Top Threat Computer Vision Models
The models below have been fine-tuned for various threat detection tasks. You can try out each model in your browser, or test an edge deployment solution (i.e. to an NVIDIA Jetson). You can use the datasets associated with the models below as a starting point for building your own threat detection model.
At the bottom of this page, we have guides on how to count threats in images and videos.
by coachingAI
132 images 9 classes
A Spiteful Shade has set its sights on the player Adversaries summon totems on the ground, which can become a substantial threat if they are not promptly dealt with. An enemy is in the process of casting a perilous spell An enemy's spellcasting has been interrupted by the player Fire orbs materialize beneath or beside players Player Spiteful Shades spawn upon an enemy's demise The orbs eventually detonate, delivering a knockback and inflicting damage. The player eliminates a Spiteful Shade
by IDRBT
134 images 30 classes
ATM ATM opened Attacker Hooded user (male) Inserting card Might have an object (hidden hand) Person Person assisting (spurious activity) Person bending Phone Physical Assault Physical Assault (male) Reaching behind ATM Safe Attempted to be opened Security (male) Setting up Phone (record pin) Stealing customer details (peeking) Threat (fight) USB Un-identifiable
by magic
6257 images 1778 classes
camera face human light people ##ce euphoria ##ce euphoria empowerment ##ec competition ##ec diligence euphoria ##ec diligencephoria ##ecurity competition ##ecurity humility ##enity diligence ##enity diligence euphoria ##igence euphoria ##igence euphoria empowerment ##sil comfort ##sil diligence euphoria ##sil insec diligence euphoria ##sil serenity diligence euphoria
1 - 30 of 100k+