Threat Recognition Through Victim And Assailant's Pose And Used Threat Object By Applying YOLOv5s Algorithm | IEEE Conference Publication | IEEE Xplore