iProtect: Detecting Physical Assault Using Smartphone

  • Zehao Sun
  • Shaojie Tang
  • He HuangEmail author
  • Liusheng Huang
  • Zhenyu Zhu
  • Hansong Guo
  • Yu-e Sun
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9204)


Motivated by the reports about assaults on women, especially college girls, in China, we take the first step to explore possibility of using off-the-shelf smartphone for physical assault detection. The most difficult one among challenges in our design is the extraordinary complexity and diversity of various assault instances, which lead to an extremely hard, if not impossible, to perform fine-grained recognition. To this end, we decide to focus on the characteristics of intensity and irregularity, based on which several features are extracted. Moreover, we proposed a combinatorial classification scheme considering individuality of user’s ADLs(Activities of Daily Living) and universality of differences between ADLs and assaults to most people. The data we used for evaluation are collected from simulated assaults which are performed by our volunteers in controlled settings. Our experiment results showed that physical assaults could be distinguished with the majority of ADLs in our proposed feature space, and our proposed system could correctly detect most instances of aggravated assault with low false alarm rate and short delay.


Assault detection Smartphone sensing Activity recognition Machine learning 



This paper is supported by the National Science and Technology Major Project under No. 2012ZX03005-009, National Science Foundation of China under No. U1301256, 61170058, Special Project on IoT of China NDRC (2012-2766), Research Fund for the Doctoral Program of Higher Education of China No. 20123402110019, and joint innovation fund of Jiangsu Provision No. BY2012127.


  1. 1.
    Lane, N.D., Miluzzo, E., Lu, H., Peebles, H.: A survey of mobile phone sensing. Commun. Mag. 48(9), 140–150 (2010)CrossRefGoogle Scholar
  2. 2.
    Ladha, C., Hammerla, N.Y., Olivier, P., et al.: ClimbAX: Skill assessment for climbing enthusiasts. In: Ubicomp 2013, ACM, pp 235–244 (2013)Google Scholar
  3. 3.
    Buman, M.P., et al.: Objective light-intensity physical activity associations with rated health in older adults. Am. J. Epidemiol. 172(10), 1155–1165 (2010)CrossRefGoogle Scholar
  4. 4.
    Parate, A., Chiu, M.C., et al.: RisQ: recognizing smoking gestures with inertial sensors on a wristband. In: Mobisys 2014, ACM, pp 149–161 (2014)Google Scholar
  5. 5.
    Hung, H., Englebienne, G., Kools, J.: Classifying social actions with a single accelerometer. In: Ubicomp 2013, ACM, pp 207–21 (2013)Google Scholar
  6. 6.
  7. 7.
  8. 8.
  9. 9.
    Tax, D.M., Duin, R.P.: Support vector data description. Mach. Learn. 54(1), 45–66 (2004)CrossRefzbMATHGoogle Scholar
  10. 10.
    PPlatt, J.: Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods. Advances in large margin classifiers (1999)Google Scholar
  11. 11.
    Ward, J.A., et al.: TIST. Perform. Metrics Act. Recogn. 2(1), 6 (2011)Google Scholar
  12. 12.
    Gu, T., et al.: An unsupervised approach to activity recognition and segmentation based on object-use fingerprints. Data Knowl. Eng. 69(6), 533–544 (2010)CrossRefGoogle Scholar
  13. 13.
    Kwapisz, J.R., Weiss, G.M., Moore, S.A.: Activity recognition using cell phone accelerometers. ACM SigKDD Explor. Newsl. 12(2), 74–82 (2011)CrossRefGoogle Scholar
  14. 14.
    Kong, Q., Maekawa, T.: Sharing training data among different activity classes. In: Ubicomp 2013, ACM, pp 701–712 (2013)Google Scholar
  15. 15.
    Cheng, H.T., Sun, F.T., et al.: Nuactiv: recognizing unseen new activities using semantic attribute-based learning. In: Mobisys 2013, ACM, pp 361–374 (2013)Google Scholar
  16. 16.
    Stikic, M., Van Laerhoven, K., Schiele, B.: Exploring semi-supervised and active learning for activity recognition. In: ISWC 2008, IEEE, pp 81–88 (2008)Google Scholar
  17. 17.
    Maekawa, T., Watanabe, S.: Unsupervised activity recognition with user’s physical characteristics data. In: ISWC 2011, IEEE, pp 89–96 (2011)Google Scholar
  18. 18.
    Bagaveyev, S., Cook, D.J.: Designing and evaluating active learning methods for activity recognition. In: Ubicomp 2014, ACM, pp 469–478 (2014)Google Scholar
  19. 19.
    Yin, J., Yang, Q., Pan, J.J.: Sensor-based abnormal human-activity detection. IEEE Trans. Knowl. Data Eng. 20(8), 1082–1090 (2008)CrossRefGoogle Scholar
  20. 20.
    Zheng, Y., Jeon, B., Xu, D., Wu, Q.J., Zhang, H.: Image segmentation by generalized hierarchical fuzzy C-means algorithm. J. Intell. Fuzzy Syst. 28(2), 961–973 (2015)Google Scholar
  21. 21.
    Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for support vector regression. Neural Netw. 67, 140–150 (2015)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Zehao Sun
    • 1
  • Shaojie Tang
    • 3
  • He Huang
    • 2
    Email author
  • Liusheng Huang
    • 1
  • Zhenyu Zhu
    • 1
  • Hansong Guo
    • 1
  • Yu-e Sun
    • 2
  1. 1.University of Science and Technology of ChinaHefeiChina
  2. 2.Soochow UniversitySuzhouChina
  3. 3.University of Texas at DallasDallasUSA

Personalised recommendations