[1]
N. N. Namithadevi, S. D. Bhuvana, M. D. Tarun, K. S. Reddy, and P. S. Gowda, “Suspicious Activity Detection using LSTM and MobileNetV2”, IJRESM, vol. 7, no. 5, pp. 81–85, May 2024, doi: 10.5281/zenodo.11195713.