{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T00:36:32Z","timestamp":1722558992776},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819755967","type":"print"},{"value":"9789819755974","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5597-4_34","type":"book-chapter","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T09:10:06Z","timestamp":1722503406000},"page":"403-415","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Handheld Knife Stick Detection Based on Dual-Path Multi-layer Residuals"],"prefix":"10.1007","author":[{"given":"Liuhui","family":"Jin","sequence":"first","affiliation":[]},{"given":"Quanli","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Chenchen","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Jiyang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Changle","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Jiaxuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yanhua","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,2]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Tamboli, S., Jagadale, K., Mandavkar, S., Katkade, N., Ruprah, T.S.: A comparative analysis of weapons detection using various deep learning techniques. In: 20237th International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1141\u20131147. IEEE (2023)","DOI":"10.1109\/ICOEI56765.2023.10125710"},{"key":"34_CR2","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10044-017-0640-9","volume":"21","author":"VH Gaidhane","year":"2018","unstructured":"Gaidhane, V.H., Hote, Y.V., Singh, V.: An efficient similarity measure approach for PCB surface defect detection. Pattern Anal. Appl. 21, 277\u2013289 (2018)","journal-title":"Pattern Anal. Appl."},{"key":"34_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118698","volume":"212","author":"P Yadav","year":"2023","unstructured":"Yadav, P., Gupta, N., Sharma, P.K.: A comprehensive study towards high-level approaches for weapon detection using classical machine learning and deep learning methods. Expert Syst. Appl. 212, 118698 (2023)","journal-title":"Expert Syst. Appl."},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"34366","DOI":"10.1109\/ACCESS.2021.3059170","volume":"9","author":"MT Bhatti","year":"2021","unstructured":"Bhatti, M.T., Khan, M.G., Aslam, M., Fiaz, M.J.: Weapon detection in real-time CCTV videos using deep learning. IEEE Access 9, 34366\u201334382 (2021)","journal-title":"IEEE Access"},{"issue":"6","key":"34_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Commun. ACM 60(6), 84\u201390 (2017)","journal-title":"Commun. ACM"},{"key":"34_CR6","doi-asserted-by":"crossref","unstructured":"Lin, T.Y., Goyal, P., Girshick, R., He, K., Doll\u00e1r, P.: Focal loss for dense object detection. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2980\u20132988 (2017)","DOI":"10.1109\/ICCV.2017.324"},{"key":"34_CR7","unstructured":"Tian, Z., Chu, X., Wang, X., Wei, X., Shen, C.: Fully convolutional one-stage 3D object detection on LiDAR range images. In: Advances in Neural Information Processing Systems, vol. 35, pp. 34899\u201334911 (2022)"},{"key":"34_CR8","doi-asserted-by":"publisher","unstructured":"Zhu, C., Chen, F., Shen, Z., Savvides, M.: Soft anchor-point object detection. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.M. (eds.) ECCV 2020. LNCS, Part IX, vol. 12354, pp. 91\u2013107. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58545-7_6","DOI":"10.1007\/978-3-030-58545-7_6"},{"key":"34_CR9","unstructured":"Ren, S., He, K., Girshick, R., Sun, J.: Faster R-CNN: towards real-time object detection with region proposal networks. In: Advances in Neural Information Processing Systems, vol. 28 (2015)"},{"key":"34_CR10","doi-asserted-by":"publisher","unstructured":"Liu, W., et al.: SSD: Single shot MultiBox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, Part I, vol. 9905, pp. 21\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46448-0_2","DOI":"10.1007\/978-3-319-46448-0_2"},{"key":"34_CR11","unstructured":"Redmon, J., Farhadi, A.: YOLOV3: an incremental improvement. arXiv preprint arXiv:1804.02767 (2018)"},{"key":"34_CR12","unstructured":"Bochkovskiy, A., Wang, C.Y., Liao, H.Y.M.: YOLOV4: optimal speed and accuracy of object detection. arXiv preprint arXiv:2004.10934 (2020)"},{"key":"34_CR13","unstructured":"Long, X., et al.: PP-YOLO: an effective and efficient implementation of object detector. arXiv preprint arXiv:2007.12099 (2020)"},{"key":"34_CR14","unstructured":"Yu, G., et al.: PP-PicoDet: a better real-time object detector on mobile devices. arXiv preprint arXiv:2111.00902 (2021)"},{"key":"34_CR15","unstructured":"Vaswani, A., et al.: Attention is all you need. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"34_CR16","unstructured":"Dosovitskiy, A., et al.: An image is worth 16x16 words: transformers for image recognition at scale. arXiv preprint arXiv:2010.11929 (2020)"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Hou, Q., Zhou, D., Feng, J.: Coordinate attention for efficient mobile network design. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 13713\u201313722 (2021)","DOI":"10.1109\/CVPR46437.2021.01350"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Lee, Y., Kim, J., Willette, J., Hwang, S.J.: MPViT: multi-path vision transformer for dense prediction. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 7287\u20137296 (2022)","DOI":"10.1109\/CVPR52688.2022.00714"},{"key":"34_CR19","first-page":"2761","volume":"70","author":"AH Ashraf","year":"2022","unstructured":"Ashraf, A.H., et al.: Weapons detection for security and video surveillance using CNN and YOLO-V5s. CMC Comput. Mater. Contin. 70, 2761\u20132775 (2022)","journal-title":"CMC Comput. Mater. Contin."},{"key":"34_CR20","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.neucom.2017.05.012","volume":"275","author":"R Olmos","year":"2018","unstructured":"Olmos, R., Tabik, S., Herrera, F.: Automatic handgun detection alarm in videos using deep learning. Neurocomputing 275, 66\u201372 (2018)","journal-title":"Neurocomputing"},{"key":"34_CR21","doi-asserted-by":"publisher","unstructured":"Fernandez-Carrobles, M.M., Deniz, O., Maroto, F.: Gun and knife detection based on faster R-CNN for video surveillance. In: Morales, A., Fierrez, J., S\u00e1nchez, J., Ribeiro, B. (eds.) IbPRIA 2019. LNCS, vol. 11868, pp. 441\u2013452. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31321-0_38","DOI":"10.1007\/978-3-030-31321-0_38"},{"key":"34_CR22","unstructured":"Doan, T.S., Nguyen, T.K.T., Vo, T.A.: Weapon detection with yolo model version 5, 7, 8 (2023)"},{"key":"34_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2022.103790","volume":"132","author":"G Wang","year":"2023","unstructured":"Wang, G., Ding, H., Duan, M., Pu, Y., Yang, Z., Li, H.: Fighting against terrorism: a real-time CCTV autonomous weapons detection based on improved Yolo V4. Digit. Signal Process. 132, 103790 (2023)","journal-title":"Digit. Signal Process."},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Yu, W., et al.: MetaFormer is actually what you need for vision. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 10819\u201310829 (2022)","DOI":"10.1109\/CVPR52688.2022.01055"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Qi, D., Tan, W., Liu, Z., Yao, Q., Liu, J.: A dataset and system for real-time gun detection in surveillance video using deep learning. In: 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 667\u2013672. IEEE (2021)","DOI":"10.1109\/SMC52423.2021.9659207"},{"key":"34_CR26","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.neucom.2018.10.076","volume":"330","author":"A Castillo","year":"2019","unstructured":"Castillo, A., Tabik, S., P\u00e9rez, F., Olmos, R., Herrera, F.: Brightness guided preprocessing for automatic cold steel weapon detection in surveillance videos with deep learning. Neurocomputing 330, 151\u2013161 (2019)","journal-title":"Neurocomputing"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5597-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T09:17:29Z","timestamp":1722503849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5597-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819755967","9789819755974"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5597-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}