{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T23:46:45Z","timestamp":1726184805791},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031201011"},{"type":"electronic","value":"9783031201028"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-20102-8_5","type":"book-chapter","created":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T10:04:11Z","timestamp":1673517851000},"page":"54-66","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Webpage Text Detection Based on Improved Faster-RCNN Model"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8700-8210","authenticated-orcid":false,"given":"Junling","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2132-8035","authenticated-orcid":false,"given":"Moran","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6202-4487","authenticated-orcid":false,"given":"Jianchao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4126-1111","authenticated-orcid":false,"given":"Yijin","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5769-6307","authenticated-orcid":false,"given":"Lifang","family":"Ma","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6973-3366","authenticated-orcid":false,"given":"Pingping","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,13]]},"reference":[{"key":"5_CR1","unstructured":"Lu, Y.H., Gao, J.: Design and implementation of anti-tampering monitoring system for campus secondary websites based on webpage comparison. Experimental Technol. Manage. 28(06), 119\u2013121+133 (2011)"},{"issue":"15","key":"5_CR2","first-page":"4112","volume":"6","author":"LW Sun","year":"2010","unstructured":"Sun, L.W., He, G.F., Wu, L.F.: Research on web crawler technology. Computer Knowledge Technol. 6(15), 4112\u20134115 (2010)","journal-title":"Computer Knowledge Technol."},{"issue":"11\u201316","key":"5_CR3","first-page":"1623","volume":"31","author":"S Chakrabarti","year":"2009","unstructured":"Chakrabarti, S., Van den Berg, M., Dom, B.: Focused crawling: a new approach to topic-specific Web resource discovery. Comput. Netw. 31(11\u201316), 1623\u20131640 (2009)","journal-title":"Comput. Netw."},{"issue":"11","key":"5_CR4","doi-asserted-by":"publisher","first-page":"3111","DOI":"10.1109\/TMM.2018.2818020","volume":"20","author":"J Ma","year":"2018","unstructured":"Ma, J., et al.: Arbitrary-oriented scene text detection via rotation proposals. IEEE Trans. Multimedia 20(11), 3111\u20133122 (2018)","journal-title":"IEEE Trans. Multimedia"},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1109\/TIP.2016.2547588","volume":"25","author":"T He","year":"2016","unstructured":"He, T., Huang, W., Qiao, Y., Yao, J.: Text-attentional convolutional neural network for scene text detection. IEEE Trans. Image Process. 25(6), 2529\u20132541 (2016)","journal-title":"IEEE Trans. Image Process."},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, X., Zeng, Y., Jin., X.B., Yan, Z.W., Geng, G.G.: Boosting the phishing detection performance by semantic analysis. In: 2017 IEEE International Conference on Big Data, pp. 1063\u20131070. IEEE publisher, Piscataway (2017)","DOI":"10.1109\/BigData.2017.8258030"},{"issue":"11","key":"5_CR7","doi-asserted-by":"publisher","first-page":"4737","DOI":"10.1109\/TIP.2014.2353813","volume":"23","author":"C Yao","year":"2014","unstructured":"Yao, C., Bai, X., Liu, W.: A unified framework for multioriented text detection and recognition. IEEE Trans. Image Process. 23(11), 4737\u20134749 (2014)","journal-title":"IEEE Trans. Image Process."},{"issue":"6","key":"5_CR8","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2015","unstructured":"Ren, S., He, K., Girshick, R.: Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2015)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Zhi, T., Huang, W., Tong, H.: Detecting text in natural image with connectionist text proposal network. In: 2016 14th European Conference on Computer Vision, pp. 56\u201372. Springer Science press, Amsterdam (2016). https:\/\/doi.org\/10.1007\/978-3-319-46484-8_4","DOI":"10.1007\/978-3-319-46484-8_4"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Liu, W., Anguelov, D., Erhan, D.: SSD: single shot multi-box detector. In: 2016 14th European Conference on Computer Vision, pp. 21\u201337. Springer Science press, Amsterdam (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Shi, B.G., Bai, X., Belongie, S.: Detecting oriented text in natural images by linking segments. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3482\u20133490. IEEE publisher, Honolulu (2017)","DOI":"10.1109\/CVPR.2017.371"},{"issue":"4","key":"5_CR12","first-page":"640","volume":"39","author":"J Long","year":"2015","unstructured":"Long, J., Shelhamer, E., Darrell, T.: Fully convolutional networks for semantic segmentation. IEEE Trans. Pattern Analysis Machine Intelligence 39(4), 640\u2013651 (2015)","journal-title":"IEEE Trans. Pattern Analysis Machine Intelligence"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Dollar, P., Girshick, R., He, K., Hariharan, B., Belongie, S.: Feature pyramid networks for object detection. In: IEEE Conference on Computer Vision and Pattern Recognition ( CVPR ), pp. 2117\u20132125. IEEE publisher, Honolulu (2017)","DOI":"10.1109\/CVPR.2017.106"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Zhou, X.Y., et al.: EAST: an efficient and accurate scene text detector. In: 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2642\u20132651. IEEE publisher, Honolulu (2017)","DOI":"10.1109\/CVPR.2017.283"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Wang, W.H., et al.: Shape robust text detection with progressive scale expansion network. In: 2019 IEEE \/ CVF Conference on Computer Vision and Pattern Recognition (CVPR ), pp. 9328\u20139337. IEEE publisher, Long Beach (2019)","DOI":"10.1109\/CVPR.2019.00956"},{"issue":"4","key":"5_CR16","first-page":"96","volume":"30","author":"Y Xie","year":"2017","unstructured":"Xie, Y., Lei, Y.: Image object detection based on deep convolutional neural network. Industrial Control Computer 30(4), 96\u201397 (2017)","journal-title":"Industrial Control Computer"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Razavian, A.S., Azizpour, H., Sullivan, J., Carlsson, S.: CNN features off-the-shelf: an astounding baseline for recognition. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops, pp. 512\u2013519. IEEE publisher, Columbus, OH, USA (2014)","DOI":"10.1109\/CVPRW.2014.131"},{"key":"5_CR18","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1016\/j.patcog.2017.10.013","volume":"77","author":"JX Gu","year":"2018","unstructured":"Gu, J.X., et al.: Recent advances in convolutional neural networks. Pattern Recogn. 77, 458\u2013463 (2018)","journal-title":"Pattern Recogn."},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TPAMI.2020.3018491","volume":"44","author":"XJ Rong","year":"2022","unstructured":"Rong, X.J., Yi, C., Tian, Y.L.: Unambiguous text localization, retrieval, and recognition for cluttered scenes. In IEEE Trans. Pattern Analysis Machine Intelligence 44(3), 1638\u20131652 (2022)","journal-title":"In IEEE Trans. Pattern Analysis Machine Intelligence"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.patcog.2019.02.002","volume":"90","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Jin, L., Zhang, S., Luo, C., Zhang, S.: Curved scene textdetection via transverse and longitudinal sequence connection. Pattern Recogn. 90, 337\u2013345 (2019)","journal-title":"Pattern Recogn."},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Patgiri, R., Katari, H., Kumar, R., Sharma, D.: Empirical study on malicious URL detection using machine learning. In: 15th International Conference on Distributed Computing and Internet Technology, pp. 380\u2013388. IEEE publisher, India: Bhubaneswar (2019)","DOI":"10.1007\/978-3-030-05366-6_31"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"144341","DOI":"10.1109\/ACCESS.2021.3121608","volume":"9","author":"OY Ling","year":"2021","unstructured":"Ling, O.Y., Theng, L.B., Weiyen, A.C., Mccarthy, C.: Development of vertical text interpreter for natural scene images. IEEE Access 9, 144341\u2013144351 (2021)","journal-title":"IEEE Access"},{"issue":"11","key":"5_CR23","doi-asserted-by":"publisher","first-page":"5566","DOI":"10.1109\/TIP.2019.2900589","volume":"28","author":"Y Xu","year":"2019","unstructured":"Xu, Y., Wang, Y., Zhou, W., Wang, Y., Yang, Z., Bai, X.: Textfield: Learning a deep direction field for irregular scene text detection. IEEE Trans. Image Process. 28(11), 5566\u20135579 (2019)","journal-title":"IEEE Trans. Image Process."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Bodla, N., Singh, B., Chellappa, R.: Soft-NMS-Improving object detection with one line of code. In: 2017 IEEE International Conference on Computer Vision, pp. 5562\u20135570. IEEE publisher, Venice, Italy (2017)","DOI":"10.1109\/ICCV.2017.593"},{"issue":"11","key":"5_CR25","first-page":"377","volume":"6","author":"YF Liu","year":"2020","unstructured":"Liu, Y.F., Lu, B.H., Peng, J.Y.: Research on the use of YOLOv5 object detection algorithm in mask recognition. World Scientific Reaearch J. 6(11), 377\u2013383 (2020)","journal-title":"World Scientific Reaearch J."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Duan, K.W., Song, B., Xie, L.: Center Net: keypoint triplets for object detection. In: Proceedings of 2019IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 6568\u20136577. IEEE publisher, Seoul, Korea (2019)","DOI":"10.1109\/ICCV.2019.00667"}],"container-title":["Lecture Notes in Computer Science","Machine Learning for Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20102-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T10:27:58Z","timestamp":1673519278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20102-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031201011","9783031201028"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20102-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ML4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning for Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ml4cs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ml4cs2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}