A Hybrid Deep Learning Model for Efficient Anomaly Detection in Video Surveillance Systems
- Authors
-
-
Abba M. BALA
Department of Computer Science, Faculty of Computing, Northwest University, Kano, Kano State, Nigeria
Author
-
Abdurrauf G. SHARIFAI
Department of Computer Science, Faculty of Computing, Northwest University, Kano, Kano State, Nigeria
Author
-
Umar S. HARUNA
Department of Cybersecurity, Faculty of Computing, Northwest University, Kano, Kano State, Nigeria
Author
-
- Keywords:
- CNN, ViT, Swin-Transformer, VAD, Attention Mechanism, Feature Fusion.
- Abstract
-
Traditional CNNs often face challenges in capturing long-range dependencies and contextual relationships within data, which limits their effectiveness in complex tasks like anomaly detection. To overcome these limitations, we propose an innovative enhanced attention-mechanism hybrid model that combines the strengths of CNNs with Transformer architecture. This hybrid model leverages the powerful feature extraction capabilities of four distinct CNN architectures, VGG16, DenseNet121, ResNet50, and MobileNetV2. To process the training data comprehensively, the extracted features are fused and passed through Swin Transformer which integrates attention mechanisms to capture long-range dependencies within the data effectively, and focuses on the most relevant regions of the input data. The effectiveness of this approach is evaluated on the UCF-Crime benchmark dataset using performance metrics such as ROC-AUC, achieving an outstanding accuracy of 99.2% surpassing existing state-of-the-art methods. Moreover, the model’s ability to handle complex video data and extract semantically rich features highlights its potential for real-time surveillance applications where timely and accurate anomaly detection is critical.
- References
- Downloads
- Published
- 02-03-2026
- Section
- Articles
- License
-
Copyright (c) 2026 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Umar A. IBRAHIM, Abdulra’uf G. SHARIFAI, Hybrid CNN Feature Fusion with Optimization for Precision Potato Leaf Disease Classification , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Yusuf T. BAFFA, Muhammad Y. MUHAMMAD, Aliyu SHUAIBU, Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Jennifer BALA, Sikiru O. SUBAIRU, Noel M. DOGONYARO, Joseph A. OJENIYI, Suleiman AHMAD, Development of an Optimized Hybrid XGBoost–GRU Model for Detection of Ponzi Schemes in Ethereum Transaction Networks , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Muyideen O. MOMOH, Emmanuel I. AWODE, Gowon SULE, Umar ABUBAKAR, Ikechukwu O. ALUM, Usman K. AMINU, Bio-Inspired Flight Mechanisms for Unmanned Aerial Vehicles: An Overview , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Joseph A. OJENIYI, Zainab L. BELLO, Ismail IDRIS, Noel M. DOGONYARO, Suleiman AHMAD, Sikiru O. SUBAIRU, Entropy-Based Deep Learning Framework for Classifying Ransomware Families in Windows Environment , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Kazeem A. BELLO, Adeniyi O. ADESINA, Lukman A. OPEYEMI, Solomon O. UVIASE, The Impact of Industry 4.0 on New Product Development in Small and Medium Enterprises: A Review , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Abubakar A. IBRAHIM, Fatimah Y. GARBA, Fatimah A. MUHAMMAD, Ismail B. ADEFESO, Bello A. ISAH, Jacob OLAYIWOLA, Industrial and Biomedical Applications Biobased Polymers of Polylactic Acid and Polyhydroxybutyrate: A Review , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
