See it in action.

A complete security dashboard with live detection feed, real-time analytics, and instant Telegram alerts.

FinderFileEditViewGoWindowHelp
Mon Jun 22 9:41 AM
Menu
Live Monitoring. Real-time camera feed with skeleton overlays, active threat levels, and critical system health metrics.
Live Capabilities

Proactive Safety.
Complete Privacy.

Instant detection. Zero facial recognition.

CAM_04_SOUTH
HOSTILITY DETECTED
CONF: 99.4%LATENCY: 1.2s
Core Infrastructure

Proactive Security.
Uncompromising Safety.

Enterprise-grade threat detection designed to protect educational campuses. We process streams in milliseconds so you can prevent incidents before they escalate.

Live System

Dual-Stream HPI-GCN

Our Hierarchy-aware Part-Informed Graph Convolutional Network analyzes both spatial joint relationships and temporal motion dynamics to detect aggressive behavior with 99.4% accuracy.

⚠️
AI Guardian
Just now
Hostility detected in Corridor A. Confidence: 98%.

Instant Alerts

Real-time push notifications sent directly to administration via Telegram/WhatsApp APIs.

<2s

Response Time

From detection to notification, optimized for YOLOv11 and TensorRT.

Integrates With Existing CCTV

No need for expensive new hardware. AI Guardian processes standard RTSP streams from any IP camera, transforming legacy infrastructure into an active threat-prevention network.

How It Works

Camera to alert.
Under two seconds.

Connect

Any RTSP camera, webcam, or video file. One click to start real-time monitoring.

Analyze

Stage 1: YOLO11n-Pose extracts skeletal keypoints. Stage 2: HPI-GCN-RP graph network classifies aggression patterns.

Alert

Instant Telegram notification with screenshot and confidence score. Review and confirm directly from your phone.

Total Latency: < 2 seconds

Try it yourself.

Upload a test footage and watch our dual-stage cascade detect aggressive behavior in real-time.

All processing is simulated in this browser demo. No data leaves your device.
Open Source

Built in the Open.

AI Guardian is fully open-source. Inspect every line of code. Deploy on your own infrastructure. Own your security data completely.