[1]
N. N. Namithadevi, S. D. Bhuvana, M. D. Tarun, K. S. Reddy, and P. S. Gowda, “Suspicious Activity Detection using LSTM and MobileNetV2”, IJRESM, vol. 7, no. 5, pp. 81–85, May 2024, Accessed: Dec. 21, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/3033