizhou University,2022
47.
go back to reference Yan Y H,Chen T,Liu Z, Y et al (2023) Action recognitionmethod based on double attention and 3d resnet-bilstm. Comput Appl Softw 40(2): 192–196 Yan Y H,Chen T,Liu Z, Y et al (2023) Action recognitionmethod based on double attention and 3d resnet-bilstm. Comput Appl Softw 40(2): 192–196
48.
go back to reference Zhang R L.Gao B, P (2023) Abnormal behavior recognition based on time⁃series spatiotemporal two-stream convolution. Modern Electronics Technique, 46(3): 81–87 Zhang R L.Gao B, P (2023) Abnormal behavior recognition based on time⁃series spatiotemporal two-stream convolution. Modern Electronics Technique, 46(3): 81–87
50.
go back to reference Cheng Y H (2022) Research on miners’ unsafe behavior recognition algorithm based on lightweight neural network. Xuzhou:China University of Mining and Technology Cheng Y H (2022) Research on miners’ unsafe behavior recognition algorithm based on lightweight neural network. Xuzhou:China University of Mining and Technology
51.
go back to reference Jiang J R,Wei Y,Wang J, Y et al (2022) Graph convolutional behavior recognition algorithm based on human spatio-temporal skeletal features. Journalof Chongqing Normal University(Natural Science), 39(4): 124–133 Jiang J R,Wei Y,Wang J, Y et al (2022) Graph convolutional behavior recognition algorithm based on human spatio-temporal skeletal features. Journalof Chongqing Normal University(Natural Science), 39(4): 124–133
52.
go back to reference Sun Q X,He N,Zhang C, C et al (2022) Human Skeleton Action Recognition Method Based on Lightweight Graph Convolution. Computer Engineering, 48(5): 306–313 Sun Q X,He N,Zhang C, C et al (2022) Human Skeleton Action Recognition Method Based on Lightweight Graph Convolution. Computer Engineering, 48(5): 306–313
53.
go back to reference Wang X L, Wang G Y,Sun Y X (2023) Human behavior recognition algorithm based on two-stream gcn. Transducer and Microsystem Technologies, 42(7): 140–143 + 147 Wang X L, Wang G Y,Sun Y X (2023) Human behavior recognition algorithm based on two-stream gcn. Transducer and Microsystem Technologies, 42(7): 140–143 + 147
54.
go back to reference LI H P (2023) Research on behavior recognition of factory personnel based on machine vision .Xi’an:Xi’an Technological University LI H P (2023) Research on behavior recognition of factory personnel based on machine vision .Xi’an:Xi’an Technological University
55.
go back to reference MAO Z Z (2022) Action recognition based on spatio-temporal features[D].Wuxi: Jiangnan University MAO Z Z (2022) Action recognition based on spatio-temporal features[D].Wuxi: Jiangnan University
56.
go back to reference Chang J,Zhang G W,Chen W, J et al (2023) Gas station unsafe behavior detection based on YOLO-V3 algorithm. China safety science journaL 33(2):31 Chang J,Zhang G W,Chen W, J et al (2023) Gas station unsafe behavior detection based on YOLO-V3 algorithm. China safety science journaL 33(2):31
57.
go back to reference Wang C (2022) Research and implementation of intelligent detection technology for job security[D].Xi’an:Xi’an Technological University Wang C (2022) Research and implementation of intelligent detection technology for job security[D].Xi’an:Xi’an Technological University
58.
go back to reference Sun Y (2020) Research and design of intelligent detection system for construction workers’ unsafe behavior[D].Shenzhen:Shenzhen University Sun Y (2020) Research and design of intelligent detection system for construction workers’ unsafe behavior[D].Shenzhen:Shenzhen University
59.
go back to reference Zhang B,Song Y B,Wu, B et al (2022) Two-stage faster r-cnn for analyzing worker-truck collision hazard. Manufacturing Automation, 44(6): 24–27 + 31 Zhang B,Song Y B,Wu, B et al (2022) Two-stage faster r-cnn for analyzing worker-truck collision hazard. Manufacturing Automation, 44(6): 24–27 + 31
60.
go back to reference Yang P,Meng X X,Wang Z, Q et al (2021) Research on Automatic Identification of Unsafe Behavior of Chemical Enterprises Based on Computer Vision. Shandong Chemical Industry, 50(14): 134–135 Yang P,Meng X X,Wang Z, Q et al (2021) Research on Automatic Identification of Unsafe Behavior of Chemical Enterprises Based on Computer Vision. Shandong Chemical Industry, 50(14): 134–135
61.
go back to reference Xie D K (2020) A thesis submitted in partial fulfillment of the requirements for the degree of master of engineering. Wuhan:Huazhong University of Science and Technology Xie D K (2020) A thesis submitted in partial fulfillment of the requirements for the degree of master of engineering. Wuhan:Huazhong University of Science and Technology
62.
go back to reference Fan B Q,Dong B Y,Wang, B et al (2023) Identification and application of unsafe behaviors of subway construction workers based on deep learning. China Safety Science Journal, 33(1): 41 Fan B Q,Dong B Y,Wang, B et al (2023) Identification and application of unsafe behaviors of subway construction workers based on deep learning. China Safety Science Journal, 33(1): 41
63.
go back to reference Wen T X,Wang G T,Kong X, B et al (2020) Identification of miners’ unsafe behaviors based on transfer learning and residual network. China safety science journal, 30(3):41 Wen T X,Wang G T,Kong X, B et al (2020) Identification of miners’ unsafe behaviors based on transfer learning and residual network. China safety science journal, 30(3):41
64.
go back to reference Cheng, M H (2023) Research on target detection in gas station monitoring scenarios based on improved yolo . DAQING: Northeast Petroleum University Cheng, M H (2023) Research on target detection in gas station monitoring scenarios based on improved yolo . DAQING: Northeast Petroleum University
66.
go back to reference Zhang L,Ran L B,Dai W, W et al (2023) Behavior recognition method for underground personnel based on fusion network. J Mine Autom 49(3):45–52 Zhang L,Ran L B,Dai W, W et al (2023) Behavior recognition method for underground personnel based on fusion network. J Mine Autom 49(3):45–52
69.
go back to reference Rao T Y,Pan T,Xu H J (2022) Unsafe action recognition in underground coal mine based on cross-attention mechanism. J Mine Autom 48(10):48–54 Rao T Y,Pan T,Xu H J (2022) Unsafe action recognition in underground coal mine based on cross-attention mechanism. J Mine Autom 48(10):48–54
71.
go back to reference Gao Z J,Gu Q Y,Chen, P et al (2023) Dangerous behavior recognition based on cnn-lstm dual-stream fusion network. Journal of Data Acquisition and Processing, 38(1):132–140 Gao Z J,Gu Q Y,Chen, P et al (2023) Dangerous behavior recognition based on cnn-lstm dual-stream fusion network. Journal of Data Acquisition and Processing, 38(1):132–140
73.
go back to reference Zhang M (2022) Research on intelligent identification method of dangerous state of scaffold high-altitude operation based on deep learning. Zhenjiang:Jiangsu University Zhang M (2022) Research on intelligent identification method of dangerous state of scaffold high-altitude operation based on deep learning. Zhenjiang:Jiangsu University
74.
go back to reference Meng W,Wang J B,Wei D Y (2022) Research on human behavior recognition method based on deep learning. Jiangsu Communication 38(4):112–116 Meng W,Wang J B,Wei D Y (2022) Research on human behavior recognition method based on deep learning. Jiangsu Communication 38(4):112–116
75.
go back to reference Su H C (2021) On identification of human unsafe behavior in industrial environment. Dalian:Dalian Maritime University Su H C (2021) On identification of human unsafe behavior in industrial environment. Dalian:Dalian Maritime University
76.
go back to reference Yu R (2019) Computer-vision-based method for the recognition of construction workers’ unsafe behaviors. Beijing:Tsinghua University Yu R (2019) Computer-vision-based method for the recognition of construction workers’ unsafe behaviors. Beijing:Tsinghua University
77.
go back to reference Wu (2022) C(2022),Research on abnormal human behavior recognition in electric power operation. WUXI:Jiangnan University Wu (2022) C(2022),Research on abnormal human behavior recognition in electric power operation. WUXI:Jiangnan University
78.
go back to reference Xu D W (2021) Research on unsafe behavior recognition method based on attention and key points of miners. Xuzhou:China University of Mining and Technology Xu D W (2021) Research on unsafe behavior recognition method based on attention and key points of miners. Xuzhou:China University of Mining and Technology
79.
go back to reference li W J, Liu X (2023) Research on underground personnel unsafe behavior identification and early warning system based on deep learning. Metal Mine (3):177–184 li W J, Liu X (2023) Research on underground personnel unsafe behavior identification and early warning system based on deep learning. Metal Mine (3):177–184
80.
go back to reference Mao, X D. Elevator dangerous behavior monitoring based on object detection and action recognition algorithm. Mach Des Manuf :1–7 Mao, X D. Elevator dangerous behavior monitoring based on object detection and action recognition algorithm. Mach Des Manuf :1–7
82.
go back to reference He Y Z,Zhou, H,Wu X, H et al Unsafe behavior recognition algorithm and application for water personnel. China Meas Test :1–6 He Y Z,Zhou, H,Wu X, H et al Unsafe behavior recognition algorithm and application for water personnel. China Meas Test :1–6
83.
go back to reference Wang HF (2014) On anomaly detection and defense resource allocation of industrial control networks[D]. Hangzhou: School of Control Science and Engineering, Zhejiang University Wang HF (2014) On anomaly detection and defense resource allocation of industrial control networks[D]. Hangzhou: School of Control Science and Engineering, Zhejiang University
84.
go back to reference Luo YF (2013) Research and design on intrusion detection methods for industrial control system[D]. Hangzhou: School of Control Science and Engineering, Zhejiang University Luo YF (2013) Research and design on intrusion detection methods for industrial control system[D]. Hangzhou: School of Control Science and Engineering, Zhejiang University
85.
go back to reference Cheng C (2016) Research and implementation of deep packet inspection of Modbus TCP on industrial control network[D]. Chengdu: School of Automation Engineering, University of Electronic Science and Technology of China Cheng C (2016) Research and implementation of deep packet inspection of Modbus TCP on industrial control network[D]. Chengdu: School of Automation Engineering, University of Electronic Science and Technology of China
86.
go back to reference Liu CC (2017) Research on intrusion detection technology of industrial control system[D]. Chengdu: School of Automation Engineering, University of Electronic Science and Technology of China Liu CC (2017) Research on intrusion detection technology of industrial control system[D]. Chengdu: School of Automation Engineering, University of Electronic Science and Technology of China
89.
go back to reference Liu YL (2018) Research and application of traffic anormal detection in smart grid industrial control system[D]. Beijing: Shenyang Institute of Computing Technology, University of Chinese Academy of Sciences Liu YL (2018) Research and application of traffic anormal detection in smart grid industrial control system[D]. Beijing: Shenyang Institute of Computing Technology, University of Chinese Academy of Sciences
93.
go back to reference Zhang F, Kodituwakku HA, Hines JW et al (2019) Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Transactions on Industrial Informatics, 2019, 15(7): 4362–4369. https://doi.org/10.1109/TII.2019.2891261 Zhang F, Kodituwakku HA, Hines JW et al (2019) Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Transactions on Industrial Informatics, 2019, 15(7): 4362–4369. https://​doi.​org/​10.​1109/​TII.​2019.​2891261
94.
go back to reference Luo JZ, Yang M, Ling Z et al (2016) Architecture and key technologies of cyberspace security. Sci CHINA: Inform Sci 46(8): 939–968 Luo JZ, Yang M, Ling Z et al (2016) Architecture and key technologies of cyberspace security. Sci CHINA: Inform Sci 46(8): 939–968
100.
101.
go back to reference Gerdes RM, Daniels TE, Mina M et al (2006) Device identification via analog signal fingerprinting: A matched filter approach . Network and Distributed System Security Symposium (NDSS2006). San Diego: ISOC, 2006: 1–11 Gerdes RM, Daniels TE, Mina M et al (2006) Device identification via analog signal fingerprinting: A matched filter approach . Network and Distributed System Security Symposium (NDSS2006). San Diego: ISOC, 2006: 1–11
102.
go back to reference Esquivel H, Mori T, Akella A (2009) Router-level spam filtering using TCP fingerprints: Architecture and measurement-based evaluation[C]. The 6th Conference on Email and Anti-Spam (CEAS). Mountain View: IEEE, 2009: 1–10 Esquivel H, Mori T, Akella A (2009) Router-level spam filtering using TCP fingerprints: Architecture and measurement-based evaluation[C]. The 6th Conference on Email and Anti-Spam (CEAS). Mountain View: IEEE, 2009: 1–10
Metadata
Title
A Survey of Artificial Intelligence for Industrial Detection
Authors
Jun Li
YiFei Hai
SongJia Yin
Publication date
23-05-2024
Publisher
Springer Berlin Heidelberg
Published in
Annals of Data Science
Print ISSN: 2198-5804
Electronic ISSN: 2198-5812
DOI
https://doi.org/10.1007/s40745-024-00545-0

Premium Partner