{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T23:40:23Z","timestamp":1730590823464,"version":"3.28.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819787944","type":"print"},{"value":"9789819787951","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,3]],"date-time":"2024-11-03T00:00:00Z","timestamp":1730592000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8795-1_17","type":"book-chapter","created":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T23:04:07Z","timestamp":1730588647000},"page":"246-260","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["114Xray: A Large-Scale X-Ray Security Detection Benchmark and\u00a0Aware Enhance Network for\u00a0Real-World Prohibited Item Inspection in\u00a0Baggage"],"prefix":"10.1007","author":[{"given":"Hongxia","family":"Gao","sequence":"first","affiliation":[]},{"given":"Zhenming","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Yaobin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Xiaomeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hongyu","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hongzhen","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Runze","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Litao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haolin","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Guoyuan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Zhanhong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,3]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ak\u00e7ay, S., Kundegorski, M.E., Devereux, M., Breckon, T.P.: Transfer learning using convolutional neural networks for object classification within x-ray baggage security imagery. In: 2016 IEEE International Conference on Image Processing (ICIP), pp. 1057\u20131061. IEEE (2016)","DOI":"10.1109\/ICIP.2016.7532519"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Cai, Z.: Cascade r-cnn: Delving into high quality object detection. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 6154\u20136162 (2018)","DOI":"10.1109\/CVPR.2018.00644"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Carion, N., Massa, F., Synnaeve, G., Usunier, N., Kirillov, A., Zagoruyko, S.: End-to-end object detection with transformers. In: European Conference on Computer Vision, pp. 213\u2013229. Springer (2020)","DOI":"10.1007\/978-3-030-58452-8_13"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Feng, C., Zhong, Y., Gao, Y., Scott, M.R., Huang, W.: Tood: Task-aligned one-stage object detection. In: 2021 IEEE\/CVF International Conference on Computer Vision (ICCV), pp. 3490\u20133499. IEEE Computer Society (2021)","DOI":"10.1109\/ICCV48922.2021.00349"},{"key":"17_CR5","unstructured":"Ge, Z., Liu, S., Wang, F., Li, Z., Sun, J.: Yolox: Exceeding yolo series in 2021. arXiv preprint arXiv:2107.08430 (2021)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"He, K., Gkioxari, G., Doll\u00e1r, P., Girshick, R.: Mask r-cnn. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 2961\u20132969 (2017)","DOI":"10.1109\/ICCV.2017.322"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Howard, A., Sandler, M., Chu, G., Chen, L.C., Chen, B., Tan, M., Wang, W., Zhu, Y., Pang, R., Vasudevan, V., et\u00a0al.: Searching for mobilenetv3. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 1314\u20131324 (2019)","DOI":"10.1109\/ICCV.2019.00140"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Li, M., Ma, B., Wang, H., Chen, D., Jia, T.: Gadet: A geometry-aware x-ray prohibited items detector. IEEE Sensors J. (2023)","DOI":"10.1109\/JSEN.2023.3332171"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Li, Y., Mao, H.: Exploring plain vision transformer backbones for object detection. In: European Conference on Computer Vision, pp. 280\u2013296. Springer (2022)","DOI":"10.1007\/978-3-031-20077-9_17"},{"issue":"18","key":"17_CR10","doi-asserted-by":"publisher","first-page":"3934","DOI":"10.3390\/electronics12183934","volume":"12","author":"Y Li","year":"2023","unstructured":"Li, Y., Zhang, C., Sun, S., Yang, G.: X-ray detection of prohibited item method based on dual attention mechanism. Electronics 12(18), 3934 (2023)","journal-title":"Electronics"},{"issue":"4","key":"17_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s10921-015-0315-7","volume":"34","author":"D Mery","year":"2015","unstructured":"Mery, D., Riffo, V., Zscherpel, U., Mondrag\u00f3n, G., Lillo, I., Zuccar, I., Lobel, H., Carrasco, M.: Gdxray: the database of x-ray images for nondestructive testing. J. Nondestr. Eval. 34(4), 42 (2015)","journal-title":"J. Nondestr. Eval."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Miao, C., Xie, L., Wan, F., Su, C., Liu, H., Jiao, J., Ye, Q.: Sixray: A large-scale security inspection x-ray benchmark for prohibited item discovery in overlapping images. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 2119\u20132128 (2019)","DOI":"10.1109\/CVPR.2019.00222"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Ouyang, D., He, S., Zhang, G., Luo, M., Guo, H., Zhan, J., Huang, Z.: Efficient multi-scale attention module with cross-spatial learning. In: ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.\u00a01\u20135. IEEE (2023)","DOI":"10.1109\/ICASSP49357.2023.10096516"},{"issue":"6","key":"17_CR14","doi-asserted-by":"publisher","first-page":"1137","DOI":"10.1109\/TPAMI.2016.2577031","volume":"39","author":"S Ren","year":"2017","unstructured":"Ren, S., He, K., Girshick, R.: Faster r-cnn: towards real-time object detection with region proposal networks. IEEE Trans. Pattern Anal. Mach. Intell. 39(6), 1137\u20131149 (2017)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Tao, R., Wei, Y., Jiang, X., Li, H., Qin, H., Wang, J., Ma, Y., Zhang, L., Liu, X.: Towards real-world x-ray security inspection: A high-quality benchmark and lateral inhibition module for prohibited items detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision, pp. 10923\u201310932 (2021)","DOI":"10.1109\/ICCV48922.2021.01074"},{"issue":"7","key":"17_CR16","doi-asserted-by":"publisher","first-page":"2865","DOI":"10.1007\/s00371-022-02498-y","volume":"39","author":"M Wang","year":"2023","unstructured":"Wang, M., Du, H., Mei, W., Wang, S., Yuan, D.: Material-aware cross-channel interaction attention (mcia) for occluded prohibited item detection. Vis. Comput. 39(7), 2865\u20132877 (2023)","journal-title":"Vis. Comput."},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Wei, Y., Tao, R., Wu, Z., Ma, Y., Zhang, L., Liu, X.: Occluded prohibited items detection: An x-ray security inspection benchmark and de-occlusion attention module. In: Proceedings of the 28th ACM International Conference on Multimedia, pp. 138\u2013146 (2020)","DOI":"10.1145\/3394171.3413828"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Wu, J., Xu, X., Yang, J.: Object detection and x-ray security imaging: a survey. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3273736"},{"key":"17_CR19","unstructured":"Zhang, H., Li, F., Liu, S., Zhang, L., Su, H., Zhu, J., Ni, L.M., Shum, H.Y.: Dino: Detr with improved denoising anchor boxes for end-to-end object detection. arXiv preprint arXiv:2203.03605 (2022)"},{"issue":"12","key":"17_CR20","doi-asserted-by":"publisher","first-page":"3170","DOI":"10.1007\/s11263-023-01855-1","volume":"131","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Jiang, L., Ji, R., Fan, H.: Pidray: a large-scale x-ray benchmark for real-world prohibited item detection. Int. J. Comput. Vision 131(12), 3170\u20133192 (2023)","journal-title":"Int. J. Comput. Vision"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, S., Chi, C., Yao, Y., Lei, Z., Li, S.Z.: Bridging the gap between anchor-based and anchor-free detection via adaptive training sample selection. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 9759\u20139768 (2020)","DOI":"10.1109\/CVPR42600.2020.00978"},{"key":"17_CR22","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/TIFS.2022.3154287","volume":"17","author":"C Zhao","year":"2022","unstructured":"Zhao, C., Zhu, L., Dou, S., Deng, W., Wang, L.: Detecting overlapped objects in x-ray security imagery by a label-aware mechanism. IEEE Trans. Inf. Forensics Secur. 17, 998\u20131009 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition and Computer Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8795-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T23:04:41Z","timestamp":1730588681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8795-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,3]]},"ISBN":["9789819787944","9789819787951"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8795-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,3]]},"assertion":[{"value":"3 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PRCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chinese Conference on Pattern Recognition and Computer Vision (PRCV)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Urumqi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ccprcv2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2024.prcv.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}