YOLO in Suspicious Human Activity Recognition for Intelligent Environmental Security Systems: A Review
DOI:
https://doi.org/10.37012/jtik.v12i1.3243Abstract
The rapid growth of intelligent environmental security systems has intensified the need for accurate and real-time suspicious human activity recognition. Computer vision techniques, particularly deep learning–based object detection models, have emerged as key enablers in addressing these challenges. Among them, You Only Look Once (YOLO) has gained significant attention due to its high detection speed, end-to-end architecture, and suitability for real-time surveillance applications. This review paper presents a comprehensive analysis of the application of YOLO-based models in suspicious human activity recognition for intelligent environmental security systems. It examines the evolution of YOLO architectures, their adaptations for activity and behavior analysis, and their integration with surveillance frameworks. The review further discusses commonly used datasets, performance evaluation metrics, and comparative results reported in existing studies. In addition, key challenges such as occlusion, varying illumination, complex backgrounds, privacy concerns, and computational constraints are highlighted. Finally, the paper outlines future research directions, including hybrid models, multi-modal data fusion, edge-based deployment, and explainable AI, to enhance the robustness and reliability of YOLO-driven security systems. This review aims to provide researchers and practitioners with a structured understanding of current advancements and open issues in YOLO-based suspicious human activity recognition.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2026 Yohanes Bowo Widodo, Sondang Sibuea, Rano Agustino

This work is licensed under a Creative Commons Attribution 4.0 International License.
Jurnal Teknologi Informatika dan Komputer allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles and allow readers to use them for any other lawful purpose. The journal allows the author(s) to hold the copyright without restrictions. Finally, the journal allows the author(s) to retain publishing rights without restrictions Authors are allowed to archive their submitted article in an open access repository Authors are allowed to archive the final published article in an open access repository with an acknowledgment of its initial publication in this journal.

Jurnal Teknlogi Informatika dan Komputer is licensed under a Creative Commons Attribution 4.0 International License.









